Big data access control management system and method

A management system and management method technology, applied in the big data access control management system and its management field, can solve the problems that security cannot be effectively and timely protected, the reliability is not high, and it is useless, so as to avoid congestion, improve effectiveness, The effect of ensuring life safety

Inactive Publication Date: 2018-10-26
HUBEI BEILISI INTELLIGENT TECH CO LTD
View PDF7 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Most of the existing access control technical means are observed by security personnel, swiping cards, etc. The method of observation by security personnel is time-consuming and laborious, and the reliability is not high. timely protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data access control management system and method
  • Big data access control management system and method
  • Big data access control management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A kind of big data access control management system 100, such as figure 1 As shown, it includes: display screen, near-infrared acquisition equipment, controller host, alarm unit, and controller.

[0047] The display screen is used to display the image of the acquisition area under the lens of the near-infrared image acquisition device; the near-infrared acquisition device is used to collect the panoramic video stream corresponding to the image of the acquisition area when the presence of a person is sensed and send it to the controller host and the large database; The controller host is used to collect two-dimensional images of different angles of all faces in the panoramic video stream, and simultaneously extracts facial feature values ​​for each face, and based on the facial feature values, the two-dimensional image of the face Match the image data in the image data group corresponding to the unique code of the controller mainframe in the large database. If each face ...

Embodiment 2

[0053] On the basis of Embodiment 1, the image data group includes: a long-term permission data group and a temporary permission data group, such as figure 2 As shown, the system 100 further includes: a temporary authority application unit.

[0054] The temporary authority application unit is used to receive the ID number and temporary visit time period entered by the temporary visitor through the guard terminal, retrieve the identity information corresponding to the ID number from the public security system, the identity information includes the record image data, and collect the face of the temporary visitor image, and match the record image data with the face image. If the match is successful, the ID number, temporary access time period and face image will be sent to the temporary permission data group; Delete the ID number and face image in the temporary permission data group.

[0055] It should be noted that the temporary authority application unit will automatically de...

Embodiment 3

[0058] On the basis of Embodiment 1 or Embodiment 2, the acquisition area corresponding to the acquisition area picture is set by adjusting the near-infrared image acquisition device according to actual needs; the size of the display screen is set according to the actual required acquisition image size; the alarm system Including: security system and / or public security system.

[0059] Using a large screen or increasing the collection screen can increase the number of faces in the collection screen, and simultaneously recognize and match multiple faces, improve the recognition efficiency, and prevent the occurrence of congestion at the access control.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a big data access control management system and method. The system comprises a display screen, near infrared acquisition equipment, a master controller and an alarm unit; thedisplay screen is used for displaying images of an acquisition area; the near infrared acquisition equipment is used for acquiring panoramic video streams corresponding to the images of the acquisition area and sending the same the master controller and a big database; the master controller is used for acquiring two-dimensional images of all faces in the video streams, subjecting the two-dimensional images of the faces and image data in an image data set corresponding to the only coding of the master controller in the big database, if matched successfully, releasing an access control, or otherwise, sending relevant information to the alarm unit on the basis of face eigenvalues that fail to be matched; the alarm unit is used for matching the corresponding two-dimensional images and blacklist image data in the big database on the basis of the face eigenvalues that fail to be matched, and sending alarm information to an alarm system if necessary. By the arrangement, access control effectiveness is greatly improved, and meanwhile, a public security system is helped catch criminals or wanted criminals in time.

Description

technical field [0001] The invention relates to the technical field of security protection, in particular to a big data access control management system and a management method thereof. Background technique [0002] The social environment is becoming more and more complex, and public security and criminal crimes occur from time to time. Therefore, security access control in residential areas, schools, companies and other office and leisure and entertainment areas is essential. Most of the existing access control technical means are observed by security personnel, swiping cards, etc. The method of observation by security personnel is time-consuming and laborious, and the reliability is not high. timely protection. Contents of the invention [0003] The technical problem to be solved by the present invention is to provide a big data access control management system and its management method for the above-mentioned deficiencies in the prior art. [0004] The technical solut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K9/00G06K9/62
CPCG07C9/37G06V40/168G06F18/22
Inventor 吴修敏
Owner HUBEI BEILISI INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products