CN114944030A - Access control method and device - Google Patents

Access control method and device Download PDF

Info

Publication number
CN114944030A
CN114944030A CN202210546396.4A CN202210546396A CN114944030A CN 114944030 A CN114944030 A CN 114944030A CN 202210546396 A CN202210546396 A CN 202210546396A CN 114944030 A CN114944030 A CN 114944030A
Authority
CN
China
Prior art keywords
person
access control
image
face
facial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210546396.4A
Other languages
Chinese (zh)
Other versions
CN114944030B (en
Inventor
毕化镭
朱徐立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202210546396.4A priority Critical patent/CN114944030B/en
Publication of CN114944030A publication Critical patent/CN114944030A/en
Application granted granted Critical
Publication of CN114944030B publication Critical patent/CN114944030B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides an access control method and device, relates to the technical field of image processing, and can be used for identifying persons to be accessed, who do not store facial images, of an access control system. The specific scheme comprises the following steps: the method comprises the steps of firstly obtaining a first request for opening the entrance guard, wherein the first request comprises a first association degree which is used for indicating the face association degree between a first person and a second person; in response to the first request, acquiring a face image of the first person and a face image of the second person; determining a second degree of association between the facial image of the first person and the facial image of the second person; and when the difference value between the first association degree and the second association degree is within a preset range, responding to the first request, and controlling the entrance guard to be opened.

Description

Access control method and device
Technical Field
The application relates to the technical field of intelligent security and protection, in particular to an access control method and device.
Background
The entrance guard safety management system is a novel modern safety management system and is mainly applied to the aspects of safety management, passing vehicle management, personnel attendance management and the like of important entrances and exits. Along with the development of society, besides the traditional induction card type access control system, the access control systems of various technologies such as a fingerprint access control system, an iris access control system, a facial recognition access control system, a finger vein recognition access control system, an out-of-order keyboard access control system and the like are also available.
The face recognition access control system can acquire images or video streams containing human faces by using a camera or a camera, so that the human faces are automatically detected and tracked in the images, and further identity recognition is carried out. The identification process of the system does not need to be in direct contact with a person to be communicated, the operation is simple, the result is visual, the concealment is good, and therefore the system is wide in application.
However, the face recognition access control system usually adopts a mode of pre-storing face information of persons who may pass, and when the person to be passed needs to pass, the system compares the face information of the person collected on site with the face information pre-stored in the system so as to recognize the identity of the person to be passed. However, this approach is not suitable for identifying persons who are permitted temporary passage who have no facial information stored in the system.
Disclosure of Invention
The application provides an access control method and device, which can be used for identifying a person to be accessed, who does not store a facial image, of an access control system.
In order to achieve the technical purpose, the following technical scheme is adopted in the application:
in a first aspect, an embodiment of the present application provides an access control method, where the method includes: the method comprises the steps of firstly obtaining a first request for opening the entrance guard, wherein the first request comprises a first association degree which is used for indicating the face association degree between a first person and a second person; in response to the first request, acquiring a face image of the first person and a face image of the second person; determining a second degree of association between the facial image of the first person and the facial image of the second person; and when the difference value between the first association degree and the second association degree is within a preset range, responding to the first request, and controlling the entrance guard to be opened.
The access control method can acquire the face association degree between the face images acquired at different moments between the first person and the second person, namely the first association degree and the second association degree. Further, the access control device may have determined whether the first person and the second person are passable by comparing the first degree of association and the second degree of association. Therefore, the access control system is not required to store the facial images of the persons to be communicated, the leakage risk of the facial images of the persons can be reduced, the privacy safety of the persons is protected, and the storage space of the access control system is saved.
In a possible implementation manner, when the difference between the first degree of association and the second degree of association is not within a preset range, the entrance guard is kept closed.
In another possible implementation manner, the access control is an access control of a kindergarten, the first person is a pick-up person, and the second person is a child picked up by the pick-up person; alternatively, the first person is a pick-up person, and the second person is a person related to a child who has a face image recorded in an access control system of a kindergarten.
In yet another possible implementation, the first request further includes facial detail features of the first person; then when the difference between the first degree of association and the second degree of association is within the preset range, controlling the entrance guard to open specifically includes: and the difference between the first relevance degree and the second relevance degree is within a preset range, and the facial image of the first person is matched with the facial detail characteristics to control the entrance guard to be opened.
It can be understood that the entrance guard control device can perform double recognition on the facial images of the first person and the second person through the relationship between the second association degree and the first association degree and the facial detail features of the first person, and the recognition accuracy can be improved.
In yet another possible implementation, before determining the second degree of association between the face image of the first person and the face image of the second person, the method further comprises: determining an image quality of a facial image of a first person and an image quality of a facial image of a second person; when the image quality of the face image of the first person is lower than a preset image quality threshold, the face image of the first person is obtained again; and/or when the image quality of the face image of the second person is lower than a preset threshold value, the face image of the second person is obtained again.
It is understood that the higher the image quality of the face image is, the sharper the face features of the person represented by the face image is, and thus the more accurate the image association degree determined from the face image with high image quality is. Therefore, this implementation may improve the accuracy of the second degree of association.
In yet another possible implementation manner, the first request further includes an access validity time; before the acquiring the face image of the first person and the face image of the second person, the method further includes: if the current time is within the effective access time, acquiring a face image of a first person and a face image of a second person; and if the current moment is not within the access effective time, controlling the entrance guard to be closed.
In another possible implementation manner, the obtaining the first request for opening the access control specifically includes: scanning a preset identification code to obtain a first request for opening the access control, wherein the preset identification code is an identification code generated based on the first association degree.
In yet another possible implementation manner, the method is applied to an access control system, where the access control system includes a first face recognition device, and the face image of the first person and the face image of the second person are collected by the first face recognition device of the access control system; or the facial image of the first person is collected by a first facial recognition device of the access control system, and the facial image of the second person is recorded in the access control system.
In yet another possible implementation manner, the access control system further includes a second face collecting device, the facial image of the first person is collected by the first face recognition device, and the facial image of the second person is collected by the second face recognition device.
In a second aspect, the present application provides an access control device. The device includes: the receiving and sending module is used for obtaining a first request for opening the entrance guard, the first request comprises a first association degree, the first association degree is used for indicating the face association degree between a first person and a second person, and the receiving and sending module is further used for responding to the first request and obtaining a face image of the first person and a face image of the second person. The processing module is used for determining a second association degree between the facial image of the first person and the facial image of the second person, and is further used for responding to the first request and controlling the entrance guard to be opened when a difference value between the first association degree and the second association degree is within a preset range.
In a possible implementation manner, the processing module is further configured to keep the access control closed when a difference between the first association degree and the second association degree is not within a preset range.
In another possible implementation manner, the access control is a kindergarten access control, the first person is a pick-up person, and the second person is a child picked up by the pick-up person; alternatively, the first person is a pick-up person, and the second person is a person related to a child who has a face image recorded in an access control system of a kindergarten.
In yet another possible implementation, the first request further includes facial detail features of the first person, and the processing module is specifically configured to: and the difference between the first relevance degree and the second relevance degree is within a preset range, and the facial image of the first person is matched with the facial detail characteristics to control the entrance guard to be opened.
In another possible implementation manner, the processing module is further configured to: determining an image quality of a facial image of a first person and an image quality of a facial image of a second person; when the image quality of the face image of the first person is lower than a preset image quality threshold, the face image of the first person is obtained again; and/or when the image quality of the face image of the second person is lower than a preset threshold value, the face image of the second person is obtained again.
In yet another possible implementation manner, the first request further includes an access validity time, and the processing module is further configured to: if the current time is within the effective access time, acquiring a face image of a first person and a face image of a second person; and if the current time is not within the effective access time, controlling the entrance guard to be closed.
In yet another possible implementation manner, the apparatus further includes a scanning module, configured to scan a preset identification code, where the preset identification code is an identification code generated based on the first association degree.
In yet another possible implementation manner, the method is applied to an access control system, where the access control system includes a first face recognition device, and the face image of the first person and the face image of the second person are collected by the first face recognition device of the access control system; or the facial image of the first person is collected by a first facial recognition device of the access control system, and the facial image of the second person is recorded in the access control system.
In yet another possible implementation manner, the access control system further includes a second face collecting device, the facial image of the first person is collected by the first face recognition device, and the facial image of the second person is collected by the second face recognition device.
In a third aspect, the present application provides an electronic device comprising a memory and a processor. The memory is coupled to the processor. The memory is for storing computer program code comprising computer instructions. The computer instructions, when executed by the processor, cause the electronic device to perform the access control method according to the first aspect and any one of the possible design manners thereof.
In a fourth aspect, the present application provides a chip system, which is applied to an access control device; the chip system includes one or more interface circuits, and one or more processors. The interface circuit and the processor are interconnected through a line; the interface circuit is configured to receive signals from a memory of the access control device and to send signals to the processor, the signals including computer instructions stored in the memory. The computer instructions, when executed by the processor, cause the electronic device to perform the access control method according to the first aspect and any one of its possible designs.
In a fifth aspect, the present application provides a computer-readable storage medium, which stores computer instructions that, when executed on an electronic device, cause the electronic device to perform the access control method according to the first aspect and any one of the possible design manners thereof.
In a sixth aspect, the present application provides a computer program product, which includes computer instructions, when the computer instructions are executed on an electronic device, causing the electronic device to execute the access control method according to the first aspect and any possible design manner thereof.
Reference may be made in detail to the second to sixth aspects and various implementations of the first aspect in this application; in addition, for the beneficial effects of the second aspect to the sixth aspect and the various implementation manners thereof, reference may be made to beneficial effect analysis in the first aspect and the various implementation manners thereof, which is not described herein again.
Drawings
Fig. 1 is a schematic diagram of an access control system according to an embodiment of the present application;
fig. 2 is a schematic view of another access control system provided in an embodiment of the present application;
fig. 3 is a schematic hardware structure diagram of an access control device according to an embodiment of the present application;
fig. 4 is a flowchart of an access control method according to an embodiment of the present application;
fig. 5 is a schematic diagram of a face recognition apparatus according to an embodiment of the present application;
fig. 6 is a schematic diagram of a face image according to an embodiment of the present application;
fig. 7 is a flowchart of another access control method provided in the embodiment of the present application;
fig. 8 is a schematic structural diagram of an access control device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of this application, "/" means "or" unless otherwise stated, for example, A/B may mean A or B. "and/or" herein is merely an association describing an associated object, and means that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. Further, "at least one" means one or more, "a plurality" means two or more. The terms "first", "second", and the like do not necessarily limit the number and execution order, and the terms "first", "second", and the like do not necessarily limit the difference.
It is noted that, in the present application, words such as "exemplary" or "for example" are used to mean exemplary, illustrative, or descriptive. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
At present, the face recognition access control system is widely applied to places such as schools, kindergartens, banks, hotels, machine rooms, intelligent districts, factories and the like. Taking a kindergarten as an example, the facial recognition access control system of the kindergarten usually stores the facial information of parents of each child, and in the system, the serial number or other identification of each child has a corresponding relationship with the facial information of the parents. When the head of a family connects children to go out the garden, facial recognition access control system can acquire the facial information of the head of a family of these children of storage according to this children's serial number or other signs to compare with the facial information of on-the-spot collection, if the contrast result satisfies the requirement, then control entrance guard and open, allow this head of a family to take away this children.
However, the parent of the delivery of each child may not be fixed, or the parent may select a temporary delivery person to deliver the child due to a family-specific event. At this time, the facial recognition access control system may not store the facial information of each current child pickup person. Therefore, the face recognition access control system cannot normally identify the receiving and sending personnel.
Based on the technical problem, the application provides an access control method, and the specific scheme includes: the method comprises the steps of firstly, obtaining a first request for opening the entrance guard, wherein the first request comprises a first association degree, and the first association degree is used for indicating the face association degree between a first person and a second person; in response to the first request, acquiring a face image of the first person and a face image of the second person; determining a second degree of association between the facial image of the first person and the facial image of the second person; and when the difference value between the first association degree and the second association degree is within a preset range, responding to the first request, and controlling the entrance guard to be opened. Therefore, the access control system is not required to store the facial images of the persons to be communicated, the leakage risk of the facial images of the persons can be reduced, the privacy safety of the persons is protected, and the storage space of the access control system is saved.
As shown in fig. 1 (a), an embodiment of the present application provides an access control system based on a facial recognition technology. Fig. 1 (b) is a schematic structural diagram of the access control system. The access control system 100 includes an access control device 10 and a face recognition device 20. Wherein the access control device 10 is connected with a face recognition device 20.
It should be understood that the above-mentioned connection may be a wireless connection, such as a bluetooth connection, a Wi-Fi connection, etc.; alternatively, the connection may be a wired connection, such as an optical fiber connection, but is not limited thereto.
The access control device 10 is an execution device that prohibits the current passage from passing. The access control device 10 may be, for example, an access blocking device, such as a gate. Alternatively, the access control device 10 may be a lock, such as an electromagnetic lock, provided on a door of the current passageway. In the door access system 100, the door access device 10 may adjust its own state to an open state when receiving an open instruction of the face recognition device 20 in a closed state, so as to allow a current person to be cleared. Alternatively, the access control device 10 may be kept in a closed state to prohibit a person currently waiting to pass.
The face recognition device 20 is used to acquire a face image of the person to be communicated of the current passageway. Optionally, the face recognition device 20 is further configured to recognize the acquired face image of the person to be communicated of the current passage. Optionally, the face recognition device 20 is further configured to send an opening instruction to the access control device 10 according to a recognition result of the face image of the person to be cleared.
Illustratively, the face recognition device 20 may be a device having basic functions of video camera/radio and still image capture. In actual use, in order to acquire an image having facial features of a person, the deployment height and angle of the face recognition device 20 may be determined according to the average height of the person to be navigated, the actual environment of the current passageway, and other factors. For example, the face recognition device 20 used in a kindergarten to capture images of a child's face may be deployed at a lower location, such as 1.2 meters or other suitable height.
Optionally, the access control system 100 may further include a code scanning device 30.
In some embodiments, the code scanning device 30 may be integrated with the facial recognition device 20 into one device. Alternatively, the code scanning device 30 and the face recognition device 20 are two separate devices. The code scanning device 30 may be connected to the facial recognition device 20 through a Universal Serial Bus (USB), a communication interface RS232, an interface RS485, and the like, or the code scanning device 30 may be wirelessly connected to the facial recognition device 20 in a bluetooth connection, a Wi-Fi connection, and the like.
In the access control system 100, the code scanning device 30 is used to identify a preset identification code, and when the identified information matches with the current channel, the face recognition device 20 may start to collect a face image of a person to be communicated. Illustratively, the preset identification code may be a two-dimensional code, a bar code, a graphic identification code, or the like.
Optionally, the preset identification code may be generated by the user equipment. The user equipment may generate a preset identification code that can be recognized by the code scanning device 30 according to information such as an identifier of the access control device 10 and an identifier of a current channel in the access control system 100. Optionally, the preset identification code may further include information for verifying the identity of the person to be communicated, for example, the first association degree in the access control method.
For example, the user equipment in the embodiment of the present application may be a terminal equipment such as a mobile phone, a tablet computer, a desktop computer, a laptop computer, a handheld computer, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, and the like.
Alternatively, a plurality of facial recognition devices may be included in the access control system 100. As shown in fig. 2 (a), the access control system 100 may further include a face recognition device 40. Fig. 2 (b) is a schematic structural diagram of the access control system 100. Wherein the face recognition device 40 is connected to the face recognition device 20.
The face recognition device 40 may be configured to capture a facial image of a person to be recognized and transmit the captured facial image to the face recognition device 20, so that the face recognition device 20 may recognize the image captured by the face recognition device 40.
Alternatively, the face recognition device 20 and the face recognition device 40 may be deployed at different heights. Using the access control system who sets up in the kindergarten as an example, if this access control system needs discernment children's facial image, also need discernment head of a family's facial image, then facial recognition device 20 can confirm to deploy the height according to children's height for gather children's facial image, facial recognition device 40 can set up according to head of a family's height, is used for gathering head of a family's facial image.
The embodiment of the application also provides an access control device, and the access control device is an execution main body of the access control method. The access control device is an electronic device with data processing capability. For example, the access control device may be the facial recognition device 20 in the access control system 100, or the access control device may be a functional module in the facial recognition device 20, or the access control device may be any computing device connected to the facial recognition device 20, and so on. The embodiments of the present application do not limit this.
A hardware configuration of the access control device 200 will be described with reference to fig. 3.
As shown in fig. 3, the access control device 200 includes a processor 210, a communication line 220, and a communication interface 230.
Optionally, the access control device 200 may further include a memory 240. The processor 210, the memory 240 and the communication interface 230 may be connected via a communication line 220.
The processor 210 may be a Central Processing Unit (CPU), a general purpose processor Network (NP), a Digital Signal Processor (DSP), a microprocessor, a microcontroller, a Programmable Logic Device (PLD), or any combination thereof. The processor 201 may also be any other device with processing function, such as a circuit, a device or a software module, without limitation.
In one example, processor 210 may include one or more CPUs, such as CPU0 and CPU1 in fig. 3.
As an alternative implementation, access control device 200 includes multiple processors, for example, processor 270 may be included in addition to processor 210. A communication line 220 for transmitting information between the respective components included in the access control device 200.
A communication interface 230 for communicating with other devices or other communication networks. The other communication network may be an ethernet, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), or the like. Communication interface 230 may be a module, circuit, transceiver, or any device capable of enabling communication.
A memory 240 for storing instructions. Wherein the instructions may be a computer program.
The memory 240 may be a read-only memory (ROM) or another type of static storage device that can store static information and/or instructions, an access memory (RAM) or another type of dynamic storage device that can store information and/or instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or another optical disc storage, an optical disc storage (including a compact disc, a laser disc, an optical disc, a digital versatile disc, a blu-ray disc, etc.), a magnetic disc storage medium or another magnetic storage device, and the like, without limitation.
It is noted that the memory 240 may exist independently of the processor 210 or may be integrated with the processor 210. The memory 240 may be used to store instructions or program code or some data or the like. The memory 240 may be located inside the access control device 200, or may be located outside the access control device 200, without limitation.
The processor 210 is configured to execute the instructions stored in the memory 240 to implement the communication method provided in the embodiments described below. For example, when the access control device 200 is a terminal or a chip or a system on a chip in a terminal, the processor 210 may execute instructions stored in the memory 240 to implement the access control device provided in the present application.
As an alternative implementation, the access control device 200 further includes an output device 250 and an input device 260. The output device 250 may be a display screen, a speaker, or the like capable of outputting data of the access control apparatus 200 to a user. The input device 260 may be a device capable of inputting data to the access control apparatus 200, such as a keyboard, a mouse, a microphone, or a joystick.
For example, the input device 260 may be a two-dimensional code scanning gun for recognizing a two-dimensional code and inputting the recognized data to the access control device 200.
It should be noted that the configuration shown in fig. 3 does not constitute a limitation of the computing device, which may include more or less components than those shown in fig. 3, or some components may be combined, or a different arrangement of components than those shown in fig. 3.
The embodiments provided in the present application will be described in detail below with reference to the accompanying drawings.
As shown in fig. 4, an embodiment of the present application provides an access control method, which is optionally executed by the access control device 200 shown in fig. 3, and the method includes the following steps:
s101, the entrance guard control device obtains a first request for opening an entrance guard, wherein the first request comprises a first association degree.
The first request is used for requesting the access control device to open the access of the current channel. The current passage is an entrance passage for entrance guard equipment installed in places such as schools, kindergartens, banks, hotels, machine rooms and the like.
In some embodiments, the access control device may scan a preset identification code to obtain the first request.
Optionally, the preset identification code may be a two-dimensional code, a barcode, a graphic identification code, or other types of identification codes.
Alternatively, the predetermined identification code may be generated by the user equipment. It should be understood that the specific type of the preset identification code generated by the user equipment is the same as the type of the identification code recognizable by the access control device. Optionally, the preset identification code may be generated based on the identifier of the current channel and/or the access valid time, and the first association degree.
Correspondingly, the input device of the access control device scans the preset identification code, and the obtained first request may include the identifier of the current channel and/or the access valid time, and the first association degree.
The identity of the current channel is used to refer to the current channel. For example, it may be a gate code of the current channel, a name of a scene where the current channel is located, and the like. It should be understood that the identity of the access way of kindergarten a is different from the identity of the access way of kindergarten B, and the preset identification code for access to kindergarten a cannot be used for access to kindergarten B. Therefore, if the preset identification code is generated based on the identification of the access passage at a certain place, the preset identification code can only be used when passing through the passage, so that the condition that the same preset identification code can be used at different places is avoided, and the safety of the access control of the current passage is improved.
The access effective time is used for indicating the effective use time period of the preset identification code, namely the time that the access control device can identify the preset identification code, and the time that a person can use the preset identification code to pass through the current channel can also be indicated. The effective time for entrance and exit can be a specific time period, such as a time period of 2022-1-517: 00-2022-1-520: 00. Or, the access valid time may be specifically a duration, so that the access control device may determine the valid use period of the preset identification code according to the generation time of the preset identification code and the duration indicated by the access valid time. Illustratively, the length of the access valid time indication may be 30 minutes, 1 hour, 1 day, and the like. Taking the time length indicated by the access valid time as 1 day as an example, assuming that the generation time of the preset identification code is 2022-1-517: 00, the valid use time period of the preset identification code is 2022-1-517: 00-2022-1-617: 00.
Further, the above-described first degree of association is used to indicate a degree of facial association between the first person and the second person. The face association degree refers to a degree of association between a facial feature of the first person and a facial feature of the second person. The first degree of association may be determined from the face image of the first person and the face image of the second person. Illustratively, the actual value of the first degree of association may be between 0% and 100%. Alternatively, the actual value of the first degree of association may be between 0.00% and 100.00%.
In actual use, the user equipment may calculate the first association degree based on a preset association degree algorithm according to the face image of the first person and the face image of the second person.
In a possible implementation manner, if the above-mentioned access control is an access control of a kindergarten, the first person may be a pick-up person, and the second person may be a child picked up by the pick-up person.
Alternatively, for the pickup person whose face image is not stored in the kindergarten, the parent of the child may input the face image of the pickup person and the face image of the pickup child to the user equipment to determine the first degree of association. And then determining the effective time for the user to go in and out according to the expected required time for the user to pick up the child. And the user equipment can generate a preset identification code according to the first association degree, the access valid time and the pre-stored identification of the kindergarten access passage.
Optionally, the user device may capture the facial image of the first person and the facial image of the second person in real time. Alternatively, the user device may also acquire a face image of the first person and a face image of the second person that are stored in advance.
It should be noted that, for the same person, the facial features of the person may change greatly over a long period of time due to the influence of body type, age, and the like. Especially for children who are in the process of growing up, their facial features change faster. Therefore, the time interval between the acquisition time of the face image of the first person for determining the first degree of association and the time at which the preset identification code is generated should not be excessively long. Illustratively, the time interval may be less than or equal to 2 months, 1 year, etc. for a reasonable period of time. Likewise, the time interval between the acquisition time of the facial image of the second person for determining the first degree of association and the generation of the preset identification code should not be too long.
In one possible implementation, if the access control is a kindergarten access control, the first person is a pick-up person, and the second person is a person related to a child picked up by the pick-up person who is described in a face image in an access control system of the kindergarten.
Optionally, for the pick-up person whose kindergarten does not store the face image, the parent of the child may input the face image of the pick-up person and the face image of the parent recorded with the face image in the kindergarten access control system to the user equipment to determine the first degree of association. Therefore, the privacy and the safety of children can be further protected.
Further, the user can determine the effective time for entrance and exit according to the expected required time for the carrier to carry the child. And the user equipment can generate a preset identification code according to the first association degree, the access valid time and the pre-stored identification of the kindergarten access passage.
Optionally, if the second person is one of a plurality of persons related to the child picked up and picked up by the pick-up person, which are recorded in the kindergarten access control system by the facial image, the user equipment may further generate a preset identification code according to the identifier of the second person, the first association degree, the access valid time, and the identifier of the pre-stored kindergarten access passage.
For example, the identifier of the second person may be determined according to the relationship between the second person and the child, for example, the identifier may be dad, mom, vintage, or the like.
S102, responding to the first request, the entrance guard control device obtains the face image of the first person and the face image of the second person.
In some embodiments, in response to the first request, the access control device may first obtain the access validity time from the first request. If the current moment is in the access effective time, the access control device acquires the facial image of the first person and the facial image of the second person so as to further determine whether to open the access. Or if the current time is not within the effective access time, the access control device controls the access to be kept closed.
In some embodiments, in response to the first request, the access control device may first obtain the identifier of the current channel from the first request. And if the obtained identification of the current channel is matched with the current channel, the access control device obtains the facial image of the first person and the facial image of the second person so as to further determine whether to open the access control. Or if the obtained identifier of the current channel is not matched with the current channel, the access control device controls the access to be kept closed.
In practical use, the above described access control is the access control of a kindergarten, and the first person is the pick-up person as an example. When the pick-up person enters the kindergarten, the access control device can only determine the access valid time and the identifier of the current channel. When the pick-up person picks up the child from the kindergarten, the access control device needs to acquire the face image of the first person and the face image of the second person in addition to the identification of the access effective time and the current channel, so as to further determine whether to open the access.
In one possible implementation, the access control device may obtain a facial image of the first person and a facial image of the second person collected in real time.
It can be understood that if above-mentioned entrance guard is the entrance guard of kindergarten, and first personnel for connecing the personnel of sending, under the second personnel for connecing the children that the personnel of sending connect and send, first personnel and second personnel are all in current passageway department, and facial recognition equipment can gather first personnel's facial image and second personnel's facial image in real time this moment, therefore entrance guard control device can acquire the facial image of first personnel and the facial image of second personnel of real-time collection.
For example, in the door access control system shown in fig. 1, in response to a first request, the door access control apparatus controls the face recognition device 20 to sequentially or simultaneously acquire a face image of a first person and a face image of a second person. For example, the face recognition apparatus 20 first acquires a face image of a first person, and then acquires a face image of a second person after the acquisition of the face image of the first person is completed. For another example, the face recognition apparatus 20 first captures the face image of the second person, and then captures the face image of the first person after the face image capture of the second person is completed.
Alternatively, in the access control system as shown in fig. 2, in response to the first request, the access control apparatus controls the face recognition device 20 to capture a face image of the first person, and controls the face recognition device 40 to capture a face image of the second person.
It should be understood that the face recognition device 20 and the face recognition device 40 are only capable of capturing facial images of one person at a time.
Optionally, in response to the first request, the access control device may further control the face recognition device to simultaneously capture a face image of the first person and a face image of the second person.
The above-described face recognition apparatus may be as shown as the face recognition device 50 in fig. 5, wherein the face recognition device 50 supports a multi-person simultaneous face recognition function. As shown in fig. 5, in the recognition process, the face recognition device 50 displays the captured face image of the first person at the area 51 of the display screen, and displays the captured face image of the second person at the area 51 of the display screen.
The following description will be given of a process in which the access control device controls a face recognition device to capture a face image of a first person and a face image of a second person, where the face recognition device captures the face image of the first person and the face image of the second person:
s1, the face recognition device determines whether the first face image is not captured within the first capturing period from the start time of the start of the face image acquisition. Wherein the first face image is a face image of the first person or the second person. The first acquisition period may be a reasonable period of time such as 5 minutes, 10 minutes, etc.
If so, the face recognition apparatus executes step S12 described below.
If not, the face recognition apparatus executes step S13 described below.
S2, the face recognition device determines whether the second face image is not acquired within the second acquisition duration since the first face image was acquired. Wherein the second facial image is a facial image of the first person or the second person.
It should be understood that if the first face image is an image of a first person's face, then the second face image is an image of a second person's face. Alternatively, if the first face image is a face image of a second person, the second face image is a face image of the first person.
In addition, the second acquisition time period may be a reasonable time period such as 5 minutes, 10 minutes, etc., the first acquisition time period may be the same as the second acquisition time period, and the first acquisition time period may also be different from the second acquisition time period.
Further, if yes, the face recognition device completes acquisition of the face image of the first person and the face image of the second person.
If not, the face recognition apparatus executes step S14 described below.
S14, the face recognition device interrupts the acquisition of the face image.
Optionally, the access control device may further send an identification timeout prompt when the facial recognition device interrupts to obtain the facial image. For example, the recognition timeout reminding may be playing a preset prompt tone, flashing a preset indicator light, or reporting similar voice information such as "face recognition timeout, please re-recognize".
In another possible implementation manner, the access control device may acquire a facial image of a first person acquired in real time and acquire a facial image of a second person stored in advance.
It can be understood that, in the case where the above-mentioned access control is an access control of a kindergarten, and the first person is a person to pick up and deliver, and the second person is a person related to a child to which the person to pick up and deliver, who is recorded in a facial image in an access control system of the kindergarten, the first person is at a current passageway, and at this time, the facial recognition device may only acquire the facial image of the first person in real time. Therefore entrance guard control device can acquire the facial image of the first person who gathers in real time to acquire the facial image of the parents of this children who stores in the system, also be the facial image of second person.
Optionally, when the access control is a kindergarten access control, the first person is a pick-up person, and the second person is a person related to a child picked up by the pick-up person and recorded in a facial image in an access control system of the kindergarten, the first request may further include an identifier of the child.
For example, when the first person and the child leave the kindergarten together, the first person or the kindergarten manager may input the child's identification to the access control system, for example, the identification may be the child's number in the kindergarten.
For another example, the kindergarten may be configured with an identification device for each child, such as a magnetic card carrying identification information and identification of each child. When first personnel and this children play the garden, this identification device can be discerned to entrance guard control device, and then acquires this children's sign.
Thus, the access control device can acquire, in the access control system of the kindergarten, the face image of the person related to the child, which is described in the access control system of the kindergarten by the face image, according to the identification of the child.
It will be appreciated that the number of persons associated with the child that are depicted in the face image in the kindergarten's access system may be one or more. In the case where the number of the persons is one, the door access control device may use the acquired face image of the person as the face image of the second person. Or, in a case where the number of the persons is plural, the access control device may acquire the identifier of the second person, and determine the face image of the second person from the acquired face images of the plural persons according to the identifier of the second person.
Optionally, the access control device may obtain the facial image of the first person collected in real time within the first collection duration.
S103, determining a second association degree between the face image of the first person and the face image of the second person by the entrance guard control device.
The second degree of association is used for indicating the degree of facial association between the first person and the second person.
Optionally, the access control device may determine the second association degree based on a preset association degree algorithm according to the acquired face image of the first person and the face image of the second person. It should be understood that the preset association algorithm used by the access control device is the same as the preset association algorithm used by the user equipment in step S101.
In some embodiments, the access control device may determine an image quality of the facial image of the first person and an image quality of the facial image of the second person prior to determining the second degree of association. And when the image quality of the face image of the first person and the image quality of the face image of the second person meet the requirement for calculating the degree of association, determining a second degree of association between the face image of the first person and the face image of the second person.
Optionally, the image quality of the face image may be determined according to one or more of parameters in the face image, such as a human eye distance, a human face pitch angle, a human face deflection angle, a human face roll angle, and the like.
The human eye distance may be a distance between two inner corners of the human eye in the face image, a interpupillary distance of the human eye, or the like.
Further, as shown in fig. 6, the face pitch angle is used to indicate the angle at which the head of the person is rotated along the Y-axis compared with the first face image. Wherein, the range of the angle of the face pitch angle is [ -90 degrees, 90 degrees ]. The face deflection angle is used to indicate the angle at which the person's head is rotated along the Z-axis compared to the first face image. Wherein, the range of the angle of the face pitch angle is [ -180 degrees, 180 degrees ]. The face roll angle is used to indicate the angle at which the person's head is rotated along the X-axis as compared to the first face image. Wherein, the range of the angle of the face roll angle is [ -90 degrees, 90 degrees ]. The first face image is an image captured by a person looking forward at the face recognition device. The face pitch angle of the first face image is 0 °, the face deflection angle of the first face image is 0 °, and the face roll angle of the first face image is 0 °.
Therefore, the access control device can identify parameters such as the human face eye distance, the human face pitch angle, the human face deflection angle and the human face roll angle of the first person in the facial image of the first person, and further determine the image quality of the facial image of the first person according to the parameters such as the human face eye distance, the human face pitch angle, the human face deflection angle and the human face roll angle of the first person. And the entrance guard control device can also identify parameters such as the face-eye distance, the face pitch angle, the face deflection angle and the face roll angle of the second person in the face image of the second person, and further determine the image quality of the face image of the second person according to the parameters such as the face-eye distance, the face pitch angle, the face deflection angle and the face roll angle of the second person.
Further, the access control device may determine whether the image quality of the first person and the image quality of the second person satisfy a requirement for calculating the degree of association.
Optionally, when the image quality of the facial image of the first person is less than the preset image quality threshold, the access control device acquires the facial image of the first person again. Or when the image quality of the face image of the first person is greater than or equal to a preset image quality threshold value, the entrance guard control device determines the second relevance according to the face image of the first person.
In some embodiments, when the access control device re-acquires the facial image of the first person, the access control device may send a "please look ahead at the camera" or similar voice prompt to prompt the first person to look ahead at the camera, thereby acquiring the facial image of the first person with higher image quality.
Optionally, when the image quality of the facial image of the second person is less than the preset image quality threshold, the access control device obtains the facial image of the second person again. Or when the image quality of the face image of the second person is greater than or equal to a preset image quality threshold value, the entrance guard control device determines the second relevance according to the face image of the second person.
Similarly, when the access control device reacquires the facial image of the second person, the access control device may also send a "please look ahead at the camera" or similar voice prompt to remind the second person to look ahead at the camera, thereby acquiring the facial image of the second person with higher image quality.
It will be appreciated that the second degree of association described above is also used to indicate a degree of facial association between the first person and the second person. The face association degree refers to a degree of association between a facial feature of the first person and the second facial feature. And the facial features of the person represented by the facial image of the person are related to the acquisition angle of the facial image. For example, in the facial image of the person collected at the front, the door access control device can clearly recognize the facial features of the person. In the face image of the person collected on the right side of the person, the door access control device may not recognize the feature of the left face of the person. In the face image of the person captured on the left side of the person, the door access control device may not recognize the features of the right face of the person. Therefore, the face image of the person collected in the front most meets the requirement of calculating the relevance. And, the smaller the deflection degree of the acquisition angle of the image compared with the frontal acquisition, the higher the image quality of the image. The greater the deflection of the acquisition angle of the image compared to the frontal acquisition, the lower the image quality of the image.
And S104, responding to the first request when the difference value between the first association degree and the second association degree is within a preset range, and controlling the entrance guard to be opened by the entrance guard control device.
It should be noted that, for the same person, the facial features of the person remain substantially unchanged for a short period of time. Since the above-described face association degree (for example, the above-described first association degree and second association degree) is the degree of association between the facial features of two persons, the face association degree of the two persons also remains substantially unchanged for a short period of time in a case where the facial features of both persons remain substantially unchanged. However, since the face relevance is determined according to the face images of the two persons, and is influenced by the posture of the person in the face images, the image acquisition environment, the image definition and other factors, the face relevance determined according to the face images acquired at different times may not be the same for the same two persons, but the face relevance determined according to the face images acquired at different times may fluctuate within a certain range, that is, the difference between the first relevance and the second relevance is within a preset range. Therefore, the access control device can identify the identities of the first person and the second person who want to pass through the current channel according to the relationship between the first association degree and the second association degree, and then judge whether the access can be opened.
Optionally, the first association degree and the second association degree may satisfy the following relationship:
S 1 =S 2 ±ΔS
wherein S is 1 For indicating a first degree of association; s 2 For indicating a second degree of association; Δ S is used to indicate a preset threshold.
That is, the predetermined range is from- Δ S to Δ S.
Illustratively, Δ S may be 5%, 10%, 10.08%, or other possible values.
Optionally, under the condition that the entrance guard is an entrance guard of a kindergarten, if the entrance guard is controlled to be opened by the entrance guard control device, the entrance guard control device sends first reminding information to the user equipment of the parents of the child.
Wherein, above-mentioned first warning information is used for reminding the head of a family this children will be taken away by first personnel.
And S105, when the difference value between the first association degree and the second association degree is not within the preset range, controlling the entrance guard to be kept closed by the entrance guard control device.
Optionally, when the difference between the first degree of association and the second degree of association is not within the preset range, the access control device may perform the steps S102 to S105 again to obtain the face image of the first person and the face image of the second person again, and determine whether to open the access control according to the face image of the first person and the face image of the second person.
Further, the door access control device may determine the number of times of acquiring the face image of the first person and the face image of the second person, and issue a person abnormality alarm when the number of times is greater than a preset number of times.
Based on the technical scheme shown in fig. 4, the access control device can acquire the face association degrees between the face images acquired at different moments between the first person and the second person, that is, the first association degree and the second association degree. Further, the access control device may have determined whether the first person and the second person are passable by comparing the first degree of association and the second degree of association. Therefore, the access control system is not required to store the facial images of the persons to be communicated, the leakage risk of the facial images of the persons can be reduced, the privacy safety of the persons is protected, and the storage space of the access control system is saved.
In some embodiments, based on the method shown in fig. 4, the first request further includes a facial detail feature of the first person, and as shown in fig. 7, the access control method provided by the present application may further be implemented as the following steps:
s201, the entrance guard control device obtains a first request for opening an entrance guard, and determines a second association degree between the face image of the first person and the face image of the second person.
Wherein the first request includes the first degree of association and facial detail features of the first person.
For example, the facial detail characteristics of the first person may be the position of the first person's eyes relative to the first person's face, the shape of the first person's mouth, or other facial details of the first person.
It should be understood that, based on the identification and/or the access valid time of the current channel and the first association degree, the preset identification code may also be generated according to the facial detail feature of the first person, so that the access control device may identify the preset identification code and obtain the first request including the facial detail feature of the first person.
Optionally, for a specific process of determining the second association degree between the face image of the first person and the face image of the second person by the access control device, reference may be made to the related description in steps S101 to S103, which is not described herein again.
S202, when the difference value between the first relevance degree and the second relevance degree is within a preset range and the facial image of the first person is matched with the facial detail characteristics, the entrance guard control device controls entrance guard opening.
Optionally, the access control device may identify facial detail features of the first person from the acquired facial image of the first person, and obtain the detail association degree according to the identified facial detail features and the facial detail features determined from the first request.
Therefore, when the detail association degree is greater than the preset detail association degree threshold value, the access control device can determine that the face image of the first person is matched with the face detail features.
It should be noted that, according to the description in the step S104, the access control device may identify the identity of the person who wants to pass through the current channel according to the relationship between the first association degree and the second association degree, and further determine whether the access control device can be opened. However, there may be a case where the difference between the face association degree between the third person and the fourth person, which are two persons other than the first person and the second person, and the above-described first association degree is within a preset range. Therefore, the entrance guard control device can further determine the identity of the first person according to the facial detail features of the first person.
And then, when the difference between the first relevance degree and the second relevance degree is within a preset range and the facial image of the first person is matched with the facial detail characteristics, the access control device can determine that the person who wants to pass at present is the person corresponding to the preset identification code, and then the access control device controls the access to be opened.
S203, when the difference between the first relevance degree and the second relevance degree is not in a preset range and/or the facial image of the first person is not matched with the facial detail features, the access control device controls the access to be kept closed.
Based on the technical scheme shown in fig. 7, the access control device can perform dual recognition on the facial images of the first person and the second person through the relationship between the second association degree and the first association degree and the facial detail characteristics of the first person, so that the recognition accuracy can be improved.
Alternatively, a procedure for a delivery person who has not recorded a face image in the kindergarten access control system to enter and exit the kindergarten will be described below by taking the above-described access control as an example of an access control for a kindergarten.
The procedure of entering the garden for receiving and sending the personnel:
SA11, when the pick-up enters the kindergarten, the access control device recognizes the preset identification code of the pick-up.
If the identification is successful, step SA12 is performed.
If the identification fails, step SA13 is performed.
SA12, entrance guard control device controls the entrance guard to open, and the transfer personnel is allowed to enter the park.
SA13, the entrance guard control device controls the entrance guard to keep closed, and forbids the transfer personnel to enter the park.
The procedure of taking the receiving and sending personnel out of the garden comprises the following steps:
SA21, entrance guard control device discerns this preset identification code of sending personnel to obtain this sending personnel that indicates in the preset identification code and this children's first degree of association.
If the identification is successful, step SA22 is performed.
If the identification fails, step SA27 is performed.
SA23, the door access control device obtaining the face image of the delivery person and the face image of the child, and calculating a second degree of association between the face image of the delivery person and the face image of the child.
SA24, the entrance guard control device determines whether to open the entrance guard according to the difference between the first degree of association and the second degree of association.
If the difference between the first degree of association and the second degree of association is within the preset range, the access control device performs step S15.
And if the difference between the first relevance degree and the second relevance degree is not in the preset range, the access control device executes the step S.
SA25, door access control device, controls the door access to allow the pick-up person to pick up the child.
SA26, the entrance guard control device sends first reminding information to user equipment of parents of the child.
Wherein, above-mentioned first warning information is used for reminding the head of a family this children will be taken away.
SA27, entrance guard control device controls the entrance guard to keep closed, forbids the person who sends and receives the children to take away.
Optionally, the access control device re-executes steps SA21-SA27 to re-identify whether the pick-up person can pick up the child from the kindergarten.
SA28, the entrance guard control device determines the execution times of SA27, and stops executing SA4 and sends out a personnel abnormity alarm when the execution times is larger than the preset times.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed in hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Fig. 8 is a schematic structural diagram of an access control device 300 according to an embodiment of the present application. The apparatus 300 may include: a transceiver module 301 and a processing module 302. Optionally, the access control device 300 further includes a scanning module 303.
The transceiver module 301 is configured to obtain a first request for opening a door lock, where the first request includes a first association degree, and the first association degree is used to indicate a facial association degree between a first person and a second person.
The transceiving module 301 is further configured to acquire a face image of the first person and a face image of the second person in response to the first request.
The processing module 302 is configured to determine a second degree of association between the facial image of the first person and the facial image of the second person.
The processing module 302 is further configured to respond to the first request to control the entrance guard to open when the difference between the first association degree and the second association degree is within a preset range.
In a possible implementation manner, the processing module 302 is further configured to keep the entrance guard closed when a difference between the first association degree and the second association degree is not within a preset range.
In another possible implementation manner, the access control is a kindergarten access control, the first person is a pick-up person, and the second person is a child picked up by the pick-up person; alternatively, the first person is a pick-up person, and the second person is a person related to a child who has a face image recorded in an access control system of a kindergarten.
In yet another possible implementation, the first request further includes facial detail features of the first person, and the processing module 302 is specifically configured to: and the difference between the first relevance degree and the second relevance degree is within a preset range, and the facial image of the first person is matched with the facial detail characteristics to control the entrance guard to be opened.
In yet another possible implementation manner, the processing module 302 is further configured to: determining an image quality of a facial image of a first person and an image quality of a facial image of a second person; when the image quality of the face image of the first person is lower than a preset image quality threshold, the face image of the first person is obtained again; and/or when the image quality of the face image of the second person is lower than a preset threshold value, the face image of the second person is obtained again.
In yet another possible implementation manner, the first request further includes an access validity time, and then the processing module 302 is further configured to: if the current time is within the effective access time, acquiring a face image of a first person and a face image of a second person; and if the current time is not within the effective access time, controlling the entrance guard to be closed.
In yet another possible implementation manner, the apparatus further includes a scanning module 303, where the scanning module 303 is configured to scan a preset identification code, and the preset identification code is an identification code generated based on the first association degree.
In yet another possible implementation, the facial image of the first person is captured by a first facial recognition device and the facial image of the second person is captured by a second facial recognition device.
For the detailed description of the above alternative modes, reference may be made to the foregoing method embodiments, which are not described herein again. In addition, for the explanation and the description of the beneficial effects of any one of the door access control devices 300 provided above, reference may be made to the corresponding method embodiments described above, and details are not repeated.
As an example, in conjunction with fig. 3, the functions implemented by the processing module 302 of the access control device may be implemented by the processor 210 or the processor 270 of fig. 3 executing the program code in the memory 240 of fig. 3. The functions implemented by the transceiver module 301 can be implemented by the communication line 220 in fig. 3, but are not limited thereto.
Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should be noted that the division of the modules in fig. 8 is schematic, and is only one logical function division, and there may be another division manner in actual implementation. For example, two or more functions may also be integrated in one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The embodiment of the present application further provides a computer-readable storage medium, which includes computer-executable instructions, and when the computer-readable storage medium is run on a computer, the computer is caused to execute any one of the methods provided by the above embodiments. For example, one or more features of S101-S105 in FIG. 4 may be undertaken by one or more computer-executable instructions stored in the computer-readable storage medium.
The embodiments of the present application also provide a computer program product containing instructions for executing a computer, which when executed on a computer, causes the computer to perform any one of the methods provided by the above embodiments.
An embodiment of the present application further provides a chip, including: a processor coupled to the memory through the interface, and an interface, when the processor executes the computer program or the computer execution instructions in the memory, the processor causes any one of the methods provided by the above embodiments to be performed.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The processes or functions according to the embodiments of the present application are generated in whole or in part when the computer-executable instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. An access control method, the method comprising:
acquiring a first request for opening the access control, wherein the first request comprises a first association degree, and the first association degree is used for indicating the face association degree between a first person and a second person;
in response to the first request, obtaining a facial image of the first person and a facial image of the second person;
determining a second degree of association between the facial image of the first person and the facial image of the second person;
and when the difference value between the first association degree and the second association degree is within a preset range, responding to the first request, and controlling the entrance guard to open.
2. The method of claim 1, further comprising:
and when the difference between the first association degree and the second association degree is not within the preset range, keeping the entrance guard closed.
3. The method of claim 2, wherein the access control is a kindergarten access control, and the first person is a pick-up person and the second person is a child picked up by the pick-up person; or, the first person is a pick-up person, and the second person is a person related to the child who is recorded by a face image in an access control system of the kindergarten.
4. The method of claim 3, wherein the first request further includes facial detail features of the first person;
when the difference between the first degree of association and the second degree of association is within a preset range, controlling the entrance guard to open, including:
and when the difference value between the first relevance degree and the second relevance degree is within a preset range, and the facial image of the first person is matched with the facial detail characteristics, controlling the entrance guard to be opened.
5. The method of any of claims 1 to 4, wherein prior to said determining a second degree of association between the facial image of the first person and the facial image of the second person, the method further comprises:
determining an image quality of the facial image of the first person and an image quality of the facial image of the second person;
when the image quality of the face image of the first person is lower than a preset image quality threshold, the face image of the first person is obtained again; and/or the presence of a gas in the atmosphere,
and when the image quality of the face image of the second person is lower than the preset threshold value, the face image of the second person is obtained again.
6. The method of any of claims 1 to 4, wherein the first request further comprises an access validity time; prior to the acquiring the facial image of the first person and the facial image of the second person, the method further comprises:
if the current moment is within the access effective time, acquiring the face image of the first person and the face image of the second person;
and if the current moment is not within the access effective time, controlling the entrance guard to be closed.
7. The method according to any one of claims 1 to 4, wherein the obtaining a first request to open the door access comprises:
scanning a preset identification code to obtain a first request for opening the access control, wherein the preset identification code is an identification code generated based on the first association degree.
8. The method according to claim 1 or 2, wherein the method is applied to an access control system, the access control system comprises a first face recognition device, and the facial image of the first person and the facial image of the second person are acquired by the first face recognition device of the access control system; or, the facial image of the first person is collected by a first facial recognition device of the access control system, and the facial image of the second person is recorded in the access control system.
9. The method of claim 8, wherein the access control system further comprises a second face recognition device, and wherein the facial image of the first person is captured by the first face recognition device and the facial image of the second person is captured by the second face recognition device.
10. An access control device is characterized by comprising a transceiver module and a processing module;
the receiving and sending module is used for acquiring a first request for opening the access control, wherein the first request comprises a first association degree, and the first association degree is used for indicating the face association degree between a first person and a second person;
the transceiver module is further configured to acquire a facial image of the first person and a facial image of the second person in response to the first request;
the processing module is used for determining a second degree of association between the facial image of the first person and the facial image of the second person;
the processing module is further configured to respond to the first request and control the entrance guard to open when the difference between the first association degree and the second association degree is within a preset range.
11. The apparatus of claim 10,
the processing module is further configured to keep the access control closed when the difference between the first association degree and the second association degree is not within the preset range;
the first request further includes facial detail features of the first person; the processing module is specifically configured to:
when the difference value between the first relevance degree and the second relevance degree is within a preset range, and the facial image of the first person is matched with the facial detail characteristics, controlling the entrance guard to be opened;
the processing module is further configured to:
determining an image quality of the facial image of the first person and an image quality of the facial image of the second person;
when the image quality of the face image of the first person is lower than a preset image quality threshold, the face image of the first person is obtained again; and/or the presence of a gas in the gas,
when the image quality of the face image of the second person is lower than the preset threshold value, the face image of the second person is obtained again;
the first request further includes an access validity time; the processing module is further configured to:
if the current moment is within the access effective time, acquiring the face image of the first person and the face image of the second person;
if the current time is not within the access effective time, controlling the entrance guard to keep closed;
the device further comprises a scanning module, wherein the scanning module is used for scanning a preset identification code, and the preset identification code is an identification code generated based on the first association degree.
12. An electronic device, wherein the electronic device comprises a memory and a processor; the memory and the processor are coupled; the memory for storing computer program code, the computer program code comprising computer instructions;
wherein the computer instructions, when executed by the processor, cause the electronic device to perform the access control method of any of claims 1-9.
13. A computer-readable storage medium storing computer instructions which, when executed on an electronic device, cause the electronic device to perform the access control method of any one of claims 1-9.
CN202210546396.4A 2022-05-19 2022-05-19 Access control method and device Active CN114944030B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210546396.4A CN114944030B (en) 2022-05-19 2022-05-19 Access control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210546396.4A CN114944030B (en) 2022-05-19 2022-05-19 Access control method and device

Publications (2)

Publication Number Publication Date
CN114944030A true CN114944030A (en) 2022-08-26
CN114944030B CN114944030B (en) 2024-02-09

Family

ID=82908066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210546396.4A Active CN114944030B (en) 2022-05-19 2022-05-19 Access control method and device

Country Status (1)

Country Link
CN (1) CN114944030B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020101353A1 (en) * 1999-05-19 2002-08-01 Israel Radomsky Infant and parent matching and security system and method of matching infant and parent
CN101630386A (en) * 2008-04-17 2010-01-20 中航芯控科技(北京)有限公司 Mother and infant rfid management information system
JP2010204912A (en) * 2009-03-03 2010-09-16 Fujitsu Ltd Safety holding system, and method and program for the same
CN103456060A (en) * 2013-09-04 2013-12-18 深圳市平安校园科技有限公司 Kindergarten after-school safety access control system and kindergarten child after-school safety handover method
CN103871139A (en) * 2014-03-26 2014-06-18 西安祥泰软件设备系统有限责任公司 School access control management method and embedded mainboard
CN106340093A (en) * 2016-08-24 2017-01-18 上海斐讯数据通信技术有限公司 Security protection method and system for kindergarten pick-up
CN106934073A (en) * 2017-05-02 2017-07-07 成都通甲优博科技有限责任公司 Face comparison system, method and mobile terminal based on three-dimensional image
CN107293024A (en) * 2017-08-14 2017-10-24 深圳市思维树科技有限公司 A kind of kindergarten based on recognition of face is far from garden management system and method
CN107845174A (en) * 2017-11-23 2018-03-27 郑州云海信息技术有限公司 A kind of kindergarten's gate control system and method based on cloud computing
CN108875989A (en) * 2018-06-29 2018-11-23 北京金山安全软件有限公司 Reservation method and device based on face recognition, computer equipment and storage medium
CN109409330A (en) * 2018-11-19 2019-03-01 中铁程科技有限责任公司 Face identification method, device and computer equipment based on mobile terminal
CN110111456A (en) * 2019-04-11 2019-08-09 西京学院 Orderly pick system in kindergarten based on cloud computing platform and face recognition technology
US20210056289A1 (en) * 2018-01-12 2021-02-25 Nec Corporation Face authentication apparatus
CN112562158A (en) * 2019-09-26 2021-03-26 南京甄视智能科技有限公司 Identity information confirmation system and method

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020101353A1 (en) * 1999-05-19 2002-08-01 Israel Radomsky Infant and parent matching and security system and method of matching infant and parent
CN101630386A (en) * 2008-04-17 2010-01-20 中航芯控科技(北京)有限公司 Mother and infant rfid management information system
JP2010204912A (en) * 2009-03-03 2010-09-16 Fujitsu Ltd Safety holding system, and method and program for the same
CN103456060A (en) * 2013-09-04 2013-12-18 深圳市平安校园科技有限公司 Kindergarten after-school safety access control system and kindergarten child after-school safety handover method
CN103871139A (en) * 2014-03-26 2014-06-18 西安祥泰软件设备系统有限责任公司 School access control management method and embedded mainboard
CN106340093A (en) * 2016-08-24 2017-01-18 上海斐讯数据通信技术有限公司 Security protection method and system for kindergarten pick-up
CN106934073A (en) * 2017-05-02 2017-07-07 成都通甲优博科技有限责任公司 Face comparison system, method and mobile terminal based on three-dimensional image
CN107293024A (en) * 2017-08-14 2017-10-24 深圳市思维树科技有限公司 A kind of kindergarten based on recognition of face is far from garden management system and method
CN107845174A (en) * 2017-11-23 2018-03-27 郑州云海信息技术有限公司 A kind of kindergarten's gate control system and method based on cloud computing
US20210056289A1 (en) * 2018-01-12 2021-02-25 Nec Corporation Face authentication apparatus
CN108875989A (en) * 2018-06-29 2018-11-23 北京金山安全软件有限公司 Reservation method and device based on face recognition, computer equipment and storage medium
CN109409330A (en) * 2018-11-19 2019-03-01 中铁程科技有限责任公司 Face identification method, device and computer equipment based on mobile terminal
CN110111456A (en) * 2019-04-11 2019-08-09 西京学院 Orderly pick system in kindergarten based on cloud computing platform and face recognition technology
CN112562158A (en) * 2019-09-26 2021-03-26 南京甄视智能科技有限公司 Identity information confirmation system and method

Also Published As

Publication number Publication date
CN114944030B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
US20230386317A1 (en) Augmented reality system for guards of controlled environment residents
US20070183634A1 (en) Auto Individualization process based on a facial biometric anonymous ID Assignment
WO2018192448A1 (en) People-credentials comparison authentication method, system and camera
JP7298945B2 (en) Near-field information authentication method, near-field information authentication device, electronic equipment and computer storage medium
CN101496074A (en) Device and method for detecting suspicious activity, program, and recording medium
JP6163466B2 (en) Authentication device
CN110096974A (en) A kind of sight spot tourist based on recognition of face enters the method and system of garden veritification
CN109979059A (en) A kind of method, apparatus, equipment and storage medium controlling gate
CN113947826A (en) Door lock control method, device, terminal and readable storage medium based on UWB
CN110599657A (en) Access control monitoring system and method based on image recognition technology
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
CN111292454A (en) Intelligent identity access control identification system and method
CN112862640A (en) Digital school zone cloud platform management system
CN112801023A (en) Scenic spot visitor identification system
CN114944030A (en) Access control method and device
JP2023075227A (en) Information processor and information processing method
JP6754451B2 (en) Monitoring system, monitoring method and program
JP2008009690A (en) Entry management device, access management device, and entry management method
CN106023365A (en) Portrait and identity card comparison identification method and system based on scenic area safety
WO2022219932A1 (en) Information processing device, information processing system, and estimation method
CN112669501B (en) Access control method, device and computer readable storage medium
CN113591713A (en) Image processing method and device, electronic equipment and computer readable storage medium
CN114202842A (en) Be used for personnel to pass in and out register recorder
WO2023176167A1 (en) Registration device, registration method, and program
WO2021186576A1 (en) Gate system, gate device, image processing method therefor, program, and arrangement method for gate device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant