CN219017029U - Authority authentication system - Google Patents

Authority authentication system Download PDF

Info

Publication number
CN219017029U
CN219017029U CN202320074116.4U CN202320074116U CN219017029U CN 219017029 U CN219017029 U CN 219017029U CN 202320074116 U CN202320074116 U CN 202320074116U CN 219017029 U CN219017029 U CN 219017029U
Authority
CN
China
Prior art keywords
space
rfid reader
authentication system
target user
entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202320074116.4U
Other languages
Chinese (zh)
Inventor
李春玲
杨正
陆建胜
胡伟伟
谢一龙
杨振华
乜建龙
侯晓康
窦玉琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Shunxin Pharmaceutical Co Ltd
Original Assignee
Nanjing Shunxin Pharmaceutical Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Shunxin Pharmaceutical Co Ltd filed Critical Nanjing Shunxin Pharmaceutical Co Ltd
Application granted granted Critical
Publication of CN219017029U publication Critical patent/CN219017029U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model relates to the technical field of security authentication, and discloses a permission authentication system, which comprises: the system comprises a biological identification device and a zeroth RFID reader, wherein the biological identification device is arranged at an inlet of a first space and used for carrying out first authority authentication on a target user, and the zeroth RFID reader is used for reading information of an RFID tag carried by the target user; the first RFID readers are arranged at the inlets of the second spaces and used for carrying out second authority authentication on the target user, and the second spaces are arranged inside the first spaces. According to the embodiment of the utility model, the biological identification equipment and the zeroth RFID reader are arranged at the entrance of the first space, and the first RFID reader is arranged at the entrance of each second space inside the first space, so that double identity authentication can be performed on users needing to enter each second space, the safety is improved, and the authority authentication can be effectively performed.

Description

Authority authentication system
Technical Field
The utility model relates to the technical field of security authentication, in particular to a permission authentication system.
Background
At present, places requiring face protection and even whole body protection, such as pharmaceutical workshops, operating rooms and the like, are shielded by masks, eyes are shielded by masks, hands are provided with rubber gloves, therefore, fingerprints and face recognition are unavailable, the accuracy of iris recognition is low, the related technology generally adopts non-biological recognition technologies such as access cards or handrings to carry out authority authentication, and the related technology is seen to face the technical problems that the safety is poor and effective authority authentication cannot be carried out.
Disclosure of Invention
Based on the above technical problem, according to an aspect of the present utility model, there is provided a rights authentication system, the system including:
the biological identification device and the zeroth RFID reader are arranged at the entrance of the first space;
the first RFID readers are arranged at the inlets of the second spaces, and the second spaces are arranged inside the first spaces.
In one possible embodiment, the biometric device comprises at least one of a facial recognition machine, a fingerprint recognition machine, or an iris recognition machine.
In one possible embodiment, a first access control is provided at the entrance of the first space, and a second access control is provided at the entrance of each second space.
In one possible embodiment, the system further comprises:
the alarm devices are respectively arranged at the inlet of the first space and the inlet of each second space.
In one possible embodiment, the system further comprises:
and an input device connected to the first RFID reader.
In one possible embodiment, the system further comprises:
a second RFID reader is disposed at an exit of a third space, the third space being within the first space and near the exit of the first space.
In a possible embodiment, the biometric device is further used for taking a photograph of the target user.
In one possible embodiment, the system further comprises:
and the controller is connected with the biological identification device and the first RFID reader.
In one possible embodiment, the second space includes a target user entering a location where a face, hand, or the like is to be masked.
In a possible embodiment, the second space comprises a pharmaceutical shop, an operating room.
According to the embodiment of the utility model, the biological identification equipment and the zeroth RFID reader are arranged at the entrance of the first space, and the first RFID reader is arranged at the entrance of each second space inside the first space, so that double identity authentication can be performed on users needing to enter each second space, the safety is improved, and the authority authentication can be effectively performed.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the utility model as claimed. Other features and aspects of the present utility model will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the utility model and together with the description, serve to explain the principles of the utility model.
Fig. 1 shows a schematic diagram of a rights authentication system according to an embodiment of the utility model.
Detailed Description
Various exemplary embodiments, features and aspects of the utility model will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
In the description of the present utility model, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate describing the present utility model and simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and therefore should not be construed as limiting the present utility model.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present utility model, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the present utility model, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the above terms in the present utility model can be understood by those of ordinary skill in the art according to the specific circumstances.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better illustration of the utility model. It will be understood by those skilled in the art that the present utility model may be practiced without some of these specific details. In some instances, well known methods, procedures, components, and circuits have not been described in detail so as not to obscure the present utility model.
Fig. 1 shows a schematic diagram of a rights authentication system according to an embodiment of the utility model.
As shown in fig. 1, the system includes:
the system comprises a biological identification device 30 and a zeroth RFID reader 40, which are arranged at the entrance of a first space 10, wherein the biological identification device 30 is used for carrying out first authority authentication on a target user, and the zeroth RFID reader 40 is used for reading information of an RFID tag carried by the target user;
the first RFID reader 50 is disposed at an entrance of each second space 20, and is configured to perform second authority authentication on the target user, where each second space 20 is inside the first space 10.
According to the embodiment of the utility model, the biological identification equipment 30 and the zeroth RFID reader 40 are arranged at the entrance of the first space 10, and the first RFID reader 50 is arranged at the entrance of each second space 20 in the first space 10, so that double identity authentication can be performed on users needing to enter each second space 20, the security is improved, and the authority authentication can be effectively performed.
The type of the biometric device 30 is not limited, and a specific implementation manner of performing the first authority authentication on the biometric device 30 is not limited, and a person skilled in the art may use a biometric device 30 mature in the market, such as a face recognition machine, a fingerprint recognition machine, or an iris recognition machine, to perform the first authority authentication, for example, the face recognition machine may collect a facial image of a target user and match with facial information in a database to perform face recognition; for example, the fingerprint recognition machine can collect the fingerprint of the target user and match the fingerprint in the database to perform fingerprint recognition; for example, the iris recognition machine may acquire iris images of the target user and match iris information in a database to perform iris recognition. The specific implementation modes of face recognition, fingerprint recognition and iris recognition by the face recognition machine, the fingerprint recognition machine or the iris recognition machine are not limited, and as the face recognition scheme, the fingerprint recognition scheme and the iris recognition scheme already exist in the prior art, a person skilled in the art can adopt the face recognition scheme, the fingerprint recognition scheme and the iris recognition scheme in the prior art to carry out first authority authentication, so that the embodiment of the utility model is not limited.
The information of the RFID tag carried by the target user (for example, disposed on the clothing, the protective clothing, etc.) may be read by the zeroth RFID reader 40 at the entrance of the first space 10, and the embodiment of the present utility model is not limited to a specific application of the information collected by the zeroth RFID reader 40, for example, a person skilled in the art may upload the information of the target user, so that the control center records the authority of the target user, for example, which second spaces 20 the target user may enter, and of course, the authority of the target user in each second space 20 may be set and modified.
In a possible implementation manner, a first entrance guard is provided at an entrance of the first space 10, a second entrance guard is provided at an entrance of each second space 20, the first entrance guard is used for being opened when the first authority authentication passes, and the second entrance guard is forbidden to be opened when the second authority authentication passes, it should be noted that the specific type of the entrance guard and the specific implementation manner of the operation of the entrance guard are not limited in the embodiment of the present utility model, the scheme of opening or closing the entrance guard based on the biological recognition or the radio frequency recognition technology is mature, and a person skilled in the art can adopt an entrance guard control scheme in the prior art, for example, the entrance guard can be regarded as a switch (door lock), the biological recognition device 30 and the RFID reader can output a switch signal (such as a high level and a low level) according to the recognition result when the authority authentication passes, and control the state of the switch is controlled, for example, the high level control switch is output to be opened, and the corresponding entrance guard is controlled to be opened; in contrast, the authority authentication is not passed, and the output low-level control switch is kept closed, namely the corresponding entrance guard is controlled to be kept closed.
In one possible embodiment, the system may further comprise:
the alarm devices are respectively arranged at the inlet of the first space 10 and the inlet of each second space 20.
For example, the alarm device may include an audible and visual alarm, such as a buzzer, a loudspeaker, an indicator light, a display, etc., where the alarm device may be activated to send alarm information when the authority authentication fails, for example, if the target user enters a certain second space 20, the first RFID reader 50 performs the second authority authentication on the target user, and if it is determined that the target user does not enter the authority of the second space 20, the loudspeaker may be used to send an alarm sound, such as "no authority", or the display may be used to output a corresponding text, or a buzzer may be used to alarm, where the indicator light blinks, and these alarm modes may, of course, be implemented by using the prior art, which is not limited in this embodiment of the present utility model.
In one possible embodiment, the system may further comprise:
and an input device, connected to the first RFID reader 50, for receiving and modifying the correspondence between the RFID tag and the entrance of each second space 20.
It should be understood that the RFID tag may be reused, and modification of information of the RFID tag is a relatively commonly used technology at present, and in the embodiment of the present utility model, the information of the RFID tag may be rewritten by using an input device in the prior art, which is not limited to this embodiment of the present utility model, and a user may implement a function of issuing dynamic rights in a correspondence relationship between an ID of an RFID electronic tag and rights of the second space 20 that can be input by the input device.
The embodiment of the utility model does not limit the specific implementation mode of the input device, and a person skilled in the art can adopt the existing terminal to realize, for example, the terminal can be connected with an RFID reader-writer, input corresponding information through the input device (such as a keyboard, a touch screen and the like) of the terminal, and modify the information of the RFID tag by using the RFID reader-writer.
In one example, a Terminal is also called a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), etc., and is a device that provides voice and/or data connectivity to a User, e.g., a handheld device, an in-vehicle device, etc., with wireless connectivity. Currently, some examples of terminals are: a Mobile Phone, a tablet, a notebook, a palm, a Mobile internet device (Mobile Internetdevice, MID), a wearable device, a Virtual Reality (VR) device, an Augmented Reality (AR) device, a wireless terminal in industrial control (Industrial Control), a wireless terminal in unmanned driving (Selfdriving), a wireless terminal in teleoperation (Remote medical Surgery), a wireless terminal in Smart Grid (Smart Grid), a wireless terminal in transportation security (Transportation Safety), a wireless terminal in Smart City (Smart City), a wireless terminal in Smart Home (Smart Home), a wireless terminal in the internet of vehicles, and the like.
In one possible embodiment, the system may further comprise:
and a second RFID reader disposed at an exit of a third space, which is within the first space 10 and near the exit of the first space 10, for reading and transmitting information of the RFID tag.
The third space may be, for example, a dressing room, and when the target user comes out of the second space 20 (such as an operating room, etc.), the target user changes the clothes and leaves the first space 10, in which case, the second RFID reader reads and transmits the information of the RFID tag, so that the control center deletes the authority information dynamically issued by the target user through the aforementioned input device, or performs other processes, the information of the RFID tag is read and transmitted by the RFID reader, which belongs to its basic function.
In one possible implementation, the biometric device 30 is also used to take a photograph of the target user.
For example, if the biometric device 30 is a facial recognition machine including an image capturing device, an iris recognition machine, or the like, photographing of the target user may be implemented, and the biometric device 30 may also transmit the photographed photograph to the control center. For example, the manager may view the photograph, confirm that the identified person has worn the coverall, and use it to trace the validity of the identification.
Of course, the system may also include a memory to store information obtained by the various components, for example, photographs taken, information about the target user, and so forth.
In one example, the memory may include a computer-readable storage medium, which may be a tangible device that can hold and store instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), programmable read-only memory (PROM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove protrusion structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
In one possible embodiment, the system may further comprise:
a controller connected to the biometric device 30 and the first RFID reader 50.
The controller may be used as a control center to control any of the foregoing devices, and of course, those skilled in the art who control the control may set the control as needed, and may implement the control by using related technologies, which is not limited to the embodiment of the present utility model.
In one example, the controller may include a processing component, illustratively including but not limited to a separate processor, or a discrete component, or a combination of a processor and a discrete component. The processor may include a controller in an electronic device having the functionality to execute instructions, and may be implemented in any suitable manner, for example, by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements. Within the processor, hardware circuits such as logic gates, switches, application specific integrated circuits (Application Specific Integrated Circuit, ASIC), programmable logic controllers, and embedded microcontrollers may be implemented.
In one possible implementation, the second space 20 may include the target user entering a location where a face, hand, or the like is to be masked.
In one possible embodiment, the second space 20 comprises a pharmaceutical shop, an operating room.
Of course, the specific types of the first space 10 and the second space 20 are not limited in the embodiment of the present utility model, and the authority authentication system of the embodiment of the present utility model may be applied to various scenes, so long as the second space 20 is entered, the authority authentication system of the embodiment of the present utility model may be adopted, for example, the reliability of fingerprint identification is low, and the authority authentication system is easy to be copied; the iris recognition can greatly reduce the recognition rate due to eye congestion in the conditions of staying up, illness and the like, and the permission authentication system of the embodiment of the utility model can be adopted under the conditions, for example, the face recognition machine is used for first permission authentication, the target user reads the RFID tag arranged on the clothes (such as work clothes) of the target user by using the RFID reader for second permission authentication after entering the first space 10, and the problems can be solved, the safety is improved and the permission authentication can be effectively carried out through the double permission authentication.
The foregoing description of embodiments of the utility model has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the improvement of technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. A rights authentication system, the system comprising:
the biological identification device and the zeroth RFID reader are arranged at the entrance of the first space;
the first RFID readers are arranged at the inlets of the second spaces, and the second spaces are arranged inside the first spaces.
2. The rights authentication system of claim 1, wherein the biometric device comprises at least one of a facial recognition machine, a fingerprint recognition machine, or an iris recognition machine.
3. The authority authentication system according to claim 1, wherein a first entrance guard is provided at an entrance of the first space, and a second entrance guard is provided at each entrance of the second spaces.
4. The rights authentication system of claim 1, wherein the system further comprises:
the alarm devices are respectively arranged at the inlet of the first space and the inlet of each second space.
5. The rights authentication system of claim 1, wherein the system further comprises:
and an input device connected to the first RFID reader.
6. The rights authentication system of claim 1, wherein the system further comprises:
a second RFID reader is disposed at an exit of a third space, the third space being within the first space and near the exit of the first space.
7. The rights authentication system of claim 1, wherein the biometric device is further configured to take a photograph of the target user.
8. The rights authentication system of claim 1, wherein the system further comprises:
and the controller is connected with the biological identification device and the first RFID reader.
9. The rights authentication system of claim 1, wherein the second space comprises a target user entering a location where a face, hand, needs to be obscured.
10. The rights authentication system of any of claims 1-9, wherein the second space comprises a pharmaceutical shop, an operating room.
CN202320074116.4U 2023-01-04 2023-01-10 Authority authentication system Active CN219017029U (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2023200148037 2023-01-04
CN202320014803 2023-01-04

Publications (1)

Publication Number Publication Date
CN219017029U true CN219017029U (en) 2023-05-12

Family

ID=86233730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202320074116.4U Active CN219017029U (en) 2023-01-04 2023-01-10 Authority authentication system

Country Status (1)

Country Link
CN (1) CN219017029U (en)

Similar Documents

Publication Publication Date Title
CN109886697B (en) Operation determination method and device based on expression group and electronic equipment
CN102812471B (en) The personal data of safety process and management system
CN101763671B (en) System for monitoring persons by using cameras
CN105637522B (en) Access control is driven using the world of trusted certificate
CN206162736U (en) Access control system based on face recognition
CN106296950A (en) A kind of gate control system based on recognition of face
CN102354409A (en) Access control system based on face recognition
CN102129725A (en) Method and apparatus for configuring an access control system
CN107920070A (en) Identity identifying method, server and system
CN106780866A (en) Gate control system based on living things feature recognition
CN113763620A (en) Combined access control, method and device for controlling combined access control, and storage medium
CN111597910A (en) Face recognition method, face recognition device, terminal equipment and medium
CN103791686A (en) Intelligent refrigerator with iris recognition function
CN206574094U (en) Multi-modal identity recognition device
CN103806789A (en) Intelligent safety box with iris recognition function
CN107451543A (en) Event-handling method and Related product
US20240095326A1 (en) Modular biometric station with cohesive form factor
CN213338863U (en) Offline authorization system of dynamic face access control
CN207046622U (en) A kind of building elevator Intelligent security apparatus
CN219017029U (en) Authority authentication system
CN203947945U (en) A kind of intelligent safe that possesses iris identifying function
CN108986288A (en) A kind of two-door access control system of the laboratory based on recognition of face and speech recognition
CN107563338A (en) Method for detecting human face and Related product
CN208110708U (en) Identify equipment and gate inhibition
CN105761424A (en) Information authentication method and electronic device

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant