Access control method, device and system
An access control and target technology, applied in the direction of instrument, calculation, single input port/output port register, etc., can solve the problems of high maintenance cost, unable to open the door, unable to implement and so on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 It shows a schematic flow diagram of the implementation of the access control method in the embodiment of the present application. As shown in the figure, the access control method may include the following steps:
[0031] Step 101, acquiring the image of the target captured by the camera;
[0032] Step 102, identifying the characteristic information of the target according to the image of the target;
[0033] Step 103. Determine the category of the target according to the feature information and the pre-calculated cluster center;
[0034] Step 104: Determine an access control instruction according to the category of the object and the entry and exit information of the object within a preset time range.
[0035] During specific implementation, access control and cameras can be set in areas that require security (for example: communities, companies, etc.), wherein one access control can be set at the gate, and multiple cameras can be set at the gate or in vari...
Embodiment 2
[0062] Based on the same inventive concept, an access control device is also provided in the embodiment of the present application. Since the problem-solving principle of these devices is similar to an access control method, the implementation of these devices can refer to the implementation of the method, and the repetition is no longer repeat.
[0063] figure 2 A schematic structural diagram of the access control device provided by the embodiment of the present application is shown. As shown in the figure, the access control device may include:
[0064] An image determination module 201, configured to acquire the image of the target captured by the camera;
[0065] A feature identification module 202, configured to identify feature information of the target according to the image of the target;
[0066] A category matching module 203, configured to determine the category of the target according to the feature information and the pre-calculated cluster centers;
[0067] T...
Embodiment 3
[0082] Based on the same inventive concept, an embodiment of the present application also provides an access control system, including the above-mentioned access control device and access control, the access control receives the control instruction sent by the access control device and performs an opening or closing operation according to the control instruction .
[0083] The access control system provided by the embodiment of the present application can associate the access control device with the access control, improve the statistical efficiency of the resident population, increase the security of the access control, and reduce the maintenance cost of the access control.
[0084] Furthermore, potential high-risk groups can be found through data aggregation and data mining in the cloud; the location of criminals can be located and the haunts of suspects can be found through networking with the public security; at the same time, the system provided by the embodiment of the ap...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


