Access control system, access control robot and operating method thereof

An operation method and robot system technology, applied to instruments, time registers, single input/output registers, etc., can solve the problems of high cost, low security, unfavorable access control system promotion, etc., to prevent theft Brushing or proxy brushing, the effect of improving security

Active Publication Date: 2020-06-30
BEIJING UNISROBO TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the process of entering passwords, if the authorized or authenticated personnel do not pay attention to actively cover the input keypad, or malicious intruders install sneak shooting equipment in advance, the passwords entered by visitors are easily stolen and leaked
Fingerprint identification technology can improve the security of the access control system to a certain extent by collecting and comparing single or multiple fingerprints of visitors. However, malicious intruders or attendance checkers can still use resin to reverse the fingerprints of authorized and authenticated users. Obtain the fingerprint film of the user through the model to defraud the credit of the access control system
[0004] Another access control system can judge the identity of the visitor through face recognition. However, the existing silicone mold can also be designed for the user, using the geometric positional relationship between a few feature points on the face to judge the identity of the user. The method is easily deceived by the silicone filling, and the security is still not high
[0005] Access control systems with higher security can adopt advanced technologies such as retina recognition, iris recognition, and DNA recognition. However, these technologies not only cost a lot, but also require users to actively provide more physiological information, which is not conducive to protecting user privacy and reducing user comfort. and the degree of trust, on the other hand, it is also not conducive to the promotion of the access control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control system, access control robot and operating method thereof
  • Access control system, access control robot and operating method thereof
  • Access control system, access control robot and operating method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The features and technical effects of the technical solution of the present invention will be described in detail below with reference to the drawings and in conjunction with exemplary embodiments, and an access control system, robot and operation method thereof that can efficiently prevent theft or replacement of brushes and improve security are disclosed. It should be pointed out that similar reference signs indicate similar structures. The terms "first", "second", "upper", "lower", etc. used in this application can be used to modify various system components or method steps. . Unless otherwise specified, these modifications do not imply the spatial, order, or hierarchical relationship of the modified system components or method steps.

[0037] Such as figure 1 As shown, the access control robot according to the embodiment of the present invention includes: a high-sensitivity microphone 1 located on top of the head, used to collect or receive surrounding sound informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An operating method of an access control robot system is disclosed. The method includes detecting a fact that fingers of a user are pressed one or more press button zones on an input panel; measuringand recording the area pressed by the fingers of the user in each press button zone; measuring and recording partial fingerprints of user's fingers in each press button zone; for each press button zone, forming a fingerprint code of each press button zone by combining the measured partial fingerprint and the area pressed by the corresponding user's finger; connecting the fingerprint codes in the press button zones in series to form a total fingerprint code for one time of pressing; and connecting the total fingerprint code in each time of pressing to form a password of the access control system. According to the access control robot and the operating method thereof, the compound password is obtained by combining fingerprints in different button zones on the input panel according to areas and input sequences by utilizing an input habit of the user, and unauthorized or acting access card brushing can be efficiently prevented, thus improving safety.

Description

Technical field [0001] The invention relates to the field of intelligent robots, in particular to an access control system, an access control robot and an operation method thereof that prevent the stolen or substitute brush and improve safety. Background technique [0002] With the development of robotics, robots are used in various fields. Existing robots are divided into two categories, namely industrial robots and special robots. The so-called industrial robots are multi-joint manipulators or multi-degree-of-freedom robots oriented to the industrial field. In addition to industrial robots, special robots are various advanced robots used in non-manufacturing industries and serving humans, including: underwater robots, entertainment robots, military robots, agricultural robots, roboticized machines, etc. And service robots are often used in service industries such as welcoming reception, tour guide services, and advertising in banks, shopping malls, restaurants, sales offices, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/33G07C9/37
CPCG07C9/32
Inventor 刘雪楠沈刚
Owner BEIJING UNISROBO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products