Access control system based on body shape
Technical Field
The utility model relates to a face identification technique, DSP technique, eyeball identification technique, fingerprint identification technique, voice recognition technique, IP data transmission technique and wireless data transmission technique are applied to entrance guard's management, belong to city security protection control field, especially relate to an entrance guard management system and method based on health form.
Background
The entrance guard management system is developed in order to meet the requirements of people on higher-level safety and intelligent management of modern office and living places, and the main idea is to improve the management efficiency of enterprises and ensure the public safety of the enterprises. Setting management levels and distributing management responsibilities through hierarchical management; through authority management, personnel types are distinguished, and the safety of an entrance is ensured; the work flow is simplified and the like through attendance management and standardization of an attendance system. At present, the access control management system is widely applied to various occasions such as factories, schools, residential districts, financial systems, telecommunication systems, military systems and the like, and the overall working efficiency and the system safety management requirements are greatly improved.
At present, domestic identity recognition aiming at access control management mainly comprises the following steps:
a system represented by a radio frequency card mainly uses 'things' as medium identification, and basically, the method verifies that the person holds certain 'things' instead of verifying the person per se. As long as the validity of the "object" is confirmed, the identity of the person holding the "object" is also confirmed. The loophole existing in the method of recognizing people by 'things' is obvious: the loss of the 'article' can lead the legal person to be not authenticated, and the theft of the 'article' can prevent the illegal person from being legally verified.
(II) biometric feature recognition: such as fingerprints, irises, faces, voice and the like, the body characteristics or the individual behavior characteristics of the user are mainly measured by adopting an automatic technology, and the characteristics or the characteristics are compared with template data of a database to finish a solution of authentication.
Fingerprint identification: among all human biometrics used for individual identification, fingerprint features were first discovered and applied. Each time a fingerprint is used, fingerprints of the user are left on the fingerprint acquisition head, and the fingerprints have the possibility of being used for copying; in addition, some people or groups have few fingerprint features and are difficult to image, so that multiple identification is needed or cannot be realized.
Iris recognition: at present, iris identification is not tested at all, only a small-scale test is carried out by using a statistical principle, and a unique authentication experiment in the real world is not carried out; meanwhile, the requirement on a light source is very high, the material required by the equipment is expensive, the cost performance is low, and the black eyes are extremely difficult to read;
and (3) voice recognition: sound is too wide to be matched precisely because of the large range of variation; the sound can affect the result of collection and comparison with the change of volume, speed and tone quality (for example, when you are cold); while voice recognition tends to fool the voice recognition system with recorded voice on magnetic tape.
Face recognition: the human face has a variable shape due to different expressions, and the visual images of the human face are greatly different at different observation angles, and in addition, the face recognition is also influenced by various factors such as illumination conditions (such as day and night, indoor and outdoor, and the like), many coverings of the human face (such as a mask, sunglasses, hair, beard, and the like), age, and the like.
Therefore, one technical problem that needs to be urgently solved by those skilled in the art is: the entrance guard is provided, the personal identity is comprehensively judged and identified, the uniqueness of the personal identity is confirmed, the possibility of identity misjudgment is effectively reduced, and the comprehensive management efficiency is improved.
SUMMERY OF THE UTILITY MODEL
The technical problem is as follows: an object of the utility model is to provide an entrance guard management system based on health form through synthesizing a plurality of morphological characteristics of human body, carries out comprehensive judgement discernment to individual identity, confirms individual identity's uniqueness, effectively reduces the possibility that identity erroneous judgement, improves comprehensive management efficiency.
The technical scheme is as follows: in order to achieve the above object, the utility model provides a following technical scheme:
the utility model discloses an entrance guard management system based on body shape, which comprises a body shape recognition device, an identity recognition system, an entrance guard management system, an entrance guard controller and an electric control lock which are connected in sequence; wherein,
body shape recognition device: the system comprises a fingerprint detection device, a human face detection device, an iris detection device, an identity recognition system and a voice recognition system, wherein the fingerprint detection device is used for acquiring identity information through fingerprint detection equipment, human face detection equipment, iris detection equipment and voice detection equipment, processing the identity information according to a preset rule, generating corresponding body shape recognition information and sending the body shape recognition information to the identity recognition system for identity confirmation;
an identity recognition system: the system is used for receiving the body form identification information, comparing and judging the body form identification information with corresponding information stored in a body form information base and confirming identity information;
entrance guard management system: the system comprises a front-end access controller, a front-end access controller and a central processing unit, wherein the front-end access controller is used for receiving identity identification information sent by an identity identification system, converting the identity identification information into a control signal and sending the control signal to the front-end access controller;
entrance guard controller: and the control circuit is used for receiving the control signal, converting the control signal into a driving signal, and sending the driving signal to the electric control lock for unlocking operation.
Wherein:
the identity recognition system is respectively connected with a communication interface, a data transceiving module, a management module and a data analysis module;
communication interface: the interface protocol is used for carrying out data butt joint with the identification equipment and adopts a standard interface protocol;
a data receiving and transmitting module: the system comprises a body shape information acquisition device, a body shape information storage device and an access control management system, wherein the body shape information acquisition device is used for acquiring body shape information data provided by the identification device and transmitting an identity identification result to the access control management system;
a management module: the system is used for providing functions of authority management, data query, data statistics and the like;
a data analysis module: the system is used for carrying out identity recognition judgment on the received body shape information data.
The gate inhibition controller main control unit adopts a DSP chip and is respectively connected with a power supply module, a pulse control module, a data transceiving module, a phase receiving and converting module and a relay module,
a power supply module: a 5-24V direct current power supply is adopted;
the pulse control module: the pulse control signal is used for sending a pulse control signal to the electric control lock;
a data receiving and transmitting module: the system comprises a control module, a data processing module and a data processing module, wherein the control module is used for receiving a control signal sent by an access control management system;
the phase receiving and converting module: the control signal is converted into a pulse signal, and meanwhile, clutter interference signals on a line are eliminated;
a relay module: the method is used for realizing signal amplification and preventing the signal distortion phenomenon caused by overlong transmission lines.
The utility model discloses an entrance guard management method of entrance guard management system based on health form, entrance guard management method includes:
the entrance guard management system collects the body morphological characteristics of the person to be passed through body recognition equipment, the body recognition equipment acquires body information through detection equipment of fingerprints, human faces, irises and sounds, the body information is processed according to a preset method to generate corresponding identity information, the corresponding body morphological characteristics are converted into data information, and the data information is sent to an identity recognition system;
the identity recognition system receives the body shape recognition information, compares the body shape recognition information with corresponding information stored in a body shape information base for judgment, judges the identity according to a preset recognition scheme by the identity recognition system, and sends the judgment result to the access control management system;
and the door control management system performs data conversion on the judgment result, converts the judgment result into a control signal which can be recognized by the door control controller, and the door control controller converts the received control signal into a driving signal to control the front-end electric lock to perform unlocking operation.
Has the advantages that: compared with the prior art, the beneficial effects of the utility model are that:
1. the utility model provides a pair of entrance guard management system based on health form, the discernment rate of accuracy is higher, has stopped the possibility of making a fake basically, has effectively improved safety control efficiency.
2. The utility model provides a 30 kinds of judgement control scheme supplies the user to select, satisfies user's customization demand.
3. The utility model discloses humanized multiple intelligent recognition mode of access control management system can promote convenient to use nature greatly.
4. The utility model discloses access control management system need not the contact when using, accords with the human habit of discerning, and is effectual to be safe, convenient integration.
Drawings
Fig. 1 is a schematic view of the access control system.
Fig. 2 is a schematic view of a body shape information acquisition process.
Fig. 3 is a schematic view of a body shape information recognition process.
FIG. 4 is a schematic diagram of the decision logic.
FIG. 5 is a diagram of a software framework of an identification system.
Fig. 6 is a hardware frame diagram of the door controller.
Fig. 7 is a body shape access control detection data flow diagram.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
(one) as shown in fig. 1, the utility model provides a pair of entrance guard management system based on health form, carry out health form characteristic through personnel to preparing through health identification equipment and gather, convert corresponding health form characteristic into data message, send for identification system, carry out identity judgment by identification system according to predetermined identification scheme, send the judged result for entrance guard management system, carry out data conversion to the judged result by entrance guard management system, convert the control signal that can be discerned by entrance guard controller, entrance guard controller converts the control signal who receives into pulse signal, the control front end electric control lock carries out the unblock operation.
And (II) as shown in fig. 2, the identity recognition device acquires identity information through detection devices such as fingerprints, human faces, irises, voices and the like, analyzes the identity information according to a preset rule, generates corresponding identity information, and sends the identity information to an identity recognition system for identity confirmation. The specific acquisition flow is shown in fig. 2.
And (III) the identity recognition system receives the front-section body form recognition information, compares and judges the front-section body form recognition information with corresponding information stored in a body form information base, and confirms identity information. The specific identification process and the judgment logic are shown in fig. 3 and 4.
And (4) comparing the results:
and 30 judgment schemes are provided in the comparison result scheme. The client can customize and select a single or multiple combined schemes to carry out access control management according to personalized requirements. The specific judgment scheme is shown in the following table.
And (IV) after receiving the identity recognition information sent by the identity recognition system, the access control management system performs signal conversion, converts the identity recognition information into a control signal and sends the control signal to the front-end access controller.
And (V) the access controller is responsible for receiving the control signal, converting the control signal into a pulse signal and sending the pulse signal to the electric control lock for unlocking.
Sixthly, as shown in fig. 5, the identity recognition system software is developed by adopting a C language, wherein a communication interface adopts a standard interface protocol, so that data butt joint with recognition equipment is facilitated; the data transceiver module is responsible for receiving the body form information data provided by the identification equipment and sending an identity identification result to the access control management system; the management module mainly provides functions of authority management, data query, data statistics and the like; the data analysis module is mainly used for carrying out identity recognition judgment on the received body shape information data.
Seventhly, as shown in fig. 6, the access controller controls the main control unit to adopt a DSP chip, and the power supply module adopts a 5-24V direct-current power supply; the pulse control module is mainly used for sending a pulse control signal to the electric control lock; the data transceiver module is responsible for receiving a control signal sent by the access control management system; the phase receiving and converting module is mainly responsible for converting the control signal into a pulse signal and eliminating clutter interference signals on a line; the relay module realizes signal amplification and prevents signal distortion caused by overlong transmission line.
(eight) as shown in fig. 7, carry out the health form characteristic to preparing through personnel through front end body recognition equipment and gather, convert corresponding health form characteristic into data message, send to identification system, carry out identity judgement by identification system according to the predetermined identification scheme, send the judged result for access control management system, carry out data conversion to the judged result by access control management system, convert the control signal that can be discerned by access control ware, access control ware converts the control signal received into pulse signal, control front end electric lock carries out the unblock operation.
Example 1
Information acquisition process introduction
A) A system administrator takes staff to enter the access control barrier management system; the method comprises the following steps that (1) an employee inputs name information and a preset password according to the requirement of an administrator;
B) the system analyzes and judges the input preset password according to the password setting rule, judges whether the preset character password is successful, if so, performs matching storage on the name information and the preset password, and executes the step C; otherwise, continuing to execute the information acquisition judgment operation of the step;
C) after the user sets the password, the system collects face biological characteristic data of the current user through the intelligent video terminal, meanwhile, establishes a one-to-one corresponding relation between the current face biological characteristic data and preset password information, and executes the step D, otherwise, continuously executes the information collection judgment operation of the step;
D) the system collects the voice characteristic signals of the user through the intelligent voice recognition terminal, establishes a one-to-one correspondence relationship with the preset password and the face characteristic data, and executes the step E, otherwise, continues to execute the information collection judgment operation of the step;
E) the system collects the iris characteristic signals of the user through the intelligent iris recognition terminal, establishes a one-to-one corresponding relation with the preset password, the face characteristic number and the voice characteristic data, and executes the step F, otherwise, continues to execute the information collection judgment operation of the step;
F) the system collects fingerprint characteristic signals of a user through an intelligent fingerprint identification terminal, establishes a one-to-one correspondence relationship with preset passwords, face characteristic numbers, voice characteristic data and iris characteristic data, and executes the step G, otherwise, continues to execute the information collection judgment operation of the step;
G) the system stores the acquired name information, the preset password, the fingerprint characteristic data, the face characteristic data, the voice characteristic data and the iris characteristic data respectively, and meanwhile establishes corresponding connection relations, so that the system is convenient to judge, identify and call in the later period.
(II) introduction of information judgment process
1. A client enters an entrance guard management channel, inputs a preset password and enters an entrance guard management system;
2. the identity recognition equipment acquires identity information through detection equipment such as fingerprints, human faces, irises and voices, analyzes the identity information according to a preset rule, generates corresponding identity information and sends the identity information to an identity recognition system for identity confirmation. The specific acquisition flow is shown in fig. 2.
3. And the identity recognition system receives the front-section body form recognition information, compares and judges the front-section body form recognition information with corresponding information stored in the body form information base, and confirms identity information. The specific identification process and judgment scheme are shown in fig. 3, fig. 4 and fig. 5.
(III) specific identification step:
A) a user inputs a preset password and starts to enter an entrance guard identity recognition program;
B) the system calls a pre-stored password in a preset password information base, compares the pre-stored password with a password input by a user, prompts the user to perform a voice recognition program if the judgment is successful, otherwise prompts the user to re-input the password, and simultaneously the re-recognition system automatically records the recognition times, and if the recognition times exceed a certain number, the step G is executed;
C) the front-segment voice recognition intelligent terminal recognizes the voice characteristics of the user, analyzes the voice characteristic information, compares and judges the voice characteristic information with prestored voice data, successfully prompts the user to enter a fingerprint recognition program, otherwise prompts the user to perform voice recognition again, and simultaneously, a re-recognition system automatically records the recognition times, and if the recognition times exceed a certain number, the step G is executed;
D) the front-segment fingerprint identification intelligent terminal identifies the fingerprint characteristics of a user, analyzes fingerprint characteristic information, compares and judges the fingerprint characteristics with prestored fingerprint data, successfully prompts the user to enter a face identification program, otherwise prompts the user to re-fingerprint, and simultaneously a re-identification system automatically records the identification times, and if the identification times exceed a certain number, the step G is executed;
E) the front-segment face recognition intelligent terminal recognizes the face features of the user, analyzes face feature information, compares and judges the face features with prestored face data, successfully prompts the user to enter an iris recognition program, otherwise prompts the user to perform face recognition again, and simultaneously a re-recognition system automatically records recognition times, and if the recognition times exceed a certain number, executes the step G;
F) the front-stage iris recognition intelligent terminal recognizes iris features of a user, analyzes iris feature information, compares and judges the iris feature information with prestored iris data, if the judgment is successful, the step H is executed, otherwise, the iris recognition is prompted to be carried out again, meanwhile, a re-recognition system can automatically record recognition times, and if the recognition times exceed a certain number, the step G is executed;
G) judging whether the decryption times exceed the preset times, if so, sending an alarm signal by the access control barrier management system; otherwise, only the required identification program is needed to be executed;
H) the front-end intelligent terminal selects a judgment scheme (the detailed content of the selection scheme is shown in a comparison result scheme) according to the identification success information, and after the scheme is successfully selected, the identification result is sent to the access control system, and the access control system opens or closes the access control.