Security protection method, security protection device, computer device and computer readable storage medium

A computer program and security technology, applied in the field of data processing, can solve problems such as loss or damage, failure to supervise and manage, access control system does not have access management registration, etc.

Pending Publication Date: 2019-07-05
PING AN TECH (SHENZHEN) CO LTD
View PDF14 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing access control system does not have the function of entry and exit management and registration. The entry and exit of outsiders depends on the manual registration records of security personnel. It is easy to miss or misrecord, and it has been lost or damaged, which cannot effectively supervise and manage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method, security protection device, computer device and computer readable storage medium
  • Security protection method, security protection device, computer device and computer readable storage medium
  • Security protection method, security protection device, computer device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 It is a flow chart of steps in a preferred embodiment of the security method of the present invention. According to different requirements, the order of the steps in the flowchart can be changed, and some steps can be omitted.

[0053] refer to figure 1 As shown, the security method specifically includes the following steps.

[0054] Step S1, acquiring the face image of the visitor.

[0055] In this embodiment, after the visitor passes through the access control, the camera installed on the terminal scans the visitor to obtain the face image of the visitor. During face scanning, a voice prompt similar to "Face recognition is about to enter, please do not leave" can be issued. Wherein, the identity information of the visitor refers to an internal employee or an external visitor. And when the identity information of the visitor is an internal employee, the personal information of the internal employee is retrieved and displayed on the interface for checking....

Embodiment 2

[0083] figure 2 It is a functional block diagram of a preferred embodiment of the security device of the present invention.

[0084] refer to figure 2 As shown, the security device 20 may include an acquisition module 201 , a comparison module 202 , a judgment module 203 , a request module 204 and a save module 205 .

[0085] The acquiring module 201 is used to acquire the face images of visitors.

[0086] In this embodiment, after the visitor passes through the access control, the acquiring module 201 scans the visitor through the camera installed on the terminal, so as to acquire the face image of the visitor. During face scanning, a voice prompt similar to "Face recognition is about to enter, please do not leave" can be issued. Wherein, the identity information of the visitor refers to an internal employee or an external visitor. And when the identity information of the visitor is an internal employee, the personal information of the internal employee is retrieved and...

Embodiment 3

[0114] image 3 It is a schematic diagram of a preferred embodiment of the computer device of the present invention.

[0115] The computer device 30 includes a memory 31 , a processor 32 and a computer program 33 stored in the memory 31 and operable on the processor 32 , such as a mobile phone control program. When the processor 32 executes the computer program 33, the steps in the above security method embodiments are implemented, for example figure 1 Steps S1-S5 are shown. Alternatively, when the processor 32 executes the computer program 33, it realizes the functions of each module in the above security device embodiment, for example figure 2 Modules 201-205 in .

[0116] Exemplarily, the computer program 33 can be divided into one or more modules / units, and the one or more modules / units are stored in the memory 31 and executed by the processor 32 to complete this invention. The one or more modules / units may be a series of computer program instruction segments capable...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a security protection method, a security protection device, a computer device and a computer readable storage medium. The security protection method includes the following steps that: the face image of a visitor is acquired; the face image is compared with saved images in a preset database; whether the face image is matched with the saved images in the preset database is judged; if the face image is not matched with the saved images in the preset database, a request is popped up to acquire an interface for obtaining the identity information of the visitor; and the identity information of the visitor is obtained and saved. The present invention belongs to the field of image recognition. With the security protection method, the security protection device, the computer device and the computer readable storage medium adopted, automatic access management registration can be realized.

Description

technical field [0001] The present invention relates to the field of data processing, in particular to a security method, device, computer device and computer-readable storage medium. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are set forth in the claims and detailed description. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] With the development and progress of science and technology, intelligent security technology has entered a new field. At present, the boundary between intelligent security technology and computers is gradually disappearing, especially the popularization and application of Internet of Things technology, which makes security evolve from a simple security protection system in the past to a comprehensive system. Security projects in cities cover many areas, such as street communities, buildings, bank post offices, road ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
CPCG07C9/38G07C9/37
Inventor 郭玲玲姜宜君
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products