Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control method, device and system

An access control and target technology, applied in the direction of instrument, calculation, single input port/output port register, etc., can solve the problems of high maintenance cost, unable to open the door, unable to implement and so on

Active Publication Date: 2019-06-11
BEIJING DEEPGLINT INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) The access control card is falsely claimed and borrowed frequently, the security level is low, and it is impossible to confirm whether the identity of the access control card is the user himself;
[0005] 2) ID cards have privacy issues, and cannot be implemented in residential areas and other places where the security level is not high, and minors do not have ID cards;
[0006] 3) All access control methods need to put all the resident population in the park into the storage management, the maintenance cost is high and needs to be updated continuously, and it is impossible to achieve efficient and low-cost management for the temporary population;
[0007] 4) The existing face recognition and other methods have serious misrecognition, and often the door cannot be opened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method, device and system
  • Access control method, device and system
  • Access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It shows a schematic flow diagram of the implementation of the access control method in the embodiment of the present application. As shown in the figure, the access control method may include the following steps:

[0031] Step 101, acquiring the image of the target captured by the camera;

[0032] Step 102, identifying the characteristic information of the target according to the image of the target;

[0033] Step 103. Determine the category of the target according to the feature information and the pre-calculated cluster center;

[0034] Step 104: Determine an access control instruction according to the category of the object and the entry and exit information of the object within a preset time range.

[0035] During specific implementation, access control and cameras can be set in areas that require security (for example: communities, companies, etc.), wherein one access control can be set at the gate, and multiple cameras can be set at the gate or in vari...

Embodiment 2

[0062] Based on the same inventive concept, an access control device is also provided in the embodiment of the present application. Since the problem-solving principle of these devices is similar to an access control method, the implementation of these devices can refer to the implementation of the method, and the repetition is no longer repeat.

[0063] figure 2 A schematic structural diagram of the access control device provided by the embodiment of the present application is shown. As shown in the figure, the access control device may include:

[0064] An image determination module 201, configured to acquire the image of the target captured by the camera;

[0065] A feature identification module 202, configured to identify feature information of the target according to the image of the target;

[0066] A category matching module 203, configured to determine the category of the target according to the feature information and the pre-calculated cluster centers;

[0067] T...

Embodiment 3

[0082] Based on the same inventive concept, an embodiment of the present application also provides an access control system, including the above-mentioned access control device and access control, the access control receives the control instruction sent by the access control device and performs an opening or closing operation according to the control instruction .

[0083] The access control system provided by the embodiment of the present application can associate the access control device with the access control, improve the statistical efficiency of the resident population, increase the security of the access control, and reduce the maintenance cost of the access control.

[0084] Furthermore, potential high-risk groups can be found through data aggregation and data mining in the cloud; the location of criminals can be located and the haunts of suspects can be found through networking with the public security; at the same time, the system provided by the embodiment of the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an access control method, device, and system, including: acquiring an image of a target captured by a camera; identifying feature information of the target according to the image of the target; The center determines the category of the object; and determines the access control instruction according to the category of the object and the entry and exit information of the object within a preset time range. The scheme provided by this application can automatically count the resident population and non-resident population. After establishing an association with the access control, the resident population does not need to swipe the card, and it is more accurate than the existing face recognition method.

Description

technical field [0001] The present application relates to the technical field of access control, in particular to an access control method, device and system. Background technique [0002] At present, the resident population statistics method is in the form of offline manual visit records, which is not only inefficient but also has problems such as data delay and low accuracy. [0003] The implementation schemes of access control systems are usually access control cards, ID cards, fingerprint recognition, iris recognition, face recognition, etc. These access control implementation schemes have the following disadvantages: [0004] 1) The access control card is falsely claimed and borrowed frequently, and the security level is low, so it is impossible to confirm whether the identity of the access control card is the user himself; [0005] 2) ID cards have privacy issues, and cannot be implemented in residential areas and other places where the security level is not high, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/00G06K9/00
CPCG07C9/37G06V40/172
Inventor 申皓全邓亚峰赵勇
Owner BEIJING DEEPGLINT INFORMATION TECH