Access control method and system

An access control and personnel technology, which is applied in the direction of instruments, time registers, and individual input/output registers, etc., can solve the problems of poor real-time performance of the access control system, shorten the face comparison time, improve real-time performance, The effect of high safety and reliability

Active Publication Date: 2017-04-12
SUZHOU KEDA TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this reason, the technical problem to be solved in the present invention is that the access control system of the prior art has poor real-time performance, thus a good real-time access control method and system are proposed to solve this problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system
  • Access control method and system
  • Access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 An access control method according to Embodiment 1 of the present invention is shown, the method includes the following steps:

[0023] S11. Obtain the identity information of the person to be identified. The identity information may be an access control card number, or an ID card number, or a fingerprint. Correspondingly, the way to obtain the identity information may be to swipe the access control card of the person to be identified, or swipe the second-generation ID card, or enter fingerprints as required.

[0024] S12. Obtain real-time facial feature data of the person to be identified.

[0025] S13. Retrieving the authority corresponding to the identity information and backing up facial feature data. A personnel information database can be established in advance, which includes basic information data and backup facial feature data of each employee. Among them, the basic information includes the employee's name, gender, department, job number, access co...

Embodiment 2

[0047] image 3 An access control system according to Embodiment 2 of the present invention is shown, which includes an identity information acquisition module 21, a facial feature acquisition module 22, a call module 23, a judgment module 24, a comparison module 25, an acceptance module 26 and a rejection module. Module 27.

[0048] The identity information acquisition module 21 is used to acquire the identity information of the person to be identified. The facial feature acquisition module 22 is used to acquire real-time facial feature data of the person to be identified. The calling module 23 is used to call the authority corresponding to the identity information and the backup facial feature data. The judging module 24 is used for judging whether the person to be identified can enter the current area according to the invoked authority. The comparison module 25 is used to compare whether the real-time facial feature data is consistent with the backup facial feature data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a door guard control method and system, wherein the method comprises the following steps that identity information of personnel to be identified is obtained; the real-time face feature data of the personnel to be identified is obtained; the permissions corresponding to the identity information are called, and the face feature data is backed up; whether the personnel to be identified can enter the current region or not is judged according to the called permissions; when the personnel to be identified can enter the current region, whether the real-time face feature data is coincident to the backup face feature data or not is judged; when the comparison result shows that the real-time face feature data coincident to the backup face feature data, the personnel to be identified are accepted to enter the current region; when the personnel to be identified cannot enter the current region or the comparison result shows that the real-time face feature data is not coincident to the backup face feature data, the personnel to be identified are refused to enter the current region. Therefore the method and the system solve the technical problem of poor real-time performance of a door guard control system in the prior art.

Description

technical field [0001] The invention relates to the technical field of automatic control, in particular to an access control method and system. Background technique [0002] In places with a certain degree of confidentiality, there is strict authority control over the entry and exit personnel. Traditional access control adopts the way of swiping the access control card, that is, each person is assigned a card number, bound to a card, each card has permission regulations, and each area is entered by swiping the card. This access control method has the method of recognizing the card but not the person, so the security is poor, and behaviors such as borrowing cards cannot be identified, and the loss of cards will also bring risks to system security. With the maturity of video intelligent analysis technology, the application of face recognition comparison algorithm is becoming more and more extensive. In the traditional face recognition comparison technology, it is necessary t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00
Inventor 魏治兵刘继刚穆怀信陈卫东
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products