Unlock instant, AI-driven research and patent intelligence for your innovation.

Access control identification method and device

An identification method and access control technology, applied in the field of image recognition, can solve the problems of increasing the maintenance cost of the access control system, reducing the security and reliability of the access control system, and high failure rate and wear rate

Inactive Publication Date: 2019-03-15
WATRIX TECH CORP LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the opening methods of these access control systems are relatively easy to copy, such as forging the same radio frequency card, forging audio information, or password leaks, resulting in the access control system being no longer safe, reducing the security and reliability of the access control system, or changing the corresponding password when personnel are replaced. The radio frequency card also needs to be replaced, and the failure rate and wear rate of the mechanical type and radio frequency card are relatively high. When these problems occur, the maintenance cost of the access control system will be increased.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control identification method and device
  • Access control identification method and device
  • Access control identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] The embodiment of the present application provides an access control identification method, such as figure 1 Shown is a flow diagram of an access control identification method, including:

[0047]Step S102, acquiring the gait characteristics of the target object appearing in the target area, wherein the target area is an area within a preset distance from the access control system.

[0048] The above-mentioned way of obtaining the gait characteristics of the target object in the target area can be obtained through the camera set by the access control system. The monitoring range covered by the camera is the above-mentioned target area. When the target object appears within the range that the camera can monitor, that is At first, the gait characteristics of the above-mentioned target object are acquired by the frame image of the target object captured in the monitoring video. The above-mentioned method of obtaining the gait characteristics of the target object can also b...

Embodiment 2

[0069] The embodiment of the present application provides another access control identification method, which can be found in figure 2 The schematic flow chart of another access control identification method is shown, and the specific steps are as follows:

[0070] Step S202, receiving a first indication message sent by the access control system to confirm whether to open the door lock, to determine whether to open the door lock.

[0071] After receiving the first indication message sent by the access control system, the administrator terminal sends the first indication message to prompt the user whether to unlock the door lock.

[0072] Step S204, when the judgment result is yes, send a second instruction message to unlock the door to the access control system.

[0073] After the user confirms that the door lock is opened by fingerprint or iris or facial recognition or password, the second indication message for confirming the opening of the door lock is sent to the access ...

Embodiment 3

[0077] The embodiment of the present application provides an access control identification device, which can be found in image 3 A structural schematic diagram of an access control identification device shown, including:

[0078] An acquisition module, configured to acquire the gait characteristics of the target object appearing in the target area, wherein the target area is an area within a preset distance from the access control system;

[0079] The processing module is used to determine whether the gait characteristics of the target object match the gait characteristics of the specified object stored in advance when it is detected that the function of unlocking the door lock in the access control system is triggered and the trigger operation is a preset operation; When the result is yes, open the door lock; when the judgment result is no, send a first indication message to the administrator terminal to confirm whether to open the door lock; when receiving the second indica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control identification method and device, and relates to the technical field of image identification. The method comprises the steps of: acquiring a gait feature of atarget object appearing in a target area; when the facts that a function of opening a door lock in an access control system is triggered and a triggering operation is a preset operation are detected,judging whether the gait feature of the target object is matched with a pre-stored gait feature of a specified object or not; when the judgment result is positive, opening the door lock; when the judgment result is negative, sending a first indication message confirming whether to open the door lock or not to an administrator terminal; when a second indication message, for opening the door lock, sent by the administrator terminal is received, opening the door lock; and when receiving a third indication message, for refusing to open the door lock, sent by the administrator terminal is received,sending at least one frame of image including the facial features of the target object to the administrator terminal. The method and device are capable of increasing the security and reliability of the access control system while reducing the maintenance cost.

Description

technical field [0001] The present application relates to the technical field of image recognition, and in particular, to an access control recognition method and device. Background technique [0002] At present, the development of the access control system has experienced purely mechanical opening, radio frequency card opening, password lock, audio and other methods, making the management of the access control system more and more intelligent. [0003] However, the opening methods of these access control systems are relatively easy to copy, such as forging the same radio frequency card, forging audio information, or password leaks, resulting in the access control system being no longer safe, reducing the security and reliability of the access control system, or changing the corresponding password when personnel are replaced. 1. The radio frequency card also needs to be replaced. At the same time, the mechanical and radio frequency cards have a high failure rate and wear rat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K9/00
CPCG07C9/37G06V40/25
Inventor 张曼黄永祯
Owner WATRIX TECH CORP LTD