Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Control method and system for access control

An access control and central control module technology, applied in the field of access control methods and systems, can solve problems such as difficulty in meeting the real-time requirements of the access control system, time-consuming, etc., and improve recognition efficiency, recognition accuracy, safety and reliability. The effect of high and shortened face contrast time

Inactive Publication Date: 2016-01-13
GUILIN XINTONG TECH
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional face recognition comparison technology, it is necessary to find location information from the massive information in the database, that is to say, it is necessary to compare the face information with all the face information in the database one by one before making a judgment, which is very costly. time, it is difficult to meet the real-time requirements of the access control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method and system for access control
  • Control method and system for access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Embodiment one, a kind of door access control method, will be combined with the following figure 1 An access control method of the present invention is described in detail.

[0017] Such as figure 1 As shown, a flow chart of an access control method, including:

[0018] Step 1: Detect whether someone is visiting, if yes, go to step 2, otherwise continue to the next round of detection;

[0019] Step 2: Obtain the identity information of the visitor;

[0020] Step: 3: transfer the authority corresponding to the identity information of the visitor and judge whether the visitor can enter the current area, if yes, then enter step 4, otherwise the visitor is prohibited from entering the current area, and the identity of the visitor is uploaded;

[0021] Step 4: Obtain the fingerprint information of the visitor, and compare the fingerprint information of the visitor with the pre-stored authority fingerprint information database. If the two are consistent, the visitor is acc...

Embodiment 2

[0030] Embodiment two, a kind of entrance guard control system, will be combined with the following figure 2 An access control system of the present invention is described in detail.

[0031] Such as figure 2 As shown, a structural diagram of an access control system includes an infrared detection module, a central control module, an identity information acquisition module, a fingerprint information acquisition module, a drive module, an electric door lock and a server.

[0032] Wherein, the infrared detection module is used to detect whether someone is visiting; the central control module includes a starting unit, a first judging unit and the second judging unit; The identity information acquisition module sends the first start command; the first judging unit is used to receive the identity information of the visitor and transfer the authority corresponding to the identity information of the visitor, and judge whether the visitor can enter the current area, and if so, to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a control method and system for access control. The system includes an infrared detection module, a central control module, an identity information acquisition module, a fingerprint information acquisition module, a drive module, an electric door lock and a server; and the central control module comprises a starting unit, a first judging unit and a second judging unit. The control method and system for access control use double identification of identity information and fingerprint information of a user to be identified, not only overcome the shortcoming that a traditional access control only recognizes the card rather than the user, but also greatly shorten face comparison time, improve recognition rate and recognition accuracy of the access control system. All data is stored in the central controller or server; and compared to the traditional data information storage in an IC card, the system is not easy to be maliciously tampered, and has higher safety and reliability.

Description

technical field [0001] The invention relates to the field of access control management, in particular to an access control method and system. Background technique [0002] In places with a certain degree of confidentiality, there is strict authority control over the entry and exit personnel. Traditional access control adopts the way of swiping the access control card, that is, each person is assigned a card number, bound to a card, each card has permission regulations, and each area is entered by swiping the card. This access control method has the method of recognizing the card but not the person, so the security is poor, and behaviors such as borrowing cards cannot be identified, and the loss of cards will also bring risks to system security. With the maturity of video intelligent analysis technology, the application of face recognition comparison algorithm is becoming more and more extensive. In the traditional face recognition comparison technology, it is necessary to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00
Inventor 范浩
Owner GUILIN XINTONG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products