CN116863580A - Intelligent access control system based on Internet of things - Google Patents

Intelligent access control system based on Internet of things Download PDF

Info

Publication number
CN116863580A
CN116863580A CN202310804251.4A CN202310804251A CN116863580A CN 116863580 A CN116863580 A CN 116863580A CN 202310804251 A CN202310804251 A CN 202310804251A CN 116863580 A CN116863580 A CN 116863580A
Authority
CN
China
Prior art keywords
access control
data
face
information
control system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310804251.4A
Other languages
Chinese (zh)
Inventor
陈燃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202310804251.4A priority Critical patent/CN116863580A/en
Publication of CN116863580A publication Critical patent/CN116863580A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an intelligent access control system based on the Internet of things, which comprises the following steps: step one: collecting and storing the information of the face of the teacher; step two: carrying out data analysis on the face recognition information through an intelligent access control system; step three: performing relevance analysis on the acquired data to realize management optimization; step four: the data acquisition and storage module is used for collecting, processing and storing the gate entering and exiting data of teachers and students from the access control system and providing a reliable data basis for subsequent data analysis and excavation; the data analysis and mining module is used for helping school managers to know attendance conditions of students and time distribution of going in and out of school gates, predicting personnel flow and finding out behavior pattern differences; the visualization module is used for displaying the people flow data through a screen; the invention has the characteristics of comprehensive data analysis and accurate monitoring of abnormal events.

Description

Intelligent access control system based on Internet of things
Technical Field
The invention relates to the technical field of the Internet of things, in particular to an intelligent access control system based on the Internet of things.
Background
In schools and educational institutions, the access control system is a common safety management tool and is used for controlling and monitoring the entrance and exit of students, the modern access control system has realized basic identity verification and recording functions, and the entrance and exit information of students can be collected through hardware devices such as card readers, fingerprint identifiers and face recognition devices.
However, the current access control system still has some defects in terms of data analysis and excavation, the campus access control system at the present stage is used for preventing strangers from entering a campus, the intelligent access control function of the campus access control system cannot be fully exerted, the access control system relies on manual inspection and processing in terms of detection and early warning of abnormal events, and the manual intervention cost is high. For large-scale schools and educational institutions, monitoring and coping with potential safety problems becomes difficult, and delays and missing reports are likely to occur. Therefore, it is necessary to design an intelligent access control system based on the internet of things, which has high intelligent degree and quick response to abnormal events.
Disclosure of Invention
The invention aims to provide an intelligent access control system based on the Internet of things, so as to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: the intelligent access control system based on the Internet of things comprises the following operation methods:
step one: collecting and storing the information of the face of the teacher;
step two: carrying out data analysis on the face recognition information through an intelligent access control system;
step three: performing relevance analysis on the acquired data to realize management optimization;
step four: abnormal event monitoring and alarm triggering.
According to the above technical scheme, the step of collecting and storing the face information of the teacher includes:
deploying face information acquisition equipment;
collecting face information and extracting face feature vectors;
and storing the acquired information.
According to the above technical scheme, the step of collecting the face information and extracting the face feature vector includes:
the method comprises the steps of collecting faces of teachers and students, ensuring good quality of collected face images, including definition, light conditions, angles and the like, extracting features of the collected face images after collection, firstly positioning and identifying face areas in the images by using a face detection algorithm, simultaneously aligning the faces to reduce the influence of gesture and expression differences in the face images on feature extraction, aligning key points such as eyes and noses in the face images to fixed positions to enable different faces to be more consistent in geometry, and then extracting face features from the aligned face images by adopting a principal component analysis method, wherein high-dimensional face image data are mapped to a low-dimensional feature space through linear transformation.
According to the above technical scheme, the step of performing data analysis on the face identification information through the intelligent access control system comprises the following steps:
counting attendance conditions by a time sequence analysis method;
and drawing the people flow information by adopting a thermodynamic diagram technology.
According to the above technical solution, the step of drawing the traffic information by thermodynamic diagram technology includes:
aiming at hot areas in schools, such as canteens, libraries and activity centers, different facilities are connected through an intelligent access control system to monitor and count, for places such as canteens and activity centers where access control devices are difficult to install, pictures collected by cameras can be utilized, people count is conducted through a people head recognition algorithm, so that people flow information of each area can be obtained in real time, meanwhile, the data are visually displayed on a screen in the campus through a thermodynamic diagram technology, school managers and teachers can intuitively know people flow heat and crowding degree of each area, through data analysis of the access control system and application of technical means, attendance conditions of students and time distribution of entering and exiting from school gates can be comprehensively known, meanwhile, hot areas in the schools are monitored and managed, data support and decision basis are provided, and resource allocation, personnel scheduling and safety management of the schools are optimized.
According to the above technical solution, the step of implementing management optimization by performing correlation analysis on the collected data includes:
information such as time and place of entering and exiting from a gate inhibition system is collected from a gate inhibition system, the information is stored in a database, accuracy and integrity of data are ensured, the method comprises the steps of removing repeated data, processing missing values and the like, and then association rules between entering and exiting from the gate inhibition system are mined by applying an association analysis algorithm, wherein the association rules are generally composed of two parts: the method comprises the steps of selecting a frequent item set and association rules by setting parameters such as minimum support degree, minimum confidence degree and the like, and finally evaluating and selecting the association rules obtained through excavation according to set evaluation indexes such as support degree, confidence degree, lifting degree and the like, and selecting the association rules with higher support degree and confidence degree so as to ensure the reliability and practicability of the rules.
According to the above technical solution, the steps of abnormal event monitoring and alarm triggering include:
defining an exception event in the system;
monitoring and alarming abnormal events;
and according to the type and the level of the abnormal event, automatically triggering corresponding emergency response measures.
According to the above technical solution, the step of monitoring and alarming the abnormal event includes:
when the access control system detects an abnormal event, the alarm is immediately triggered and related personnel are notified, the alarm information is sent to a mobile phone, a computer or other communication equipment of a safety manager, and the alarm information is pushed to a display screen of a safety center or a monitoring room to be realized, meanwhile, the access control system is combined with video monitoring, and the severity and the emergency degree of the abnormal event can be more accurately judged by combining data of the access control system and the video monitoring through multidimensional data analysis.
According to the above technical solution, the step of automatically triggering the corresponding emergency response measures according to the type and the level of the abnormal event includes:
when an illegal intrusion event occurs, the access control system can automatically lock the access control channel, start the alarm system and inform security personnel to process, finally the access control system records and analyzes the abnormal event, records the information such as time, place and duration of the abnormal event and correlates with the identity information of students, so that the access control system is beneficial to knowing the occurrence mode and trend of the event and taking corresponding precautions.
According to the above technical solution, the system comprises:
the data acquisition and storage module is used for collecting, processing and storing the gate entering and exiting data of teachers and students from the gate inhibition system and providing a reliable data basis for subsequent data analysis and excavation;
the data analysis and mining module is used for helping school managers to know attendance conditions of students and time distribution of going in and out of school gates, predicting personnel flow and finding out behavior pattern differences;
the abnormal event monitoring and early warning module is used for detecting abnormal events, triggering an alarm in time and informing related personnel to carry out emergency response so as to ensure the safety and order of schools.
Compared with the prior art, the invention has the following beneficial effects: according to the intelligent access control system, the data acquisition and storage module, the data analysis and mining module and the abnormal event monitoring and early warning module are arranged, face information data are acquired through the acquisition equipment and stored, attendance conditions are counted according to daily face information data, a thermodynamic diagram is drawn by means of cameras and access control information in campuses, in the system, association rules between access control data and access check behaviors can be effectively mined through association analysis of the access control data, finally abnormal events are defined in the system and monitored and alerted, and the method can achieve full utilization of the access control data and further achieve abnormal event monitoring accurately.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
fig. 1 is a flowchart of an intelligent access control method based on internet of things according to an embodiment of the present invention;
fig. 2 is a schematic diagram of module composition of an intelligent access control system based on internet of things according to a second embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Embodiment one: fig. 1 is a flowchart of an intelligent access control method based on the internet of things, which is provided in the embodiment of the present invention, and the method may be implemented by an intelligent access control system based on the internet of things, as shown in fig. 1, and specifically includes the following steps:
step one: collecting and storing the information of the face of the teacher;
in the embodiment of the invention, face acquisition equipment, such as a face camera or face recognition equipment, is deployed at a proper position of a school so as to accurately acquire face information of teachers and students;
the method comprises the steps of collecting faces of teachers and students, ensuring good quality of collected face images, including definition, light conditions, angles and the like, extracting features of the collected face images after collection is completed, converting each face image into corresponding face feature vectors, wherein the face feature vectors comprise key features such as face contours, eyes, nose, mouth and the like, associating the face feature vectors with identity information of the teachers and students, storing the identity information in a safe database, simultaneously establishing a teacher information database, registering key information such as names, academic numbers, roles and the like of the teachers and students, associating the information with corresponding face data, and facilitating subsequent face recognition and identity verification;
the face feature extraction method comprises the following steps: the method comprises the steps of firstly using a face detection algorithm to locate and identify a face region in an image, simultaneously, in order to reduce the influence of the gesture and expression difference in the face image on feature extraction, aligning the key points such as eyes, noses and the like in the face image to a fixed position, enabling different faces to be more consistent geometrically, then adopting a principal component analysis method to extract face features from the aligned face image, mapping high-dimensional face image data to a low-dimensional feature space through linear transformation, in the process, the extracted principal components represent the largest variance in a data set, namely the most important features, selecting the number of the principal components to be reserved or setting a variance percentage threshold according to the result of principal component analysis, determining the number of the principal components to be reserved by analyzing the accumulated variance contribution rate of the principal components, reducing the feature dimension, improving the calculation efficiency, reserving higher information quantity, representing each face image as the coefficient of the extracted principal components, enabling the coefficients to be regarded as features of an original image, reflecting the feature of the face image, reflecting the maximum variance in the data set, and storing the feature vectors in the face vector-image-recognition process, and the face-recognition process.
Step two: carrying out data analysis on the face recognition information through an intelligent access control system;
in the embodiment of the invention, the access control system can record information such as the time, place and the like of entering and exiting the school gate of teachers and students and store the information in a database so as to perform data analysis;
by means of a time sequence analysis method, attendance conditions of teachers and students are counted, attendance rates and times of entering and exiting from the school gate every day, every week or every month are calculated through analysis of patterns and trends of time of entering and exiting from the school gate, school managers can be helped to know attendance conditions of students and time distribution of entering and exiting from the school gate, corresponding management and adjustment are conducted, in addition, abnormal attendance patterns, such as times of entering and exiting from the school gate which are suddenly increased or decreased, are identified, and accordingly corresponding measures are found and taken in time;
for example, aiming at hot areas in schools, such as canteens, libraries and activity centers, different facilities are connected by using an intelligent access control system to monitor and count, for places such as canteens and activity centers where access control devices are difficult to install, pictures collected by cameras can be utilized, people number statistics is carried out by using a people head recognition algorithm, so that people flow information of each area can be obtained in real time, meanwhile, the data are visually displayed on a screen in a campus by adopting a thermodynamic diagram technology, so that school managers and teachers and students can intuitively know people flow heat and crowding degree of each area, the attendance situation of students and time distribution of entering and exiting from a school gate can be more comprehensively known through data analysis of the access control system and application of technical means, and meanwhile, data support and decision basis are provided for monitoring and managing the hot areas in the schools to optimize resource allocation, personnel scheduling and safety management of the schools.
Step three: performing relevance analysis on the acquired data to realize management optimization;
in the embodiment of the invention, the entrance and exit mode of students in a specific time period and place is mined to provide better traffic and safety management measures;
for example, information such as time and place of entering and exiting from the gate inhibition system is collected from the gate inhibition system, and is stored in a database, so that accuracy and integrity of data are ensured, including removing repeated data and processing missing values, and an association analysis algorithm is applied to mine association rules between entering and exiting from the gate inhibition system, wherein the association rules are generally composed of two parts: the method comprises the steps of selecting a frequent item set and association rules by setting parameters such as minimum support degree, minimum confidence degree and the like, and finally evaluating and selecting the association rules obtained by excavation according to set evaluation indexes such as support degree, confidence degree, lifting degree and the like, and selecting the association rules with higher support degree and confidence degree so as to ensure the reliability and practicability of the rules;
by way of example, through correlation analysis, the following correlation data may be obtained: first: association rules between door entering and exiting actions: the correlation analysis may reveal frequent combinations, sequencing, or correlations between student gate-in and gate-out behaviors, e.g., there are correlations between groups of students that are in and out of a particular gate for a certain period of time, or certain students are often in and out of a gate at a particular location, second: correlation of entry and exit gate behavior with time period: the correlation analysis may reveal a correlation between different time periods and the behavior of entering and exiting the gate, for example, the student population entering and exiting the gate in the morning and afternoon is different, or the frequency of use of a gate in a certain time period is high, and third: correlation of entry and exit gate behavior with location: the correlation analysis may reveal correlations between different places and gate-in and gate-out behaviors, e.g., students near a place are more inclined to gate-in and gate-out using nearby gates, fourth: association of business trip behavior with student population: the association analysis can reveal the association of the entrance and exit behaviors among different student groups, for example, a certain student group tends to enter and exit a school gate in a specific time period and place, a school manager can further know the entrance and exit behavior pattern and rule of the student by analyzing the association data, data support and decision basis are provided for traffic and safety management, and the association data can help the school manager to reasonably arrange resources, formulate personalized management measures and find potential abnormal events or problems, so that the operation efficiency and safety of the school are improved.
Step four: abnormal event monitoring and alarm triggering.
In the embodiment of the invention, the monitoring of abnormal events and the early warning of abnormal conditions are carried out based on the data collected by the access control system, so that the safety of the campus environment is ensured;
for example, firstly, defining an abnormal event in a system, in the system, before a visitor enters a campus, face entry is needed in an access control system, and an authorized party of a manager can enter the access control system, and aiming at the visitor which is not authorized but enters the campus, when the access control system collects the face data of the visitor, judging the condition as the abnormal event, wherein the abnormal time also comprises other conditions, such as the entrance and exit of a student in a school gate or an area which is forbidden to enter in an irregular time period;
when the access control system detects an abnormal event, an alarm is triggered immediately and related personnel are notified, the alarm information is sent to a mobile phone, a computer or other communication equipment of a safety manager, and the alarm information is pushed to a display screen of a safety center or a monitoring room to be realized, meanwhile, the access control system is combined with video monitoring, and the severity and the emergency degree of the abnormal event can be judged more accurately by combining data of the two through multidimensional data analysis;
the access control system has an automatic emergency response function, can automatically trigger corresponding emergency response measures according to different abnormal event types and levels, can automatically lock an access control channel, start an alarm system and inform safety personnel to process when an illegal intrusion event occurs, finally records and analyzes the abnormal event, records information such as time, place and duration of the abnormal event, correlates with identity information of students, is beneficial to knowing the occurrence mode and trend of the event, takes corresponding precautions, can monitor and early warn the abnormal event, improves the safety management level of schools and education institutions, and timely handles potential safety risks.
Embodiment two: the second embodiment of the present invention provides an intelligent access control system based on the internet of things, and fig. 2 is a schematic diagram of module composition of the intelligent access control system based on the internet of things, as shown in fig. 2, the system includes:
the data acquisition and storage module is used for collecting, processing and storing the gate entering and exiting data of teachers and students from the gate inhibition system and providing a reliable data basis for subsequent data analysis and excavation;
the data analysis and mining module is used for helping school managers to know attendance conditions of students and time distribution of going in and out of school gates, predicting personnel flow and finding out behavior pattern differences;
the abnormal event monitoring and early warning module is used for detecting abnormal events, triggering an alarm in time and informing related personnel to carry out emergency response so as to ensure the safety and order of schools;
in some embodiments of the invention, the data acquisition and storage module comprises:
the data acquisition module is used for acquiring information such as time and place of entering and exiting a school gate of a teacher and students;
the data processing module is used for preprocessing the acquired data;
the data storage module is used for storing the processed data into a database so as to be used for subsequent analysis and mining;
in some embodiments of the invention, the data analysis and mining module comprises:
the statistical analysis module is used for analyzing the access control data by using a statistical analysis method and calculating indexes such as attendance rate, number of times of entering and exiting the school gate and the like of teachers and students;
the visualization module is used for displaying the people flow data through a screen;
the association analysis module is used for monitoring the entrance and exit behaviors of students by using an association analysis algorithm;
in some embodiments of the present invention, the abnormal event monitoring and early warning module comprises:
the abnormal detection module is used for excavating a student's entrance and exit gate mode in a specific time period and place through a correlation analysis algorithm and detecting abnormal events;
the alarm triggering module is used for automatically triggering an alarm when the system detects an abnormal event;
and the emergency response notification module is used for notifying related personnel to perform emergency response so as to ensure the safety and order of schools.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An intelligent access control method based on the Internet of things is characterized by comprising the following steps: the method comprises the following steps:
step one: collecting and storing the information of the face of the teacher;
step two: carrying out data analysis on the face recognition information through an intelligent access control system;
step three: performing relevance analysis on the acquired data to realize management optimization;
step four: abnormal event monitoring and alarm triggering.
2. The intelligent access control method based on the internet of things according to claim 1, wherein the intelligent access control method is characterized in that: the step of collecting and storing the information of the face of the teacher comprises the following steps:
deploying face information acquisition equipment;
collecting face information and extracting face feature vectors;
and storing the acquired information.
3. The intelligent access control method based on the internet of things according to claim 2, wherein: the step of collecting the face information and extracting the face feature vector comprises the following steps:
the method comprises the steps of collecting faces of teachers and students, ensuring good quality of collected face images, including definition, light conditions and angles, extracting features of the collected face images after collection is completed, firstly positioning and identifying face areas in the images by using a face detection algorithm, simultaneously aligning the faces to reduce the influence of gesture and expression differences in the face images on feature extraction, aligning eye and nose key points in the face images to fixed positions to enable different faces to be more consistent in geometry, and then extracting face features from the aligned face images by adopting a principal component analysis method, wherein high-dimensional face image data are mapped to a low-dimensional feature space through linear transformation.
4. The intelligent access control method based on the internet of things according to claim 1, wherein the intelligent access control method is characterized in that: the step of carrying out data analysis on face identification information through the intelligent access control system comprises the following steps:
counting attendance conditions by a time sequence analysis method;
and drawing the people flow information by adopting a thermodynamic diagram technology.
5. The intelligent access control method based on the internet of things according to claim 4, wherein the intelligent access control method is characterized in that: the step of drawing the people flow information by adopting the thermodynamic diagram technology comprises the following steps:
aiming at hot areas in schools, such as canteens, libraries and activity centers, different facilities are connected through an intelligent access control system to monitor and count, for places where access control devices are difficult to install in canteens and activity centers, pictures collected by cameras can be utilized, people count is conducted through a people head recognition algorithm, people flow information of each area can be obtained in real time, meanwhile, the data are visually displayed on a screen in the campus through a thermodynamic diagram technology, school managers and teachers and students can intuitively know people flow heat and crowding degree of each area, through data analysis of the access control system and application of technical means, attendance conditions of students and time distribution of entering and exiting from school gates can be comprehensively known, meanwhile, hot areas in the schools are monitored and managed, data support and decision basis are provided, and therefore resource allocation, personnel scheduling and safety management of the schools are optimized.
6. The intelligent access control method based on the internet of things according to claim 1, wherein the intelligent access control method is characterized in that: the step of realizing management optimization by carrying out relevance analysis on the collected data comprises the following steps:
the method comprises the steps of collecting time and place information of entering and exiting from a gate inhibition system, storing the time and place information in a database, ensuring the accuracy and the integrity of data, removing repeated data and processing missing values, and then applying a correlation analysis algorithm to mine a correlation rule between entering and exiting from the gate inhibition system, wherein the correlation rule is generally composed of two parts: the method comprises the steps of selecting a frequent item set and association rules by setting minimum support and minimum confidence parameters, evaluating and selecting the association rules obtained through excavation according to set evaluation indexes such as support, confidence and promotion, and selecting the association rules with higher support and confidence to ensure the reliability and practicability of the rules.
7. The intelligent access control method based on the internet of things according to claim 1, wherein the intelligent access control method is characterized in that: the step of monitoring and triggering the alarm of the abnormal event comprises the following steps:
defining an exception event in the system;
monitoring and alarming abnormal events;
and according to the type and the level of the abnormal event, automatically triggering corresponding emergency response measures.
8. The intelligent access control method based on the internet of things of claim 7, wherein: the step of monitoring and alarming for abnormal events includes:
when the access control system detects an abnormal event, the alarm is immediately triggered and related personnel are notified, the alarm information is sent to a mobile phone, a computer or other communication equipment of a safety manager, and the alarm information is pushed to a display screen of a safety center or a monitoring room to be realized, meanwhile, the access control system is combined with video monitoring, and the severity and the emergency degree of the abnormal event can be more accurately judged by combining data of the access control system and the video monitoring through multidimensional data analysis.
9. The intelligent access control method based on the internet of things of claim 7, wherein: the step of automatically triggering corresponding emergency response measures according to the type and the level of the abnormal event comprises the following steps:
when an illegal intrusion event occurs, the access control system can automatically lock the access control channel, start the alarm system and inform security personnel to process, finally the access control system records and analyzes the abnormal event, records the time, place and duration information of the abnormal event and associates with the identity information of students, so that the access control system is beneficial to knowing the occurrence mode and trend of the event and taking corresponding precautions.
10. Intelligent access control system based on thing networking, its characterized in that: the system comprises:
the data acquisition and storage module is used for collecting, processing and storing the gate entering and exiting data of teachers and students from the gate inhibition system and providing a reliable data basis for subsequent data analysis and excavation;
the data analysis and mining module is used for helping school managers to know attendance conditions of students and time distribution of going in and out of school gates, predicting personnel flow and finding out behavior pattern differences;
the abnormal event monitoring and early warning module is used for detecting abnormal events, triggering an alarm in time and informing related personnel to carry out emergency response so as to ensure the safety and order of schools.
CN202310804251.4A 2023-07-03 2023-07-03 Intelligent access control system based on Internet of things Pending CN116863580A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310804251.4A CN116863580A (en) 2023-07-03 2023-07-03 Intelligent access control system based on Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310804251.4A CN116863580A (en) 2023-07-03 2023-07-03 Intelligent access control system based on Internet of things

Publications (1)

Publication Number Publication Date
CN116863580A true CN116863580A (en) 2023-10-10

Family

ID=88229840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310804251.4A Pending CN116863580A (en) 2023-07-03 2023-07-03 Intelligent access control system based on Internet of things

Country Status (1)

Country Link
CN (1) CN116863580A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117994889A (en) * 2024-02-21 2024-05-07 湖南朗赫科技有限公司 Intelligent door lock monitoring method and system based on machine vision

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117994889A (en) * 2024-02-21 2024-05-07 湖南朗赫科技有限公司 Intelligent door lock monitoring method and system based on machine vision

Similar Documents

Publication Publication Date Title
Adam et al. Robust real-time unusual event detection using multiple fixed-location monitors
CN112333431B (en) Scene monitoring method and device, electronic equipment and storage medium
US20220092881A1 (en) Method and apparatus for behavior analysis, electronic apparatus, storage medium, and computer program
CN106780250B (en) Intelligent community security event processing method and system based on Internet of things technology
CN109784231B (en) Security information management method, device and storage medium
CN110096606B (en) Foreign roll personnel management method and device and electronic equipment
CN112418091B (en) Big data-based smart campus security data processing method
CN116863580A (en) Intelligent access control system based on Internet of things
CN112800910A (en) Communication machine room maintenance operation efficiency evaluation method and system
CN111429309A (en) Smart community visual real-time supervision system and method based on big data
CN113065448A (en) Face recognition method, face recognition system, computer equipment and storage medium
CN107609330B (en) Access log mining-based internal threat abnormal behavior analysis method
CN115913998A (en) PCTSE intelligent park state evaluation method and system
CN113793441B (en) Campus visitor safety analysis system based on thing networking
CN114973567A (en) Automatic alarm method and terminal based on face recognition
CN111126167B (en) Method and system for quickly identifying serial activities of multiple specific personnel
CN116824311A (en) Performance detection method, device, equipment and storage medium of crowd analysis algorithm
CN110310443B (en) Keep somewhere monitored control system of room state
CN115359639B (en) Electronic two-ticket-based equipment linkage control method
CN109460714B (en) Method, system and device for identifying object
CN115359593B (en) Access control method, system, electronic equipment and storage medium
CN106127903A (en) Electronic equipment detection gate inhibition's control device and method thereof
CN113705988B (en) Method and system for managing performance of staff, storage medium and intelligent terminal
CN113570756B (en) Personnel counting method and device and electronic equipment
CN113450236B (en) Method, device, system and medium for identifying suspicious personnel based on space-time data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination