CN115880826B - Park access method and system based on access data - Google Patents

Park access method and system based on access data Download PDF

Info

Publication number
CN115880826B
CN115880826B CN202310148197.2A CN202310148197A CN115880826B CN 115880826 B CN115880826 B CN 115880826B CN 202310148197 A CN202310148197 A CN 202310148197A CN 115880826 B CN115880826 B CN 115880826B
Authority
CN
China
Prior art keywords
character
visitor
data
visitor data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310148197.2A
Other languages
Chinese (zh)
Other versions
CN115880826A (en
Inventor
陈毅帆
尹政皓
孙二军
黄英邦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cotell Intelligent Technology Shenzhen Co ltd
Original Assignee
Cotell Intelligent Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cotell Intelligent Technology Shenzhen Co ltd filed Critical Cotell Intelligent Technology Shenzhen Co ltd
Priority to CN202310148197.2A priority Critical patent/CN115880826B/en
Publication of CN115880826A publication Critical patent/CN115880826A/en
Application granted granted Critical
Publication of CN115880826B publication Critical patent/CN115880826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Document Processing Apparatus (AREA)
  • Character Discrimination (AREA)

Abstract

The invention provides a park access method and system based on access data, comprising the following steps: receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor; detecting whether matched target face characteristic information exists in a database based on the face characteristic information; acquiring historical visitor data of a visitor, and performing desensitization treatment to obtain desensitized visitor data; after pushing to an access terminal for the visitor to confirm or modify, generating a corresponding pass code based on the text information; and storing the visitor data, the face characteristic information and the pass code in a database in association, and sending the pass code to the visitor. The visitor access management can be realized based on the face characteristic information and the pass code, the gate inhibition is not required to be manually watched, and the labor is saved; and meanwhile, complicated operation of inputting information by a visitor can be avoided.

Description

Park access method and system based on access data
Technical Field
The invention relates to the technical field of data processing, in particular to a park access method and system based on access data.
Background
With the rapid development of social economy, the mobility of the community and the park is increased, the difficulty for managing the community and the park is increased, and the potential safety hazard is increased.
In the prior art, a large number of communities and parks adopt the traditional paper registration as a main way of visitor management and mainly rely on manual management, so that the way wastes manpower, is easy to generate contradiction and conflict, has the condition of missing registration and has potential safety hazard; meanwhile, when a visitor inputs visitor data, the input operation is complicated, and more time is required.
Disclosure of Invention
The invention mainly aims to provide a park access method and system based on access data, which aim to overcome the defect of manpower waste during the access management of the existing park and overcome the defect of complicated input information.
In order to achieve the above object, the present invention provides a campus access method based on access data, comprising the following steps:
receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor;
Detecting whether matched target face characteristic information exists in a database based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time;
detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data;
pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify, so that the visitor can input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data;
after receiving the visitor confirmation or the modified visitor data, generating a corresponding pass code based on the text information;
storing the visitor data in a database in association with the face feature information and a pass code, and transmitting the pass code to the visitor; the face feature information and the pass code are used for verifying that the visitor accesses the garden area.
Further, after the desensitized visitor data is pushed to the access terminal, the desensitized visitor data is automatically decrypted into the visitor data, which comprises the following steps:
after the desensitized visitor data are pushed to the access terminal, acquiring identification information of the access terminal;
carrying out hash calculation on the identification information to obtain a corresponding identification hash value;
judging whether the hash value which is the same as the identification hash value exists in the database, and if so, controlling the access terminal to automatically decrypt the desensitized visitor data to obtain the visitor data.
Further, after the step of storing the visitor data in a database in association with the face feature information and the passcode, and transmitting the passcode to the visitor, the method includes:
when the visitor accesses the park area, acquiring face image information of the visitor based on a camera on a park entrance guard;
verifying whether the face image information is matched with face feature information stored in a database;
if so, allowing the visitor to enter a park;
if the password is not matched with the password, prompting the visitor to input the password; if the correct pass code is received and input by the visitor, the visitor is released to enter the park; and if the correct pass code input by the visitor is not received, prohibiting release.
Further, the step of generating a corresponding pass code based on the text information includes:
acquiring characteristic information of the text information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the text information; wherein, the character information is a single Chinese character;
based on the pinyin characteristics, generating corresponding first characters by adopting a first generation rule;
based on the stroke characteristics, generating a corresponding second character by adopting a second generation rule;
generating a corresponding third character by adopting a third generation rule based on the component characteristics;
randomly generating a fourth character which is not repeated, wherein the fourth character is only generated once in a preset period;
determining a corresponding character combination rule based on the radical features; the database stores the corresponding relation between the character combination rules and the character component characteristics;
and combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character serving as the pass code.
Further, the pinyin characteristics include initial characteristics, final characteristics and tone characteristics; the step of generating the corresponding first character by adopting a first generation rule based on the pinyin characteristics comprises the following steps:
Mapping the initial consonant feature to a first number based on a first mapping table;
mapping the final characteristics into second numbers based on a second mapping table;
mapping the tone feature to a third number based on a third mapping table;
sequentially concatenating the first number, the second number and the third number to obtain concatenated numbers; judging whether the number of the digits in the serial number is larger than a threshold value or not; if the number is larger than the first character, a 32-system coding table is adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; wherein the 32-ary encoding table is arranged based on the initial consonant features.
Further, the arrangement mode of the 32-system coding table comprises:
obtaining a standard 32-ary coding table; the standard 32-system coding table is a preset coding table of a park;
acquiring characters in the initial consonant characteristics as initial consonant characters;
all the code symbols corresponding to the initial consonant characters in the standard 32-system code table are deleted, so that a plurality of gaps are obtained; and shifting all the codes after the empty space in the standard 32-ary coding table forward to fill the empty space; filling the initial characters in a blank space left at the end of the standard 32-system coding table to obtain the arranged 32-system coding table.
Further, the step of generating the corresponding first character by adopting the first generation rule based on the pinyin characteristics includes:
mapping each character in the pinyin feature to a corresponding number based on a fourth mapping table;
the numbers obtained through mapping are sequentially connected in series according to the sequence corresponding to the pinyin characteristics, and serial numbers are obtained; judging whether the number of the digits in the serial number is larger than a threshold value or not; if the number is larger than the first character, a 32-system coding table is adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; wherein the 32-ary encoding table is arranged based on the pinyin characteristics.
Further, the step of generating a corresponding second character using a second generation rule based on the stroke characteristics includes:
taking the stroke number in the stroke characteristic as the second character;
based on the character string feature, generating a corresponding third character by using a third generation rule, including:
and searching a number corresponding to the component feature as the third character based on the component feature and the corresponding relation between the component feature and the number stored in the database.
Further, after the step of determining the corresponding character combination rule based on the radical feature, the method further includes:
searching a corresponding first Chinese character set in a Chinese character dictionary base based on the pinyin characteristics of the text information; wherein, the Chinese characters in the first Chinese character set have the same pinyin characteristics;
detecting whether only one Chinese character exists in the first Chinese character set; if only one Chinese character exists in the first Chinese character set, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
if more than one Chinese character in the first Chinese character set is found, searching a corresponding second Chinese character set in the first Chinese character set based on stroke characteristics of the text information; wherein, the Chinese characters in the second Chinese character set have the same stroke characteristics;
detecting whether the Chinese characters in the second Chinese character set are only one; if only one Chinese character in the second Chinese character set exists, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
If more than one Chinese character in the second Chinese character set is found, searching a corresponding third Chinese character set in the second Chinese character set based on the radical characteristics of the character information; wherein, the Chinese characters in the third Chinese character set have the same radical characteristics;
detecting whether the Chinese characters in the third Chinese character set are only one; if only one Chinese character exists in the third Chinese character set, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
if the number of Chinese characters in the third Chinese character set is not more than one, randomly generating a fifth character which is not repeated, wherein the fifth character is only generated once in a preset period; and combining the first character, the second character, the third character, the fourth character and the fifth character based on the determined character combination rule to obtain a combined character serving as the pass code.
The invention also provides a park access system based on the access data, which comprises:
the first receiving unit is used for receiving characteristic information input by the visitor on the access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor;
The matching unit is used for detecting whether the matched target face characteristic information exists in the database or not based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time;
the desensitization unit is used for detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data;
the pushing unit is used for pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify so as to enable the visitor to input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data;
the second receiving unit is used for generating a corresponding pass code based on the text information after receiving the visitor confirmation or the modified visitor data;
a storage unit, configured to store the visitor data in a database in association with the face feature information and a pass code, and send the pass code to the visitor; the face feature information and the pass code are used for verifying that the visitor accesses the garden area.
Further, after the desensitized visitor data is pushed to the access terminal, the desensitized visitor data is automatically decrypted into the visitor data, which comprises the following steps:
after the desensitized visitor data are pushed to the access terminal, acquiring identification information of the access terminal;
carrying out hash calculation on the identification information to obtain a corresponding identification hash value;
judging whether the hash value which is the same as the identification hash value exists in the database, and if so, controlling the access terminal to automatically decrypt the desensitized visitor data to obtain the visitor data.
The invention also provides a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of any of the methods described above when the computer program is executed.
The invention also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method of any of the preceding claims.
The park access method and system based on the access data provided by the invention comprise the following steps: receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor; detecting whether matched target face characteristic information exists in a database based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time; detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data; pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify, so that the visitor can input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data; after receiving the visitor confirmation or the modified visitor data, generating a corresponding pass code based on the text information; storing the visitor data in a database in association with the face feature information and a pass code, and transmitting the pass code to the visitor; the face feature information and the pass code are used for verifying that the visitor accesses the garden area. The visitor access management can be realized based on the face characteristic information and the pass code, the gate inhibition is not required to be manually watched, and the labor is saved; and meanwhile, complicated operation of inputting information by a visitor can be avoided.
Drawings
FIG. 1 is a schematic diagram of steps of a campus access method based on access data in an embodiment of the present invention;
FIG. 2 is a block diagram of a campus access system based on access data in one embodiment of the invention;
fig. 3 is a block diagram schematically illustrating a structure of a computer device according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, in one embodiment of the present invention, there is provided a campus access method based on access data, including the steps of:
step S1, receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor;
step S2, based on the face feature information, detecting whether matched target face feature information exists in a database; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time;
Step S3, detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data;
step S4, the desensitized visitor data are pushed to the access terminal for the visitor to confirm or modify, so that the visitor can input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data;
step S5, after receiving the visitor confirmation or the modified visitor data, generating a corresponding pass code based on the text information;
step S6, the visitor data, the face characteristic information and the pass code are stored in a database in an associated mode, and the pass code is sent to the visitor; the face feature information and the pass code are used for verifying that the visitor accesses the garden area.
In this embodiment, the above scheme is applied to application management where visitors access before entering the campus. Specifically, as described in the above step S1, the visitor may send an access request for accessing the campus on the access terminal, and input feature information, where the feature information includes face feature information and text information randomly input by the visitor, the face feature information is used for performing face recognition to pass through the entrance guard when the visitor accesses the campus, and the text information randomly input by the visitor is used for generating a corresponding pass code as described in the above step S5; the pass code is used for inputting the pass code to pass through the entrance guard when the visitor cannot pass through the entrance guard by using the face characteristic information, namely, the face characteristic information and the pass code can be used for verifying that the visitor accesses the garden area.
Detecting whether the matching target face feature information exists in the database based on the face feature information as described in the steps S2-S3; if the target face feature information exists, the visitor accesses the park, and only the time difference between the effective period of the target face feature information in the database and the current time is detected; the expiration date of the targeted face feature information is typically only a few hours. Detecting whether the time difference is smaller than a preset duration or not; if the historical visitor data is smaller than the preset threshold value, indicating that the visitor recently accesses the campus, and acquiring the historical visitor data of the visitor at the moment in order to facilitate the visitor to input the data, wherein the historical visitor data is required to be subjected to desensitization processing to obtain the desensitized visitor data in order to prevent the historical visitor data from being leaked in the transmission process; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data; pushing the desensitized visitor data to the access terminal for confirmation or modification by the visitor for the visitor to input visitor data as described in the above step S4; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data; at this time, if the visitor accesses the enterprise with history access, the visitor data does not need to be manually input; if the visitor accesses the enterprise which is not the history access, the visitor can manually modify the enterprise; in this embodiment, the input operation of the visitor is simplified.
In an embodiment, the method for automatically decrypting the desensitized guest data into guest data after pushing to the access terminal includes:
after the desensitized visitor data are pushed to the access terminal, acquiring identification information of the access terminal;
carrying out hash calculation on the identification information to obtain a corresponding identification hash value;
judging whether the hash value which is the same as the identification hash value exists in the database, and if so, controlling the access terminal to automatically decrypt the desensitized visitor data to obtain the visitor data.
In this embodiment, after the desensitized visitor data is pushed to the access terminal, decryption processing is automatically performed, so that not only is leakage of the visitor data avoided in the transmission process, but also the operation of the visitor can be reduced.
In an embodiment, after the step S6 of storing the visitor data in a database in association with the face feature information and the passcode, and sending the passcode to the visitor, the method includes:
s7, acquiring face image information of the visitor based on a camera on a park entrance guard when the visitor accesses the park;
step S8, verifying whether the face image information is matched with face feature information stored in a database;
Step S9a, if the visitor is matched with the park, releasing the visitor to enter the park;
step S9b, if the password is not matched, prompting the visitor to input the password; if the correct pass code is received and input by the visitor, the visitor is released to enter the park; and if the correct pass code input by the visitor is not received, prohibiting release.
In the embodiment, the situation that the face recognition system of the access control is possibly down or inaccurate in recognition is considered, so that the passing of visitors is prevented from being influenced; the determination of whether to pass or not may be made based on the passcode described above. The pass code is generated according to the text negotiation input by the visitor, and only the visitor and the park management end know the pass code, so that leakage is not worry. In other embodiments, if the pass is still unable to pass, a corresponding Chinese character may be input, whether the corresponding Chinese character is a Chinese character input in advance by the visitor is determined, if yes, the release is permitted, and if not, the release is prohibited.
In this embodiment, a specific scheme for generating a pass code is provided, specifically, the step S5 of generating a corresponding pass code based on the text information includes:
step S51, obtaining characteristic information of the text information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and radical characteristics of the text information; wherein, the character information is a single Chinese character; for example, the Chinese characters input by the visitor are: "visited", its corresponding phonetic feature is "fang", its stroke feature is "06", its radical feature is "" book ", and its radicals are common components in the combined word. People are familiar with the fact that the upper, lower, left and right parts of Chinese characters are commonly referred to as components. In general, the term "header" is referred to above as "" + "in the word of flowers, and the term" grass header "; the bottom is called as a dish in the basin, and the dish sub-bottom is called as a dish in the basin; the left side is called as "side", such as "side of Chinese character Ji" in Chinese character' xi; the right side is called as a 'bucket' in the material word, and is called as a bucket word side; the external terms "frame", such as "" in the oka word, refer to the same word frame, some components, and the shapes are changed at different positions, and the external terms are also different, such as "people" in the "meeting" word, refer to the header of a figure, and in the "immortal" word, refer to a single person. The character components express the structural characteristics of the Chinese characters. It can be understood that if the Chinese characters are polyphones, common pronunciation can be selected or any pronunciation can be selected.
Step S52, based on the pinyin characteristics, generating corresponding first characters by adopting a first generation rule;
step S53, based on the stroke characteristics, generating a corresponding second character by adopting a second generation rule;
step S54, based on the component characteristics, generating corresponding third characters by adopting a third generation rule; in this embodiment, the database stores the first generation rule, the second generation rule, and the third generation rule, and corresponding rules are adopted for the pinyin feature, the stroke feature, and the radical feature to generate corresponding characters; so that the subsequently generated pass codes combine the multidimensional characteristics of Chinese characters and enhance the designability. In one embodiment, the characters are numbers.
Step S55, randomly generating a fourth character which is not repeated, wherein the fourth character is only generated once in a preset period; since different guests may have entered the same text, a non-repeating fourth character, typically a number, needs to be generated for distinction, and generated only once within a predetermined period. For example, the number is generated only once every working day, and is not regenerated on that day.
Step S56, corresponding character combination rules are determined based on the component characteristics; the database stores the corresponding relation between the character combination rules and the character component characteristics; different character combination rules are adopted corresponding to different radical characteristics, and the character combination rules can be the sequence of character combination, such as third character-first character-second character-fourth character, or fourth character-third character-first character-second character. Different character combination rules are adopted corresponding to the component features, so that the difference of the component features is conveniently represented, and the component features are conveniently reversely deduced according to the character combination rules.
And step S57, based on the determined character combination rule, combining the first character, the second character, the third character and the fourth character to obtain a combined character serving as the pass code. And combining the first character, the second character, the third character and the fourth character based on the determined character combination rule, so that the pass code serving as the access control pass verification can be obtained.
In one embodiment, the pinyin characteristics include an initial characteristic, a final characteristic, and a tone characteristic; the step S52 of generating the corresponding first character by using the first generation rule based on the pinyin feature includes:
Mapping the initial consonant feature to a first number based on a first mapping table; in the first mapping table, each initial consonant corresponds to a number; the number is at most two digits;
mapping the final characteristics into second numbers based on a second mapping table; in the second mapping table, each vowel corresponds to a number; the number is at most two digits;
mapping the tone feature to a third number based on a third mapping table; in the third mapping table, each tone corresponds to a number, and the number is a one-digit number;
sequentially concatenating the first number, the second number and the third number to obtain concatenated numbers; judging whether the number of the digits in the serial number is larger than a threshold value or not; if the number is larger than the first character, a 32-system coding table is adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; wherein the 32-ary encoding table is arranged based on the initial consonant features. In order to avoid that the subsequent pass code is too long, the length of the first character is not too long, usually not more than four digits (the threshold value is 4), and if the number in the concatenated number is not more than 4, the concatenated number can be directly used as the first character; if the number is larger than 4, a 32-system coding table can be adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; since the numbers are decimal numbers, the number length can be significantly reduced after 32-ary encoding. It can be understood that after the 32-system coding is performed, whether the number of characters in the converted characters is greater than a threshold value can be detected again, and if so, characters with more tail parts than the threshold value in the converted characters can be removed.
In this embodiment, a specific scheme for arranging the encoding table is provided, where the arranging manner of the 32-ary encoding table includes:
obtaining a standard 32-ary coding table; the standard 32-system coding table is a preset coding table of a park;
the standard 32-ary encoding table is shown in table 1 below:
TABLE 1
Sequence(s) Coding symbol Sequence(s) Coding symbol Sequence(s) Coding symbol Sequence(s) Coding symbol
0 a 8 i 16 q 24 y
1 b 9 j 17 r 25 z
2 c 10 k 18 s 26 1
3 d 11 l 19 t 27 2
4 e 12 m 20 u 28 3
5 f 13 n 21 v 29 4
6 g 14 o 22 w 30 5
7 h 15 p 23 x 31 6
Acquiring characters in the initial consonant characteristics as initial consonant characters; for example, if the initial character is "sh", the initial character is s, h;
all the code symbols corresponding to the initial consonant characters in the standard 32-system code table are deleted, so that a plurality of gaps are obtained; and shifting all the codes after the empty space in the standard 32-ary coding table forward to fill the empty space; filling the initial characters in a blank space left at the end of the standard 32-system coding table to obtain the arranged 32-system coding table.
For example, when the initial characters are s and h, the corresponding sequences are 18 and 7, after all the codes corresponding to the initial characters in the standard 32-system coding table are deleted, gaps corresponding to the sequence numbers 18 and 7 are obtained, at this time, all the codes after the sequence number 7 are translated forward, and the last two gaps are left to fill in the s and h, so as to obtain the rearranged 32-system coding table, as shown in the following table 2:
TABLE 2
Sequence(s) Coding symbol Sequence(s) Coding symbol Sequence(s) Coding symbol Sequence(s) Coding symbol
0 a 8 j 16 r 24 1
1 b 9 k 17 t 25 2
2 c 10 l 18 u 26 3
3 d 11 m 19 v 27 4
4 e 12 n 20 w 28 5
5 f 13 o 21 x 29 6
6 g 14 p 22 y 30 s
7 i 15 q 23 z 31 h
The rearranged 32-ary code table, unlike the standard 32-ary code table, has a partial code value changed, and the serial numbers are converted based on the rearranged 32-ary code table, so that the conversion result is changed, the rearranged 32-ary code table has uniqueness and relevance with the initial characters, so that the rearranged 32-ary code table can be obtained only in the same way.
In an embodiment, the step of generating the corresponding first character using the first generation rule based on the pinyin feature includes:
mapping each character in the pinyin feature to a corresponding number based on a fourth mapping table; in the fourth mapping table, each character corresponds to a number.
The numbers obtained through mapping are sequentially connected in series according to the sequence corresponding to the pinyin characteristics, and serial numbers are obtained; judging whether the number of the digits in the serial number is larger than a threshold value or not; if the number is larger than the first character, a 32-system coding table is adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; wherein the 32-ary encoding table is arranged based on the pinyin characteristics. The encoding manner of the 32-ary encoding table is described in the above embodiments, and will not be described herein.
In another embodiment, the step of generating the corresponding second character using a second generation rule based on the stroke feature includes:
taking the stroke number in the stroke characteristic as the second character; if the stroke number is 8, the second character is 08.
Based on the character string feature, generating a corresponding third character by using a third generation rule, including:
and searching a number corresponding to the component feature as the third character based on the component feature and the corresponding relation between the component feature and the number stored in the database. The database stores the correspondence between various character components and numbers, and the third character can be obtained from the character components.
In another embodiment, to avoid that Chinese characters with the same pinyin characteristics, stroke characteristics and radical characteristics produce the same pass code, the situation needs to be corrected, specifically, after the step of determining the corresponding character combination rule based on the radical characteristics, the method further includes:
searching a corresponding first Chinese character set in a Chinese character dictionary base based on the pinyin characteristics of the text information; wherein, the Chinese characters in the first Chinese character set have the same pinyin characteristics;
Detecting whether only one Chinese character exists in the first Chinese character set; if only one Chinese character exists in the first Chinese character set, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
if more than one Chinese character in the first Chinese character set is found, searching a corresponding second Chinese character set in the first Chinese character set based on stroke characteristics of the text information; wherein, the Chinese characters in the second Chinese character set have the same stroke characteristics;
detecting whether the Chinese characters in the second Chinese character set are only one; if only one Chinese character in the second Chinese character set exists, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
if more than one Chinese character in the second Chinese character set is found, searching a corresponding third Chinese character set in the second Chinese character set based on the radical characteristics of the character information; wherein, the Chinese characters in the third Chinese character set have the same radical characteristics;
Detecting whether the Chinese characters in the third Chinese character set are only one; if only one Chinese character exists in the third Chinese character set, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
if the number of Chinese characters in the third Chinese character set is not more than one, randomly generating a fifth character which is not repeated, wherein the fifth character is only generated once in a preset period; and combining the first character, the second character, the third character, the fourth character and the fifth character based on the determined character combination rule to obtain a combined character serving as the pass code.
In an embodiment, the step S5 of generating the corresponding pass code based on the text information includes:
acquiring characteristic information of the text information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and radical characteristics of the text information; wherein, the character information is a single Chinese character;
inputting the pinyin characteristics, the stroke characteristics and the component characteristics of the text information into a classification model for classification, and obtaining a classification result; the classification model is a deep learning model which is obtained by training a large amount of training data in advance;
Obtaining a target generation rule corresponding to the classification result of the text information according to the mapping relation between the classification result and the generation rule stored in the database;
and processing the text information based on the target generation rule to obtain a corresponding pass code.
In the embodiment, the deep learning model is adopted to classify the text information, and the classification is based on the pinyin characteristics, the stroke characteristics and the radical characteristics of the text information; because of different Chinese characters, different complexity, different pinyin and different strokes, different Chinese characters in different categories need to be processed differently. In this embodiment, different generation rules are corresponding to different classification results, and the generation rules are used for processing the text information to obtain corresponding pass codes.
Referring to fig. 2, in one embodiment of the present invention, there is also provided a campus access system based on access data, including:
the first receiving unit is used for receiving characteristic information input by the visitor on the access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor;
the matching unit is used for detecting whether the matched target face characteristic information exists in the database or not based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time;
The desensitization unit is used for detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data;
the pushing unit is used for pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify so as to enable the visitor to input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data;
the second receiving unit is used for generating a corresponding pass code based on the text information after receiving the visitor confirmation or the modified visitor data;
a storage unit, configured to store the visitor data in a database in association with the face feature information and a pass code, and send the pass code to the visitor; the face feature information and the pass code are used for verifying that the visitor accesses the garden area.
In an embodiment, the method for automatically decrypting the desensitized guest data into guest data after pushing to the access terminal includes:
After the desensitized visitor data are pushed to the access terminal, acquiring identification information of the access terminal;
carrying out hash calculation on the identification information to obtain a corresponding identification hash value;
judging whether the hash value which is the same as the identification hash value exists in the database, and if so, controlling the access terminal to automatically decrypt the desensitized visitor data to obtain the visitor data.
In this embodiment, for specific implementation of each unit in the above embodiment of the park access system based on the access data, please refer to the description in the above embodiment of the method, and no further description is given here.
Referring to fig. 3, in an embodiment of the present invention, there is further provided a computer device, which may be a server, and an internal structure thereof may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing face characteristic information and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a campus access method based on access data.
It will be appreciated by those skilled in the art that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
An embodiment of the present invention also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a campus access method based on access data. It is understood that the computer readable storage medium in this embodiment may be a volatile readable storage medium or a nonvolatile readable storage medium.
In summary, the method and system for park access based on access data provided in the embodiments of the present invention include: receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor; detecting whether matched target face characteristic information exists in a database based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time; detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data; pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify, so that the visitor can input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data; after receiving the visitor confirmation or the modified visitor data, generating a corresponding pass code based on the text information; storing the visitor data in a database in association with the face feature information and a pass code, and transmitting the pass code to the visitor; the face feature information and the pass code are used for verifying that the visitor accesses the garden area. The visitor access management can be realized based on the face characteristic information and the pass code, the gate inhibition is not required to be manually watched, and the labor is saved; and meanwhile, complicated operation of inputting information by a visitor can be avoided.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present invention and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes using the descriptions and drawings of the present invention or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (9)

1. A campus access method based on access data, comprising the steps of:
receiving characteristic information input by a visitor on an access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor;
Detecting whether matched target face characteristic information exists in a database based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time;
detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data;
pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify, so that the visitor can input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data;
after receiving the visitor confirmation or the modified visitor data, generating a corresponding pass code based on the text information;
storing the visitor data in a database in association with the face feature information and a pass code, and transmitting the pass code to the visitor; the face characteristic information and the pass code are used for verifying that the visitor accesses a garden area;
The step of generating the corresponding pass code based on the text information comprises the following steps:
acquiring characteristic information of the text information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the text information; wherein, the character information is a single Chinese character;
based on the pinyin characteristics, generating corresponding first characters by adopting a first generation rule;
based on the stroke characteristics, generating a corresponding second character by adopting a second generation rule;
generating a corresponding third character by adopting a third generation rule based on the component characteristics;
randomly generating a fourth character which is not repeated, wherein the fourth character is only generated once in a preset period;
determining a corresponding character combination rule based on the radical features; the database stores the corresponding relation between the character combination rules and the character component characteristics;
and combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character serving as the pass code.
2. The campus access method based on access data according to claim 1, wherein the desensitizing visitor data automatically decrypts the desensitizing visitor data into visitor data after pushing to the access terminal, comprising:
After the desensitized visitor data are pushed to the access terminal, acquiring identification information of the access terminal;
carrying out hash calculation on the identification information to obtain a corresponding identification hash value;
judging whether the hash value which is the same as the identification hash value exists in the database, and if so, controlling the access terminal to automatically decrypt the desensitized visitor data to obtain the visitor data.
3. The method of claim 1, wherein the pinyin characteristics include initial characteristics, final characteristics, and tone characteristics; the step of generating the corresponding first character by adopting a first generation rule based on the pinyin characteristics comprises the following steps:
mapping the initial consonant feature to a first number based on a first mapping table;
mapping the final characteristics into second numbers based on a second mapping table;
mapping the tone feature to a third number based on a third mapping table;
sequentially concatenating the first number, the second number and the third number to obtain concatenated numbers; judging whether the number of the digits in the serial number is larger than a threshold value or not; if the number is larger than the first character, a 32-system coding table is adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; wherein the 32-ary encoding table is arranged based on the initial consonant features.
4. A campus access method based on access data according to claim 3, wherein the arrangement of the 32-ary encoding table comprises:
obtaining a standard 32-ary coding table; the standard 32-system coding table is a preset coding table of a park;
acquiring characters in the initial consonant characteristics as initial consonant characters;
all the code symbols corresponding to the initial consonant characters in the standard 32-system code table are deleted, so that a plurality of gaps are obtained; and shifting all the codes after the empty space in the standard 32-ary coding table forward to fill the empty space; filling the initial characters in a blank space left at the end of the standard 32-system coding table to obtain the arranged 32-system coding table.
5. The method of claim 1, wherein the step of generating the corresponding first character using a first generation rule based on the pinyin characteristics comprises:
mapping each character in the pinyin feature to a corresponding number based on a fourth mapping table;
the numbers obtained through mapping are sequentially connected in series according to the sequence corresponding to the pinyin characteristics, and serial numbers are obtained; judging whether the number of the digits in the serial number is larger than a threshold value or not; if the number is larger than the first character, a 32-system coding table is adopted to carry out system conversion on the serial numbers, and the converted characters are used as the first characters; wherein the 32-ary encoding table is arranged based on the pinyin characteristics.
6. The method of campus access based on access data of claim 1, wherein the step of generating a corresponding second character using a second generation rule based on the stroke characteristics comprises:
taking the stroke number in the stroke characteristic as the second character;
based on the character string feature, generating a corresponding third character by using a third generation rule, including:
and searching a number corresponding to the component feature as the third character based on the component feature and the corresponding relation between the component feature and the number stored in the database.
7. The data-based campus access method according to claim 1, wherein after the step of determining the corresponding character combination rule based on the radical feature, further comprising:
searching a corresponding first Chinese character set in a Chinese character dictionary base based on the pinyin characteristics of the text information; wherein, the Chinese characters in the first Chinese character set have the same pinyin characteristics;
detecting whether only one Chinese character exists in the first Chinese character set; if only one Chinese character exists in the first Chinese character set, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
If more than one Chinese character in the first Chinese character set is found, searching a corresponding second Chinese character set in the first Chinese character set based on stroke characteristics of the text information; wherein, the Chinese characters in the second Chinese character set have the same stroke characteristics;
detecting whether the Chinese characters in the second Chinese character set are only one; if only one Chinese character in the second Chinese character set exists, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
if more than one Chinese character in the second Chinese character set is found, searching a corresponding third Chinese character set in the second Chinese character set based on the radical characteristics of the character information; wherein, the Chinese characters in the third Chinese character set have the same radical characteristics;
detecting whether the Chinese characters in the third Chinese character set are only one; if only one Chinese character exists in the third Chinese character set, executing the step of combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain combined characters as the pass code;
If the number of Chinese characters in the third Chinese character set is not more than one, randomly generating a fifth character which is not repeated, wherein the fifth character is only generated once in a preset period; and combining the first character, the second character, the third character, the fourth character and the fifth character based on the determined character combination rule to obtain a combined character serving as the pass code.
8. A campus access system based on access data, comprising:
the first receiving unit is used for receiving characteristic information input by the visitor on the access terminal; the characteristic information comprises face characteristic information of the visitor and character information randomly input by the visitor;
the matching unit is used for detecting whether the matched target face characteristic information exists in the database or not based on the face characteristic information; if the target face feature information exists, detecting the time difference between the valid period of the target face feature information in the database and the current time;
the desensitization unit is used for detecting whether the time difference is smaller than a preset duration; if the historical visitor data of the visitor is smaller than the historical visitor data, the historical visitor data is subjected to desensitization processing, and desensitization visitor data are obtained; the method comprises the steps that only privacy data in historical visitor data are desensitized in desensitized visitor data;
The pushing unit is used for pushing the desensitized visitor data to the access terminal for the visitor to confirm or modify so as to enable the visitor to input the visitor data; after the desensitized visitor data are pushed to the access terminal, the desensitized visitor data are automatically decrypted into visitor data;
the second receiving unit is used for generating a corresponding pass code based on the text information after receiving the visitor confirmation or the modified visitor data;
a storage unit, configured to store the visitor data in a database in association with the face feature information and a pass code, and send the pass code to the visitor; the face characteristic information and the pass code are used for verifying that the visitor accesses a garden area;
the second receiving unit generates a corresponding pass code based on the text information, including:
acquiring characteristic information of the text information, wherein the characteristic information comprises pinyin characteristics, stroke characteristics and component characteristics of the text information; wherein, the character information is a single Chinese character;
based on the pinyin characteristics, generating corresponding first characters by adopting a first generation rule;
Based on the stroke characteristics, generating a corresponding second character by adopting a second generation rule;
generating a corresponding third character by adopting a third generation rule based on the component characteristics;
randomly generating a fourth character which is not repeated, wherein the fourth character is only generated once in a preset period;
determining a corresponding character combination rule based on the radical features; the database stores the corresponding relation between the character combination rules and the character component characteristics;
and combining the first character, the second character, the third character and the fourth character based on the determined character combination rule to obtain a combined character serving as the pass code.
9. The access data-based campus access system of claim 8, wherein the desensitized visitor data, after being pushed to the access terminal, automatically decrypts the desensitized visitor data into visitor data, comprising:
after the desensitized visitor data are pushed to the access terminal, acquiring identification information of the access terminal;
carrying out hash calculation on the identification information to obtain a corresponding identification hash value;
judging whether the hash value which is the same as the identification hash value exists in the database, and if so, controlling the access terminal to automatically decrypt the desensitized visitor data to obtain the visitor data.
CN202310148197.2A 2023-02-22 2023-02-22 Park access method and system based on access data Active CN115880826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310148197.2A CN115880826B (en) 2023-02-22 2023-02-22 Park access method and system based on access data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310148197.2A CN115880826B (en) 2023-02-22 2023-02-22 Park access method and system based on access data

Publications (2)

Publication Number Publication Date
CN115880826A CN115880826A (en) 2023-03-31
CN115880826B true CN115880826B (en) 2023-05-05

Family

ID=85761468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310148197.2A Active CN115880826B (en) 2023-02-22 2023-02-22 Park access method and system based on access data

Country Status (1)

Country Link
CN (1) CN115880826B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132527B (en) * 2023-04-13 2023-06-16 深圳柯赛标识智能科技有限公司 System and method for managing indication board and data processing server
CN116303163B (en) * 2023-05-24 2023-08-01 深圳市乐升半导体有限公司 SPI Flash access method and system of graphics controller
CN116487050B (en) * 2023-06-21 2023-12-22 深圳市万佳安智能科技有限公司 Human health monitoring method, device and computer equipment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100584357B1 (en) * 2003-06-16 2006-05-26 삼성전자주식회사 Method for restricting read/write operation of mobile phone in info-mobile system
CN103778380A (en) * 2013-12-31 2014-05-07 网秦(北京)科技有限公司 Data desensitization method and device and data anti-desensitization method and device
CN108512807B (en) * 2017-02-24 2020-08-04 中国移动通信集团公司 Data desensitization method and data desensitization server in data transmission
CN111400765B (en) * 2020-03-25 2021-11-02 支付宝(杭州)信息技术有限公司 Private data access method and device and electronic equipment
CN111639360A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Intelligent data desensitization method and device, computer equipment and storage medium
CN112765596A (en) * 2021-01-22 2021-05-07 朱捷 Information data verification method and system based on mathematical permutation combination and operation
CN113920631A (en) * 2021-09-26 2022-01-11 中通服和信科技有限公司 Visitor authorization system and management method for data center park access management
CN114639188A (en) * 2022-03-15 2022-06-17 云屏数字科技(云南)有限公司 Visitor access control system based on WeChat and visitor door opening method

Also Published As

Publication number Publication date
CN115880826A (en) 2023-03-31

Similar Documents

Publication Publication Date Title
CN115880826B (en) Park access method and system based on access data
CN111695439B (en) Image structured data extraction method, electronic device and storage medium
CN109033150B (en) Sensitive word verification method, device, computer equipment and storage medium
KR102248242B1 (en) Identity authentication method and device
CN108345641B (en) Method for crawling website data, storage medium and server
RU2017131519A (en) SYSTEMS AND METHODS OF SAFE HANDLING WITH BIOMETRIC DATA
CN109766072B (en) Information verification input method and device, computer equipment and storage medium
CN111008923A (en) Watermark embedding method, watermark extracting method, watermark embedding device, watermark extracting device and watermark extracting equipment
CN107357824B (en) Information processing method, service platform and computer storage medium
CN106407781A (en) Data processing system
CN111680480A (en) Template-based job approval method and device, computer equipment and storage medium
CN113408278B (en) Intention recognition method, device, equipment and storage medium
CN112732892A (en) Course recommendation method, device, equipment and storage medium
CN105786974A (en) Computer data storage query system
CN116186658A (en) User identity verification data processing system
CN108090044B (en) Contact information identification method and device
CN110852098B (en) Data correction method, electronic equipment and storage medium
CN108616533B (en) Sensitive data encryption method and device
US10114860B1 (en) Computerized case management system with auto-generated memorable case identifiers
CN115268799B (en) Storage method and device based on cloud service
CN115640585A (en) Data processing method and device and readable storage medium
CN113065360B (en) Word semantic model construction method and device, computer equipment and storage medium
CN115718910A (en) Handwriting characteristic unlocking method, device, equipment and medium
CN112035616B (en) BERT model and rule-based medical insurance data code matching method, device and equipment
CN113326365A (en) Reply statement generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant