CN117994890A - Access control system, method and access control equipment - Google Patents

Access control system, method and access control equipment Download PDF

Info

Publication number
CN117994890A
CN117994890A CN202410375206.6A CN202410375206A CN117994890A CN 117994890 A CN117994890 A CN 117994890A CN 202410375206 A CN202410375206 A CN 202410375206A CN 117994890 A CN117994890 A CN 117994890A
Authority
CN
China
Prior art keywords
identification information
authenticated
queue
channel
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410375206.6A
Other languages
Chinese (zh)
Inventor
梁波
王伟洋
陈蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202410375206.6A priority Critical patent/CN117994890A/en
Publication of CN117994890A publication Critical patent/CN117994890A/en
Pending legal-status Critical Current

Links

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The embodiment of the application provides an access control system, an access control method and access control equipment, wherein a to-be-authenticated queue and an authenticated queue are maintained through a controller, after identification information sent by an information acquisition device is received, the identification information in the to-be-authenticated queue is compared, and if the to-be-authenticated queue has the same target object represented by the identification information but different corresponding passing control devices, only the identification information of one passing control device of the same target object is reserved in the to-be-authenticated queue, so that the problem that one person is opened through a plurality of passing control devices is avoided, and the passing safety of a channel is improved.

Description

Access control system, method and access control equipment
Technical Field
The application relates to the technical field of computers, in particular to an access control system, an access control method and access control equipment.
Background
The access control system for the passage can control personnel to enter and exit, the passers-by personnel can realize the entry and exit through the passage, and the access control system for the passage generally consists of a controller and a passer control device, wherein the passer control device corresponds to a collecting device, and the collecting device is used for collecting the identification information of the personnel to be passed.
In the current channel access control system, a channel is provided with a channel passing control device and a collecting device, the channel is opened when the channel passing control device is opened, passing personnel can enter and exit through the channel, a gate is closed, the channel is closed, and the passing personnel cannot pass through the channel. The current access control system for the passage comprises a controller, a collection device, a control device and a control device, wherein the collection device is used for collecting identification information of a person to be passed, the controller is used for authenticating the identification information, judging whether the person to be passed can pass, and controlling the opening of a passing control device if the person to be passed can pass, otherwise, the passing control device is not opened, so that the passing of the person is controlled, but the system has the following problems: when the non-contact mode such as biological characteristics, code scanning or certificate scanning is used, the condition that the collection equipment on the multichannel passing control equipment is used for collecting the biological characteristic information of the same personnel to be passed at the same moment easily occurs, so that the situation that the multichannel passing control equipment is opened simultaneously by one person occurs, and the personnel passage access control system is unsafe is caused.
Disclosure of Invention
The embodiment of the application aims to provide an access control system, an access control method and access control equipment, which are used for solving the problem that a plurality of traffic control equipment are opened when a person passes through, so that the communication safety of a gate is improved. The specific technical scheme is as follows:
The embodiment of the application provides an access control system, which comprises:
The controller, the traffic control equipment of the multichannel, the traffic control equipment to each channel, the traffic control equipment corresponds to the information acquisition equipment; the information acquisition equipment is used for acquiring identification information of the target object;
The information acquisition equipment is used for acquiring first identification information of a target object and sending the first identification information of the target object to the controller; the first identification information comprises a first biological feature of the target object and a first channel identifier, wherein the first channel identifier uniquely characterizes a channel corresponding to information acquisition equipment for acquiring the first identification information;
The controller is used for acquiring first identification information sent by the information acquisition equipment; judging whether second identification information of the target object exists in a queue to be authenticated and an authenticated queue; the second identification information includes a second biometric of the target object and a second channel identification; the second channel identification is different from the first channel identification; discarding the first identification information if the second identification information exists in the authenticated queue; discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
The embodiment of the application also provides access control equipment, which comprises:
a controller, a multichannel passage control device;
The controller is used for acquiring first identification information; the first identification information is obtained by collecting a target object by information collecting equipment; the first identification information comprises a first biological feature of the target object and a first channel identifier, wherein the first channel identifier uniquely characterizes a channel corresponding to information acquisition equipment for acquiring the first identification information; the traffic control equipment is corresponding to the information acquisition equipment aiming at each channel; the information acquisition equipment is used for acquiring identification information of the target object;
The controller is used for judging whether the second identification information of the target object exists in the queue to be authenticated and the authenticated queue; the second identification information includes a second biometric of the target object and a second channel identification; the second channel identification is different from the first channel identification; discarding the first identification information if the second identification information exists in the authenticated queue; discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
The embodiment of the application also provides an access control method, which comprises the following steps:
Acquiring first identification information sent by information acquisition equipment, wherein the first identification information comprises a first biological feature of a target object and a first channel identifier, and the first channel identifier uniquely characterizes a channel corresponding to the information acquisition equipment for acquiring the first identification information;
Judging whether second identification information of the target object exists in a queue to be authenticated and an authenticated queue; the second identification information includes a second biometric of the target object and a second channel identification; the second channel identification is different from the first channel identification;
discarding the first identification information if the second identification information exists in the authenticated queue;
Discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
Authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
The embodiment of the application also provides electronic equipment, which comprises: a processor, a memory;
A memory for storing a computer program;
and the processor is used for realizing any one of the access control methods when executing the programs stored in the memory.
The embodiment of the application also provides a computer readable storage medium, wherein a computer program is stored in the computer readable storage medium, and the computer program realizes any one of the access control methods when being executed by a processor.
The embodiment of the application also provides a computer program product containing instructions, which when run on a computer, cause the computer to execute the access control method.
The embodiment of the application has the beneficial effects that:
according to the access control system, the access control method and the access control equipment provided by the embodiment of the application, the queue to be authenticated and the authenticated queue are maintained through the controller, after the identification information sent by the information acquisition equipment is received, the identification information in the queue to be authenticated is compared, and if the identification information-represented target objects in the queue to be authenticated are the same but the corresponding passing control equipment is different, only the identification information of one passing control equipment of the same target object is reserved in the queue to be authenticated, so that the problem that one person is opened through a plurality of passing control equipment is avoided, and the passing safety of a channel is improved.
Of course, it is not necessary for any one product or method of practicing the application to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the application, and other embodiments may be obtained according to these drawings to those skilled in the art.
Fig. 1 is a first schematic diagram of an access control system according to an embodiment of the present application;
Fig. 2 is a second schematic diagram of an access control system according to an embodiment of the present application;
fig. 3 is a third schematic diagram of an access control system according to an embodiment of the present application;
Fig. 4 is a fourth schematic diagram of an access control system according to an embodiment of the present application;
Fig. 5 is a fifth schematic diagram of an access control system according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a target object passing through an access control system according to an embodiment of the present application;
fig. 7 is a schematic flow chart of an information acquisition device of an access control system according to an embodiment of the present application;
Fig. 8 is a schematic diagram of a first flow of a controller of an access control system according to an embodiment of the present application;
Fig. 9 is a schematic diagram of a second flow of a controller of an access control system according to an embodiment of the present application;
fig. 10 is a schematic diagram of an access control method according to an embodiment of the present application;
Fig. 11 is a schematic structural diagram of an access control device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. Based on the embodiments of the present application, all other embodiments obtained by the person skilled in the art based on the present application are included in the scope of protection of the present application.
Term interpretation:
An access control system: the access control system is a digital access control system which can control personnel to access and accurately record and count management data, and generally consists of an access controller and a traffic control device;
and (3) a gate: the device is a channel blocking device and is used for managing the people flow and standardizing the people to come in and go out;
Multiple channels: a plurality of traffic channels formed by a plurality of traffic control devices;
Personnel rights: the method is used for judging whether personnel have permission to open the door;
face recognition: is a biological recognition technology for carrying out identity recognition based on facial feature information of people;
Iris recognition: is a biological recognition technology for carrying out identity recognition based on the iris in the eye;
Information acquisition equipment: means for collecting personal credential information (e.g., facial information, iris information, etc.);
Channel plate: the device for controlling the opening and closing of the traffic control equipment is generally arranged in the box body of the traffic control equipment.
As shown in fig. 1, an embodiment of the present application provides an access control system, including:
A controller 01, a multi-path traffic control device 02, traffic control devices 02 of each path, wherein the traffic control devices 02 correspond to information acquisition devices 03; the information acquisition device 03 is used for acquiring identification information of a target object;
The information acquisition device 03 is configured to acquire first identification information of a target object, and send the first identification information of the target object to the controller 01; the first identification information includes a first biological feature of the target object and a first channel identifier, where the first channel identifier uniquely characterizes a channel corresponding to the information acquisition device 03 that acquires the first identification information;
The controller 01 is configured to obtain first identification information sent by the information acquisition device 03; judging whether second identification information of the target object exists in a queue to be authenticated and an authenticated queue; the second identification information comprises a second biological feature and a second channel identifier of the target object; the second channel identification is different from the first channel identification; discarding the first identification information if the second identification information exists in the authenticated queue; discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
In the access control system, the closing and opening of the traffic control device can manage the flow of people and standardize the entry and exit of pedestrians, when the traffic control device is opened, the passage is opened, the pedestrians can pass through the passage, and when the traffic control device is closed, the passage is closed, and the pedestrians cannot pass through the passage.
The access control system comprises a plurality of paths of traffic control equipment, wherein the traffic control equipment controls the closing and opening of a channel. The "one-way traffic control device" in the embodiment of the present application refers to a device for controlling traffic of one-way channels. The "one-way traffic control device" corresponding to one-way channel may be a gate, where the gate may include one case or two cases. For example, in general, a passage control of a passage may be performed by setting up two gate boxes on the left and right sides to form a passage space. Or when the passage space is a barrier object such as a wall, the barrier object such as the wall and a fan gate case can form a passage space.
For example, there are 3 paths of passage channels, and 3 gate cases, gate case 1, gate case 2, and gate case 3 may be configured, wherein channel 1 is formed between gate case 1 and gate case 2, channel 2 is formed between gate case 2 and gate case 3, channel 3 is formed between gate case 3 and other barrier objects, and the barrier may be a wall, a baffle, or other objects, which is not limited herein.
For example, there are 3 traffic channels corresponding to a plurality of gate cases, for example, 4 gate cases may be configured, gate case 1, gate case 2, gate case 3, and gate case 4, wherein channel 1 is formed between gate case 1 and gate case 2, channel 2 is formed between gate case 2 and gate case 3, and channel 3 is formed between gate case 3 and gate case 4. The gate may include a gate housing body, a passage plate, a gate (e.g., a door swing, a door wing), etc., wherein the passage plate is used for controlling a device for opening and closing the gate, and is generally disposed inside the gate housing body.
The traffic control device for each channel corresponds to an information acquisition device, and the information acquisition device is used for acquiring identification information of a target object (i.e. a target object with an entry intention) to enter the channel. The entering channel means entering the channel inner region from the channel outer region, the region surrounded by the gate is called the channel inner region, and the exiting channel means moving from the channel inner region to the channel outer region. The passage may comprise one passage direction, two passage directions or a plurality of passage directions, the passage direction being understood as the direction from which the passage enters the passage or as the direction from which the passage enters the passage. For example, if a straight channel is provided, it may have two passing directions, that is, may enter the channel from two ends of the channel respectively, so as to implement a passing process, in one example, the passing control device connects the first area and the second area, and the passing control device uses the first area as a reference, and enters the first area via the channel to be called a entering direction of the first area, exits the first area via the channel to be called a exiting direction of the first area, and similarly uses the second area as a reference, enters the second area via the channel to be called a entering direction of the second area, and exits the second area via the channel to be called an exiting direction of the second area. For each direction of passage of the passage there may be associated an information acquisition device for acquiring identification information of objects entering the passage from a certain direction of passage.
The information collecting device corresponding to the channel may be disposed on the traffic control device corresponding to the channel (for example, mounted on a gate of the channel), or other devices, and may specifically be determined based on the actual situation.
In the embodiment of the application, the "the traffic control equipment corresponding to each channel has information acquisition equipment" refers to that, functionally or in terms of signal interaction, for one channel, the entrance end of the channel needs to have information acquisition equipment capable of realizing the function of acquiring credential information, but the number of entities of the information acquisition equipment is not limited, for example, the entity equipment which is required to be installed on one channel and respectively acquires credential information in two entrance directions at two ends of the channel is not limited, and if the equipment integration degree is higher, the two-way information acquisition can be realized by only setting 1 entity acquisition equipment on one channel.
The controller of the present application may be integrated into the general body of the traffic control device. In addition, the controller may also be a device independent of the traffic control device, for example, the controller may be a smart device loaded with a control application for executing the corresponding steps when the control application is run on the smart device.
The biological characteristics, code scanning, certificate scanning and the like can be characteristics which can be acquired by the target object without contacting with the information acquisition equipment, for example, the biological characteristics can be facial characteristics of the target object, iris characteristics of the target object and voiceprint characteristics of the target object. The information acquisition device may enable acquisition of at least one of the following features: facial features of the target object, iris features of the target object, voiceprint features of the target object.
After the information acquisition device acquires the biological characteristics of the target object, generating first identification information comprising the first biological characteristics of the target object and the first channel identifier, wherein the first biological characteristics comprise at least one of the following characteristics: the facial features of the target object, the iris features of the target object, the voiceprint features of the target object, the first channel identification may characterize which channel the channel is, and/or the direction of passage of the channel, etc. The first identification information is sent to the controller, and after the controller receives the first identification information, the first biological characteristics can be identified to determine the identification of the target object, wherein the identification of the target object is the information uniquely representing the target object; for example, the name, number, etc. of the target object may be specifically set based on actual conditions, and are not limited herein.
The queue to be authenticated is used for storing identification information of personnel needing authentication, and the authenticated queue is used for storing identification information of personnel passing authentication, the passing control equipment is opened, and the passing control equipment is not closed.
The information acquisition equipment sends the acquired first identification information to the controller, and after the controller acquires the first identification information, the controller judges whether the identification information corresponding to the identification information exists in the queue to be authenticated and the authenticated queue, but the identification information corresponding to the channel is different. Illustratively, the controller obtains the identification information of the authorized object in advance, and in one example, the access platform determines the object that needs to be authorized and then sends the identification information of the authorized object to the controller.
If the second identification information exists in the authenticated queue, the first identification information is directly discarded.
If the second identification information exists in the queue to be authenticated:
The first identification information is directly discarded or the second identification information is deleted from the queue to be authenticated, and the first identification information is added to the queue to be authenticated.
In one example, the second identification information is cleared in the queue to be authenticated, and the first identification information is added to the location of the second identification information in the queue to be authenticated, i.e., the first identification information is used in place of the second identification information in the queue to be authenticated. In this way, the target object can be preferentially identified, so that the target object can not wait too long.
In one example, the second identifying information is cleared in the queue to be authenticated and the first identifying information is added to the end of the queue at the location of the queue to be authenticated.
For example, when the user first approaches the passage control device from the exit direction of the passage 1, the information acquisition device A 'in the exit direction of the passage 1 acquires the biological characteristic information of the user first and uploads the biological characteristic information to the controller, and the information acquisition device B' in the exit direction of the passage 2 also acquires the biological characteristic information of the user first and uploads the biological characteristic information to the controller; after receiving the identification information of the user A uploaded by the information acquisition equipment A ', the controller judges whether the identification information of the user A uploaded by other information acquisition equipment exists in the queue to be authenticated and the authenticated queue, and discards the identification information of the user A uploaded by the information acquisition equipment A' if the identification information of the user A uploaded by other information acquisition equipment exists in the authenticated queue. Or if the queue to be authenticated exists, discarding the identification information of the user A uploaded by the equipment of the information acquisition equipment A ', or deleting the identification information of the user A uploaded by other existing information acquisition equipment in the queue to be authenticated, and adding the identification information of the user A uploaded by the equipment of the information acquisition equipment A' to the queue to be authenticated.
In one example, the identification information of the user first uploaded by the other information acquisition devices is cleared in the queue to be authenticated, and the identification information of the user first uploaded by the information acquisition device A 'device is added to the position of the identification information of the user first uploaded by the other information acquisition devices in the queue to be authenticated, namely, the identification information of the user first uploaded by the information acquisition device A' device is used for replacing the identification information of the user first uploaded by the other information acquisition devices in the queue to be authenticated.
In one example, the identification information of the user A uploaded by other information acquisition equipment is cleared in the queue to be authenticated, and the identification information of the user A uploaded by the information acquisition equipment A' equipment is added to the tail position in the queue to be authenticated.
For example, after the waiting authentication queue stores the user first identification information uploaded by the information acquisition device a ' device, if the controller receives the user first identification information uploaded by the information acquisition device B ' device, the user first identification information uploaded by the information acquisition device B ' device can be updated in the waiting authentication queue or discarded after the user first identification information is already in the authenticated queue, and the controller takes out the user first identification information from the waiting authentication queue to perform authority authentication, and under the condition of successful authentication, sends an instruction of opening the traffic control device of the channel 1, simultaneously deletes the user first identification information from the waiting authentication queue and adds the user first identification information into the authenticated queue, and the controller can also return an authentication success result to the information acquisition device; and if the personnel authority check is not passed, the personnel information of the first user is cleared from the queue to be authenticated, and an authentication failure result is returned to the information acquisition equipment.
If the channel comprises an in-out direction, the first identification information further comprises channel direction information; the channel direction information indicates whether the target object is to enter a channel or exit the channel, and if the authentication is successful, a pass control device opening command in a corresponding direction is sent to the pass control device so that the target object can smoothly pass through the channel.
The controller maintains the queue to be authenticated and the authenticated queue, compares the identification information in the queue to be authenticated after receiving the identification information sent by the information acquisition equipment, and only retains the identification information of one channel of the same target object in the queue to be authenticated under the condition that the corresponding channels are different if the target objects represented by the identification information in the queue to be authenticated are the same, so that the problem that one person is opened through a plurality of passing control equipment is avoided, and the passing safety of the channels is improved. That is, one controller is used for controlling the opening of each passage control device, so that the problem that a plurality of passage control devices are opened when one object passes due to the fact that each passage control device is controlled to be opened by each passage is solved, and the passage safety is improved.
In an alternative embodiment, the controller is specifically configured to; after the first identification information sent by the information acquisition equipment is acquired, judging whether second identification information of the target object exists in the authenticated queue, if so, discarding the first identification information, and if not, judging whether the second identification information of the target object exists in the queue to be authenticated.
After the controller acquires the first identification information sent by the information acquisition device, the controller can compare the identification information in the authenticated queue, if the second identification information of the target object exists in the authenticated queue, the first identification information is discarded, and otherwise, the identification information in the queue to be authenticated is continuously compared.
In an alternative embodiment, the controller is specifically configured to;
If the queue to be authenticated and the authenticated queue do not have the second identification information, adding the first identification information into the queue to be authenticated;
The controller is specifically configured to, after adding the target identification information to the authenticated queue; and deleting the target identification information from the authenticated queue after the first channel is closed.
And if the second identification information does not exist in the queue to be authenticated and the authenticated queue, directly adding the first identification information to the queue to be authenticated.
In addition, after adding the target identification information to the authenticated queue, the target identification information is deleted from the authenticated queue after the first channel is closed. The first channel closing may be that the target object is detected to pass through the first channel, or the first channel is closed after the first channel is opened for a preset period of time, which is specifically set based on the actual situation, and is not limited herein.
Based on the embodiment shown in fig. 1, as shown in fig. 2, in an alternative embodiment, the traffic control device also corresponds to a passage plate 04; the passage plate 04 is used for controlling the opening and closing of the traffic control device.
In one example, the controller sends a traffic control device opening instruction to a channel board of a first channel corresponding to a channel identifier of the target identification information when authentication is successful, and controls the traffic control device to be opened after the channel board of the first channel corresponding to the channel identifier of the target identification information receives the traffic control device opening instruction.
The passage board controls the passage to be closed under a preset condition, for example, controls the passage control device to be closed after detecting that the target object passes through the passage, or controls the passage control device to be closed after receiving an opening instruction of the passage control device and passing through a preset time.
In one example, the channel board sends the information that the traffic control device has been turned off to the controller after controlling the traffic control device to turn off, and the controller removes the identification information from the authenticated queue after receiving the information that the traffic control device has been turned off. Or the controller determines the identification information to be verified in the queue to be authenticated based on the on state of the traffic control device.
Based on the embodiment shown in fig. 2, in an alternative embodiment, each channel in-and-out direction corresponds to one information collecting device, that is, each channel corresponds to 2 information collecting devices, one information collecting device may collect the biological characteristic information (in-direction) of the object entering the channel, and the other information collecting device may collect the biological characteristic information (out-direction) of the object exiting the channel.
As shown in fig. 3, the gate control system includes N paths of traffic control devices, where one path of traffic control device may form one path of channel, each path of channel corresponds to an information acquisition device a and an information acquisition device B, where the information acquisition device a is configured to acquire biometric information of an object entering (exiting) a channel, and directions acquired by the information acquisition device a and the information acquisition device B are opposite.
The information acquisition equipment A, the information acquisition equipment B and the channel board of each channel are connected with the controller through a network, and the channel board is in communication connection with the traffic control equipment.
In one example, as shown in fig. 4, the passage control device includes a passage control device body and 2 gates. One channel corresponds to 2 information collection devices, for example, channel 1 corresponds to information collection device A1 and information collection device B1, channel 2 corresponds to information collection device A2 and information collection device B2, and channel 3 corresponds to information collection device A3 and information collection device B3. For example, for the channel 1, the information collecting device A1 is configured to collect first identification information of a target object in a direction of entry of the channel 1, and send the first identification information of the target object to the controller; the controller acquires first identification information sent by the information acquisition equipment A1, wherein the first identification information comprises first biological characteristics of a target object and a channel 1 advancing direction identifier; judging whether second identification information of the target object exists in the queue to be authenticated and the authenticated queue; the second identification information includes a second biometric feature of the target object and a second channel identification; the second channel identifier is different from the first channel identifier; discarding the first identification information if the second identification information exists in the authenticated queue; if the second identification information exists in the queue to be authenticated, discarding the first identification information, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; and authenticating the biological characteristics of the target identification information in the queue to be authenticated, and sending an entry direction passing control equipment opening instruction to a channel plate of the channel 1 to control the entry direction of the channel 1 to be opened under the condition that authentication is successful, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue.
In one example, as shown in fig. 5, the controller support platform issues rights of the authorized object in advance, that is, the platform sends information of the authorized object to the controller, and after receiving the identification information uploaded by the information acquisition device, the controller determines whether the personnel information has the passing rights or not and controls the switch of the passing control device, so that the manager passes.
In an alternative embodiment, under the condition that the authentication of the traffic information fails, the traffic information is deleted from the queue to be authenticated, an authentication failure message for reminding a person is generated, and the authentication failure message is sent to an associated channel corresponding to the traffic information.
If the authentication of the pass information fails, deleting the pass information from the queue to be authenticated and generating an authentication failure message for reminding a person so as to remind the manager of passing an unauthorized object and improve the pass safety.
In an alternative embodiment, the identification information includes face angle information and/or distance information of the target object;
the controller is specifically used for;
Determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information;
If the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
And discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
The face angle of the target object refers to the angle of the target object with the information recognition device, and includes the horizontal, vertical and in-plane angles of the face, and a smaller horizontal, vertical and in-plane rotation angle of the face indicates that the target object is more opposite to the channel. As shown in fig. 6, when the person is facing the information acquisition device a', the angles of the face and the information acquisition devices of the channels are obvious angles a < b < c. Wherein a is the angle between the person and the information acquisition device A ', B is the angle between the person and the information acquisition device B ', and C is the angle between the person and the information acquisition device C '.
The distance information refers to the distance of the target object from the information collecting device. The closer the target object is to the information collection device, the more convenient the target object is to pass through the channel.
And determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information, and storing identification information corresponding to the optimal channel in a queue to be authenticated so as to facilitate the passing of the target object.
In an alternative embodiment, determining the optimal channel of the target object based on the face angle information in the first identification information and the face angle information in the second identification information includes:
comparing the face angle information in the first identification information with the face angle information in the second identification information;
If the face angle in the first identification information is smaller than the face angle in the second identification information, taking the channel corresponding to the first identification information as an optimal channel;
and if the face angle in the first identification information is not smaller than the face angle in the second identification information, taking the channel corresponding to the second identification information as an optimal channel.
The smaller the angle is, the more the target object is opposite to the channel, and the channel is directly used as an optimal channel, so that the target object can conveniently pass through.
In an alternative embodiment, determining the optimal channel of the target object based on the distance information in the first identification information and the distance information in the second identification information includes:
comparing the distance information in the first identification information with the distance information in the second identification information;
if the distance in the first identification information is smaller than the distance in the second identification information, taking the channel corresponding to the first identification information as an optimal channel;
and if the distance in the first identification information is not smaller than the distance in the second identification information, taking the channel corresponding to the second identification information as an optimal channel.
The smaller the distance is, the closer the distance is to the passage opening is, the more convenient the target object passes through the passage, and the passage is directly used as an optimal passage so as to facilitate the passing of the target object.
In an alternative embodiment, based on the face angle information and the distance information in the first identification information, and the face angle information and the distance information in the second identification information, the method includes:
Respectively giving weights to the face angle information and the distance information in the first identification information and the face angle information and the distance information in the second identification information based on the size of the face angle and the size of the distance in the face angle information;
The face angle information and the distance information in the first identification information are weighted and calculated based on a first weight of the face angle information in the first identification information and a second weight of the distance information in the first identification information, so that a first value is obtained;
Weighting and calculating the face angle information and the distance information in the second identification information based on a third weight of the face angle information in the second identification information and a fourth weight of the distance information in the second identification information to obtain a second value;
An optimal channel is determined based on the magnitudes of the first value and the second value.
The weight can be set based on the actual situation, and the weight is larger as the face angle is smaller, and the weight is smaller as the face angle is larger; the smaller the distance, the larger the weight, and the smaller the weight.
And carrying out weighted calculation on the first identification information and the second identification information to determine an optimal channel.
In an alternative embodiment, after acquiring the first identification information sent by the acquisition device, the method further includes:
judging whether third identification information exists or not; the third identification information characterizes the traffic information of the target object; the third identification information comprises a third biological feature and a third channel identifier of the target object; the channel represented by the third channel identifier is the same as the channel represented by the first channel identifier;
if so, discarding the first identification information.
The third identification information comprises a third biological feature and a third channel identifier of the target object; the channel characterized by the third channel identifier is the same as the channel characterized by the first channel identifier. That is, if the channels corresponding to the same object are the same, in order to avoid repeated authentication of the target object in the same channel, only one data of the target object corresponding to the channel may be reserved, so that the credential collecting device side filters personnel information in the repeated identification interval, and invalid redundant data is removed, so that the communication load is reduced, and the processing efficiency of the controller is improved.
In an alternative embodiment, after the information collecting device collects the first identification information of the target object, it is determined whether the identification information of the target object is collected within a preset time period, if yes, the first identification information is discarded.
The information acquisition equipment filters the identification information of the object in the repeated identification interval, removes invalid redundant data, reduces communication load and improves the processing efficiency of the controller.
In one example, after the information collecting device collects the first identification information of the target object, it is determined whether the first identification information is preset identification information, where the preset identification information is a face model/face ID, an iris model/iris ID, or the like, and if not, the first identification information is discarded. If yes, judging whether the identification information of the target object is acquired within a preset time period, and if yes, discarding the first identification information.
In an example, as shown in fig. 7, the target object is identified on the information collecting device, the information collecting device obtains the identification information of the target object, and the information collecting device determines whether the identification information is the following identification information, including a face model/face ID, an iris model/iris ID, and the like, if yes, whether the identification information of the target object is in the same repeated authentication interval of the identification information of the target object is determined, if yes, the identification information of the target object is discarded, and if not, the identification information of the target object is sent to the controller.
The information acquisition equipment filters the identification information of the object in the repeated identification interval, removes invalid redundant data, reduces communication load and improves the processing efficiency of the controller.
In an alternative embodiment, each identification information corresponds to a time stamp, and the controller is specifically configured to:
If the third identification information exists; judging whether the interval between the time stamp of the first identification information and the time stamp of the third identification information is larger than a preset threshold value or not, wherein the time stamp of the first identification information is later than the time stamp of the third identification information; if not, deleting the third identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; if yes, discarding the first identification information.
The time stamp can be the time stamp of the identification information received by the controller or the time stamp acquired by the information acquisition equipment. If the interval between the time stamp of the first identification information and the time stamp of the third identification information is larger than a preset threshold value, the interval time of repeated authentication is indicated, and if the interval between the time stamp of the first identification information and the time stamp of the third identification information is not larger than the preset threshold value, the interval time of repeated authentication is indicated, and in order to avoid repeated authentication, the first identification information is discarded.
Based on the above embodiment, as shown in fig. 8, the controller receives the identification information of the target object uploaded by the information collecting device, and then determines whether the identification information is already in the authenticated queue, if yes, discards the identification information; if not, judging whether the identification information is in the queue to be authenticated, if not, storing the identification information in the queue to be authenticated, if yes, judging whether the identification information is a face model/face ID, an iris model/iris ID, if not, discarding the identification information, if yes, comparing the existing identification information in the queue to be authenticated with the newly received identification information (such as face deflection angle, distance between an object and a channel, and the like), confirming the optimal channel of the object, judging whether the channel corresponding to the identification information is the optimal channel of the object, if yes, updating the identification information of the target object in the queue to be authenticated, and if not, discarding the identification information.
In an alternative embodiment, the controller is specifically configured to;
Judging whether the traffic control equipment corresponding to the target identification information is not opened, and authenticating the biological characteristics of the target identification information under the condition that the traffic control equipment is not opened;
the controller is also specifically used for;
And under the condition of opening, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
For any channel, when the traffic control device is in an open state, the controller does not authenticate the identification information of the person to pass through the channel in the queue to be authenticated, and when the traffic control device is closed (not opened), the identification information of the person to pass through the channel in the queue to be authenticated is continuously processed.
In one example, as shown in fig. 9, the controller obtains channel information of an on state of the traffic control device from the authenticated queue, where the channel information of the on state of the channel is used to characterize whether the traffic control device is in an on state or an off state; the controller sequentially searches the identification information of the passing control equipment in a closed state from the queue to be authenticated, if the corresponding identification information is found, the controller stops searching continuously, judges the authority of the identification information, authenticates the biological characteristics of the identification information, controls whether the passing control equipment is opened or not based on the authentication result, if the authentication is passed, controls the opening of the passing control equipment corresponding to the identification information (the controller sends an opening instruction of the passing control equipment to the corresponding channel board, controls the opening of the passing control equipment), adds the identification information into the authenticated queue, judges whether the passing control equipment is closed (the channel board controls the closing of the passing control equipment under the preset condition and sends the closing information of the passing control equipment to the controller, and the controller can judge whether the closing information of the passing control equipment is received or not so as to judge whether the passing control equipment is closed or not), if the authentication is passed, removes the identification information from the authenticated queue of the controller, and if the identification information is not, continuously judges whether the passing control equipment is closed or not.
For example, when the person 1 enters from the channel 1 and the person 2 enters from the channel 1, the information acquisition device 1 corresponding to the channel 1 acquires the identification information of the person 1 first and then acquires the identification information of the person 2, and when the channel 1 is controlled to be opened based on the information of the person 1 but the channel 1 is closed, the identification information of the person 2 can be authenticated when the identification information of the person 2 is required to be authenticated. However, when the channel 1 is controlled to be opened based on the information of the person 1, but the channel 1 is not closed (the controller considers that the person 1 is not yet passing), the identification information of the person 2 cannot be authenticated when the identification information of the person 2 needs to be authenticated, and the passage information of the channel corresponding to the identification information in the unopened state needs to be selected from the queue to be authenticated for verification.
In an alternative embodiment, the queue to be authenticated is a first-in first-out queue.
And judging each piece of identification information in the queue to be authenticated according to the sequence of the joining time from first to last.
If the order of the first personnel information related channel 1, the second personnel information related channel 1, the third personnel information related channel 1, and the fourth personnel information related channel 2 in the queue to be authenticated is the first personnel information, if the authentication is passed, the first personnel information is opened, and the first personnel information is cleared from the queue to be authenticated, and the first personnel information is added in the authenticated queue, if the channel 1 is not closed (in an open state), the fourth personnel information is started to be authenticated, and if the channel 2 is opened, the second personnel information is continuously authenticated after the channel 1 is closed, according to the authentication result, the third personnel information is controlled to be opened.
The embodiment of the application also provides access control equipment, which comprises:
a controller, a multichannel passage control device;
The controller is used for acquiring first identification information; the first identification information is obtained by collecting a target object by information collecting equipment; the first identification information comprises a first biological feature of the target object and a first channel identifier, wherein the first channel identifier uniquely characterizes a channel corresponding to information acquisition equipment for acquiring the first identification information; the traffic control equipment is corresponding to the information acquisition equipment aiming at each channel; the information acquisition equipment is used for acquiring identification information of the target object;
The controller is used for judging whether the second identification information of the target object exists in the queue to be authenticated and the authenticated queue; the second identification information comprises a second biological feature and a second channel identifier of the target object; the second channel identifier is different from the first channel identifier; discarding the first identification information if the second identification information exists in the authenticated queue; discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
The traffic control device may comprise a traffic control device body, a passage plate, a gate, etc., and the controller may be integrated in the traffic control device body. In other embodiments, the controller may also be a device independent of the traffic control device, e.g. the controller may be a smart device loaded with a control application for performing the respective steps when the control application is run on the smart device.
In an alternative embodiment, the controller is specifically configured to;
If the queue to be authenticated and the authenticated queue do not have the second identification information, adding the first identification information into the queue to be authenticated;
The controller is specifically configured to, after adding the target identification information to the authenticated queue; and deleting the target identification information from the authenticated queue after the first channel is closed.
In an alternative embodiment, the identification information includes face angle information and/or distance information of the target object;
The controller is specifically used for; determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information; if the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated; and discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
In an alternative embodiment, the controller is specifically configured to; judging whether the traffic control equipment corresponding to the target identification information is not opened, and authenticating the biological characteristics of the target identification information under the condition that the traffic control equipment is not opened;
The controller is also used for; and under the condition of opening, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
In an alternative embodiment, the controller is specifically configured to;
After the first identification information sent by the acquisition equipment is acquired, judging whether third identification information exists or not; the third identification information characterizes the traffic information of the target object; the third identification information comprises a third biological feature and a third channel identifier of the target object; the channel represented by the third channel identifier is the same as the channel represented by the first channel identifier;
if so, discarding the first identification information.
The embodiment of the application provides an access control method, which is applied to an access control system comprising multiple channels as shown in fig. 10, and is used for traffic control equipment of each channel, wherein the traffic control equipment corresponds to information acquisition equipment; the information acquisition equipment is used for acquiring identification information of a target object:
S810, acquiring first identification information sent by information acquisition equipment, wherein the first identification information comprises a first biological feature of a target object and a first channel identifier, and the first channel identifier uniquely characterizes a channel corresponding to the information acquisition equipment for acquiring the first identification information;
S820, judging whether the second identification information of the target object exists in the queue to be authenticated and the authenticated queue; the second identification information comprises a second biological feature and a second channel identifier of the target object; the second channel identifier is different from the first channel identifier;
S830, discarding the first identification information if the second identification information exists in the authenticated queue;
S840, if the second identification information exists in the queue to be authenticated, discarding the first identification information, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
S850, authenticating the biological characteristics of the target identification information in the queue to be authenticated, controlling a first pass control device corresponding to the channel identification of the target identification information to be opened under the condition that authentication is successful, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
In an alternative embodiment, the method further comprises:
If the queue to be authenticated and the authenticated queue do not have the second identification information, adding the first identification information into the queue to be authenticated;
after adding the target identification information to the authenticated queue, the method further includes:
And deleting the target identification information from the authenticated queue after the first traffic control device is closed.
In an alternative embodiment, the identification information includes face angle information and/or distance information of the target object;
The deleting the second identification information from the queue to be authenticated and adding the first identification information to the queue to be authenticated includes:
Determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information;
If the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
And discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
In an optional embodiment, the authenticating the biometric feature of the target identification information in the queue to be authenticated includes:
Judging whether a channel corresponding to the target identification information is not opened, and authenticating the biological characteristics of the target identification information under the condition that the channel is not opened;
The method further comprises the following steps:
and under the condition of unopened state, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
The embodiment of the application also provides an access control device, which is applied to an access control system comprising multiple channels as shown in fig. 11, and is used for traffic control equipment of each channel, wherein the traffic control equipment corresponds to information acquisition equipment; the information acquisition equipment is used for acquiring identification information of a target object:
An obtaining module 910, configured to obtain first identification information sent by an information collecting device, where the first identification information includes a first biological feature of a target object and a first channel identifier, where the first channel identifier uniquely characterizes a channel corresponding to the information collecting device that collects the first identification information;
A judging module 920, configured to judge whether second identification information of the target object exists in the queue to be authenticated and the authenticated queue; the second identification information comprises a second biological feature and a second channel identifier of the target object; the second channel identification is different from the first channel identification;
a first processing module 930 configured to discard the first identification information if the second identification information exists in the authenticated queue;
A second processing module 940, configured to discard the first identification information if the second identification information exists in the to-be-authenticated queue, or delete the second identification information in the to-be-authenticated queue, and add the first identification information to the to-be-authenticated queue;
An authentication module 950, configured to authenticate a biological feature of the target identification information in the queue to be authenticated, and in case of successful authentication, control a first traffic control device corresponding to a channel identifier of the target identification information to be opened, delete the target identification information from the queue to be authenticated, and add the target identification information to the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
In an alternative embodiment, the apparatus further comprises:
the third processing module is used for adding the first identification information to the queue to be authenticated if the second identification information does not exist in the queue to be authenticated and the authenticated queue;
The device further comprises:
and a fourth processing module configured to delete the target identification information from the authenticated queue after the first passage control device is turned off after the target identification information is added to the authenticated queue.
In an alternative embodiment, the identification information includes face angle information and/or distance information of the target object;
The second processing module 940 is specifically configured to:
Determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information;
If the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
And discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
In an alternative embodiment, the authentication module 950 is specifically configured to:
Judging whether a channel corresponding to the target identification information is not opened, and authenticating the biological characteristics of the target identification information under the condition that the channel is not opened;
The device further comprises:
and under the condition of unopened state, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The embodiment of the application also provides an electronic device, as shown in fig. 12, including:
A memory 1001 for storing a computer program;
The processor 1002 is configured to execute the program stored in the memory 1001, and implement the following steps:
Acquiring first identification information sent by information acquisition equipment, wherein the first identification information comprises a first biological feature of a target object and a first channel identifier, and the first channel identifier uniquely characterizes a channel corresponding to the information acquisition equipment for acquiring the first identification information;
judging whether second identification information of the target object exists in a queue to be authenticated and an authenticated queue; the second identification information comprises a second biological feature and a second channel identifier of the target object; the second channel identifier is different from the first channel identifier;
Discarding the first identification information if the second identification information exists in the authenticated queue;
discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
Authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
The electronic device may further include a communication bus and/or a communication interface, where the processor, the communication interface, and the memory may communicate with each other via the communication bus.
The communication bus mentioned above for the electronic device may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but may also be a digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
In yet another embodiment of the present application, a computer readable storage medium is provided, in which a computer program is stored, the computer program implementing the steps of any of the above access control methods when executed by a processor.
In yet another embodiment of the present application, a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the access control methods of the above embodiments is also provided.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a Solid state disk (Solid STATE DISK, SSD), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for method, apparatus, electronic device, computer readable storage medium and computer program product embodiments, the description is relatively simple as it is substantially similar to system embodiments, and relevant places are referred to in the section of the description of method embodiments.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application are included in the protection scope of the present application.

Claims (15)

1. An access control system, comprising:
The controller, the traffic control equipment of the multichannel, the traffic control equipment to each channel, the traffic control equipment corresponds to the information acquisition equipment; the information acquisition equipment is used for acquiring identification information of the target object;
The information acquisition equipment is used for acquiring first identification information of a target object and sending the first identification information of the target object to the controller; the first identification information comprises a first biological feature of the target object and a first channel identifier, wherein the first channel identifier uniquely characterizes a channel corresponding to information acquisition equipment for acquiring the first identification information;
The controller is used for acquiring first identification information sent by the information acquisition equipment; judging whether second identification information of the target object exists in a queue to be authenticated and an authenticated queue; the second identification information includes a second biometric of the target object and a second channel identification; the second channel identification is different from the first channel identification; discarding the first identification information if the second identification information exists in the authenticated queue; discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
2. The system of claim 1, wherein the controller is specifically configured to;
if the queue to be authenticated and the authenticated queue do not have the second identification information, the first identification information is added to the queue to be authenticated;
After adding the target identification information to the authenticated queue, the controller is specifically configured to; after the first traffic control device is turned off, the target identification information is deleted from the authenticated queue.
3. The system of claim 1, wherein the identification information includes facial angle information and/or distance information of the target object;
the controller is specifically configured to;
Determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information;
if the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
And discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
4. The system of claim 1, wherein the controller is specifically configured to;
Judging whether the passing control equipment corresponding to the target identification information is not opened or not, and authenticating the biological characteristics of the target identification information under the condition that the passing control equipment is not opened;
The controller is further configured to:
And under the condition of opening, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
5. The system of claim 1, wherein the controller is specifically configured to;
After the first identification information sent by the acquisition equipment is acquired, judging whether third identification information exists or not; the third identification information characterizes the traffic information of the target object; the third identification information comprises a third biological feature and a third channel identifier of the target object; the channel represented by the third channel identifier is the same as the channel represented by the first channel identifier;
if so, discarding the first identification information.
6. An access control device, comprising:
a controller, a multichannel passage control device;
The controller is used for acquiring first identification information; the first identification information is obtained by collecting a target object by information collecting equipment; the first identification information comprises a first biological feature of the target object and a first channel identifier, wherein the first channel identifier uniquely characterizes a channel corresponding to information acquisition equipment for acquiring the first identification information; the traffic control equipment is corresponding to the information acquisition equipment aiming at each channel; the information acquisition equipment is used for acquiring identification information of the target object;
The controller is used for judging whether the second identification information of the target object exists in the queue to be authenticated and the authenticated queue; the second identification information includes a second biometric of the target object and a second channel identification; the second channel identification is different from the first channel identification; discarding the first identification information if the second identification information exists in the authenticated queue; discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated; authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
7. The apparatus of claim 6, wherein the controller is specifically configured to;
if the queue to be authenticated and the authenticated queue do not have the second identification information, the first identification information is added to the queue to be authenticated;
After adding the target identification information to the authenticated queue, the controller is specifically configured to; after the first traffic control device is turned off, the target identification information is deleted from the authenticated queue.
8. The apparatus according to claim 6, wherein the identification information includes face angle information and/or distance information of the target object;
the controller is specifically configured to;
Determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information;
if the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
And discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
9. The apparatus of claim 6, wherein the controller is specifically configured to;
Judging whether the passing control equipment corresponding to the target identification information is not opened or not, and authenticating the biological characteristics of the target identification information under the condition that the passing control equipment is not opened;
The controller is also used for;
And under the condition of opening, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
10. The apparatus of claim 6, wherein the controller is specifically configured to;
After the first identification information sent by the acquisition equipment is acquired, judging whether third identification information exists or not; the third identification information characterizes the traffic information of the target object; the third identification information comprises a third biological feature and a third channel identifier of the target object; the channel represented by the third channel identifier is the same as the channel represented by the first channel identifier;
if so, discarding the first identification information.
11. An access control method, characterized in that the method comprises:
Acquiring first identification information sent by information acquisition equipment, wherein the first identification information comprises a first biological feature of a target object and a first channel identifier, and the first channel identifier uniquely characterizes a channel corresponding to the information acquisition equipment for acquiring the first identification information;
Judging whether second identification information of the target object exists in a queue to be authenticated and an authenticated queue; the second identification information includes a second biometric of the target object and a second channel identification; the second channel identification is different from the first channel identification;
discarding the first identification information if the second identification information exists in the authenticated queue;
Discarding the first identification information if the second identification information exists in the queue to be authenticated, or deleting the second identification information in the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
Authenticating the biological characteristics of the target identification information in the queue to be authenticated, and under the condition that authentication is successful, controlling a first pass control device corresponding to a channel identifier of the target identification information to be opened, deleting the target identification information from the queue to be authenticated, and adding the target identification information into the authenticated queue; wherein the target identification information is the first identification information or the second identification information.
12. The method of claim 11, wherein the method further comprises:
if the queue to be authenticated and the authenticated queue do not have the second identification information, the first identification information is added to the queue to be authenticated;
after adding the target identification information to the authenticated queue, the method further includes:
after the first traffic control device is turned off, the target identification information is deleted from the authenticated queue.
13. The method according to claim 11, wherein the identification information comprises face angle information and/or distance information of the target object;
The deleting the second identification information in the queue to be authenticated and adding the first identification information to the queue to be authenticated includes:
Determining an optimal channel of the target object based on the face angle information and/or the distance information in the first identification information and the face angle information and/or the distance information in the second identification information;
if the channel corresponding to the first identification information is the optimal channel, deleting the second identification information from the queue to be authenticated, and adding the first identification information to the queue to be authenticated;
And discarding the first identification information if the channel corresponding to the first identification information is not the optimal channel.
14. The method of claim 11, wherein authenticating the biometric of the target identification information in the queue to be authenticated comprises:
Judging whether the passing control equipment corresponding to the target identification information is not opened or not, and authenticating the biological characteristics of the target identification information under the condition that the passing control equipment is not opened;
The method further comprises the steps of:
And under the condition of opening, selecting the traffic information of the traffic control equipment in the unopened state corresponding to the identification information from the queue to be authenticated for verification.
15. The method of claim 11, wherein after acquiring the first identification information sent by the acquisition device, the method further comprises:
Judging whether third identification information exists or not; the third identification information characterizes the traffic information of the target object; the third identification information comprises a third biological feature and a third channel identifier of the target object; the channel represented by the third channel identifier is the same as the channel represented by the first channel identifier;
if so, discarding the first identification information.
CN202410375206.6A 2024-03-29 2024-03-29 Access control system, method and access control equipment Pending CN117994890A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410375206.6A CN117994890A (en) 2024-03-29 2024-03-29 Access control system, method and access control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410375206.6A CN117994890A (en) 2024-03-29 2024-03-29 Access control system, method and access control equipment

Publications (1)

Publication Number Publication Date
CN117994890A true CN117994890A (en) 2024-05-07

Family

ID=90893630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410375206.6A Pending CN117994890A (en) 2024-03-29 2024-03-29 Access control system, method and access control equipment

Country Status (1)

Country Link
CN (1) CN117994890A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN208477610U (en) * 2018-06-19 2019-02-05 南京熊猫电子股份有限公司 Gate array IMSI authentication system based on single base station multiple antennas
CN111784885A (en) * 2020-06-17 2020-10-16 杭州海康威视数字技术股份有限公司 Passage control method and device, gate equipment and multi-gate system
CN112116745A (en) * 2020-09-10 2020-12-22 精伦电子股份有限公司 Gate, gate control method, system, electronic device and storage medium
CN112991602A (en) * 2019-12-18 2021-06-18 杭州海康威视数字技术股份有限公司 Bidirectional access control system and control method thereof
CN113626797A (en) * 2021-08-09 2021-11-09 杭州海康威视数字技术股份有限公司 Method for reducing false triggering of multi-channel gate and gate system
US20220076268A1 (en) * 2018-12-26 2022-03-10 Xunteng (guangdong) Technology Co., Ltd. Method and device for authenticating near-field information, electronic apparatus, and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN208477610U (en) * 2018-06-19 2019-02-05 南京熊猫电子股份有限公司 Gate array IMSI authentication system based on single base station multiple antennas
US20220076268A1 (en) * 2018-12-26 2022-03-10 Xunteng (guangdong) Technology Co., Ltd. Method and device for authenticating near-field information, electronic apparatus, and computer storage medium
CN112991602A (en) * 2019-12-18 2021-06-18 杭州海康威视数字技术股份有限公司 Bidirectional access control system and control method thereof
CN111784885A (en) * 2020-06-17 2020-10-16 杭州海康威视数字技术股份有限公司 Passage control method and device, gate equipment and multi-gate system
CN112116745A (en) * 2020-09-10 2020-12-22 精伦电子股份有限公司 Gate, gate control method, system, electronic device and storage medium
CN113626797A (en) * 2021-08-09 2021-11-09 杭州海康威视数字技术股份有限公司 Method for reducing false triggering of multi-channel gate and gate system

Similar Documents

Publication Publication Date Title
CN109272613B (en) Sensor and video linked Internet of things safety electronic access control system
US20230401914A1 (en) Information processing apparatus, information processing system, and information processing method
KR102222857B1 (en) System and method for access control using blockchain network and computer program for the same
JP6081859B2 (en) Entrance / exit management system and entrance / exit management method
CN110111470A (en) A kind of current data linkage control method and control device
CN213814815U (en) Access control system of national treasury
US20220415105A1 (en) Information processing apparatus, information processing system, and information processing method
CN109215191A (en) Nobody a kind of intelligent access control system and its working method on duty
EP4207112A1 (en) Authentication method and apparatus for gate entrance
JP2024019251A (en) Information processing system, method, equipment, and program
WO2021233004A1 (en) Safe cabinet device, unlocking method, and unlocking system
JP4855180B2 (en) Image processing system
CN117994890A (en) Access control system, method and access control equipment
KR102089030B1 (en) Access control system and method based on combination of authentications
KR101421962B1 (en) Entrance-Exit Control Device Using Image of Entry and Method for Managing the Entry
CN114553474B (en) Access control permission control method and device based on Internet of things
KR101933769B1 (en) Smart pass authenticating system
CN117409503A (en) Gate passing method and device and gate
JP5324176B2 (en) Entrance / exit management system and control device thereof
KR102069567B1 (en) Structured Cabling System Using Biometric Authentication
JP2014157422A (en) Entrance-exit management device and program
CN109993866A (en) Flap turnstile control method and system based on mobile management terminal
CN113850945B (en) Access control method and multi-access-control-host anti-submergence system
JP2002147080A (en) Living body information authentication device and living body information authentication system
TWI476734B (en) Multiple access control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination