CN115131907B - Intelligent access control system and communication method thereof - Google Patents

Intelligent access control system and communication method thereof Download PDF

Info

Publication number
CN115131907B
CN115131907B CN202211055103.9A CN202211055103A CN115131907B CN 115131907 B CN115131907 B CN 115131907B CN 202211055103 A CN202211055103 A CN 202211055103A CN 115131907 B CN115131907 B CN 115131907B
Authority
CN
China
Prior art keywords
visitor
image
information
user
access control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211055103.9A
Other languages
Chinese (zh)
Other versions
CN115131907A (en
Inventor
肖僖
雷亭
李明
刘思
向保军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Haixun Supply Chain Co ltd
Original Assignee
Hunan Haixun Supply Chain Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Haixun Supply Chain Co ltd filed Critical Hunan Haixun Supply Chain Co ltd
Priority to CN202211055103.9A priority Critical patent/CN115131907B/en
Publication of CN115131907A publication Critical patent/CN115131907A/en
Application granted granted Critical
Publication of CN115131907B publication Critical patent/CN115131907B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Abstract

The invention relates to the technical field of attendance registers, and discloses an intelligent access control system and a communication method thereof. The method comprises the following steps: acquiring a remote door opening request; calling map information of an office area pre-saved by a target access control, judging whether a user is in the office area of the target access control according to positioning information, if not, searching an organization architecture tree of a company according to identity information of the user to determine a company employee set in the same group with the user, then screening out online identity list information of which the current position is in the office area of the target access control from the company employee set in the same group, sending a visitor information transfer waiting request to the user, and carrying the online identity list information in the visitor information transfer waiting request; acquiring entrusted items to be input by a user based on visitor information switching and receptionist information selected from online identity list information; the commitment is then forwarded to the receptionist.

Description

Intelligent access control system and communication method thereof
Technical Field
The invention relates to the technical field of attendance registers, in particular to an intelligent access control system and a communication method thereof.
Background
Gating techniques are widely used in various scenes of real life.
In the prior art, after the identity of a user is authenticated, a user interface can realize remote door opening through an APP client or a public number of a third party such as a WeChat. In particular, in some residential communities, security kiosks and security guards that are conventionally deployed at entrances and exits of community gates and that are responsible for the management of the entrance and exit of vehicles and people have been replaced by machines.
However, the existing remote door opening operation is not limited basically, and a user can open a corresponding door access frequently by clicking a remote door opening request randomly or even maliciously and frequently without time and space limitation and platform supervision, so that certain potential safety hazards are brought, and the remote door opening operation is not convenient to implement in scenes such as an industrial park, a storage base and the like.
Disclosure of Invention
The invention aims to disclose an intelligent access control system and a communication method thereof, which can improve the safety by monitoring the remote door opening behavior.
In order to achieve the above object, the communication method of the intelligent access control system disclosed by the invention comprises the following steps:
acquiring a remote door opening request, wherein the remote door opening request carries positioning information of a user mobile terminal, identity information of a user and identity information of a target access control;
calling map information of an office area pre-stored by the target access control, judging whether the user is in the office area of the target access control according to the positioning information, if not, searching an organization architecture tree of a company according to the identity information of the user to determine a company employee set in the same group with the user, then screening out online identity list information of which the current position is in the office area of the target access control from the company employee set in the same group, sending a visitor information transfer waiting request to the user, and carrying the online identity list information in the visitor information transfer waiting request;
acquiring entrusting matters to be input by the user based on the visitor information transfer request and information of a reception person selected in the online identity list information, wherein the entrusting matters take the user as an entrusting person and at least comprise visitor identity information; then, the entrusted matters are forwarded to the reception staff;
the company employee set in the same group as the user includes a parent node, a child node, and a sibling node of the node corresponding to the user.
In order to achieve the above object, the present invention further discloses an intelligent access control system, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, wherein the processor implements the steps corresponding to the above method when executing the computer program.
The invention has the following beneficial effects:
1. the remote door opening request is supervised, so that the remote door opening request is more applied to visitor management; the remote door opening request is effectively prevented from being frequently clicked at will or even maliciously without space-time limitation, and potential safety hazards caused by misoperation of company staff and the like are also avoided. And the company staff can enter and exit more efficiently in the field by traditional face brushing or fingerprint identification and the like. Thereby realizing the division of labor and current among different operation modes.
2. In the process of processing the remote door opening request, performing differentiation management in an office area according to whether the positioning information of the user exists; the office staff who is convenient for under the conditions of business trip, leave, work off and the like forwards the reception task for the visitor to the colleagues still in the office area in time. And the user can determine the members in the group still in the office area covered by the entrance guard through the online identity list information, and the condition that the user performs polling in modes of telephone and the like is avoided, so that the processing is more efficient, and the real-time performance and the reliability are higher.
3. In the process of determining the members in the same group, automatically determining the members in the same group based on the organizational structure tree; the company employee set in the same group with the user specifically comprises a father node, a child node and a brother node of the node corresponding to the user; therefore, the query range is effectively reduced, the data processing capacity is reduced, and the energy consumption and software and hardware resources of the system are saved. Moreover, when personnel change occurs in the company, the members in the same group can be automatically and adaptively recombined according to the update of the organization structure tree.
4. The identity information of the visitor is input in advance, the experience of the visitor is improved, and meanwhile the traditional operation that the foreground or security personnel register in paper documents can be omitted, so that the system is beneficial to simplifying the cost of human resources.
The present invention will be described in further detail below with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the invention and, together with the description, serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic flow chart of a communication method of an intelligent access control system according to an embodiment of the present invention.
Detailed Description
Embodiments of the invention will be described in detail below with reference to the drawings, but the invention can be implemented in many different ways as defined and covered by the claims.
Example 1
The embodiment discloses a communication method of an intelligent access control system, as shown in fig. 1, including:
s1, a remote door opening request is obtained, wherein the remote door opening request carries positioning information of a user mobile terminal, identity information of a user and identity information of a target entrance guard.
S2, calling map information of an office area pre-stored by the target access control, judging whether the user is in the office area of the target access control according to the positioning information, if not, searching an organization architecture tree of a company according to the identity information of the user to determine a company employee set in the same group with the user, then screening out online identity list information of which the current position is in the office area of the target access control from the company employee set in the same group, then sending a visitor information transfer waiting request to the user, and carrying the online identity list information in the visitor information transfer waiting request.
In this step, the company employee set in the same group as the user includes a parent node, a child node, and a sibling node of the node corresponding to the user. The construction, updating, and other maintenance of the organization structure tree are well known to those skilled in the art and widely applied to the existing technologies of software systems such as company OA, and are not described in detail.
S3, acquiring entrusting matters input by the user based on the visitor information transfer waiting request and receptionist information selected from the online identity list information, wherein the entrusting matters take the user as an entrusting person and at least comprise visitor identity information; the commitment is then forwarded to the receptionist.
In this step, the entrusting matter may further include information such as requirement description of the visitor, expected duration, license plate number, etc.
Optionally, after it is determined that the user is in the office area of the target access control according to the positioning information, the method of this embodiment further includes:
and S10, inputting identity information of the visitor, executing corresponding identity verification after the visitor arrives at a company, and executing door opening processing and generating an electronic visitor log after the identity verification is passed, wherein the mapping relation among the user, the target access control and the visitor is recorded in the electronic visitor log.
Similarly, after the commitment item is forwarded to the reception staff in step S3, the relevant operations of the reception staff are also synchronized in step S10, which is not described in detail.
Based on the delegation item of the transfer waiting in the embodiment, further, the method of the embodiment further includes:
and S4, traversing whether the visitor identity information input based on the visitor information transfer waiting request on the current day is the same as the identity information of the visitor in the currently generated electronic visitor log, and if so, sharing the electronic visitor log to the client corresponding to the transfer waiting consignment item. In the step, the traversal range is not limited to the transfer waiting request associated with the reception staff; therefore, when the current-day schedule of the visitor successively crosses a plurality of office areas in different positions on the organizational structure tree, the dynamic information of the visitor is shared to the related personnel in other positions.
Further, the method of this embodiment further includes:
step S51, a first image retrieval request is obtained, wherein the image retrieval request carries image information of company staff in charge of reception and the starting and ending time of the reception time period.
This operation is typically initiated by the staff member of the company responsible for the reception after the visitor is received.
And S52, searching a first image set containing the images of the staff of the company in charge of reception in the reception time period one by one from the video data uploaded by each camera of the video monitoring system.
Wherein, the camera of this step is limited to the camera of visitor's activity area only.
And S53, acquiring the image information of the visitor manually segmented in any image frame screened by the staff member in charge of reception in the first image set.
In the step, the 'segmentation' is that a user manually traces the outline of the human body of the visitor to intuitively and accurately extract a reference image with the definition meeting the requirement of the visitor.
And S54, screening a second image set containing the image of the visitor from the first image set according to the image information of the visitor.
Preferably, the specific execution of this step may be subdivided into:
step S541-1, respectively extracting an image subregion from the middle parts of the human face contour region and the coat contour region which are segmented in the same human body contour by using a rectangular window with uniform pixel number, calculating the mean value and the variance of pixels in each image subregion, then respectively comparing the mean value and the variance of the image subregion extracted by using the rectangular window in the visitor reference image which is manually segmented, and when the comparison results of the mean value and the variance of the two image subregions corresponding to the human face contour region and the coat contour region are both in a preset threshold range, judging that the corresponding image frame comprises the visitor image.
In this step, the human body contour, the human face contour region, that is, the jacket contour region, may be extracted by combining key feature points and skin color features of the human body, which is the prior art, and a specific implementation algorithm usually employs a convolutional neural network or the like, and is not described in detail. The "intermediate region" is a region satisfying the rectangular window pixel size within the outline, from the viewpoint of lowering the accuracy requirement, and is advantageous in that the adverse effect on the imaging field angle can be reduced to some extent; however, if high accuracy is required, the middle region is obtained according to the symmetry of the human body contour, and accordingly, the number of the pixels corresponding to the rectangular window may be usually 5 × 5, 7 × 7, or 9 × 9.
Further, after the above steps, the method further comprises:
step S541-1, after the corresponding image frame is judged to contain the visitor image based on the machine vision, the corresponding image frame manually removed by the user is deleted.
Alternatively, the present embodiment may also screen out the second image set including the visitor image from the first image set based on the existing cross-domain pedestrian re-identification technology. In this embodiment, because the population density and mobility of the office area of the company are relatively simple, the existing cross-domain pedestrian re-identification technology can obtain a good precision, which is the prior art and is not described in detail. Similarly, in step S52, the corresponding first image sets may be retrieved one by one from the video data uploaded by each camera of the video monitoring system based on a cross-domain pedestrian re-recognition technique and/or a face recognition technique.
Step S55, extracting an image frame with a middle time in any continuous shooting time period of the image subsets corresponding to the cameras in the second image set; and then arranging the extracted image frames according to the time sequence, filling the image frames into corresponding areas of the reception report, and automatically generating visitor path information in the reception report according to the position information of the cameras corresponding to the arranged image frames.
In this step, for example: if the visitors visit the technical development results within the field angle range of the same camera within 10 minutes, a single image frame in the middle of the time period can be taken. When the number of the image frames is even M, the M/2 th frame or the 1+ M/2 th frame can be taken as the middle image frame according to the rule set by the algorithm; if the number of image frames is an odd number N, the (N + 1)/2 th frame is taken as the middle image frame.
In the steps, the visitor path information and the related recording image required by the reception report can be obtained without specially carrying out image acquisition on the visitor, so that the visitor experience is further promoted, and meanwhile, the related certificate of company privacy management can be cleared up under the condition that the visitor feels nothing, and the privacy of the clearing up process is ensured. Furthermore, when the user sorts the reception report, the mapping relation between the current reception report and the generated electronic visitor log can be established; thereby, the client is matched with the client sharing the electronic visitor log to the corresponding transfer waiting client; after the reception report is finished, the system shares the reception report to the client corresponding to the transfer pending item according to the established mapping relation, so that the corresponding client can know a plurality of real and reliable reception information of the visitor in detail and comprehensively, and the communication efficiency among staff in the enterprise is improved.
It should be noted that the execution main body of the above steps of the present invention is specifically a cloud server of the access control system, which implements human-computer interaction with company staff in the form of a public number or a small program of a third party such as APP or WeChat loaded on a mobile terminal, and obviously, the cloud server also inevitably establishes communication connection with a terminal intelligent lock of a target access control; such deployment is well known to those skilled in the art and will not be described in detail.
Example 2
Based on the same technical concept as the above embodiments, the present embodiment discloses an intelligent access control system, which includes a memory, a processor, and a computer program stored on the memory and capable of running on the processor, wherein the processor implements the corresponding steps in the above method embodiments when executing the computer program.
In summary, the intelligent access control system and the communication method thereof disclosed in the above embodiments of the present invention at least have the following beneficial effects:
1. the remote door opening request is supervised, so that the remote door opening request is more applied to visitor management; the remote door opening request is effectively prevented from being frequently clicked at will or even maliciously without space-time limitation, and potential safety hazards caused by misoperation of company staff and the like are also avoided. And the company staff can enter and exit more efficiently in the field by traditional face brushing or fingerprint identification and the like. Thereby realizing the division of labor and current among different operation modes.
2. In the process of processing the remote door opening request, performing differentiation management in an office area according to whether the positioning information of the user is available; the office staff who is convenient for under the conditions of business trip, leave, work off and the like forwards the reception task for the visitor to the colleagues still in the office area in time. And the user can determine the members in the group still in the office area covered by the entrance guard through the online identity list information, and the condition that the user performs polling in modes of telephone and the like is avoided, so that the processing is more efficient, and the real-time performance and the reliability are higher.
3. In the process of determining the members in the same group, automatically determining the members in the same group based on the organizational structure tree; the company employee set in the same group with the user specifically comprises a father node, a child node and a brother node of the node corresponding to the user; therefore, the query range is effectively reduced, the data processing capacity is reduced, and the energy consumption and software and hardware resources of the system are saved. Moreover, when personnel change occurs in the company, the members in the same group can be automatically and adaptively recombined according to the update of the organization structure tree.
4. The identity information of the visitor is input in advance, the experience of the visitor is improved, and meanwhile the traditional operation that the foreground or security personnel register in paper documents can be omitted, so that the system is beneficial to simplifying the cost of human resources. The method is particularly suitable for scenes with large office area range (such as industrial parks, storage bases and the like) and long distance between the office position of the reception staff and the gate entrance guard where visitors enter the gate most first.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A communication method of an intelligent access control system is characterized by comprising the following steps:
acquiring a remote door opening request, wherein the remote door opening request carries positioning information of a user mobile terminal, identity information of a user and identity information of a target access control;
calling map information of an office area pre-stored by the target access control, judging whether the user is in the office area of the target access control according to the positioning information, if not, searching an organization architecture tree of a company according to the identity information of the user to determine a company employee set in the same group with the user, then screening out online identity list information of which the current position is in the office area of the target access control from the company employee set in the same group, sending a visitor information transfer waiting request to the user, and carrying the online identity list information in the visitor information transfer waiting request;
acquiring entrusting matters to be input by the user based on the visitor information transfer request and information of a reception person selected in the online identity list information, wherein the entrusting matters take the user as an entrusting person and at least comprise visitor identity information; then, the entrusted matters are forwarded to the reception staff;
the company employee set in the same group with the user comprises a father node, a child node and a brother node of the node corresponding to the user.
2. The communication method of intelligent access control system according to claim 1, wherein after determining that the user is in the office area of the target access control according to the positioning information, the method further comprises:
the method comprises the steps of inputting identity information of a visitor, executing corresponding identity verification after the visitor arrives at a company, executing door opening processing and generating an electronic visitor log after the identity verification passes, wherein a mapping relation among a user, a target access control and the visitor is recorded in the electronic visitor log.
3. The communication method of the intelligent access control system according to claim 1, further comprising:
the method comprises the steps that a reception person enters identity information of a visitor so that corresponding identity verification is executed after the visitor arrives at a company, and after the identity verification is passed, door opening processing is executed and a corresponding electronic visitor log is generated; and
and traversing whether the visitor identity information to be input based on the visitor information transfer request in the current day is the same as the visitor identity information in the currently generated electronic visitor log, and if so, sharing the electronic visitor log to the client corresponding to the transfer-waiting entrusting item.
4. The communication method of the intelligent access control system according to claim 2 or 3, further comprising:
acquiring a first image retrieval request, wherein the image retrieval request carries image information of a company staff in charge of reception and the starting and ending time of a reception time period;
searching a first image set containing the images of the staff members of the company in charge of reception in the reception time period one by one from the video data uploaded by each camera of the video monitoring system;
acquiring image information of the visitor manually segmented by the staff member in charge of reception in any image frame screened by the first image set;
screening a second image set containing the visitor image from the first image set according to the image information of the visitor;
extracting an image frame with a time in the middle in any continuous shooting time period corresponding to the image subsets of the cameras in the second image set; and then arranging the extracted image frames according to the time sequence, filling the image frames into corresponding areas of the reception report, and automatically generating visitor path information in the reception report according to the position information of the camera corresponding to each arranged image frame.
5. The communication method of intelligent access control system according to claim 4, wherein in the process of screening out the second image set including the visitor image from the first image set, the method comprises:
and respectively extracting an image subregion from the middle parts of a human face contour region and a coat contour region which are segmented in the same human body contour by using rectangular windows with uniform pixel point quantity, calculating the mean value and the variance of pixels in each image subregion, then respectively comparing the mean value and the variance of the image subregions extracted by using the rectangular windows in the visitor reference image segmented manually, and judging that the corresponding image frame comprises the visitor image when the comparison result of the mean value and the variance of the two image subregions corresponding to the human face contour region and the coat contour region is in a preset threshold range.
6. The communication method of intelligent access control system according to claim 5, wherein after determining that the corresponding image frame includes the visitor image based on machine vision, further comprising:
and deleting the corresponding image frames manually removed by the user.
7. The communication method of intelligent access control system according to claim 4, wherein a second image set containing the visitor image is screened out from the first image set based on cross-domain pedestrian re-identification technology.
8. An intelligent access control system comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the computer program to perform the steps of the method of any one of claims 1 to 7.
CN202211055103.9A 2022-08-30 2022-08-30 Intelligent access control system and communication method thereof Active CN115131907B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211055103.9A CN115131907B (en) 2022-08-30 2022-08-30 Intelligent access control system and communication method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211055103.9A CN115131907B (en) 2022-08-30 2022-08-30 Intelligent access control system and communication method thereof

Publications (2)

Publication Number Publication Date
CN115131907A CN115131907A (en) 2022-09-30
CN115131907B true CN115131907B (en) 2022-11-15

Family

ID=83388040

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211055103.9A Active CN115131907B (en) 2022-08-30 2022-08-30 Intelligent access control system and communication method thereof

Country Status (1)

Country Link
CN (1) CN115131907B (en)

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112017009867B1 (en) * 2014-12-02 2022-11-16 Inventio Ag METHOD FOR PROVIDING CONTROLLED ACCESS TO A VISITOR IN A BUILDING AND MOBILE DEVICE APPLICATION
KR101545953B1 (en) * 2015-01-30 2015-08-21 (주)엘트정보기술 The method for admission control and location recognition and recoding medium recoding the method for admission control and location recognition
CN104751553B (en) * 2015-04-03 2016-04-20 厦门狄耐克电子科技有限公司 A kind of intelligence community visual talk back entrance guard system based on EPON (PON) technology
US10580235B1 (en) * 2018-09-24 2020-03-03 Honeywell International Inc. Visitor meeting registration and management
CN109785476B (en) * 2018-12-07 2021-09-14 深圳云天励飞技术有限公司 Welcome management method and system, electronic device and storage medium
CN110264685A (en) * 2019-06-25 2019-09-20 胡渐佳 Intelligent reminding system and method are monitored outdoors
CN110610347A (en) * 2019-08-13 2019-12-24 万翼科技有限公司 Park visitor message notification method and device, computer equipment and storage medium
CN110992556A (en) * 2019-11-18 2020-04-10 咪咕音乐有限公司 Access control opening method, system, control center, visited terminal and readable storage medium
CN113053012A (en) * 2021-03-15 2021-06-29 上海深曼科技有限公司 Wisdom community visitor management system
CN113240846A (en) * 2021-04-26 2021-08-10 联仁健康医疗大数据科技股份有限公司 Visitor service management method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN115131907A (en) 2022-09-30

Similar Documents

Publication Publication Date Title
CN110428522B (en) Intelligent security system of wisdom new town
KR102215041B1 (en) Method and system for tracking an object in a defined area
WO2022121059A1 (en) Intelligent integrated access control management system based on 5g internet of things and ai
US10701321B2 (en) System and method for distributed video analysis
US7617167B2 (en) Machine vision system for enterprise management
US7801330B2 (en) Target detection and tracking from video streams
US20210196169A1 (en) Methods and System for Monitoring and Assessing Employee Moods
CN107222660B (en) Distributed network vision monitoring system
WO2018180588A1 (en) Facial image matching system and facial image search system
CN108446681B (en) Pedestrian analysis method, device, terminal and storage medium
CN112183353B (en) Image data processing method and device and related equipment
KR102333143B1 (en) System for providing people counting service
CN111353343A (en) Business hall service standard quality inspection method based on video monitoring
CN111476685A (en) Behavior analysis method, device and equipment
EP3570207B1 (en) Video cookies
CN115131907B (en) Intelligent access control system and communication method thereof
EP2193435A2 (en) Machine vision system for enterprise management
CN112699328A (en) Network point service data processing method, device, system, equipment and storage medium
CN115457706B (en) Control method and device of storage cabinet, electronic equipment and storage medium
US20210034671A1 (en) Method and system for enhancing a vms by intelligently employing access control information therein
CN116798176A (en) Data management system based on big data and intelligent security
CN114205565B (en) Monitoring video distribution method and system
CN113689613A (en) Access control system, access control method, and storage medium
CN113360241A (en) Traffic tunnel analysis platform
CN113128452A (en) Greening satisfaction acquisition method and system based on image recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant