Access identity authentication system and authentication method thereof
A technology of identity authentication and authentication method, which is applied in the field of electronic management, can solve problems such as communication line data eavesdropping, and achieve the effect of accurate identity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0025] An access control identity authentication system, comprising an imaging module, a card reading module, an identification module, a monitoring center, and a database connected in sequence;
[0026] The image capturing module is connected to the identification module, and the card reading module and the identification module are respectively connected to the monitoring center through wireless or wired communication; the monitoring center is connected to the database;
[0027] The image capturing module is used for capturing images of human faces, and sending the acquired images to the recognition module;
[0028] The identification module is used to identify the face in the image of the imaging module, and identify the identity information of the person; then send the identity information of the person to the monitoring center;
[0029] The card reading module reads the badge worn by the person, and performs location recognition and character analysis to obtain the badge ...
Embodiment 2
[0037] The authentication method of the access control identity authentication system includes the following processes:
[0038] The starting module judges whether there is someone waiting for identity verification at the door, and if someone is found, a starting signal is sent, and the starting module drives the imaging module and the card reading module to start.
[0039] In the delay module, after the activation signal is sent by the activation module, the delay module performs timing, and when the timing value reaches a preset value, the imaging module is activated to acquire images.
[0040] The imaging module captures the face, and sends the acquired image to the recognition module; the recognition module recognizes the face in the image of the imaging module, and identifies the person's identity information; then the person's identity information sent to the monitoring center;
[0041] The card reading module reads the badge worn by the person at the same time, and per...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com