CN116343421A - Security linkage system and control flow thereof - Google Patents

Security linkage system and control flow thereof Download PDF

Info

Publication number
CN116343421A
CN116343421A CN202310196734.0A CN202310196734A CN116343421A CN 116343421 A CN116343421 A CN 116343421A CN 202310196734 A CN202310196734 A CN 202310196734A CN 116343421 A CN116343421 A CN 116343421A
Authority
CN
China
Prior art keywords
module
information
personnel
identification
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310196734.0A
Other languages
Chinese (zh)
Inventor
陈水标
沈春雷
陈奕诺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Junbang Electronic Technology Co ltd
Original Assignee
Zhejiang Junbang Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Junbang Electronic Technology Co ltd filed Critical Zhejiang Junbang Electronic Technology Co ltd
Priority to CN202310196734.0A priority Critical patent/CN116343421A/en
Publication of CN116343421A publication Critical patent/CN116343421A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Psychiatry (AREA)
  • Social Psychology (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a security linkage system and a control flow thereof, and relates to the technical field of security. The system comprises an Internet of things control module, a monitoring module, a personnel identification module, an action identification module, a letter identification module, a channel control module and an alarm module; the control module of the Internet of things is used for controlling the monitoring module, the personnel identification module, the action identification module and the mail identification module; the monitoring module is used for monitoring the passing personnel and the whole environment, and remotely controlling the monitoring module to change the monitored area through the control module of the Internet of things; the personnel identification module is used for identifying the information of the passing personnel and uploading the identification information. According to the invention, the information and actions of personnel in a security area can be monitored during use by matching the control module, the monitoring module, the personnel identification module, the action identification module, the letter identification module, the channel control module and the alarm module, so that the security of security linkage is improved.

Description

Security linkage system and control flow thereof
Technical Field
The invention belongs to the technical field of security, and particularly relates to a security linkage system and a control flow thereof.
Background
The security industry is an industry which is generated along with the security requirements of the modern society; so to say, as long as crime and instability factors exist in the society, the security industry exists and develops; the fact proves that the social crime rate is not reduced due to the development of society and the prosperity of economy;
the security linkage mainly refers to linkage of various fire protection types and security protection types, and is also an alarm linkage in the needs of users, so that the user can be informed and simultaneously alarm in a linkage way after being invaded or entered by outsiders under the specified positions and the specified conditions;
the sensitivity of the existing security linkage system is not high enough and the security needs to be improved, therefore, the security linkage system and the control flow thereof are designed, and the security linkage system is used for providing another solution to the technical problems that the sensitivity of the existing security linkage system is not high enough and the security needs to be improved.
Disclosure of Invention
The invention aims to provide a security linkage system and a control flow thereof, which are used for solving the technical problems in the background technology.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention relates to a security linkage system which comprises an Internet of things control module, a monitoring module, a personnel identification module, an action identification module, a letter identification module, a channel control module and an alarm module;
the control module of the Internet of things is used for controlling the monitoring module, the personnel identification module, the action identification module and the mail identification module;
the monitoring module is used for monitoring passing personnel and the whole environment, and the monitoring module is remotely controlled by the control module of the Internet of things to change the monitored area;
the personnel identification module is used for identifying information of passing personnel and uploading identification information;
the action recognition module is used for recognizing actions of people when the door is opened and uploading recognition information;
the letter recognition module is used for recognizing letters on work clothes worn by the passing personnel;
the channel control module is used for closing a related channel according to the position of illegal invasion when the illegal invasion of a person is received;
the alarm module is used for giving alarm information to relevant police officers when illegal invasion of someone is received.
Further, the control module of the internet of things comprises an information storage module, and is used for storing detection environment information, detection personnel information, detection action information and information of detection letters.
Further, the monitoring module comprises an environment matching module, and the environment matching module is used for judging the correctness of the information in the monitoring module through the detection of the environment and the matching of the information after the environment detection.
Further, the personnel identification comprises a face identification module, a fingerprint identification module and a first matching module;
the face recognition module is used for recognizing face information of the passing person and transmitting the face recognition information to the first matching module for judgment;
the fingerprint identification module is used for carrying out fingerprint identification on the passing person and transmitting the fingerprint identification information to the first matching module for judgment;
the first matching module is used for matching the information transmitted by the face recognition module and the fingerprint recognition module.
Further, the first matching module comprises a first signal transmission module, a first signal receiving module and a first statistics module;
the first signal transmission module is used for transmitting the information transmitted by the face recognition module and the fingerprint recognition module received by the first matching module to the interior of the information storage module;
the first signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the information transmitted by the face recognition module and the fingerprint recognition module;
the first statistics module is used for counting the times when the information judged by the same person through the first matching module is not matched.
Further, the action recognition module comprises a second matching module, and the second matching module is used for judging whether the unlocking action recognized in the action recognition module is a normal unlocking action or not.
Further, the second matching module comprises a second signal transmission module, a second signal receiving module and a second statistics module;
the second signal transmission module is used for transmitting the unlocking actions identified in the action identification module to the interior of the information storage module;
the second signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the unlocking action identified in the action identification module;
the second statistics module is used for counting the times of identifying the corresponding unlocking state by the action identification module in the same monitoring position.
Further, the letter recognition module comprises a judgment module, and the judgment module is used for judging whether the signal sent by the letter is a pre-recorded signal or not through the signal after receiving the signal sent by the letter.
The control flow of the security linkage system comprises the following steps:
s1: the first step: the control module of the Internet of things is used for controlling the security responsible areas of the monitoring module, the personnel identification module, the action identification module and the letter identification module;
s2: the environment of the security responsible area is monitored by a control monitoring module;
s3: identifying personnel information of a security responsible area through a personnel identification module;
s4: the method comprises the steps that actions of personnel in a security area when the personnel open the door are identified through an action identification module;
s5: identifying letters on the work clothes worn by the personnel in the security and protection responsible area through a letter identification module;
s6: and the channel control module and the alarm module are used for receiving and controlling illegal personnel entering information sent by the monitoring module, the personnel identification module, the action identification module and the letter identification module to alarm and close the corresponding channel.
The invention has the following beneficial effects:
according to the invention, the information and actions of personnel in a security area can be monitored during use by matching the control module, the monitoring module, the personnel identification module, the action identification module, the letter identification module, the channel control module and the alarm module, so that the security of security linkage is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of the present invention;
FIG. 2 is a flow chart of the personnel identification module of the present invention;
FIG. 3 is a flow chart of a first matching module according to the present invention;
fig. 4 is a flow chart of a second matching module according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Embodiment one:
referring to fig. 1-4, the present invention is a security linkage system, which includes an internet of things control module, a monitoring module, a personnel identification module, an action identification module, a letter identification module, a channel control module and an alarm module;
the internet of things control module is used for controlling the monitoring module, the personnel identification module, the action identification module and the letter identification module, so that the control can be realized through the control of the identification information in the monitoring module, the personnel identification module, the action identification module and the letter identification module;
the control module of the Internet of things comprises an information storage module, a detection module and a detection module, wherein the information storage module is used for storing detection environment information, detection personnel information, detection action information and information of detection letters, and backing up the detected information at the same time to prevent inaccurate detection caused by information loss;
the monitoring module is used for monitoring passing personnel and the whole environment, and the monitoring module is remotely controlled by the control module of the Internet of things to change the monitored area, so that the monitoring position can be adjusted as required and the environment can be monitored;
the monitoring module comprises an environment matching module which is used for judging the correctness of the information in the monitoring module through the detection of the environment and the matching of the information after the environment detection;
the personnel identification module is used for identifying the information of the passing personnel and uploading the identification information;
the personnel identification comprises a face identification module, a fingerprint identification module and a first matching module;
the face recognition module is used for recognizing the face information of the passing person and transmitting the face recognition information to the first matching module for judgment;
the fingerprint identification module is used for carrying out fingerprint identification on the passing person and transmitting the fingerprint identification information to the first matching module for judgment;
the first matching module is used for matching the information transmitted by the face recognition module and the fingerprint recognition module, so that some illegally entered personnel can be prevented from entering the monitoring position, and the safety of the monitoring position is greatly improved;
the first matching module comprises a first signal transmission module, a first signal receiving module and a first statistic module;
the first signal transmission module is used for transmitting the information transmitted by the face recognition module and the fingerprint recognition module received by the first matching module to the interior of the information storage module, so that the information transmitted by the face recognition module and the fingerprint recognition module can be queried for the same information in the interior of the information storage module;
the first signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the information transmitted by the face recognition module and the fingerprint recognition module, and further judging whether the information is correct or not according to the transmitted information;
the first statistics module is used for judging the times of mismatching of the information judged by the same personnel through the first matching module, if the times of mismatching of the information are less than three times, the matching of the information is continued, whether the information is a passable personnel is judged, and if the times of mismatching of the information are more than three times, the information is transmitted to the alarm module and the channel control module;
when a person enters an area to be detected, identifying information of the person passing by, uploading the identifying information, identifying face information of the person passing by through a face identification module, and transmitting the face identification information to a first matching module for judgment; then fingerprint identification is carried out on the passing person through the fingerprint identification module, and the fingerprint identification information is transmitted to the first matching module for judgment; the first signal transmission module is used for transmitting the information transmitted by the face recognition module and the fingerprint recognition module to the information storage module, so that the information transmitted by the face recognition module and the fingerprint recognition module can be queried in the information storage module; the first signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the information transmitted by the face recognition module and the fingerprint recognition module, and whether the information is correct or not can be judged according to the transmitted information; and then the first statistics module is used for judging the times when the information of the same person is not matched through the first matching module, if the times of the information mismatch are smaller than three times, the matching of the information is continued, whether the information is a passable person is judged, and if the times of the information mismatch are larger than three times, the information is transmitted to the alarm module and the channel control module.
The action recognition module is used for recognizing actions of people when the door is opened, uploading recognition information at the same time, and recognizing whether the door is normally or illegally accessed through the action state of an unlocking person when the recognition range is that the door is unlocked through a key and the like;
the action recognition module comprises a second matching module which is used for judging whether the unlocking action recognized in the action recognition module is a normal unlocking action or not;
the second matching module comprises a second signal transmission module, a second signal receiving module and a second statistics module;
the second signal transmission module is used for transmitting the unlocking actions identified in the action identification module to the interior of the information storage module, so that the unlocking actions identified in the action identification module can be searched for the same information in the interior of the information storage module;
the second signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the unlocking action identified in the action identification module, and further judging whether the information is correct or not according to the transmitted information;
the second statistics module is used for counting the times of the corresponding unlocking states identified by the action identification module in the same monitoring position, when the illegal unlocking actions in the same monitoring position are less than two times, the personnel can continue unlocking, and when the illegal unlocking actions in the same monitoring position are more than two times, the information is transmitted to the alarm module and the channel control module;
when the door is unlocked by a key and the like, whether the door is normally or illegally accessed is identified by the action state of the unlocking person; the second matching module is used for judging whether the unlocking motion identified in the motion identification module is a normal unlocking motion or not; the unlocking actions identified in the action identification module are transmitted to the inside of the information storage module through the second signal transmission module, and then the unlocking actions identified in the action identification module can be inquired about the same information in the inside of the information storage module; the second signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the unlocking action identified in the action identification module, and whether the information is correct or not can be judged according to the transmitted information; counting the times of identifying the corresponding unlocking state by the action identification module in the same monitoring position through the second counting module, enabling the person to continue unlocking when the illegal unlocking action is less than twice in the same monitoring position, and transmitting information to the alarm module and the channel control module when the illegal unlocking action is more than twice in the same monitoring position;
the letter recognition module is used for recognizing letters on the work clothes worn by the passing personnel, so that whether the passing personnel are safety personnel can be recognized through the letters in different positions, and meanwhile, more accurate judgment can be realized through cooperation with the personnel recognition module;
the letter recognition module comprises a judgment module, and is used for judging whether the signal sent by the letter is a pre-recorded signal or not through the signal after receiving the signal sent by the letter, if so, the explanation is correct, if not, the judgment is carried out after recognition again, and if not, the explanation is incorrect.
Preferably, the letter is NFC signal data or a data signal that can be detected or a special shape that can be identified.
The channel control module is used for closing a related channel according to the position of illegal invasion when illegal invasion of someone is received, so that the capturing of illegal invading personnel can be facilitated;
the alarm module is used for giving alarm information to relevant police officers when illegal invasion of people is received, so that the relevant police officers and users can be quickly informed of the illegal invasion of the people.
Embodiment two:
on the basis of the above embodiment 1, the control flow is disclosed:
the first step: the control module of the Internet of things is used for controlling the security responsible areas of the monitoring module, the personnel identification module, the action identification module and the letter identification module;
and a second step of: the environment of the security responsible area is monitored by a control monitoring module;
and a third step of: identifying personnel information of a security responsible area through a personnel identification module;
fourth step: the method comprises the steps that actions of personnel in a security area when the personnel open the door are identified through an action identification module;
fifth step: identifying letters on the work clothes worn by the personnel in the security and protection responsible area through a letter identification module;
sixth step: and the channel control module and the alarm module are used for receiving and controlling illegal personnel entering information sent by the monitoring module, the personnel identification module, the action identification module and the letter identification module to alarm and close the corresponding channel.
In the description of the present specification, the descriptions of the terms "one embodiment," "example," "specific example," and the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (9)

1. The security linkage system is characterized by comprising an Internet of things control module, a monitoring module, a personnel identification module, an action identification module, a letter identification module, a channel control module and an alarm module;
the control module of the Internet of things is used for controlling the monitoring module, the personnel identification module, the action identification module and the mail identification module;
the monitoring module is used for monitoring passing personnel and the whole environment, and the monitoring module is remotely controlled by the control module of the Internet of things to change the monitored area;
the personnel identification module is used for identifying information of passing personnel and uploading identification information;
the action recognition module is used for recognizing actions of people when the door is opened and uploading recognition information;
the letter recognition module is used for recognizing letters on work clothes worn by the passing personnel;
the channel control module is used for closing a related channel according to the position of illegal invasion when the illegal invasion of a person is received;
the alarm module is used for giving alarm information to relevant police officers when illegal invasion of someone is received.
2. The security linkage system according to claim 1, wherein the control module of the internet of things comprises an information storage module for storing information of detection environment, information of detection personnel, information of detection actions and information of detection letters.
3. The security linkage system according to claim 1, wherein the monitoring module comprises an environment matching module for determining the correctness of the information in the monitoring module by detecting the environment and matching the information after the environment is detected.
4. The security linkage system according to claim 1, wherein the person identification comprises a face recognition module, a fingerprint recognition module, and a first matching module;
the face recognition module is used for recognizing face information of the passing person and transmitting the face recognition information to the first matching module for judgment;
the fingerprint identification module is used for carrying out fingerprint identification on the passing person and transmitting the fingerprint identification information to the first matching module for judgment;
the first matching module is used for matching the information transmitted by the face recognition module and the fingerprint recognition module.
5. The security linkage system according to claim 4, wherein the first matching module comprises a first signal transmission module, a first signal receiving module, and a first statistics module;
the first signal transmission module is used for transmitting the information transmitted by the face recognition module and the fingerprint recognition module received by the first matching module to the interior of the information storage module;
the first signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the information transmitted by the face recognition module and the fingerprint recognition module;
the first statistics module is used for counting the times when the information judged by the same person through the first matching module is not matched.
6. The security linkage system according to claim 1, wherein the motion recognition module comprises a second matching module for determining whether the unlocking motion recognized in the motion recognition module is a normal unlocking motion.
7. The security linkage system according to claim 6, wherein the second matching module comprises a second signal transmission module, a second signal receiving module, and a second statistics module;
the second signal transmission module is used for transmitting the unlocking actions identified in the action identification module to the interior of the information storage module;
the second signal receiving module is used for receiving the information which is transmitted by the information storage module and is matched with the unlocking action identified in the action identification module;
the second statistics module is used for counting the times of identifying the corresponding unlocking state by the action identification module in the same monitoring position.
8. The security linkage system according to claim 1, wherein the letter recognition module comprises a judgment module for judging whether the signal sent by the letter is a pre-recorded signal or not through the signal after receiving the signal.
9. A control flow of a security linkage system, for the security linkage system according to any one of claims 1 to 8, characterized by comprising the following steps:
s1: the first step: the control module of the Internet of things is used for controlling the security responsible areas of the monitoring module, the personnel identification module, the action identification module and the letter identification module;
s2: the environment of the security responsible area is monitored by a control monitoring module;
s3: identifying personnel information of a security responsible area through a personnel identification module;
s4: the method comprises the steps that actions of personnel in a security area when the personnel open the door are identified through an action identification module;
s5: identifying letters on the work clothes worn by the personnel in the security and protection responsible area through a letter identification module;
s6: and the channel control module and the alarm module are used for receiving and controlling illegal personnel entering information sent by the monitoring module, the personnel identification module, the action identification module and the letter identification module to alarm and close the corresponding channel.
CN202310196734.0A 2023-03-03 2023-03-03 Security linkage system and control flow thereof Pending CN116343421A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310196734.0A CN116343421A (en) 2023-03-03 2023-03-03 Security linkage system and control flow thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310196734.0A CN116343421A (en) 2023-03-03 2023-03-03 Security linkage system and control flow thereof

Publications (1)

Publication Number Publication Date
CN116343421A true CN116343421A (en) 2023-06-27

Family

ID=86878296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310196734.0A Pending CN116343421A (en) 2023-03-03 2023-03-03 Security linkage system and control flow thereof

Country Status (1)

Country Link
CN (1) CN116343421A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118506286A (en) * 2024-07-16 2024-08-16 武汉市腾亚科技有限公司 Intelligent auxiliary system for fire operation safety defense based on multidimensional data

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118506286A (en) * 2024-07-16 2024-08-16 武汉市腾亚科技有限公司 Intelligent auxiliary system for fire operation safety defense based on multidimensional data

Similar Documents

Publication Publication Date Title
US8269602B2 (en) Security access control system and method for making same
US10641030B2 (en) Garage door authentication and automation
US7741969B2 (en) Door entry security device with electronic lock
KR100893905B1 (en) Method and system for managing entrance using biometrics
CN108492404A (en) A kind of the face lock method for unlocking and device of additional Expression Recognition
CN103544757A (en) Door access control method
CN116343421A (en) Security linkage system and control flow thereof
CN110853269B (en) Door state detection method and device
CN109191769A (en) A kind of smart home burglary-resisting system
US20180114390A1 (en) Identification and entry system and method activated by distance
KR100774029B1 (en) Security area's exit and entrance control device
CN105335629A (en) Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN105957192A (en) Access control system
CN2767605Y (en) Intelligent cabinet control device
CN116311714A (en) Method and system for preventing false alarm of intelligent door lock
CN207946900U (en) A kind of anti-theft alarm system of Internet of Things multi-Source Events Fusion processing
CN109102610A (en) A kind of cell safety security safety door prohibition system
CN205644854U (en) Security alarm system
CN210776878U (en) Intelligent household access control system
CN205722036U (en) access control system
Raizada et al. Smart Lock System using IoT, Embedded & Machine Learning
CN205485523U (en) Intelligence security system
CN109857089A (en) A kind of intelligent channel passing control system
CN214996794U (en) Intelligent lock anti-theft device
CN210222860U (en) Access control system with metal detection function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination