Access control identification method and device
An identification method and access control technology, applied in the field of image recognition, can solve the problems of increasing the maintenance cost of the access control system, reducing the security and reliability of the access control system, and high failure rate and wear rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] The embodiment of the present application provides an access control identification method, such as figure 1 Shown is a flow diagram of an access control identification method, including:
[0047]Step S102, acquiring the gait characteristics of the target object appearing in the target area, wherein the target area is an area within a preset distance from the access control system.
[0048] The above-mentioned way of obtaining the gait characteristics of the target object in the target area can be obtained through the camera set by the access control system. The monitoring range covered by the camera is the above-mentioned target area. When the target object appears within the range that the camera can monitor, that is At first, the gait characteristics of the above-mentioned target object are acquired by the frame image of the target object captured in the monitoring video. The above-mentioned method of obtaining the gait characteristics of the target object can also b...
Embodiment 2
[0069] The embodiment of the present application provides another access control identification method, which can be found in figure 2 The schematic flow chart of another access control identification method is shown, and the specific steps are as follows:
[0070] Step S202, receiving a first indication message sent by the access control system to confirm whether to open the door lock, to determine whether to open the door lock.
[0071] After receiving the first indication message sent by the access control system, the administrator terminal sends the first indication message to prompt the user whether to unlock the door lock.
[0072] Step S204, when the judgment result is yes, send a second instruction message to unlock the door to the access control system.
[0073] After the user confirms that the door lock is opened by fingerprint or iris or facial recognition or password, the second indication message for confirming the opening of the door lock is sent to the access ...
Embodiment 3
[0077] The embodiment of the present application provides an access control identification device, which can be found in image 3 A structural schematic diagram of an access control identification device shown, including:
[0078] An acquisition module, configured to acquire the gait characteristics of the target object appearing in the target area, wherein the target area is an area within a preset distance from the access control system;
[0079] The processing module is used to determine whether the gait characteristics of the target object match the gait characteristics of the specified object stored in advance when it is detected that the function of unlocking the door lock in the access control system is triggered and the trigger operation is a preset operation; When the result is yes, open the door lock; when the judgment result is no, send a first indication message to the administrator terminal to confirm whether to open the door lock; when receiving the second indica...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


