A secure identification method capable of real-time identity comparison

An identification method and a safe technology, applied in the field of security identification, can solve problems such as the inability to judge visitors

Active Publication Date: 2016-06-08
INVENTECSHANGHAI TECH +2
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although the walkie-talkie has the above-mentioned convenient functions, it is easy for children to simply press the control on the walkie-talkie without verifying the identity of the visitor because they cannot judge whether the visitor is malicious. switch, allowing visitors to enter, causing the originally well-intentioned walkie-talkie to be

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure identification method capable of real-time identity comparison
  • A secure identification method capable of real-time identity comparison
  • A secure identification method capable of real-time identity comparison

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention is a security identification method capable of real-time identity comparison, please refer to figure 1 , which is the first preferred embodiment of the present invention, the security identification method is applied to a security identification system 10, the security identification system 10 includes a walkie-talkie 11, a camera device 12 and a server 14, and the walkie-talkie includes a display Unit 112, a communication unit 114 and a control unit 116, the walkie-talkie 11 is electrically connected to the camera device 12, the camera device 12 is installed at a position adjacent to an apartment gate 13, and can capture external images to generate a video signal.

[0030] see again figure 1 , the communication unit 112 can be connected to the remote server 14 through a network N, and a database 140 is provided in the server 14, and a safety list data D1 and a danger list data D2 are stored in the database 140, the safety list data D1 A set of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety identification method capable of comparing an identity in real time. The method is applied to an interphone in a safety identification system, and the interphone is electrically connected with a camera device, so image data acquired by the camera device can be received by the interphone when a visitor reaches, and transmits the image data to a server through network, and the server compares the image data with safety list data in a database or identification images in dangerous list data; and the interphone can also receive an indication signal generated after the comparison of the server, the lock of a gate is set to a locking state according to the indication signal to make the lock not released, or the lock is set to a free state to make the lock manually released by a user and the gate unlocked. Even a child is left in home along, the identity of the visitor can be compared and confirmed in real time through the safety identification method of the interphone, so the visitor can safely enter, or the lock is preset to the locking state in order to forbid the visitor entering.

Description

technical field [0001] The present invention is a security identification method capable of real-time identity comparison, especially enabling a walkie-talkie to upload the image data of a visitor to a server in real time after obtaining the image data, and enabling the server to compare the image data with a database The method of comparing the security or hazard identification images stored in the internal memory to control whether the door lock of the gate is locked. Background technique [0002] In recent years, with changes in the social environment and industrial structure, various types of crimes have emerged one after another, which is hard to guard against. Among them, various fraudulent acts of posing as telecommunications operators, gas personnel or public officials are the most rampant. Since young children are not sufficiently judgmental and vigilant towards strangers, for parents who often need to leave their children alone at home, how to teach children not t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00H04L29/08H04L9/32H04Q5/24
Inventor 刘贞辰何怡桦
Owner INVENTECSHANGHAI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products