CN206628012U - A kind of monitoring system and gate control system - Google Patents

A kind of monitoring system and gate control system Download PDF

Info

Publication number
CN206628012U
CN206628012U CN201621319340.1U CN201621319340U CN206628012U CN 206628012 U CN206628012 U CN 206628012U CN 201621319340 U CN201621319340 U CN 201621319340U CN 206628012 U CN206628012 U CN 206628012U
Authority
CN
China
Prior art keywords
time
lock
people
identity information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201621319340.1U
Other languages
Chinese (zh)
Inventor
雷云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Carku Technology Co Ltd
Original Assignee
Shenzhen Ling Yun Strong Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Ling Yun Strong Network Technology Co Ltd filed Critical Shenzhen Ling Yun Strong Network Technology Co Ltd
Priority to CN201621319340.1U priority Critical patent/CN206628012U/en
Application granted granted Critical
Publication of CN206628012U publication Critical patent/CN206628012U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

This application discloses a kind of monitoring system and gate control system, the monitoring system includes:Population flow detection device and processing unit;In the course of the work, counted using the population flow detection device in the door-control lock opening time by the number of door, the processing unit is recorded in first preset time is used as checking number by the subscriber identity information number of checking, when checking number is not consistent with the number that the population flow detection device counts, think there may be idler's entrance within this door-control lock opening time, now intercept the monitor video including this door-control lock opening time and preserved, it is achieved thereby that the purpose that the video intercepting of abnormal conditions is come out, and then administrative staff are caused only to need emphasis to check the monitor video that the processing unit preserves, greatly reduce the labor intensity of administrative staff, and improve the operating efficiency for searching the monitor video for including abnormal conditions generation.

Description

Monitoring system and access control system
Technical Field
The application relates to the technical field of security and protection, and more particularly relates to a monitoring system and an access control system.
Background
Along with the continuous development of security protection technology, an access control system in an indoor place usually has a camera device to record monitoring videos of people entering and exiting the place, so that the purpose of monitoring the place in real time is achieved.
However, these access control systems usually need to be equipped with a special manager to check the monitoring video in real time, and to timely handle abnormal situations. However, as the manager needs to continuously check the monitoring video in real time, the labor intensity of the manager is high, and the omission abnormal condition is easily caused. And when the monitoring video needs to be reviewed to find the abnormal situation, the monitoring video needs to be reviewed repeatedly to find the time period of the abnormal situation from the lengthy monitoring video, and the working efficiency is low.
SUMMERY OF THE UTILITY MODEL
In order to solve the technical problem, the utility model provides a monitored control system and access control system to realize reducing managers' intensity of labour, carry out the intercepting to the surveillance video in the time quantum that the abnormal conditions took place and preserve, with the purpose that promotes work efficiency.
In order to achieve the technical purpose, the embodiment of the utility model provides a following technical scheme:
a monitoring system is applied to an access control system, wherein the access control system comprises an access control lock and a camera device; the monitoring system includes: a human flow rate detection device and a processing device, wherein,
the people flow detection device is used for counting the number of people passing through the door within the opening time of the access lock and sending the counted number of people to the processing device;
the processing device is connected with the people flow detection device and the access control system and used for acquiring user identity information and judging whether the user identity information passes verification or not, if so, the access control lock is controlled to be opened, the number of the user identity information passing the verification in a first preset time is recorded as the number of verified people, and when the number of the verified people is not consistent with the number of people counted by the people flow detection device, the monitoring video with the time of covering the opening time of the access control lock by the recording time acquired by the camera device is intercepted and stored;
the first preset time comprises the access control lock opening time, and the access control lock opening time is the time for the access control lock to open the access control lock.
Optionally, when the number of the verification persons is not consistent with the number of the persons counted by the people flow detection device, the processing device intercepts the monitoring video with the recording time obtained by the camera device covering the opening time of the access lock and stores the monitoring video, and when the number of the verification persons is smaller than the number of the persons counted by the people flow detection device, the processing device intercepts the monitoring video with the recording time obtained by the camera device covering the opening time of the access lock and stores the monitoring video.
Optionally, the processing device includes an embedded control board and a server; wherein,
the embedded control panel is used for controlling the entrance guard lock to be opened when receiving a permission instruction sent by the server, recording the number of user identity information passing verification in a first preset time as the number of verified people, and intercepting and storing a monitoring video as an abnormal video segment, wherein the recording time acquired by the camera device covers the opening time of the entrance guard lock at this time, and the monitoring video is acquired when the number of verified people is less than the number of people counted by the people flow detection device;
the server is used for comparing the acquired user identity information with a plurality of pieces of preset identity information in a preset database, judging that the user identity information passes verification when the user identity information is consistent with any one of the pieces of preset identity information, and sending the permission instruction to the embedded control panel.
Optionally, the embedded control board is further configured to upload the abnormal video segment to the server.
Optionally, the embedded control board is further configured to encrypt the abnormal video segment and set access right for processing.
Optionally, the recording time of the abnormal video segment includes a monitoring video within a second preset time after the opening time of the access lock at this time;
the length of the second preset time is greater than the opening time of the access lock.
An access control system comprising at least one monitoring system as claimed in any preceding claim.
As can be seen from the above technical solutions, the embodiment of the present invention provides a monitoring system and an access control system, wherein the monitoring system utilizes the people flow detection device to count the number of people passing through the door within the opening time of the door lock, the processing device records the number of the user identity information passing the verification in the first preset time as the number of the verified persons, when the number of the verified persons does not accord with the number of the persons counted by the people flow rate detection device, namely, it is considered that idle personnel can enter the access lock within the opening time of the access lock, and the monitoring video including the opening time of the access lock is intercepted and stored, thereby realizing the purpose of intercepting the video under abnormal conditions, and then make the managers only need focus to look over the monitoring video that processing apparatus kept can, greatly reduced managers' intensity of labour to the work efficiency of looking for the monitoring video including abnormal conditions emergence has been promoted.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a monitoring system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a monitoring system according to another embodiment of the present application;
fig. 3 is a schematic flow chart of a monitoring method according to an embodiment of the present application;
fig. 4 is a schematic flow chart of a monitoring method according to another embodiment of the present application;
fig. 5 is a schematic flow chart of a monitoring method according to another embodiment of the present application;
fig. 6 is a schematic flow chart of a monitoring method according to another embodiment of the present application;
fig. 7 is a flowchart illustrating a monitoring method according to another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. Based on the embodiments in the present invention, all other embodiments obtained by a person skilled in the art without creative work belong to the protection scope of the present invention.
The embodiment of the application provides a monitoring system, which is applied to an access control system, wherein the access control system comprises an access control lock and a camera device; as shown in fig. 1, the monitoring system includes: a human flow rate detecting device 200 and a processing device 100, wherein,
the people flow detection device 200 is used for counting the number of people passing through the door within the opening time of the access lock and sending the counted number of people to the processing device 100;
the processing device 100 is connected with the people flow detection device 200 and the access control system, and is used for acquiring user identity information, judging whether the user identity information passes verification or not, if so, controlling the access control lock to be opened, recording the number of the user identity information passing verification within a first preset time as the number of verified people, and intercepting and storing a monitoring video with the recording time acquired by the camera device covering the opening time of the access control lock when the number of the verified people does not accord with the number of people counted by the people flow detection device 200;
the first preset time comprises the access control lock opening time, and the access control lock opening time is the time for the access control lock to open the access control lock.
It should be noted that the number of the user identity information passing the verification in the first preset time recorded by the processing device 100 refers to the number of different user identity information passing the verification in the first preset time, and if only the same user identity information passes the verification for multiple times in the first preset time, the number of the verification persons is 1. For example, in the first preset time, if the user identity information passing the authentication for the first time is three, the number of the authenticators is increased by 1, if the user identity information passing the authentication for the second time is still three, the number of the authenticators is not increased and still 1, and if the user identity information passing the authentication for the third time is liqi, the number of the authenticators is increased by 1, and becomes 2. In addition, the number of the verification persons is recovered to the initial value after the access lock is closed.
The acquired user identity information may be sent by the user by scanning the two-dimensional code or by sending Near Field Communication (NFC) information or by face recognition or user unlocking or fingerprint lock. The specific sending mode of the user identity information is not limited, and is determined according to the actual situation. In addition, in an embodiment of the application, the first preset time may be a period of time starting from the processing apparatus 100 receiving the user identity information and ending with the entrance lock being opened and closed, and in this embodiment, the initial value of the number of verification persons is 0. However, in other embodiments of the present application, the first preset time may also be an end time that the user identity information passes verification as a starting point and the access lock is closed as a finishing point, and in this embodiment, the initial value of the number of verified people is 1. The specific length and the specific origin-destination of the first preset time are not limited in the present application, and are determined according to the actual situation.
It should be noted that, in an embodiment of the present application, the people flow rate detection device is disposed on the door outer side, and in other embodiments of the present application, the people flow rate detection device may also be disposed on the door inner side, or one people flow rate detection device may be disposed on both the door inner side and the door outer side. When people flow detection device sets up in the door outside, preferably infrared people flow detection device because infrared people flow detection device's detection distance is less, avoids detecting the number of people that passes through outdoors but not get into the door as the detection number of people. The application is not limited to the specific setting position of the people flow detection device, and the specific setting position is determined according to the actual situation.
The fact that the number of verified persons does not match the number of persons counted by the people flow rate detecting means includes the fact that the number of verified persons is greater than the number of persons counted by the people flow rate detecting means and the number of verified persons is less than the number of persons counted by the people flow rate detecting means.
Specifically, in a preferred embodiment of this application, processing apparatus works as verify the number of people with the number of people that flow detection device counted is not in conformity with, the intercepting the recording time that camera device acquireed covers this entrance guard's lock open time in surveillance video and save specifically to be used for, works as verify the number of people and is less than when the number of people that flow detection device counted, the intercepting the recording time that camera device acquireed covers this entrance guard's lock open time in surveillance video and save.
Because the condition that the number of the verification persons is larger than the number of the persons counted by the person flow detection device is possibly caused by the fact that a certain user passes the verification but does not enter the device due to some reasons, and the condition that idle persons enter the device at the tail does not exist, the monitoring videos under the condition are not stored in the embodiment, the number of the stored monitoring videos is further reduced, the labor intensity of managers is further reduced, and the work efficiency of searching the monitoring videos including abnormal conditions is improved.
On the basis of the above embodiments, in one embodiment of the present application, as shown in fig. 2, the processing device 100 includes an embedded control board 101 and a server 102; wherein,
the embedded control board 101 is configured to control the access lock to be opened when receiving a permission instruction sent by the server 102, record the number of user identity information passing verification within a first preset time as a verification number, and intercept, when the verification number is smaller than the number of people counted by the people flow detection device 200, a monitoring video with recording time covering the access lock opening time of this time, acquired by the camera device, as an abnormal video segment and store the abnormal video segment;
the server 102 is configured to compare the acquired user identity information with a plurality of pieces of preset identity information in a preset database, determine that the user identity information is verified when the user identity information is consistent with any one of the pieces of preset identity information, and send the permission instruction to the embedded control board 101.
It should be noted that, the manner for the server 102 to obtain the user identity information may be that a user directly logs in the server 102 by scanning a two-dimensional code, and the server 102 obtains the user identity information by recognizing the two-dimensional code. However, in other embodiments of the present application, the user identity information acquired by the server 102 may also be sent by the embedded control board, and the user identity information acquired by the embedded control board may be NFC information sent by a user or a password or a fingerprint or a face feature or a pupil feature input by the user. The present application does not limit this, which is determined by the actual situation.
It should be further noted that the preset identity information in the preset database may be pre-stored in the server 102 to set the access right, and the preset identity information in the preset database may also be added or deleted during the use of the monitoring system.
On the basis of the above embodiment, in another embodiment of the present application, the embedded control board 101 is further configured to upload the abnormal video segment to the server 102.
It should be noted that, in general, the abnormal video segment is intercepted by the embedded control board 101 and then stored in a storage device embedded in the embedded control board 101, where the storage device includes, but is not limited to, a memory Card, a flash memory Card, and a TF Card (Trans-flash Card). In this embodiment, the embedded control board 101 uploads the abnormal video segment to the server 102 for storage, so as to avoid the situation that the abnormal video segment is covered due to limited capacity in the storage device. In addition, in a preferred embodiment of the present application, the time for the embedded control board 101 to upload the abnormal video segment is preferably when the server 102 and the network between the server 102 and the embedded control board 101 are in an idle state, so as to avoid occupying a large amount of resources of the server 102 and the network during a busy period.
On the basis of the above embodiment, in another embodiment of the present application, the embedded control board 101 is further configured to encrypt the abnormal video segment and set an access right for processing.
In this embodiment, because the embedded control board 101 encrypts and sets the access right to the abnormal video segment, not only the situation that the abnormal video segment is covered due to the limited capacity in the storage device of the embedded control board 101 is avoided, but also the purpose of keeping the abnormal video segment secret is achieved, and the situation that other people except the administrator operate the abnormal video segment is avoided.
On the basis of the above embodiment, in another embodiment of the present application, the recording time of the abnormal video segment includes a monitoring video within a second preset time after the opening time of the access lock at this time;
the length of the second preset time is greater than the opening time of the access lock.
It should be noted that the value of the second preset time may be manually set by a manager, for example, 10 minutes, 5 minutes, or 2 minutes, which is not limited in this application and is determined according to the actual situation.
Correspondingly, the embodiment of the application also provides a monitoring method, which is applied to an access control system, wherein the access control system comprises an access control lock, a camera device, an identity verification device and the monitoring system of any one of the embodiments; as shown in fig. 3, the monitoring method includes:
s101: the people flow detection device of the monitoring system counts the number of people passing through the door within the opening time of the access lock and sends the counted number of people to the processing device;
s102: the processing device acquires user identity information and judges whether the user identity information passes verification;
if so, controlling the access lock to be opened, and recording the number of the user identity information passing the verification within the first preset time as the number of the verified persons; the first preset time comprises the opening time of the entrance guard lock, and the opening time of the entrance guard lock is the time from the opening of the entrance guard lock to the closing of the entrance guard lock;
and when the number of the verification persons is not consistent with the number of persons counted by the people flow detection device, intercepting and storing the monitoring video with the recording time obtained by the camera device covering the opening time of the access lock.
It should be noted that the number of the user identity information passing the verification within the first preset time recorded in step S102 is the number of different user identity information passing the verification within the first preset time, and if only the same user identity information passes the verification for multiple times within the first preset time, the number of the verification persons is 1. For example, in the first preset time, if the user identity information passing the authentication for the first time is three, the number of the authenticators is increased by 1, if the user identity information passing the authentication for the second time is still three, the number of the authenticators is not increased and still 1, and if the user identity information passing the authentication for the third time is liqi, the number of the authenticators is increased by 1, and becomes 2. In addition, the number of the verification persons is recovered to the initial value after the access lock is closed.
In step S102, the acquired user identity information may be sent by the user by scanning a two-dimensional code or by sending Near Field Communication (NFC) information or by face recognition or user unlock or fingerprint lock. The specific sending mode of the user identity information is not limited, and is determined according to the actual situation. In addition, in an embodiment of the application, the first preset time may be a period of time that starts from receiving the user identity information and ends at the time when the access lock is opened and closed, and in this embodiment, an initial value of the number of verification persons is 0. However, in other embodiments of the present application, the first preset time may also be an end time that the user identity information passes verification as a starting point and the access lock is closed as a finishing point, and in this embodiment, the initial value of the number of verified people is 1. The specific length and the specific origin-destination of the first preset time are not limited in the present application, and are determined according to the actual situation.
It should be noted that the case where the number of the verification persons does not match the number of the persons counted by the people flow rate detection device includes the case where the number of the verification persons is greater than the number of the persons counted by the people flow rate detection device and the case where the number of the verification persons is less than the number of the persons counted by the people flow rate detection device.
Specifically, in a preferred embodiment of the present application, as shown in fig. 4, when the number of verification persons does not match the number of persons counted by the people flow rate detection device, intercepting and storing the monitoring video whose recording time obtained by the camera device covers the opening time of the access lock at this time includes:
and when the number of the verification persons is smaller than the number of the persons counted by the people flow detection device, intercepting the monitoring video with the recording time obtained by the camera device covering the opening time of the access lock and storing the monitoring video.
Because the condition that the number of the verification persons is larger than the number of the persons counted by the person flow detection device is possibly caused by the fact that a certain user passes the verification but does not enter the device due to some reasons, and the condition that idle persons enter the device at the tail does not exist, the monitoring videos under the condition are not stored in the embodiment, the number of the stored monitoring videos is further reduced, the labor intensity of managers is further reduced, and the work efficiency of searching the monitoring videos including abnormal conditions is improved.
On the basis of the foregoing embodiment, in an embodiment of the present application, the determining whether the user identity information passes the verification includes:
and comparing the user identity information with a plurality of pieces of preset identity information in a preset database, and judging that the user identity information passes the verification when the user identity information is consistent with any one of the pieces of preset identity information.
It should be noted that the preset identity information in the preset database may be preset to set the access control authority, and the preset identity information in the preset database may also be added or deleted at any time.
On the basis of the foregoing embodiment, in another embodiment of the present application, as shown in fig. 5, after the capturing and recording time obtained by the camera device to cover the monitored video within the opening time of the current access lock and storing the monitored video, the method further includes:
s103: and uploading the abnormal video segment to a server.
It should be noted that, in general, the abnormal video segment is intercepted and stored in a local storage device, which includes but is not limited to a memory Card, a flash memory Card, and a TF Card (Trans-flash Card). In this embodiment, the abnormal video segment is uploaded to the server for storage, so as to avoid the situation that the abnormal video segment is covered due to limited capacity in the storage device. In addition, in a preferred embodiment of the present application, the time for uploading the abnormal video segment is preferably when the server and the network between the server and the local are in an idle state, so as to avoid occupying a large amount of resources of the server and the network during a busy period.
On the basis of the foregoing embodiment, in another embodiment of the present application, as shown in fig. 6, after the capturing and recording time obtained by the camera device to cover the monitored video within the opening time of the current access lock and storing the monitored video, the method further includes:
s1023: and encrypting the abnormal video segment and setting access authority for processing.
In this embodiment, because the abnormal video segment is encrypted and the access right is set, the situation that the abnormal video segment is covered due to limited capacity in the local storage device is avoided, the purpose of keeping the abnormal video segment secret is achieved, and the situation that other people except the administrator operate the abnormal video segment is avoided.
On the basis of the above embodiment, in another embodiment of the present application, the recording time of the abnormal video segment includes a monitoring video within a second preset time after the opening time of the access lock at this time;
the length of the second preset time is greater than the opening time of the access lock.
It should be noted that the value of the second preset time may be manually set by a manager, for example, 10 minutes, 5 minutes, or 2 minutes, which is not limited in this application and is determined according to the actual situation.
On the basis of the foregoing embodiment, in a specific preferred embodiment of the present application, as shown in fig. 7, the recording the number of the user identity information passing the verification within the first preset time as the number of the verified persons includes:
and judging whether the number of people passing through the door in the time of opening the access lock is changed or not in a third preset time from the moment when the first user identity information passing through the verification passes through the verification in the first preset time, if so, taking the number of the user identity information passing through the verification in the first preset time as the number of verification people, and if not, taking the number of the user identity information passing through the verification in the first preset time as an invalid number.
In this embodiment, counting the number of persons who pass the verification but do not enter the door as the number of verified persons can be effectively avoided, and the situation that the counting of the number of verified persons is inaccurate is avoided.
Correspondingly, an access control system is further provided in an embodiment of the present application, and includes at least one monitoring system as described in any of the above embodiments.
In summary, the embodiment of the present application provides a monitoring system and an access control system, wherein the monitoring system utilizes the people flow rate detection device to count the number of people passing through the door within the opening time of the access control lock, utilizes the processing device to record the number of the user identification information passing through the verification within the first preset time as the number of the verified people, when the number of the verified people is not consistent with the number of people counted by the people flow rate detection device, namely, the aim of intercepting the video of abnormal conditions is fulfilled by intercepting and storing the monitoring video including the opening time of the access lock at the time when idle personnel can enter the access lock within the opening time of the access lock, and then make the managers only need focus to look over the monitoring video that processing apparatus kept can, greatly reduced managers' intensity of labour to the work efficiency of looking for the monitoring video including abnormal conditions emergence has been promoted.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A monitoring system is characterized by being applied to an access control system, wherein the access control system comprises an access lock and a camera device; the monitoring system includes: a human flow rate detection device and a processing device, wherein,
the people flow detection device is used for counting the number of people passing through the door within the opening time of the access lock and sending the counted number of people to the processing device;
the processing device is connected with the people flow detection device and the access control system and used for acquiring user identity information and judging whether the user identity information passes verification or not, if so, the access control lock is controlled to be opened, the number of the user identity information passing the verification in a first preset time is recorded as the number of verified people, and when the number of the verified people is not consistent with the number of people counted by the people flow detection device, the monitoring video with the time of covering the opening time of the access control lock by the recording time acquired by the camera device is intercepted and stored;
the first preset time comprises the access control lock opening time, and the access control lock opening time is the time for the access control lock to open the access control lock.
2. The monitoring system according to claim 1, wherein the processing device intercepts and stores the monitoring video whose recording time covers the opening time of the access lock when the number of the verification persons does not match the number of the persons counted by the people flow rate detection device, and specifically, intercepts and stores the monitoring video whose recording time covers the opening time of the access lock when the number of the verification persons is smaller than the number of the persons counted by the people flow rate detection device.
3. The monitoring system of claim 1, wherein the processing device comprises an embedded control board and a server; wherein,
the embedded control panel is used for controlling the entrance guard lock to be opened when receiving a permission instruction sent by the server, recording the number of user identity information passing verification in a first preset time as the number of verified people, and intercepting and storing a monitoring video as an abnormal video segment, wherein the recording time acquired by the camera device covers the opening time of the entrance guard lock at this time, and the monitoring video is acquired when the number of verified people is less than the number of people counted by the people flow detection device;
the server is used for comparing the acquired user identity information with a plurality of pieces of preset identity information in a preset database, judging that the user identity information passes verification when the user identity information is consistent with any one of the pieces of preset identity information, and sending the permission instruction to the embedded control panel.
4. The monitoring system according to claim 3, wherein the embedded control board is further configured to upload the abnormal video segment to the server.
5. The monitoring system according to claim 3, wherein the embedded control board is further configured to encrypt the abnormal video segment and set an access right.
6. The monitoring system according to claim 3, wherein the recording time of the abnormal video segment comprises a monitoring video within a second preset time after the opening time of the access lock;
the length of the second preset time is greater than the opening time of the access lock.
7. An access control system, characterized in that it comprises at least one monitoring system according to any one of claims 1-6.
CN201621319340.1U 2016-12-01 2016-12-01 A kind of monitoring system and gate control system Active CN206628012U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621319340.1U CN206628012U (en) 2016-12-01 2016-12-01 A kind of monitoring system and gate control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621319340.1U CN206628012U (en) 2016-12-01 2016-12-01 A kind of monitoring system and gate control system

Publications (1)

Publication Number Publication Date
CN206628012U true CN206628012U (en) 2017-11-10

Family

ID=60212290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621319340.1U Active CN206628012U (en) 2016-12-01 2016-12-01 A kind of monitoring system and gate control system

Country Status (1)

Country Link
CN (1) CN206628012U (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447879A (en) * 2016-12-01 2017-02-22 深圳翎云思创网络科技有限公司 Monitoring system, monitoring method and door control system
CN108305363A (en) * 2018-01-31 2018-07-20 上海与德通讯技术有限公司 The monitoring method and intelligent terminal in group rental room
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN113450483A (en) * 2021-06-25 2021-09-28 广州欧轩网络科技有限公司 Gate control system
CN114554162A (en) * 2022-03-07 2022-05-27 中国工商银行股份有限公司 Video monitoring method, device, computer equipment and storage medium
CN115174769A (en) * 2022-06-20 2022-10-11 武汉虹信技术服务有限责任公司 Intelligent access control record generation method and access control system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447879A (en) * 2016-12-01 2017-02-22 深圳翎云思创网络科技有限公司 Monitoring system, monitoring method and door control system
CN108305363A (en) * 2018-01-31 2018-07-20 上海与德通讯技术有限公司 The monitoring method and intelligent terminal in group rental room
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN109272613B (en) * 2018-08-27 2021-08-27 深圳市便易通科技有限公司 Sensor and video linked Internet of things safety electronic access control system
CN113450483A (en) * 2021-06-25 2021-09-28 广州欧轩网络科技有限公司 Gate control system
CN114554162A (en) * 2022-03-07 2022-05-27 中国工商银行股份有限公司 Video monitoring method, device, computer equipment and storage medium
CN115174769A (en) * 2022-06-20 2022-10-11 武汉虹信技术服务有限责任公司 Intelligent access control record generation method and access control system

Similar Documents

Publication Publication Date Title
CN206628012U (en) A kind of monitoring system and gate control system
CN106447879A (en) Monitoring system, monitoring method and door control system
JP6911154B2 (en) Access control methods and devices, systems, electronic devices, programs and media
CN105869248A (en) Access control cloud management system and method based on face recognition
CN109767534B (en) Access control access method, system, management terminal and access control terminal based on block chain
US20170109950A1 (en) Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
CA2713320C (en) Method and apparatus for detecting behavior in a monitoring system
CN108269337A (en) A kind of dynamic human face identification gate control system
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
KR102243963B1 (en) System for managing attendance using face recognition
KR100965428B1 (en) The system and operating method using two different positioned intelligent cameras for automatic verification of authenticated person's entrance
US20120032781A1 (en) Remote personal authentication system and method using biometrics
CN101847279A (en) Network human face recognition system with intelligent management system and recognition method thereof
KR102490323B1 (en) System and method for access control using blockchain network and computer program for the same
CN106846557B (en) The access control management method realized by wireless router
CN105447931A (en) Remote access control authorization method, device and system
KR101046655B1 (en) Entrance control apparatus, entrance control system, and entrance control method for crime prevention
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN110930574A (en) Access control method and system and intelligent device
KR102153880B1 (en) Entering and Leaving Management System by Face Certification at office and Method thereof
KR20170013597A (en) Method and Apparatus for Strengthening of Security
JP2020205117A (en) Face authentication device
KR102069567B1 (en) Structured Cabling System Using Biometric Authentication
CN105825559A (en) Access control system, control equipment, image collecting device, and access control method
CN107590888A (en) A kind of building are registered one's residence gate control system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191108

Address after: 518000 Tongsheng Community, Dalang Street, Longhua District, Shenzhen City, Guangdong Province, 2 buildings 202

Patentee after: Shenzhen Carku Technology Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A (located in Shenzhen Qianhai business secretary Co. Ltd.)

Patentee before: Shenzhen Ling Yun strong network technology Co. Ltd.

TR01 Transfer of patent right