Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Entrance guard control method and device and terminal equipment

An access control and door control technology, applied in the direction of instruments, single input/output port registers, time registers, etc., can solve problems such as inability to guarantee user safety, security loopholes, etc. The effect of safety management efficiency

Inactive Publication Date: 2019-11-12
SHENZHEN LUCKYSTAR TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides an access control method and terminal equipment to solve the existing access control management methods in the prior art. Usually, access control is controlled by means of electronic locks, combination locks or ordinary door locks. There are certain security loopholes in opening and closing, and the security of users cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entrance guard control method and device and terminal equipment
  • Entrance guard control method and device and terminal equipment
  • Entrance guard control method and device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Such as figure 1 As shown, this embodiment provides an access control method, which can be applied to terminal devices such as hands. The access control method provided in this embodiment includes:

[0048] S101. Obtain image data and / or fingerprint information of a current user.

[0049] In a specific application, the camera is controlled to capture the image data of the current user or obtain the fingerprint information of the current user. The current user includes one or more users who are currently within the shooting range of the camera set on the access control. Among them, the image data can include image data such as photographs and videos of the current user taken, and can also include pupil image data, iris image data, and palmprint image data for pupil, iris, and palmprint recognition verification. feature image data.

[0050] S102. Search for corresponding user information according to the image data and / or the fingerprint information.

[0051] In a spe...

Embodiment 2

[0064] Such as figure 2 As shown, this embodiment is a further description of the method steps in the first embodiment. In this embodiment, after step S102, include:

[0065] S201. If no corresponding user information is found, acquire the access information of the current user.

[0066] In a specific application, if the corresponding user information is not found in the database according to the recognized face image information or the obtained fingerprint information, then the current user is not a registered user. At this time, the access information input by the current user is obtained.

[0067] S202. Analyze the access information, and send verification information to the terminal of the accessed user according to the access information.

[0068] In a specific application, after obtaining the access information input by the current user, analyze it, and send a verification message to the terminal of the accessed user in the access information according to the analysis...

Embodiment 3

[0073] Such as image 3 As shown, this embodiment is a further description of the method steps in the first embodiment. In this embodiment, after step S102, it also includes:

[0074] S301. If no corresponding user information is found, acquire registration information of the current user.

[0075] In a specific application, if the corresponding user information is not found in the database according to the recognized face image information or the acquired fingerprint information, then the current user is not a registered user, and the registration information input by the current user is obtained.

[0076] In this embodiment, after step S301, it also includes:

[0077] Send the registration information to the manager's terminal to confirm the registration;

[0078] Acquiring confirmation registration information fed back by the manager's terminal according to the registration information, and performing registration.

[0079] Specifically, after obtaining the registration...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of entrance guard management, and provides an entrance guard control method and device and terminal equipment. The method includes the following steps: obtaining image data and / or fingerprint information of a current user and searching corresponding user information according to the image data and / or the fingerprint information; if the corresponding user information is found, starting control authority according to the corresponding user information; and obtaining somatosensory information of the current user and controlling an entrance guard according to the somatosensory information and the control authority. The entrance guard control method of the invention identifies and judges the identity and control authority of the user by obtaining the image data, the fingerprint information, the somatosensory information and other human body feature information, which improves the security management efficiency for entrance guard management and ensures the personal and property safety of users.

Description

technical field [0001] The invention belongs to the technical field of access control management, and in particular relates to an access control method, device and terminal equipment. Background technique [0002] With the improvement of people's living standards and the development of science and technology, more and more smart products have penetrated into various fields of life. Using technology to improve people's safety is one of the most widely demanded aspects. [0003] The existing access control management methods usually control the opening and closing of the access control through means such as electronic locks, combination locks or ordinary door locks, which have certain security loopholes and cannot guarantee the safety of users. Contents of the invention [0004] In view of this, the embodiment of the present invention provides an access control method and terminal equipment to solve the existing access control management methods in the prior art, which usual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00
Inventor 吴建雄刘馨洪坤
Owner SHENZHEN LUCKYSTAR TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products