Access identity authentication system and authentication method thereof

A technology of identity authentication and authentication method, which is applied in the field of electronic management, can solve problems such as communication line data eavesdropping, and achieve the effect of accurate identity

Inactive Publication Date: 2017-08-08
SHENZHEN RUIRONGCHUANG ELECTRONICS TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Or the data on the communication line is tapped

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] An access control identity authentication system, comprising an imaging module, a card reading module, an identification module, a monitoring center, and a database connected in sequence;

[0026] The image capturing module is connected to the identification module, and the card reading module and the identification module are respectively connected to the monitoring center through wireless or wired communication; the monitoring center is connected to the database;

[0027] The image capturing module is used for capturing images of human faces, and sending the acquired images to the recognition module;

[0028] The identification module is used to identify the face in the image of the imaging module, and identify the identity information of the person; then send the identity information of the person to the monitoring center;

[0029] The card reading module reads the badge worn by the person, and performs location recognition and character analysis to obtain the badge ...

Embodiment 2

[0037] The authentication method of the access control identity authentication system includes the following processes:

[0038] The starting module judges whether there is someone waiting for identity verification at the door, and if someone is found, a starting signal is sent, and the starting module drives the imaging module and the card reading module to start.

[0039] In the delay module, after the activation signal is sent by the activation module, the delay module performs timing, and when the timing value reaches a preset value, the imaging module is activated to acquire images.

[0040] The imaging module captures the face, and sends the acquired image to the recognition module; the recognition module recognizes the face in the image of the imaging module, and identifies the person's identity information; then the person's identity information sent to the monitoring center;

[0041] The card reading module reads the badge worn by the person at the same time, and per...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an access identity authentication system and an authentication method thereof, and belongs to the technical field of electronic management. An image acquisition module is used for acquiring an image of a human face and sending the acquired image to an identification module; the identification module is used for identifying the human face in the image of the image acquisition module and identifying identity information of a person; the identity information of the person is sent to a monitoring center; a card reading module reads a chest card of the person and conducts location identification and character analysis to obtain chest card information, and then the chest card information and positioning information are sent to the monitoring center; the identity information of the person, and the chest card information are correspondingly compared with associated data of staff identity-chest card stored in a database through the monitoring center. According to the access identity authentication system and the authentication method thereof, double information is acquired and is compared with storage data of the monitoring center to ensure that the identity of the entry person is accurate, and prevent an impostor from using a copied card or other person's card to entry a control area.

Description

technical field [0001] The invention relates to an access control identity authentication system and an authentication method thereof, belonging to the technical field of electronic management. Background technique [0002] Security is the primary consideration of the access control system. At present, the access control system has the following types. The first is the access control card. In the traditional access control system, the access control card is only used to store information, and the identification and authentication process of the card is read out in plain text. Then compare with the access control system server. Such cards are easily duplicated. The card's authentication data or access control information may be stored in the access control card reader. If the card reader is stolen, the card can also be copied. Or the data on the communication line is tapped. By eavesdropping on the communication data, the secret information of the card is obtained, so as t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00
CPCG07C9/22
Inventor 李小伦涂寒易凤明朝开俊
Owner SHENZHEN RUIRONGCHUANG ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products