WO2020135079A1 - 电子闸门的开启方法、装置及服务器 - Google Patents
电子闸门的开启方法、装置及服务器 Download PDFInfo
- Publication number
- WO2020135079A1 WO2020135079A1 PCT/CN2019/124903 CN2019124903W WO2020135079A1 WO 2020135079 A1 WO2020135079 A1 WO 2020135079A1 CN 2019124903 W CN2019124903 W CN 2019124903W WO 2020135079 A1 WO2020135079 A1 WO 2020135079A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- target object
- information
- biometric information
- biometric
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
Definitions
- This application relates to the field of security technology, in particular to an electronic gate opening method, device and server.
- the purpose of the present application is to provide an electronic gate opening method, device and server, which can simplify the operation steps when a user passes the electronic gate, thereby improving the user experience; at the same time, it can also improve the safety of the electronic gate.
- an embodiment of the present application provides an electronic gate opening method, including: receiving biological biometric information of a target object; wherein the biological biometric information carries account information, and/or, electronic gate position information; according to the living body Biometric information to determine the user level to which the target object belongs; where the user level is related to account information and/or electronic gate position information; to determine whether the user level is equipped with access rights to the electronic gate; if it is, to open the electronic to the target object Gate.
- the embodiments of the present application provide a first possible implementation manner of the first aspect, wherein the above user levels include first-type users, second-type users, third-type users, and fourth-type users;
- the step of determining the user level to which the target object belongs according to the biometric information of the living body includes: according to the biometric information of the living body and the biometric information of each user in the first server, determine whether the user level to which the target object belongs is the first type of user; if No, send the biometric information of the living body to the second server, so that the second server performs the second biometric matching based on the biometric information of the living body to obtain the second biometric matching result; according to the second biometric matching result, the target object belongs to Whether the user level is the second type of user; if not, send the biometric information of the living body to the third server, so that the third server performs the third biometric matching based on the biometric information of the living body, and obtains the third biometric matching result;
- the embodiments of the present application provide a second possible implementation manner of the first aspect, wherein the above-mentioned according to the biological characteristics information of the living body and the biological characteristics of each user in the first server Information, the step of determining whether the user level to which the target object belongs is a first-type user, including: acquiring the biometric information of each first-type user in the first server; the biometric information of the living body and the biometric characteristics of each first-type user The information is used for the first biometric matching; when the first biometric matching is successful, the user level to which the target object belongs is determined as the first type of user.
- the embodiments of the present application provide a third possible implementation manner of the first aspect, wherein the above-mentioned sending the biological information of the living body to the second server enables the second server Perform second biometric matching based on living biometric information to obtain a second biometric matching result; the step of determining whether the user level to which the target object belongs is a second type user according to the second biometric matching result includes: based on living biometric information Generate a first identification request; where the first identification request includes living body biometric information and account information; send the first identification request to the second server, so that the second server looks up the biometric information of each authorized user corresponding to the account information , Perform second biometric matching on the biometric information of the living body and the biometric information of each authorized user, and return the second biometric matching result; when the second biometric matching result is successful, send a location confirmation to the target terminal of the target object Request; the associated terminal receiving the target object returns the location confirmation information based on the location confirmation request, and determines
- the embodiments of the present application provide a fourth possible implementation manner of the first aspect, wherein the above-mentioned sending the biological information of the living body to the third server enables the third server Perform third biometric matching based on living biometric information to obtain a third biometric matching result; the step of determining whether the user level to which the target object belongs is a third type user according to the third biometric matching result, including: based on living biometric information Generate a second identification request; wherein the second identification request includes living body biometric information and electronic gate position information; send the second identification request to the second server, so that the second server obtains the first grid corresponding to the electronic gate position information The biometric information of each current user in the area, and/or the biometric information of each current user in the second grid area adjacent to the first grid area, and the biometric information of the living body and each current user The third biometric matching is performed on the biometric information, and the third biometric matching result is returned; wherein, the third server tracks the trajectory of each
- the embodiments of the present application provide a fifth possible implementation manner of the first aspect, wherein the step of judging whether the user level is equipped with an access right of an electronic gate includes: When the user level is the first type user, the second type user or the third type user, it is determined that the user level is equipped with the access right of the electronic gate.
- the embodiments of the present application provide a sixth possible implementation manner of the first aspect, wherein the above method further includes: sending the user level to which the target object belongs to the associated terminal, so that the manager corresponding to the associated terminal View the user level of the target audience.
- an embodiment of the present application further provides an electronic gate opening device, including: a receiving module configured to receive biological biometric information of a target object; wherein the biological biometric information carries account information, and/or an electronic gate Location information; level determination module, configured to determine the user level to which the target object belongs based on living biological characteristics information; wherein, the user level is related to account information, and/or, electronic gate position information; judgment module, configured to determine whether the user level Equipped with the access authority of the electronic gate; the authority opening module is configured to open the electronic gate to the target object when the judgment result of the judgment module is yes.
- an embodiment of the present application further provides a server, including a processor and a memory; a computer program is stored on the memory, and when the computer program is executed by the processor, the sixth possibility as described in the first aspect to the first aspect is executed The method of any one of the embodiments.
- an embodiment of the present application further provides a computer storage medium configured to store computer software instructions used in any method of the first aspect to the sixth possible implementation manner of the first aspect.
- the method, device and server for opening an electronic gate provided by the embodiments of the present application receive the biological biometric information of a target object carrying account information or electronic gate position information, and according to the biological biometric information and account information or electronic gate position information Determine the user level to which the user belongs, and then determine whether the user level is equipped with the access authority of the electronic gate, and if so, allow the target object to enter the electronic gate.
- the embodiment of the present application judges whether the target object is equipped with the access permission of the electronic gate through the biological biometric information of the target object and the account information or the position information of the electronic gate, eliminating the steps of the target object swiping the access control card or presenting the identity document, thereby improving the user experience ;
- the method of collecting living biometric information can effectively prevent others from fraudulent use of identity documents and other information, thereby improving the security of the electronic gate; at the same time, through the location information and living biological information to further confirm whether it is the user object, it can also be effective Reduce the search scope, thereby reducing the investment in hardware equipment and improving the efficiency of user level confirmation.
- FIG. 1 is a schematic flowchart of an electronic gate opening method provided by an embodiment of the present application.
- FIG. 2 is a schematic flowchart of another electronic gate opening method provided by an embodiment of the present application.
- FIG. 3 is a schematic structural diagram of an electronic gate opening device provided by an embodiment of the present application.
- FIG. 4 is a schematic structural diagram of a server provided by an embodiment of the present application.
- an electronic gate provided by embodiments of the present application Opening method, device and server, determine whether the target object is equipped with the access right of the electronic gate through the biological information of the target object, account information or electronic gate position information, eliminating the steps of the target object swiping the access control card or showing the identity document, In turn, the user experience is improved; in addition, the method of collecting living biometric information can effectively prevent others from fraudulently using information such as identification documents, thereby improving the security of the electronic gate.
- Step S102 Receive biometric information of the target object.
- a living body biometrics collection device may be provided on the electronic gate, and when the target object wishes to enter the electronic gate, cooperate with the living body biometrics collection device to make corresponding operations so that the biological characteristic information collection device obtains the target object Living biometric information.
- the living biometric information may be living face information, living iris information, living sclera information, living eye pattern information, living ear print information, living palm vein information, living finger vein information, living palm print information, or living voiceprint information.
- a living face collection device can be used as a living biometric collection device, and the living face information of the target object can be collected by the living face collection device.
- the above-mentioned biological biometric information also carries account information, and/or, electronic gate position information
- the account information or electronic gate position information corresponding to the electronic gate can be obtained.
- the account information may be the number information of the electronic gate.
- the account information may be the account information corresponding to the residential area.
- step S104 the user level to which the target object belongs is determined according to the biological characteristic information of the living body.
- the users are divided into multiple levels in advance, and the biological biometric information of the target object is matched with the biometric information of the users in each user level to determine the user level of the target object.
- the user level is related to account information and/or electronic gate position information.
- users equipped with electronic gate access authority can be divided into three user levels.
- the first type of users can be community residents, security personnel and property management personnel.
- the biometric information of the first type of users is stored in In the first server, the biometric information of the target object can be directly matched with the biometric information of each first-type user stored in the first server. If the matching is successful, the target object can be determined as the first-type user ;
- the second category can be users of the district police, local security personnel, couriers, food delivery staff, house intermediaries and temporary workers and other people who frequently enter and leave the community.
- the second category of users can authorize the electronic gate or the residence corresponding to the electronic gate.
- the target object belongs to any of the above-mentioned first-type users, second-type users, or third-type users, it means that the target object is equipped with the access right of the electronic gate. Further, if none of the above three types of users match the user information corresponding to the target object, the target object may be classified into a fourth type of user, and the fourth type of user does not have permission to enter the electronic gate and/or issue an alarm Crowd.
- the above electronic gate can be a variety of devices such as smart gates, smart channels, smart access control, smart parking lot gates and smart elevators, etc., and can be applied to community gate entrances, building entrances, office halls, public places, exhibition halls, Stores or brand-name merchandise stores and other scenarios to provide a safer, more convenient access control system that can implement electronic fences.
- step S106 it is determined whether the user level is equipped with the access authority of the electronic gate.
- the user level of the target object By judging the user level of the target object, it can be judged whether the target object has the access authority of the electronic gate.
- the user level of the target object is any user level of the first type user, the second type user, or the third type user, it means that the target object is equipped with the access permission of the electronic gate; when the user level of the target object is the fourth When the user is a class, it means that the target object does not have access to the electronic gate.
- Step S108 if yes, open the electronic gate to the target object.
- the target object when the target object belongs to any of the above-mentioned first-class users, second-class users, or third-class users, the target object can enter the electronic gate, so the electronic gate needs to be opened to the target object.
- the method for opening an electronic gate determines the user's belongings by receiving the biological biometric information of the target object carrying account information or electronic gate position information, and according to the biological biometric information and the account information or electronic gate position information The user level, and then judge whether the user level is equipped with the access permission of the electronic gate, and if so, allow the target object to enter the electronic gate.
- the embodiment of the present application judges whether the target object is equipped with the access permission of the electronic gate through the biological biometric information of the target object and the account information or the position information of the electronic gate, eliminating the steps of the target object swiping the access control card or presenting the identity document, thereby improving the user experience ;
- the method of collecting living biometric information can effectively prevent others from fraudulent use of identity documents and other information, thereby improving the security of the electronic gate; at the same time, through the location information and living biological information to further confirm whether it is the user object, it can also be effective Reduce the search scope, thereby reducing the investment in hardware equipment and improving the efficiency of user level confirmation.
- the embodiments of the present application also provide another method for opening an electronic gate.
- Step S202 Receive biometric information of the target object.
- the biological biometric information is living human face information
- the living human face information of the target object is acquired through the human face information collection device.
- the user levels should be divided into users of the first category, users of the second category, users of the third category, and users of the fourth category in order to facilitate the judgment of the user level of the target object.
- step S204 it is determined whether the user level to which the target object belongs is the first type of user according to the biometric information of the living body and the biometric information of each user in the first server. If yes, go to step S216; if no, go to step S206.
- the biometric information stored in the first server is first used for matching.
- the target object is a first-type user, subsequent judgment is not required, and data exchange can be reduced.
- the first server may be a local server or a remote server.
- the embodiments of the present application provide a method for determining whether the user level to which the target object belongs is the first type of user based on the biometric information of the living body and the biometric information of each user in the first server.
- the method includes the following step:
- the face information of each first-type user in the first server is acquired to determine whether the target object is the first based on the live face information of the target object and the face information of each first-type user Class users.
- the target object is determined as the fourth type of user and is not allowed.
- the target object enters the electronic gate.
- the user level to which the target object belongs is determined as the first type of user.
- the target object stores biometric information in the first server, so that the target object can be determined as the first type of user.
- the target object For the first type of user, because living body biometrics is used to determine whether the target object belongs to the first type of user, it is convenient for the target object to not carry a mobile phone or other associated terminal, and for the first type of user to enter and exit. Through the setting of the first type of user, it can maximize the user's freedom, improve the user experience, and allow users to pass through the gate without devices such as mobile phones, which greatly facilitates the young and elderly user groups to freely enter and exit the community and other places.
- Step S206 Send the biometric information of the living body to the second server, so that the second server performs the second biometric matching based on the biometric information of the living body, and obtains a second biometric matching result.
- the biometric information of the target object may be sent to the second server, and the second server performs biometric matching according to the biometric information of the biological object, and then knows whether the user belongs to the second type of user.
- the first identification request is generated based on the biological biometric information, where the first identification request includes the biological biometric information and the account information, and then the first identification request is sent to the second server, so that the second server looks up the account information Corresponding biometric information of each authorized user, and performing a second biometric matching on the biometric information of the living body and the biometric information of each authorized user to obtain a second biometric matching result.
- the amount of biometric information of the searched user can be effectively reduced, thereby improving the speed of identity recognition and the accuracy of biometric recognition.
- the user has authorized the electronic gate, residential area or office building, the user's information has been filed, so it is easier to standardize the management of access personnel.
- Step S208 Determine whether the user level to which the target object belongs is the second type of user according to the second biometric matching result. If yes, go to step S216; if no, go to step S210.
- the target object should be located near the electronic gate, it can be further determined whether the target object is adjacent to the electronic gate. Specifically, when the second biometric matching is successful, a location confirmation request is sent to the target terminal's associated terminal to return the target object to the location confirmation information, confirming that the location information of the target object is adjacent to the position of the electronic gate.
- the object is determined to be the second type of user.
- the electronic gate can also be implemented by biometric identification.
- biometric identification since only the biological biometric information of the target object needs to be matched with each biometric information corresponding to the account information, there is no need for the target terminal’s associated terminal to be real-time. Sending location information, while improving the user experience, can effectively protect the location privacy of the target object.
- Step S210 Send the biometric information of the living body to the third server, so that the third server performs the third biometric matching based on the biometric information of the living body to obtain a third biometric matching result.
- the target object does not belong to the second type of user, continue to determine whether the target object belongs to the third type of user.
- the biometric information of the target object may be sent to the third server, and the third server performs biometric matching according to the biometric information of the biological object, and then knows whether the user belongs to the third type of user.
- a second identification request is generated based on the living body biometric information, where the second identification request includes living body biometric information and electronic gate position information, and then the second identification request is sent to the third server, so that the third server obtains the electronic The biometric information of each current user in the first grid area corresponding to the gate position information, and perform third biometric matching on the biometric information of the living body and the biometric information of each current user.
- the user level to which the target object belongs is determined as the third type of user.
- the second grid adjacent to the first grid area may be acquired Biometric information of each current user in the grid area, and perform third biometric identification to obtain a third biometric matching result.
- the trajectory of each user can be tracked through the third server to determine each current user in the first grid area and the second grid area.
- the third-type user can also freely enter and exit the electronic gate without filling in any information, which is convenient for the third-type user to enter and exit.
- the number of times that the third type of user enters and exits each electronic gate on the day or in the near future can be recorded, and users who frequently enter and exit can be warned to prevent the occurrence of public security events.
- Step S212 According to the third biometric matching result, determine whether the user level to which the target object belongs is a third-type user. If yes, go to step S216; if no, go to step S214.
- the target object can be determined as the third type of user.
- the target object can be directly passed through the electronic gate without providing the target object to register at the public security post, providing the target object with a simpler, more convenient and faster way to enter and exit, thereby improving the user experience of the target object.
- step S214 it is determined that the user level to which the target object belongs is the fourth type of user.
- the target object when the target object is the fourth type of user, the target object will not be able to enter the electronic gate, or the electronic gate is manually opened by security personnel to allow the target object to enter.
- the user level is the first type user, the second type user or the third type user, it is determined that the user level is equipped with the access authority of the electronic gate.
- Step S216 Open the electronic gate to the target object.
- the opening method of the electronic gate obtained by the embodiment of the present application obtains the biological biometric information of the target object through the biological biometric collection device, and in turn determines whether the target object belongs to the first type user, the second type user or The third type of user, if it is, allows the target object to enter, if not, the target object is determined to be the fourth type of user, and the target object is not allowed to enter the electronic gate.
- the embodiments of the present application determine whether the target object is equipped with the access permission of the electronic gate by collecting the biological biometric information of the target object, eliminating the steps of the target object swiping the access control card or showing the identity document, thereby improving the user experience;
- the method of biometric information can effectively prevent others from fraudulently using information such as identification documents, thereby improving the security of the electronic gate.
- the user level to which the target object belongs can be sent to the associated terminal, so that the manager corresponding to the associated terminal can view the user level of the target object, and even save the entry and exit records of the target object.
- the target object belongs to the fourth type of user it is displayed on the associated terminal that the target object belongs to the fourth type of user, so that the administrator can judge whether the target object is allowed to enter, and if the target object is allowed to enter, they should go to the corresponding duty room Visitor registration.
- the stability-related personnel database can be linked to determine whether the target object is a stability-related person by identifying the target object's biometric information, and if so, notify the security or management personnel for further processing.
- the missing population database can be linked to identify the target object's biometric information to determine whether the target object is a missing population or a person with abnormal status such as mental illness or dementia. If so, notify the security or management personnel to do Further processing.
- an embodiment of the present application further provides an opening device of the electronic gate.
- FIG. 3 which includes the following parts:
- the receiving module 302 is configured to receive the biological biometric information of the target object; wherein the biological biometric information carries account information and/or electronic gate position information.
- the level determination module 304 is configured to determine the user level to which the target object belongs based on the biological characteristics information of the living body; wherein, the user level is related to account information and/or electronic gate position information.
- the judging module 306 is configured to judge whether the user level is equipped with the access authority of the electronic gate.
- the authority opening module 308 is configured to open the electronic gate to the target object when the judgment result of the judgment module is yes.
- the information acquisition module acquires the biological biometric information of the target object through the biological biometric collection device, and the level determination module determines the user level to which the user belongs according to the biological biometric information, and then judges The module judges whether the user level is equipped with the access permission of the electronic gate. If there is, the permission opening module allows the target object to enter the electronic gate.
- the embodiments of the present application determine whether the target object is equipped with the access permission of the electronic gate by collecting the biological biometric information of the target object, eliminating the steps of the target object swiping the access control card or showing the identity document, thereby improving the user experience;
- the method of biometric information can effectively prevent others from fraudulently using identity documents and other information, thereby improving the security of the electronic gate; at the same time, through the location information and living biological information to further confirm whether it is the user object, it can also effectively reduce the search range, thereby Reduce the investment of hardware equipment and improve the efficiency of user level confirmation.
- the device is a server.
- the server includes a processor and a storage device; a computer program is stored on the storage device, and when the computer program is executed by the processor, the computer program executes any one of the embodiments described above. method.
- the server 100 includes: a processor 40, a memory 41, a bus 42, and a communication interface 43.
- the processor 40, the communication interface 43, and the memory 41 pass through the bus 42.
- the processor 40 is configured to execute an executable module stored in the memory 41, for example, a computer program.
- the memory 41 may include a high-speed random access memory (RAM, Random Access Memory), or may include a non-volatile memory (non-volatile memory), such as at least one disk memory.
- RAM Random Access Memory
- non-volatile memory such as at least one disk memory.
- the communication connection between the system network element and at least one other network element is achieved through at least one communication interface 43 (which may be wired or wireless), and the Internet, wide area network, local area network, metropolitan area network, etc. may be used.
- the bus 42 may be an ISA bus, a PCI bus, an EISA bus, or the like.
- the bus can be divided into an address bus, a data bus, and a control bus. For ease of representation, only one bidirectional arrow is used in FIG. 4, but it does not mean that there is only one bus or one type of bus.
- the memory 41 is configured to store a program, and the processor 40 executes the program after receiving the execution instruction.
- the method executed by the apparatus defined by the stream process disclosed in any of the embodiments of the present application may be applied to processing Processor 40, or implemented by processor 40.
- the processor 40 may be an integrated circuit chip with signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 40 or instructions in the form of software.
- the above processor 40 may be a general-purpose processor, including a central processing unit (CPU) and a network processor (NP), etc.; it may also be a digital signal processor (DSP). ), application specific integrated circuit (Application Specific Integrated Circuit, ASIC for short), ready-made programmable gate array (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gates or transistor logic devices, and discrete hardware components.
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application may be implemented or executed.
- the general-purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
- the steps of the method disclosed in conjunction with the embodiments of the present application may be directly embodied and executed by a hardware decoding processor, or may be executed and completed by a combination of hardware and software modules in the decoding processor.
- the software module may be located in a mature storage medium in the art, such as random access memory, flash memory and/or read-only memory, programmable read-only memory or electrically erasable programmable memory, and registers.
- the storage medium is located in the memory 41.
- the processor 40 reads the information in the memory 41 and completes the steps of the above method in combination with its hardware.
- the computer error-proofing method, device and server computer program product provided by the embodiments of the present application include a computer-readable storage medium storing non-volatile program code executable by a processor, and a computer is stored on the computer-readable storage medium Program, when the computer program is executed by the processor, the method described in the foregoing method embodiment is executed. For specific implementation, refer to the method embodiment, and details are not described herein again.
- the computer program product of the readable storage medium provided by the embodiments of the present application includes a computer-readable storage medium storing program codes, and the instructions included in the program codes may be configured to perform the method described in the foregoing method embodiments, specifically For implementation, refer to the method embodiment, and details are not described herein again.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium.
- the technical solution of the present application essentially or part of the contribution to the existing technology or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to enable a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application.
- the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program code .
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
- Alarm Systems (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
一种电子闸门的开启方法、装置及服务器,该方法包括:接收目标对象的活体生物特征信息(S102);其中活体生物特征信息携带有账号信息,和/或,电子闸门位置信息;根据活体生物特征信息,确定目标对象所属的用户级别(S104);其中,用户级别与账号信息,和/或,电子闸门位置信息相关;判断用户级别是否配有电子闸门的进入权限(S106);如果是,向目标对象开启电子闸门(S108)。通过采集目标对象活体生物特征信息,来判断目标对象是否配有电子闸门的进入权限,省去目标对象刷门禁卡片或者出示身份证件的步骤,进而提高用户体验;另外,采用采集活体生物特征信息的方式,可以有效防止他人冒用身份证件等信息,进而提高电子闸门的安全性。
Description
相关申请的交叉引用
本申请要求于2018年12月26日提交中国专利局的申请号为201811608295.5、名称为“电子闸门的开启方法、装置及服务器”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及安防技术领域,尤其是涉及一种电子闸门的开启方法、装置及服务器。
随着社会的不断发展,用户的安防意识也随之逐渐加强,门禁系统和电子闸门等设备应运而生。目前,现有的门禁系统或电子闸门等设备,需要刷门禁卡片进入,或者出示身份证件才允许用户进入,导致用户的进出需要经过较为繁琐的过程,从而降低了用户的体验。另外,当来访人员的数量较多时,往往需要每个用户进行身份登记才能进入,不但耗时和耗人力资源,还会进一步降低用户体验。并且当用户的门禁卡片或者身份证件丢失时,可能被他人拾取或冒用,不但将会给用户带来不便,同时还可能带来安全隐患。
发明内容
有鉴于此,本申请的目的在于提供一种电子闸门的开启方法、装置及服务器,可以简化用户经过电子闸门时的操作步骤,进而提高用户体验;同时还可以提高电子闸门的安全性。
第一方面,本申请实施例提供了一种电子闸门的开启方法,包括:接收目标对象的活体生物特征信息;其中活体生物特征信息携带有账号信息,和/或,电子闸门位置信息;根据活体生物特征信息,确定目标对象所属的用户级别;其中,用户级别与账号信息,和/或,电子闸门位置信息相关;判断用户级别是否配有电子闸门的进入权限;如果是,向目标对象开启电子闸门。
结合第一方面,本申请实施例提供了第一方面的第一种可能的实施方式,其中,上述用户级别包括第一类用户、第二类用户、第三类用户和第四类用户;根据活体生物特征信息,确定目标对象所属的用户级别的步骤,包括:根据活体生物特征信息和第一服务器内的各用户的生物特征信息,判断目标对象所属的用户级别是否为第一类用户;如果否,将活体生物特征信息发送至第二服务器,以使第二服务器基于活体生物特征信息进行第二生物特征匹配,得到第二生物特征匹配结果;根据第二生物特征匹配结果判断目标对象所属的用户级别是否为第二类用户;如果否,将活体生物特征信息发送至第三服务器,以使第三服务器基于活体生物特征信息进行第三生物特征匹配,得到第三生物特征匹配结果;根 据第三生物特征匹配结果判断目标对象所属的用户级别是否为第三类用户;如果否,确定目标对象所属的用户级别为第四类用户。
结合第一方面的第一种可能的实施方式,本申请实施例提供了第一方面的第二种可能的实施方式,其中,上述根据活体生物特征信息和第一服务器内的各用户的生物特征信息,判断目标对象所属的用户级别是否为第一类用户的步骤,包括:获取第一服务器内的各第一类用户的生物特征信息;对活体生物特征信息和各第一类用户的生物特征信息进行第一生物特征匹配;当第一生物特征匹配成功时,将目标对象所属的用户级别确定为第一类用户。
结合第一方面的第一种可能的实施方式,本申请实施例提供了第一方面的第三种可能的实施方式,其中,上述将活体生物特征信息发送至第二服务器,以使第二服务器基于活体生物特征信息进行第二生物特征匹配,得到第二生物特征匹配结果;根据第二生物特征匹配结果判断目标对象所属的用户级别是否为第二类用户的步骤,包括:基于活体生物特征信息生成第一识别请求;其中,第一识别请求包括活体生物特征信息和账号信息;将第一识别请求发送至第二服务器,以使第二服务器查找与账号信息对应的各授权用户的生物特征信息,对活体生物特征信息和各授权用户的生物特征信息进行第二生物特征匹配,并返回第二生物特征匹配结果;当第二生物特征匹配结果为成功时,向目标对象的关联终端发送位置确认请求;接收目标对象的关联终端基于位置确认请求返回的位置确认信息,并将目标对象所属的用户级别确定为第二类用户。
结合第一方面的第一种可能的实施方式,本申请实施例提供了第一方面的第四种可能的实施方式,其中,上述将活体生物特征信息发送至第三服务器,以使第三服务器基于活体生物特征信息进行第三生物特征匹配,得到第三生物特征匹配结果;根据第三生物特征匹配结果判断目标对象所属的用户级别是否为第三类用户的步骤,包括:基于活体生物特征信息生成第二识别请求;其中,第二识别请求包括活体生物特征信息和电子闸门位置信息;将第二识别请求发送至第二服务器,以使第二服务器获取电子闸门位置信息对应的第一栅格区域内的各当前用户的生物特征信息,和/或,与第一栅格区域相邻的第二栅格区域内的各当前用户的生物特征信息,并对活体生物特征信息和各当前用户的生物特征信息进行第三生物特征匹配,并返回第三生物特征匹配结果;其中,第三服务器对各用户的轨迹进行跟踪,以确定处于第一栅格区域,和/或,第二栅格区域内的各当前用户;当第三生物特征匹配结果为成功时,将目标对象所属的用户级别确定为第三类用户。
结合第一方面的第一种可能的实施方式,本申请实施例提供了第一方面的第五种可能的实施方式,其中,上述判断用户级别是否配有电子闸门的进入权限的步骤,包括:当用户级别为第一类用户、第二类用户或第三类用户时,确定用户级别配有电子闸门的进入权 限。
结合第一方面,本申请实施例提供了第一方面的第六种可能的实施方式,其中,上述方法还包括:将目标对象所属的用户级别发送至关联终端,以使关联终端对应的管理人员查看目标对象的用户级别。
第二方面,本申请实施例还提供一种电子闸门的开启装置,包括:接收模块,配置成接收目标对象的活体生物特征信息;其中活体生物特征信息携带有账号信息,和/或,电子闸门位置信息;级别确定模块,配置成根据活体生物特征信息,确定目标对象所属的用户级别;其中,用户级别与账号信息,和/或,电子闸门位置信息相关;判断模块,配置成判断用户级别是否配有电子闸门的进入权限;权限开放模块,配置成在判断模块的判断结果为是时,向目标对象开启电子闸门。
第三方面,本申请实施例还提供一种服务器,包括处理器和存储器;存储器上存储有计算机程序,计算机程序在被处理器运行时执行如第一方面至第一方面的第六种可能的实施方式任一项的方法。
第四方面,本申请实施例还提供一种计算机存储介质,配置成储存为第一方面至第一方面的第六种可能的实施方式任一项方法所用的计算机软件指令。
本申请实施例带来了以下有益效果:
本申请实施例提供的电子闸门的开启方法、装置及服务器,通过接收携带有账号信息或电子闸门位置信息的目标对象的活体生物特征信息,根据该活体生物特征信息以及账号信息或电子闸门位置信息确定用户所属的用户级别,然后判断该用户级别是否配有电子闸门的进入权限,如果有,则允许目标对象进入电子闸门。本申请实施例通过目标对象活体生物特征信息以及账号信息或电子闸门位置信息,判断目标对象是否配有电子闸门的进入权限,省去目标对象刷门禁卡片或者出示身份证件的步骤,进而提高用户体验;另外,采用采集活体生物特征信息的方式,可以有效防止他人冒用身份证件等信息,进而提高电子闸门的安全性;同时通过位置信息配合活体生物信息进一步确认是否为用户对象本人,还可以有效缩减搜寻的范围,从而减少硬件设备的投入和提高用户级别确认的效率。
本申请的其他特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本申请而了解。本申请的目的和其他优点在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。
为使本申请的上述目的、特征和优点能更明显易懂,下文特举较佳实施例,并配合所附附图,作详细说明如下。
为了更清楚地说明本申请具体实施方式或现有技术中的技术方案,下面将对具体实施 方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的一种电子闸门开启方法的流程示意图;
图2为本申请实施例提供的另一种电子闸门开启方法的流程示意图;
图3为本申请实施例提供的一种电子闸门的开启装置的结构示意图;
图4为本申请实施例提供的一种服务器的结构示意图。
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合附图对本申请的技术方案进行清楚且完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
目前,现有的门禁系统或电子闸门等设备,需要刷门禁卡片进入,或者出示身份证件才允许用户进入,导致用户的进出需要经过较为繁琐的过程,从而降低了用户的体验。另外,当来访人员的数量较多时,往往需要每个用户进行身份登记才能进入,不但耗时和耗人力资源,还会进一步降低用户体验。并且当用户的门禁卡片或者身份证件丢失时,可能被他人拾取或冒用,不但将会给用户带来不便,同时还可能带来安全隐患,基于此,本申请实施例提供的一种电子闸门的开启方法、装置及服务器,通过目标对象活体生物特征信息以及账号信息或电子闸门位置信息,判断目标对象是否配有电子闸门的进入权限,省去目标对象刷门禁卡片或者出示身份证件的步骤,进而提高用户体验;另外,采用采集活体生物特征信息的方式,可以有效防止他人冒用身份证件等信息,进而提高电子闸门的安全性。
为便于对本实施例进行理解,首先对本申请实施例所公开的一种电子闸门的开启方法进行详细介绍,参见图1所示的一种电子闸门开启方法的流程示意图,该方法包括以下步骤:
步骤S102,接收目标对象的活体生物特征信息。
在一种实施方式中,可以在电子闸门上设置活体生物特征采集设备,当目标对象希望进入电子闸门时,配合活体生物特征采集设备做出相应操作,以使生物特征信息采集设备获取该目标对象的活体生物特征信息。其中,活体生物特征信息可以为活体人脸信息、活体虹膜信息、活体巩膜信息、活体眼纹信息、活体耳纹信息、活体掌静脉信息、活体指静脉信息、活体掌纹信息或者活体声纹信息等生物特征信息中的一种或多种。优选地,可以采用活体人脸采集设备作为活体生物特征采集设备,通过活体人脸采集设备对目标对象的 活体人脸信息进行采集。
进一步地,考虑到用户级别与账号信息或电子闸门位置信息相关,所以为了便于对目标对象的用户级别进行识别,上述活体生物特征信息还携带有账号信息,和/或,电子闸门位置信息,当通过活体生物特征采集设备采集到目标对象的活体生物特征信息后,即可以获取电子闸门对应的账号信息或者电子闸门位置信息。在一种实施方式中,当电子闸门应用在住宅小区时,账号信息可以为电子闸门的编号信息,优选地,因为住宅小区存在多个电子闸门,因此账号信息可以为住宅小区对应的账号信息。
步骤S104,根据活体生物特征信息,确定目标对象所属的用户级别。
针对不同用户类别,预先将用户划分为多个级别,将目标对象的活体生物特征信息与各用户级别内用户的生物特征信息进行匹配,以确定目标对象的用户级别。其中,用户级别与账号信息,和/或,电子闸门位置信息相关。
在一种实施方式中,可以将配有电子闸门进入权限的用户划分为三个用户级别,第一类用户可以为小区居民、安保人员和物管人员,第一类用户的生物特征信息存储在第一服务器中,可直接将目标对象的活体生物特征信息与第一服务器中存储的各第一类用户的各生物特征信息进行匹配,如果匹配成功,则可以将目标对象确定为第一类用户;第二类可以用户为辖区警察、当地治安人员、快递员、外卖送餐员、房屋中介和临时工等经常进出小区的人员,第二类用户通过对电子闸门授权或者对电子闸门对应的住宅小区和办公楼等授权,得到第二类用户与电子闸门编号、住宅小区编号或者办公楼编号的对应关系,将目标对象的活体生物特征信息与第二类用户的各生物特征信息进行匹配,如果匹配成功,则可以将目标对象确定为第二类用户;第三类用户可以为身份未知的访客,在电子闸门对应栅格区域内的各用户均可以为第三类用户,具体地,可以获取当前在该电子闸门所处区域内的用户的生物特征信息,以判断目标对象是否为未知访客,从而确定目标对象是否属于第三类用户;并可以对同一个访客一段时期进出小区的频率进行统计,如果超过预设次数,则进行预警,以增加小区的安全性。当目标对象属于上述第一类用户、第二类用户或第三类用户中的任一类用户时,说明目标对象配有该电子闸门的进入权限。进一步地,若在上述三类用户中均未匹配到与目标对象对应的用户信息,则可以将目标对象划分为第四类用户,并且第四类用户没有进入电子闸门的权限和/或进行警报的人群。
其中,上述电子闸门可以为智能闸机、智能通道、智能门禁、智能停车场闸门和智能电梯等等多种设备,并且可以应用在小区大门入口、大楼入口、写字楼大厅、公共场所、展馆、商店或名牌商品店等多种场景,以提供更为安全的、便捷的和可实现电子围栏的门禁系统。
步骤S106,判断用户级别是否配有电子闸门的进入权限。
通过判断目标对象的用户级别,进而可以判断目标对象是否有电子闸门的进入权限。当目标对象的用户级别为第一类用户、第二类用户或第三类用户中的任一用户级别时,则说明目标对象配有电子闸门的进入权限;当目标对象的用户级别为第四类用户时,则说明目标对象没有电子闸门的进入权限。
步骤S108,如果是,向目标对象开启电子闸门。
可以理解的是,当目标对象属于上述第一类用户、第二类用户或第三类用户中的任一用户级别时,目标对象即可以进入电子闸门,因此需要向目标对象开启电子闸门。
本申请实施例提供的电子闸门的开启方法,通过接收携带有账号信息或电子闸门位置信息的目标对象的活体生物特征信息,根据该活体生物特征信息以及账号信息或电子闸门位置信息确定用户所属的用户级别,然后判断该用户级别是否配有电子闸门的进入权限,如果有,则允许目标对象进入电子闸门。本申请实施例通过目标对象活体生物特征信息以及账号信息或电子闸门位置信息,判断目标对象是否配有电子闸门的进入权限,省去目标对象刷门禁卡片或者出示身份证件的步骤,进而提高用户体验;另外,采用采集活体生物特征信息的方式,可以有效防止他人冒用身份证件等信息,进而提高电子闸门的安全性;同时通过位置信息配合活体生物信息进一步确认是否为用户对象本人,还可以有效缩减搜寻的范围,从而减少硬件设备的投入和提高用户级别确认的效率。
为便于对上述实施例进行理解,本申请实施例还提供了另一种电子闸门的开启方法,参见图2所示的另一种电子闸门开启方法的流程示意图,该方法包括以下步骤:
步骤S202,接收目标对象的活体生物特征信息。
其中,当活体生物特征信息为活体人脸信息时,通过人脸信息采集设备获取目标对象的活体人脸信息。另外,还应预先将用户级别划分为第一类用户、第二类用户、第三类用户和第四类用户,以便于对目标对象的用户级别进行判断。
步骤S204,根据活体生物特征信息和第一服务器内的各用户的生物特征信息,判断目标对象所属的用户级别是否为第一类用户。如果是,执行步骤S216;如果否,执行步骤S206。
优选地,首先采用第一服务器内存储的生物特征信息进行匹配,当目标对象为第一类用户时,则无需进行后续判断,进而可以减少数据交换。其中,第一服务器可以为本地服务器或远程服务器。
为了便于理解,本申请实施例提供了一种根据活体生物特征信息和第一服务器内的各用户的生物特征信息,判断目标对象所属的用户级别是否为第一类用户的方法,该方法包括以下步骤:
(1)获取第一服务器内的各第一类用户的生物特征信息。
当生物特征信息为人脸信息时,获取第一服务器内各第一类用户的人脸信息,以基于 目标对象的活体人脸信息和各第一类用户的人脸信息判断目标对象是否为第一类用户。
(2)对活体生物特征信息和各第一类用户的生物特征信息进行第一生物特征匹配。
优选地,先判断目标对象的活体生物特征信息是不是直接来源于真实活体,当目标对象的活体生物特征信息不是直接来源于真实活体时,则将目标对象确定为第四类用户,并不允许目标对象进入电子闸门。
(3)当第一生物特征匹配成功时,将目标对象所属的用户级别确定为第一类用户。
可以理解的是,当第一生物特征匹配成功,说明目标对象在第一服务器内存储有生物特征信息,从而可以将目标对象确定为第一类用户。
对于第一类用户,因为采用活体生物特征识别来判断目标对象是否属于第一类用户,可以方便目标对象不携带手机等关联终端,便于第一类用户的进出。通过第一类用户的设置,可以最大限度提供用户的自由度,提高用户体验的同时,允许用户不带手机等设备通过闸门,大大方便了年幼和年长等用户群体自由进出小区等场所。
步骤S206,将活体生物特征信息发送至第二服务器,以使第二服务器基于活体生物特征信息进行第二生物特征匹配,得到第二生物特征匹配结果。
当目标对象不属于第一类用户时,继续判断目标对象是否属于第二类用户。在一种实施方式中,可以将目标对象的活体生物特征信息发送至第二服务器,由第二服务器根据该活体生物特征信息进行生物特征匹配,进而得知用户是否属于第二类用户。
具体地,基于活体生物特征信息生成第一识别请求,其中,第一识别请求包括活体生物特征信息和账号信息,然后将第一识别请求发送至第二服务器,以使第二服务器查找与账号信息对应的各授权用户的生物特征信息,并对活体生物特征信息和各授权用户的生物特征信息进行第二生物特征匹配,得到第二生物特征匹配结果。
通过获取账号信息对应的授权用户的生物特征信息,可以有效减少搜索用户生物特征信息的数量,进而提高身份识别速度,提高生物识别的精准度。另外,由于用户已经对该电子闸门、住宅小区或者办公楼进行授权,因此已经对用户的信息进行备案,因此可以更方便进出人员的规范化管理。
步骤S208,根据第二生物特征匹配结果判断目标对象所属的用户级别是否为第二类用户。如果是,执行步骤S216;如果否,执行步骤S210。
因为目标对象应当位于上述电子闸门附近,所以可以进一步判断目标对象是否与电子闸门相邻。具体地,当第二生物特征匹配成功时,向目标对象的关联终端发送位置确认请求,以使目标对象返回位置确认信息,确认目标对象位置信息与电子闸门位置相邻,此时即可将目标对象确定为第二类用户。
对于第二类用户,同样可以采用生物特征识别的方式进行电子闸门,另外,由于仅需 要将目标对象的活体生物特征信息与账号信息对应的各生物特征信息进行匹配,无需目标对象的关联终端实时发送位置信息,在提高用户体验的同时,可以有效保护目标对象的位置隐私。
步骤S210,将活体生物特征信息发送至第三服务器,以使第三服务器基于活体生物特征信息进行第三生物特征匹配,得到第三生物特征匹配结果。
当目标对象不属于第二类用户时,继续判断目标对象是否属于第三类用户。在一种实施方式中,可以将目标对象的活体生物特征信息发送至第三服务器,由第三服务器根据该活体生物特征信息进行生物特征匹配,进而得知用户是否属于第三类用户。
具体地,基于活体生物特征信息生成第二识别请求,其中,第二识别请求包括活体生物特征信息和电子闸门位置信息,然后将第二识别请求发送至第三服务器,以使第三服务器获取电子闸门位置信息对应的第一栅格区域内的各当前用户的生物特征信息,并对活体生物特征信息和各当前用户的生物特征信息进行第三生物特征匹配,当第三生物特征匹配成功时,将目标对象所属的用户级别确定为第三类用户。优选地,当在第一栅格区域内没有匹配到与目标对象对应的当前用户时,考虑到定位误差对栅格区域定位的影响,可以在获取与第一栅格区域相邻的第二栅格区域内的各当前用户的生物特征信息,并进行第三生物特征识别,得到第三生物特征匹配结果。
另外,为了得知各用户所处的栅格区域,可以通过第三服务器对各用户的轨迹进行跟踪,以确定处于第一栅格区域和第二栅格区域内的各当前用户。
通过获取电子闸门位置信息对应区域内的各用户的生物特征信息,同样可以有效减少搜索用户生物特征信息的数量,进而提高身份识别速度。另外,还可以使第三类用户在不填写任何资料的情况下,自由进出电子闸门,便于第三类用户的进出。优选地,可以记录第三类用户的当天或者近期进出各电子闸门的次数,对于频繁进出的用户可以进行预警,以防止发生治安事件。
步骤S212,根据第三生物特征匹配结果判断目标对象所属的用户级别是否为第三类用户。如果是,执行步骤S216;如果否,执行步骤S214。
当第三生物特征匹配成功时,即可将目标对象确定为第三类用户。对于第三类用户,无需目标对象在治安岗登记身份,便允许目标对象直接通过电子闸门,为目标对象提供更简单、方便和快捷的进出方式,进而提高目标对象的用户体验。
步骤S214,确定目标对象所属的用户级别为第四类用户。
可以理解的是,当目标对象为第四类用户时,目标对象将无法进入电子闸门内,或者通过安保人员手动打开电子闸门,以允许目标对象进入。
当用户级别为第一类用户、第二类用户或第三类用户时,确定用户级别配有电子闸门 的进入权限。
步骤S216,向目标对象开启电子闸门。
本申请实施例提供的电子闸门的开启方法,通过活体生物特征采集设备获取目标对象的活体生物特征信息,并根据该活体生物特征信息依次判断目标对象是否属于第一类用户、第二类用户或第三类用户,如果是,则允许目标对象进入,如果不是,则将目标对象确定为第四类用户,并且不允许目标对象进入电子闸门。本申请实施例通过采集目标对象活体生物特征信息,来判断目标对象是否配有电子闸门的进入权限,省去目标对象刷门禁卡片或者出示身份证件的步骤,进而提高用户体验;另外,采用采集活体生物特征信息的方式,可以有效防止他人冒用身份证件等信息,进而提高电子闸门的安全性。
进一步地,可以将目标对象所属的用户级别发送至关联终端,以使关联终端对应的管理人员查看目标对象的用户级别,甚至保存目标对象的进出记录。另外,当目标对象属于第四类用户时,在关联终端上显示目标对象属于第四类用户,以使管理人员判断是否允许目标对象进入,若允许目标对象进入,则应到相应的值班室进行访客登记。
进一步地,可以联动涉稳人员库,通过对目标对象的生物特征信息进行身份识别,判断目标对象是否为涉稳人员,如果是则通知保安或者管理人员,做进一步处理。另外,还可以联动失踪人口库,通过对目标对象的生物特征信息进行身份识别,判断目标对象是否为失踪人口或者诸如精神疾病或者老年痴呆等状态异常人员,如果是则通知保安或者管理人员,做进一步处理。
对于前述实施例提供的电子闸门的开启方法,本申请实施例还提供了一种电子闸门的开启装置,参见图3所示的一种电子闸门的开启装置的结构示意图,该装置包括以下部分:
接收模块302,配置成接收目标对象的活体生物特征信息;其中活体生物特征信息携带有账号信息,和/或,电子闸门位置信息。
级别确定模块304,配置成根据活体生物特征信息,确定目标对象所属的用户级别;其中,用户级别与账号信息,和/或,电子闸门位置信息相关。
判断模块306,配置成判断用户级别是否配有电子闸门的进入权限。
权限开放模块308,配置成在判断模块的判断结果为是时,向目标对象开启电子闸门。
本申请实施例提供的电子闸门的开启装置,信息获取模块通过活体生物特征采集设备获取目标对象的活体生物特征信息,并由级别确定模块根据该活体生物特征信息确定用户所属的用户级别,然后判断模块判断该用户级别是否配有电子闸门的进入权限,如果有,权限开放模块则允许目标对象进入电子闸门。本申请实施例通过采集目标对象活体生物特征信息,来判断目标对象是否配有电子闸门的进入权限,省去目标对象刷门禁卡片或者出示身份证件的步骤,进而提高用户体验;另外,采用采集活体生物特征信息的方式,可以 有效防止他人冒用身份证件等信息,进而提高电子闸门的安全性;同时通过位置信息配合活体生物信息进一步确认是否为用户对象本人,还可以有效缩减搜寻的范围,从而减少硬件设备的投入和提高用户级别确认的效率。
本申请实施例所提供的装置,其实现原理及产生的技术效果和前述方法实施例相同,为简要描述,装置实施例部分未提及之处,可参考前述方法实施例中相应内容。
该设备为一种服务器,具体地,该服务器包括处理器和存储装置;存储装置上存储有计算机程序,计算机程序在被所述处理器运行时执行如上所述实施方式的任一项所述的方法。
图4为本申请实施例提供的一种服务器的结构示意图,该服务器100包括:处理器40,存储器41,总线42和通信接口43,所述处理器40、通信接口43和存储器41通过总线42连接;处理器40配置成执行存储器41中存储的可执行模块,例如计算机程序。
其中,存储器41可能包含高速随机存取存储器(RAM,Random Access Memory),也可能还包括非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。通过至少一个通信接口43(可以是有线或者无线)实现该系统网元与至少一个其他网元之间的通信连接,可以使用互联网、广域网、本地网和城域网等。
总线42可以是ISA总线、PCI总线或EISA总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,图4中仅用一个双向箭头表示,但并不表示仅有一根总线或一种类型的总线。
其中,存储器41配置成存储程序,所述处理器40在接收到执行指令后,执行所述程序,前述本申请实施例任一实施例揭示的流过程定义的装置所执行的方法可以应用于处理器40中,或者由处理器40实现。
处理器40可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器40中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器40可以是通用处理器,包括中央处理器(Central Processing Unit,简称CPU)和网络处理器(Network Processor,简称NP)等;还可以是数字信号处理器(Digital Signal Processing,简称DSP)、专用集成电路(Application Specific Integrated Circuit,简称ASIC)、现成可编程门阵列(Field-Programmable Gate Array,简称FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件以及分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存和/或只读存储器,可编程只读存储器或者电可擦写可编程存储器以及寄存器等本领域成熟的存 储介质中。该存储介质位于存储器41,处理器40读取存储器41中的信息,结合其硬件完成上述方法的步骤。
本申请实施例所提供的工艺防错方法、装置及服务器的计算机程序产品,包括存储了处理器可执行的非易失的程序代码的计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器运行时执行前面方法实施例中所述的方法,具体实现可参见方法实施例,在此不再赘述。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统具体工作过程,可以参考前述实施例中的对应过程,在此不再赘述。
本申请实施例所提供的可读存储介质的计算机程序产品,包括存储了程序代码的计算机可读存储介质,所述程序代码包括的指令可配置成执行前面方法实施例中所述的方法,具体实现可参见方法实施例,在此不再赘述。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上所述实施例,仅为本申请的具体实施方式,用以说明本申请的技术方案,而非对其限制,本申请的保护范围并不局限于此,尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,其依然可以对前述实施例所记载的技术方案进行修改或可轻易想到变化,或者对其中部分技术特征进行等同替换;而这些修改、变化或者替换,并不使相应技术方案的本质脱离本申请实施例技术方案的精神和范围,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。
Claims (10)
- 一种电子闸门的开启方法,其特征在于,包括:接收目标对象的活体生物特征信息;其中所述活体生物特征信息携带有账号信息,和/或,电子闸门位置信息;根据所述活体生物特征信息,确定所述目标对象所属的用户级别;其中,所述用户级别与所述账号信息,和/或,所述电子闸门位置信息相关;判断所述用户级别是否配有电子闸门的进入权限;如果是,向所述目标对象开启所述电子闸门。
- 根据权利要求1所述的方法,其特征在于,所述用户级别包括第一类用户、第二类用户、第三类用户和第四类用户;所述根据所述活体生物特征信息,确定所述目标对象所属的用户级别的步骤,包括:根据所述活体生物特征信息和第一服务器内的各用户的生物特征信息,判断所述目标对象所属的用户级别是否为第一类用户;所述第一服务器为本地服务器或远程服务器;如果否,将所述活体生物特征信息发送至第二服务器,以使所述第二服务器基于所述活体生物特征信息进行第二生物特征匹配,得到第二生物特征匹配结果,并向用户管理的终端设备发出位置请求;根据所述第二生物特征匹配结果和位置信息判断所述目标对象所属的用户级别是否为第二类用户;如果否,将所述活体生物特征信息发送至第三服务器,所述第三服务器基于所述电子闸门位置信息查询所有在预设范围内用户,并获取所述用户所述活体生物特征信息进行第三生物特征匹配,得到第三生物特征匹配结果;根据所述第三生物特征匹配结果判断所述目标对象所属的用户级别是否为第三类用户;如果否,确定所述目标对象所属的用户级别为第四类用户。
- 根据权利要求2所述的方法,其特征在于,所述根据所述活体生物特征信息和第一服务器内的各用户的生物特征信息,判断所述目标对象所属的用户级别是否为第一类用户的步骤,包括:获取第一服务器内的各第一类用户的生物特征信息;对所述活体生物特征信息和各所述第一类用户的生物特征信息进行第一生物特征匹配;当所述第一生物特征匹配成功时,将所述目标对象所属的用户级别确定为所述第一类用户。
- 根据权利要求2所述的方法,其特征在于,所述将所述活体生物特征信息发送至第二服务器,以使所述第二服务器基于所述活体生物特征信息进行第二生物特征匹配,得到第二生物特征匹配结果;根据所述第二生物特征匹配结果判断所述目标对象所属的用户级别是否为第二类用户的步骤,包括:基于所述活体生物特征信息生成第一识别请求;其中,所述第一识别请求包括所述活体生物特征信息和所述账号信息;将所述第一识别请求发送至第二服务器,以使所述第二服务器查找与所述账号信息对应的各授权用户的生物特征信息,对所述活体生物特征信息和各所述授权用户的生物特征信息进行第二生物特征匹配,并返回第二生物特征匹配结果;当所述第二生物特征匹配结果为成功时,向所述目标对象的关联终端发送位置确认请求;接收所述目标对象的关联终端基于所述位置确认请求返回的位置确认信息,并将所述目标对象所属的用户级别确定为所述第二类用户。
- 根据权利要求2所述的方法,其特征在于,所述将所述活体生物特征信息发送至第三服务器,以使所述第三服务器基于所述活体生物特征信息进行第三生物特征匹配,得到第三生物特征匹配结果;根据所述第三生物特征匹配结果判断所述目标对象所属的用户级别是否为第三类用户的步骤,包括:基于所述活体生物特征信息生成第二识别请求;其中,所述第二识别请求包括所述活体生物特征信息和所述电子闸门位置信息;将所述第二识别请求发送至第三服务器,以使所述第三服务器获取所述电子闸门位置信息对应的第一栅格区域内的各当前用户的生物特征信息,和/或,与所述第一栅格区域相邻的第二栅格区域内的各当前用户的生物特征信息,对所述活体生物特征信息和各所述当前用户的生物特征信息进行第三生物特征匹配,并返回第三生物特征匹配结果;其中,所述第三服务器对各用户的轨迹进行跟踪,以确定处于所述第一栅格区域,和/或,第二栅格区域内的各当前用户;当所述第三生物特征匹配结果为成功时,将所述目标对象所属的用户级别确定为所述第三类用户。
- 根据权利要求2所述的方法,其特征在于,所述判断所述用户级别是否配有电子闸门的进入权限的步骤,包括:当所述用户级别为第一类用户、第二类用户或第三类用户时,确定所述用户级别配有电子闸门的进入权限。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:将所述目标对象所属的用户级别发送至关联终端,以使所述关联终端对应的管理人员查看所述目标对象的用户级别。
- 一种电子闸门的开启装置,其特征在于,包括:接收模块,配置成接收目标对象的活体生物特征信息;其中所述活体生物特征信息携带有账号信息,和/或,电子闸门位置信息;级别确定模块,配置成根据所述活体生物特征信息,确定所述目标对象所属的用户级别;其中,所述用户级别与所述账号信息,和/或,所述电子闸门位置信息相关;判断模块,配置成判断所述用户级别是否配有电子闸门的进入权限;权限开放模块,配置成在所述判断模块的判断结果为是时,向所述目标对象开启所述电子闸门。
- 一种服务器,其特征在于,包括处理器和存储器;所述存储器上存储有计算机程序,所述计算机程序在被所述处理器运行时执行如权利要求1至7任一项所述的方法。
- 一种计算机存储介质,其特征在于,配置成储存为权利要求1至7任一项所述方法所用的计算机软件指令。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201980086689.5A CN113330491B (zh) | 2018-12-26 | 2019-12-12 | 电子闸门的开启方法、装置及服务器 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811608295.5 | 2018-12-26 | ||
CN201811608295.5A CN109712291B (zh) | 2018-12-26 | 2018-12-26 | 电子闸门的开启方法、装置及服务器 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020135079A1 true WO2020135079A1 (zh) | 2020-07-02 |
Family
ID=66258576
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/124903 WO2020135079A1 (zh) | 2018-12-26 | 2019-12-12 | 电子闸门的开启方法、装置及服务器 |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN109712291B (zh) |
WO (1) | WO2020135079A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553474A (zh) * | 2022-01-07 | 2022-05-27 | 南方电网深圳数字电网研究院有限公司 | 基于物联网的门禁权限控制方法及装置 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109712291B (zh) * | 2018-12-26 | 2020-11-10 | 巽腾(广东)科技有限公司 | 电子闸门的开启方法、装置及服务器 |
CN113223226A (zh) * | 2021-05-26 | 2021-08-06 | 武汉量卓科技有限公司 | 一种基于人工智能的智慧展会智能管理方法、系统及计算机存储介质 |
CN113870477A (zh) * | 2021-12-02 | 2021-12-31 | 湖北大学 | 一种人员身份识别管理系统及方法 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105139490A (zh) * | 2015-08-04 | 2015-12-09 | 国网上海市电力公司 | 一种用于无人值守变电站的门控管理方法 |
CN105678872A (zh) * | 2015-12-30 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | 一种门禁管理系统及其授权方法和门禁终端设备 |
CN105681278A (zh) * | 2015-12-29 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | 一种人脸识别门禁的注册方法及系统 |
JP2018100557A (ja) * | 2016-12-21 | 2018-06-28 | 株式会社 日立産業制御ソリューションズ | 入退管理装置および入退管理方法 |
CN108288315A (zh) * | 2017-12-20 | 2018-07-17 | 广州畅联信息科技有限公司 | 一种智能锁控制系统、开启方法及存储介质 |
CN207780878U (zh) * | 2018-01-24 | 2018-08-28 | 北京智钥科技有限公司 | 一种基于人体特征识别的门禁系统 |
CN108537929A (zh) * | 2018-04-12 | 2018-09-14 | 京东方科技集团股份有限公司 | 远程解锁系统及远程解锁方法 |
CN108922114A (zh) * | 2018-06-22 | 2018-11-30 | 张小勇 | 安防监测方法和系统 |
CN109712291A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 电子闸门的开启方法、装置及服务器 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090212902A1 (en) * | 2008-02-21 | 2009-08-27 | Lasercard Corporation | System and method for authorizing limited access |
CN102654924A (zh) * | 2011-03-02 | 2012-09-05 | 黄金富 | 一种中国移动门禁保安系统和相应的门禁系统保安方法 |
CN105701889A (zh) * | 2014-11-28 | 2016-06-22 | 华为技术有限公司 | 一种身份认证方法和系统 |
CN104463589B (zh) * | 2014-12-25 | 2018-09-14 | 北京释码大华科技有限公司 | 一种支付认证方法、设备及系统 |
CN104766398B (zh) * | 2015-04-28 | 2017-10-20 | 李翀 | 一种门禁控制系统及方法 |
CN107230265B (zh) * | 2016-11-25 | 2021-05-14 | 天地融科技股份有限公司 | 一种数据交互方法及系统 |
CN106846577A (zh) * | 2017-01-19 | 2017-06-13 | 泰康保险集团股份有限公司 | 基于人脸识别的人员出入权限控制方法及装置 |
CN108171842A (zh) * | 2017-12-28 | 2018-06-15 | 深圳市泛海三江科技发展有限公司 | 一种人员管理系统 |
CN108447162B (zh) * | 2018-03-30 | 2020-08-07 | 鲁班长(深圳)科技有限公司 | 基于人脸识别的门禁方法 |
CN108492429A (zh) * | 2018-05-23 | 2018-09-04 | 上海弘目智能科技有限公司 | 双模式人员身份验证方法及系统 |
CN109063590A (zh) * | 2018-07-12 | 2018-12-21 | 上海商汤智能科技有限公司 | 基于人脸识别的信息处理方法、装置及系统 |
-
2018
- 2018-12-26 CN CN201811608295.5A patent/CN109712291B/zh active Active
-
2019
- 2019-12-12 CN CN201980086689.5A patent/CN113330491B/zh active Active
- 2019-12-12 WO PCT/CN2019/124903 patent/WO2020135079A1/zh active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105139490A (zh) * | 2015-08-04 | 2015-12-09 | 国网上海市电力公司 | 一种用于无人值守变电站的门控管理方法 |
CN105681278A (zh) * | 2015-12-29 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | 一种人脸识别门禁的注册方法及系统 |
CN105678872A (zh) * | 2015-12-30 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | 一种门禁管理系统及其授权方法和门禁终端设备 |
JP2018100557A (ja) * | 2016-12-21 | 2018-06-28 | 株式会社 日立産業制御ソリューションズ | 入退管理装置および入退管理方法 |
CN108288315A (zh) * | 2017-12-20 | 2018-07-17 | 广州畅联信息科技有限公司 | 一种智能锁控制系统、开启方法及存储介质 |
CN207780878U (zh) * | 2018-01-24 | 2018-08-28 | 北京智钥科技有限公司 | 一种基于人体特征识别的门禁系统 |
CN108537929A (zh) * | 2018-04-12 | 2018-09-14 | 京东方科技集团股份有限公司 | 远程解锁系统及远程解锁方法 |
CN108922114A (zh) * | 2018-06-22 | 2018-11-30 | 张小勇 | 安防监测方法和系统 |
CN109712291A (zh) * | 2018-12-26 | 2019-05-03 | 广州市巽腾信息科技有限公司 | 电子闸门的开启方法、装置及服务器 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553474A (zh) * | 2022-01-07 | 2022-05-27 | 南方电网深圳数字电网研究院有限公司 | 基于物联网的门禁权限控制方法及装置 |
CN114553474B (zh) * | 2022-01-07 | 2023-11-03 | 南方电网数字平台科技(广东)有限公司 | 基于物联网的门禁权限控制方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN113330491A (zh) | 2021-08-31 |
CN109712291A (zh) | 2019-05-03 |
CN109712291B (zh) | 2020-11-10 |
CN113330491B (zh) | 2023-04-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020135079A1 (zh) | 电子闸门的开启方法、装置及服务器 | |
KR20200006987A (ko) | 출입 제어 방법, 출입 제어 장치, 시스템 및 저장매체 | |
CN110491004A (zh) | 一种居民社区人员安全管理系统及方法 | |
CN207690169U (zh) | 可预约式人脸识别门禁访客系统 | |
CN106846577A (zh) | 基于人脸识别的人员出入权限控制方法及装置 | |
CN105427421A (zh) | 基于人脸识别的门禁控制方法 | |
CN111275873B (zh) | 通行控制管理方法、装置、电子设备及存储介质 | |
CN102099813A (zh) | 被管理的基于生物特征识别的通知系统和方法 | |
CN109858442B (zh) | 基于门禁机的陌生人通行监控方法及装置 | |
WO2022165685A1 (zh) | 一种确定人员危险性的方法、装置、系统及存储介质 | |
CN111292454A (zh) | 一种智能身份门禁识别系统和方法 | |
CN112349016A (zh) | 一种基于大数据分析的智能门禁管理系统 | |
WO2024060872A1 (zh) | 门禁管理方法、验证服务器、门禁系统及可读存储介质 | |
CN103208144A (zh) | 基于人脸识别的宿管系统 | |
CN111462417A (zh) | 一种无人银行的多信息验证系统和多信息验证方法 | |
CN111695538A (zh) | 非法入侵人员检测方法、装置及可读存储介质 | |
CN113034768A (zh) | 一种智能门禁装置及其工作方法 | |
CN108615286A (zh) | 一种小区智能管理方法和系统 | |
Uddin et al. | Smart home security using facial authentication and mobile application | |
CN110570550A (zh) | 一种无人酒店管理认证方法及装置 | |
CN110807052B (zh) | 用户群分类方法、装置、设备及存储介质 | |
CN110648443A (zh) | 一种门禁验证方法、装置、设备和介质 | |
CN114648829A (zh) | 智能门禁方法及系统 | |
CN114882974A (zh) | 一种心理诊断数据库访问人工智能验证系统及方法 | |
CN111833503A (zh) | 一种金库的安全管理方法、装置、电子设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19902949 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/11/2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19902949 Country of ref document: EP Kind code of ref document: A1 |