TWI492189B - Security identification method for real-time identity check - Google Patents

Security identification method for real-time identity check Download PDF

Info

Publication number
TWI492189B
TWI492189B TW101150934A TW101150934A TWI492189B TW I492189 B TWI492189 B TW I492189B TW 101150934 A TW101150934 A TW 101150934A TW 101150934 A TW101150934 A TW 101150934A TW I492189 B TWI492189 B TW I492189B
Authority
TW
Taiwan
Prior art keywords
data
image
server
identification
control unit
Prior art date
Application number
TW101150934A
Other languages
Chinese (zh)
Other versions
TW201419223A (en
Inventor
Chen Chen Liu
Yi Hua Ho
Original Assignee
Inventec Appliances Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201210431205.6A priority Critical patent/CN103793961B/en
Application filed by Inventec Appliances Corp filed Critical Inventec Appliances Corp
Publication of TW201419223A publication Critical patent/TW201419223A/en
Application granted granted Critical
Publication of TWI492189B publication Critical patent/TWI492189B/en

Links

Description

Instant identification method for identity comparison

The invention is a method for realizing identity identification in real time, in particular, enabling a pair of lecturers to instantly upload to a server after obtaining the image data of the visitor, and enabling the server to image the image with a A method of comparing security or danger identification images stored in the database to control whether the door lock of the gate is locked.

In recent years, with the changes in the social environment and the changes in the industrial structure, various types of crimes have emerged in an endless stream, making it impossible to prevent. Among them, fraudulent acts of various counterfeit telecommunication operators, gas personnel or public servants are the most embarrassing. Because young children are less able to judge and be alert to strangers, how can parents teach children not to let strangers enter the house for parents who often need to leave their children alone at home? An arduous task on the subject.

Generally speaking, most of the traditional apartments have a pair of speaking machines. When there is an outsider visiting and pressing the corresponding floor bell next to the apartment door, the residents in the apartment can directly communicate with the visitors through the walkie-talkie or through one of the walkie-talkies. The screen is displayed, and the appearance of the visitor is directly known, and the resident can directly press one of the control switches on the walkie-talkie to directly open the door of the apartment to invite the visitor to enter, without having to go to the lower door to open the door. However, although the walkie-talkie has the aforementioned convenience functions, it is easy for children to judge whether the visitor is malicious or not, that is, without verifying the identity of the visitor. Under the circumstances, sloppyly press the control switch on the walkie-talkie to allow visitors to enter, resulting in a good intention of the walkie-talkie has become a major loophole in home security.

The inventor believes that the above problem is mainly because the walkie-talkie has the convenient function of directly opening the door of the apartment, so it is easy for the child to be tempted or deceived by a stranger, that is, the control switch is pressed without consideration, so that the stranger enters. Therefore, how to improve the operation mode of the conventional walkie-talkie so that the walkie-talkie can have a security identification mechanism is an important problem that the present invention is intended to solve here.

In view of the fact that the conventional walkie-talkie can not provide a security mechanism, the problem that the child can easily enter the stranger through the walkie-talkie, the inventor has finally designed the book after years of practical experience and after many researches and tests. The invention realizes a security identification method capable of real-time identity comparison, and can effectively improve the safety of the walkie-talkie in use.

An object of the present invention is to provide a security identification method capable of real-time identity comparison, which is applied to a security identification system, which includes a pair of lecturers, a camera device and a server, and the walkie-talkie has a a communication unit and a control unit are electrically connectable to the camera device, and the camera device is disposed adjacent to the gate of the door, so that the camera device can capture the visitor when the visitor presses the bell a facial feature and an image data; the communication unit is connectable to the server via a network, and the server has a database for storing a security list data (eg, a user-defined list of relatives and Its identification image) or a dangerous list data (eg, the list of suspects published by the police station and its identification image); the control unit is electrically connected to the door lock of the gate to set the state of the door lock, and the safety identification method is performed by the control unit of the walkie-talkie The following steps: receiving the image data transmitted by the camera device; transmitting the image data to the server through the communication unit, so that the server can use the image data and the safety list data or the danger list data Identifying the image for comparison and generating an indication signal (eg, permitting or disallowing); receiving an indication signal returned by the server; according to the indication signal, setting the door lock to a locked state, so that the door lock cannot be Release, or set the door lock to a free state, so that the door lock can be actively released by the user to open the door. In this case, if there is only a child in the home, if a stranger visits, the walkie-talkie can use the server to determine whether the stranger's identification image is in the safety list data or the danger list data, thereby indicating the child. Open the door, or set the door lock to the locked state, to prevent children from entering the stranger at will, effectively improving the safety of the home and the application level of the walkie-talkie.

Another object of the present invention is that a contact list information is stored in the database, and the contact list information includes at least one set of communication materials (eg, a child's mobile phone number), and the image data is not associated with the image data. If the security list data in the database or the identification image in the danger list data matches, the server can transmit the image data to a mobile communication device corresponding to the communication data according to the communication data, and The mobile communication device returns a response signal to the walkie-talkie, so that the walkie-talkie can set the state of the door lock according to the response signal.

Another object of the present invention is that the image data is not in the database In the case that the identification image in the safety list data or the danger list data is consistent, the server can simultaneously transmit the communication data and the indication signal to the walkie-talkie, and the walkie-talkie can first set the door lock to the locked state, and then according to the communication. Data, directly transmitting the image data to a corresponding one of the mobile communication devices, to set the door lock to a locked state or a free state according to one of the response signals returned by the mobile communication device, thereby further improving The safety and accuracy of this safety identification method.

For the sake of the review, the reviewer can further understand and understand the technical, structural features and purposes of the present invention. The embodiments and the drawings are described in detail as follows:

The present invention is a security identification method capable of real-time identity comparison. Referring to FIG. 1 , which is a first preferred embodiment of the present invention, the security identification method is applied to a security identification system 10 for security. The identification system 10 includes a pair of radios 11 , an imaging device 12 and a server 14 , and the intercom includes a display unit 112 , a communication unit 114 and a control unit 116 . The interphone 11 can be electrically connected to the camera 12 . The camera device 12 is installed adjacent to an apartment door 13 and can capture an external image to generate an image signal.

Referring to FIG. 1 , the communication unit 114 is connected to the server 14 at the remote end through a network N, and the server 14 is provided with a database 140. The database 140 stores therein. Safety list data D1 and a danger list data D2, which can be preset for the user Group data, including multiple recognition images, such as a list of user relatives or friends, and corresponding facial features. The danger list data D2 also includes complex array identification images, for example, suspects issued by the police station, and corresponding faces feature. In this embodiment, the security list data D1 and the dangerous list data D2 are stored in the database 140 of the same server 14, but in actual implementation, the walkie-talkie 11 can also be connected to the network N through the network N. The plurality of servers 14 respectively obtain the security list data D1 or the dangerous list data D2. For example, the security list data D1 is stored on the personal computer set up by the user, and the dangerous list data D2 is set on the website published by the police station. on.

The control unit 116 can be electrically connected to the door lock 130 of the gate 13 so that the door lock 130 can be set to a "locked state" or a "free state", and in the "locked state", That is, the walkie-talkie 11 cannot be used to remotely release the door lock 130. In the "free state", the door lock 130 of the gate 13 can still be controlled by the walkie-talkie 11, so that the user can actively select to maintain the gate 13. The door lock 130 is closed or released to open the gate 13.

Referring to Figures 1 and 2, the security identification method of the present invention enables the control unit 116 of the walkie-talkie 11 to perform the following steps: (201) receiving the camera when a visitor presses the bell on the gate 13 The image signal transmitted from the device 12, and the control unit 116 can display the image signal on the walkie-talkie 11 through the display unit 112; (202) transmit the image signal to the server through the communication unit 114. 14. The server 14 can compare the image data with the identification images of the list materials D1 and D2 in the database 140, if If the image data matches the identification image of the security list data D1, an "allow" indication signal is generated; if the image signal matches the identification image of the dangerous list data D2, an indication signal of "not allowed" is generated; 203) receiving an indication signal returned by the server 14; (204) determining whether the indication signal is "allowed"? If yes, go to step (205); otherwise, go to step (206); (205) set the door lock 130 to "free state"; and (206) set the door lock 130 to "locked state".

According to the security identification method of the present invention, the walkie-talkie 11 can set the door lock 130 according to the indication signal, that is, if the indication signal returned by the server 14 is “allowed”, the door is The lock 130 is set to a "free state", so that the user can freely choose whether to open the door lock 130. Otherwise, if the indication signal returned by the server 14 is "not allowed", the walkie-talkie 11 will set the door lock 130. In the "locked state", the user cannot directly pass the walkie-talkie 11 and release the door lock 130. In this case, if there is only a child in the home, when the visitor presses the bell, the walkie-talkie 11 can automatically connect to the server 14 after receiving the image data of the visitor, and determine the visitor. Whether the identification image is in the safety list data D1 or the danger list data D2, and then the door lock 130 of the gate 13 is set to the locked state, thereby preventing the child from allowing the visitor to enter at random or maintaining the control right of the door lock 130 for Children are free to choose whether to let the visitors enter, which effectively improves the safety of the home and the application level of the walkie-talkie 11.

In addition, in the first preferred embodiment of the present invention, if the server 14 determines If the image data of the visitor does not match any of the security list data D1 or the dangerous list data D2, the server 14 will be able to transmit a "to be confirmed" indication signal to the walkie-talkie 11, so that The walkie-talkie 11 temporarily sets the door lock 130 to the "locked state". At the same time, the server 14 further stores a contact list data D3. The contact list data D3 includes at least one set of communication data, and the communication data corresponds to an action. The communication device 15 can transmit the image data to the mobile communication device 15 according to the communication data, and receive a response message from the mobile communication device 15; the server 14 can directly The response signal is transmitted to the walkie-talkie 11 so that the walkie-talkie 11 sets the lock 130 again. For example, if the response message of the mobile communication device 15 is "Allow", the walkie-talkie 11 will set the lock 130. In the "free state", on the other hand, the walkie-talkie 11 will set the door lock 130 to the "locked state".

Referring to FIGS. 1 and 3, in the second preferred embodiment of the present invention, the pair of jacks can also directly transmit data to the mobile communication device 15, that is, the server 14 transmits the " When the indication signal is to be confirmed, the communication data will be transmitted to the walkie-talkie 11 at the same time, so that the control unit 116 of the walkie-talkie 11 can perform the following steps: (301) receiving the "to be confirmed" indication signal and the communication data (302) temporarily setting the door lock 130 to the "locked state"; (303) transmitting the image data to the mobile communication device 15 via the communication unit 114 according to the communication data; (304) receiving the The mobile communication device 15 returns one of the response signals; (305) determines whether the response signal is "allowed"? If yes, go to the step (306), otherwise, proceeding to step (307); (306) resetting the door lock 130 to "free state"; and (307) maintaining the door lock 130 in the "locked state".

It should be noted that in the foregoing embodiment, the walkie-talkie 11 is electrically connected to the door lock 130 of the gate 13, but in other preferred embodiments of the present invention, the walkie-talkie 11 can also be electrically connected. The central monitoring device to the gate 13 is configured to set the state of the door lock 130 through the central monitoring device. Thus, the same technical effects as those of the foregoing embodiment can be achieved. In addition, in other preferred embodiments of the present invention, the camera device 12 can still capture the voice data of the visitor while capturing the facial features of the visitor, so that the walkie-talkie 11 can image the image data in a subsequent step. Together with the sound data, the transmission is transmitted to the server 14 for comparison, thereby improving the accuracy of the security identification method.

Moreover, as shown in FIG. 1 , the security identification method of the present invention can be further expanded to achieve better protection. For example, the server 14 determines the image data of the visitor and the dangerous list data D2. When the identification image matches, the server 14 can directly generate an alarm signal (or notify the walkie-talkie 11 to generate an alarm signal) and transmit it to a security system for alarm.

The above description is only a few preferred embodiments of the present invention, but the technical features of the present invention are not limited thereto, and those skilled in the relevant art can easily consider after considering the technical content of the present invention. Equivalent changes should not depart from the scope of protection of the present invention.

10‧‧‧Safety Identification System

11‧‧‧Interphone

112‧‧‧Display unit

114‧‧‧Communication unit

116‧‧‧Control unit

12‧‧‧ camera

13‧‧‧ gate

130‧‧‧door lock

14‧‧‧Server

140‧‧‧Database

15‧‧‧Mobile communication device

D1‧‧‧Safety List Information

D2‧‧‧Danger List Information

D3‧‧‧Contact list information

N‧‧‧Network

Figure 1 is a schematic diagram of a walkie-talkie in the security identification method of the present invention; 2 is a flow chart of a first preferred embodiment of the security identification method of the present invention; and FIG. 3 is a flow chart of a second preferred embodiment of the security identification method of the present invention.

Claims (8)

  1. A security identification method capable of real-time identity comparison is applied to a security identification system, which includes a pair of lecturers, a server and a camera device, wherein the walkie-talkie includes a communication unit and a control unit, and can Electrically connected to the camera device, the camera device is disposed adjacent to a gate to capture an external image and generate an image data; the communication unit can be connected to the server through a network, the servo The device is provided with a database for storing a safety list data or a dangerous list data, and each of the list materials includes at least one identification image, and the database further has a contact list material, the contact list material includes at least one group Communication data; the control unit is electrically connected with the door lock of the door to control the state of the door lock, and the safety identification method enables the control unit to perform the following steps: receiving image data transmitted by the camera device; a communication unit that transmits the image data to the server, so that the server can clear the image data with each The identification image in the data is compared and generates an indication signal; receiving an indication signal sent back by the server; and if the image data matches the identification image in the security list data, the control unit can according to the indication signal The door lock is set to a locked state, so that the door lock cannot be released; if the image data matches the identification image in the danger list data, the control unit can set the door lock to be free according to the indication signal. State, make the door lock Can be actively released by the user; and if the image data does not match the identification image in the safety list data and the danger list data, the control unit can first set the door lock to the locked state according to the indication signal, The server transmits the image data to a corresponding one of the mobile communication devices according to the communication data, and obtains a response signal sent by the mobile communication device, and the control unit can receive the response signal sent by the server. And the door lock is accordingly set to a locked state or a free state.
  2. The security identification method of claim 1, wherein the camera device can simultaneously capture a sound data, and transmit the image signal together with the sound signal to the walkie-talkie, so that the control unit of the walkie-talkie can simultaneously perform the image data and The sound data is transmitted to the server for comparison.
  3. The security identification method of claim 2, wherein the server can directly generate an alarm signal when the server determines that the image data matches the identification image in the danger list data, or the server can The walkie-talkie is notified to cause the walkie-talkie to generate an alarm signal.
  4. The security identification method of claim 3, wherein the display unit is further provided with a display unit, wherein after the control unit receives the image signal transmitted by the camera device, the control unit can display the display unit through the display unit. Image signal.
  5. A security identification method capable of real-time identity comparison is applied to a security identification system, which includes a pair of lecturers, a server and a camera device, wherein the walkie-talkie includes a communication unit and a control unit, and can Electrically connected to the camera device, the camera device is disposed adjacent to a large door, The external image can be captured and an image data is generated; the communication unit can be connected to the server through a network, and the server is provided with a database for storing a safety list data or a dangerous list data, and Each of the list materials includes at least one identification image, and the database further includes a contact list data, the contact list data includes at least one set of communication materials; the control unit is electrically connected with the door lock of the door to control the door In the state of the lock, the security identification method enables the control unit to perform the following steps: receiving image data transmitted by the camera device; transmitting the image data to the server through the communication unit, so that the server can Comparing the image data with the identification images in the list data, and generating an indication signal; receiving the indication signal and the communication data returned by the server; if the image data matches the identification image in the safety list data, The control unit can set the door lock to a locked state according to the indication signal, so that the door lock cannot be released; Corresponding to the identification image in the danger list data, the control unit can set the door lock to a free state according to the indication signal, so that the door lock can be actively released by the user; and if the image data and the safety list are If the identification image in the data and the danger list data does not match, the control unit can first set the door lock to the locked state according to the indication signal, and transmit the image data to the communication data through the communication unit. Corresponding to one of the mobile communication devices, 嗣, receiving the mobile communication device One of the return signals responds to the signal, and according to the response signal, the door lock is set to a locked state or a free state.
  6. The security identification method of claim 5, wherein the camera device can simultaneously capture a sound data, and transmit the image signal together with the sound signal to the walkie-talkie, so that the control unit of the walkie-talkie can simultaneously perform the image data and The sound data is transmitted to the server for comparison.
  7. The security identification method of claim 6, wherein the server can directly generate an alarm signal when the server determines that the image data matches the identification image in the danger list data, or the server can The walkie-talkie is notified to cause the walkie-talkie to generate an alarm signal.
  8. The security identification method of claim 7, wherein the display unit further includes a display unit, wherein after the control unit receives the image signal transmitted by the camera, the control unit can display the display unit through the display unit. Image signal.
TW101150934A 2012-11-01 2012-12-28 Security identification method for real-time identity check TWI492189B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210431205.6A CN103793961B (en) 2012-11-01 2012-11-01 The security identification method of identity comparison can be carried out in real time

Publications (2)

Publication Number Publication Date
TW201419223A TW201419223A (en) 2014-05-16
TWI492189B true TWI492189B (en) 2015-07-11

Family

ID=50669581

Family Applications (1)

Application Number Title Priority Date Filing Date
TW101150934A TWI492189B (en) 2012-11-01 2012-12-28 Security identification method for real-time identity check

Country Status (2)

Country Link
CN (1) CN103793961B (en)
TW (1) TWI492189B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618860B (en) * 2014-12-31 2018-04-27 小米科技有限责任公司 Apparatus control method and device
TWI596270B (en) * 2015-08-28 2017-08-21 偉林電子股份有限公司 Remote entry control system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136068A (en) * 2006-08-28 2008-03-05 柏宇科技股份有限公司 Built-in radio frequency identification card face shape identification device
TWM413924U (en) * 2011-04-25 2011-10-11 Chi-Sheng Tsai A multi-function door control system
TWM420947U (en) * 2011-06-30 2012-01-11 Kelcctv Technology Co Ltd Entrance intercom system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200733580A (en) * 2006-02-16 2007-09-01 Inventec Appliances Corp Wireless outdoor intercom and the system thereof
CN102074056B (en) * 2010-04-09 2012-10-03 武汉聚鑫智能科技有限公司 Intelligent network burglar-proof door
CN201854298U (en) * 2010-07-14 2011-06-01 北京博雅英杰科技股份有限公司 Campus intelligent security management information system
CN101980305A (en) * 2010-10-21 2011-02-23 青岛科技大学 Face identification and 3G communication-based intelligent household access control system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136068A (en) * 2006-08-28 2008-03-05 柏宇科技股份有限公司 Built-in radio frequency identification card face shape identification device
TWM413924U (en) * 2011-04-25 2011-10-11 Chi-Sheng Tsai A multi-function door control system
TWM420947U (en) * 2011-06-30 2012-01-11 Kelcctv Technology Co Ltd Entrance intercom system

Also Published As

Publication number Publication date
CN103793961A (en) 2014-05-14
TW201419223A (en) 2014-05-16
CN103793961B (en) 2016-06-08

Similar Documents

Publication Publication Date Title
US10818158B2 (en) Security monitoring and control
US10445959B2 (en) Security and public safety application for a mobile device with audio/video analytics and access control authentication
US10619380B2 (en) Wireless electronic lock system and method
US9792806B2 (en) Security system
US20180040215A1 (en) Automated, remotely-verified alarm system with intrusion and video surveillance and digital video recording
US10262526B2 (en) Processing alarm signals
US10033972B2 (en) Electronic lock with remote monitoring
US9197867B1 (en) Identity verification using a social network
US10388134B1 (en) Video monitoring and alarm verification technology
CN106231259B (en) Display methods, video player and the server of monitored picture
US10397528B2 (en) Providing status information for secondary devices with video footage from audio/video recording and communication devices
EP3033742B1 (en) System and method for video/audio and event dispatch using positioning system
US10284820B2 (en) Covert monitoring and recording of audio and video in controlled-environment facilities
CN103680083B (en) Event is notified
US10614627B2 (en) Holographic technology implemented security solution
TWI544778B (en) Remote doorbell control system and its samrt doorbell device
US10169974B2 (en) Home security system
KR20160032004A (en) Security and/or monitoring devices and systems
US9030562B2 (en) Use of a two- or three-dimensional barcode as a diagnostic device and a security device
KR101268432B1 (en) Smart door open and close certification System using Smart Communicator and Method thereof
CN103348074B (en) Door lock assembly
US20120098918A1 (en) Video analytics as a trigger for video communications
US20170243454A1 (en) Dynamic linking of security systems
CA2880597C (en) System and method of alerting central monitoring station and registered users about a potential duress situation using a mobile application
US8675071B1 (en) Video monitoring and alarm verification technology