Gate passing authentication method and system and computer storage medium

An authentication method and gate technology, applied in wireless communication, sustainable communication technology, advanced technology, etc., can solve problems such as difficult to pass quickly, long time required, and no set of gate systems based on location information, etc., to reduce time , Improve efficiency, and optimize certification efficiency

Active Publication Date: 2020-08-21
GUANGDONG BOZHILIN ROBOT CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in the process of security inspection, if people want to pass through the security gate, they often use card swiping or face recognition. However, in the process of swiping card and face recognition, they generally need to go through the background authentication process, which takes a relatively long time. Longer, it is difficult to pass quickly when people come and go, and there is no gate system based on location information on the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Gate passing authentication method and system and computer storage medium
  • Gate passing authentication method and system and computer storage medium
  • Gate passing authentication method and system and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] see figure 1 , figure 1 It is a structural schematic diagram of a gate pass authentication system disclosed in the embodiment of this application. Such as figure 1 As shown, the gate pass authentication system includes a positioning base station, a gate, a positioning label, and a server, wherein the positioning label communicates with the gate and the positioning base station, and the positioning base station is used to locate the positioning label and send the positioning information to the server. The positioning tag is used to verify the verification information sent by the gate. On the other hand, the server communicates with the positioning base station and the gate. The server is used to generate a security authentication start command based on the positioning information. The security certification start command carries positioning information and verification information.

[0064] Exemplarily, the gate pass authentication system includes 4 positioning base st...

Embodiment 2

[0087] see figure 2 , figure 2 It is a schematic flowchart of a gate pass authentication method disclosed in the embodiment of the present application, and the gate pass authentication method is applied to a server. Such as figure 2 As shown, the gate pass authentication method includes steps:

[0088] 201. Receive the authentication information sent by the positioning base station for the positioning tag carried by the person to be authenticated entering the detection area. The authentication information includes the positioning information of the positioning tag and the verification information of the person to be authenticated;

[0089] 202. Determine the movement trend of the person to be authenticated according to the positioning information;

[0090] 203. Confirm that the preselected gate closest to the person to be authenticated is the target gate from at least one preselected gate according to the movement trend of the person to be authenticated and the position ...

Embodiment 3

[0101] see image 3 , image 3 It is a schematic flowchart of a gate pass authentication method disclosed in an embodiment of the present application, and the gate pass authentication method is applied to a positioning base station. Such as image 3 As shown, the gate pass authentication method includes steps:

[0102] 301. Locate the positioning tag entering the detection area and obtain the positioning information of the positioning tag, and the positioning tag is carried by the person to be authenticated;

[0103] 302. Obtain the verification information of the person to be certified sent by the location tag;

[0104] 303. Send the verification information and location information to the server, so that the target gate receives the security authentication start instruction sent by the server and completes the authentication of the person to be authenticated according to the security authentication start instruction.

[0105] The positioning base station of the embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a gate passing authentication method and system and a computer storage medium, and the method comprises the steps: receiving the authentication information, transmitted by a positioning base station, of a positioning label carried by a to-be-authenticated person entering a detection region, wherein the authentication information comprises the positioning information of thepositioning label and the verification information of the to-be-authenticated person; determining a motion trend of the to-be-authenticated person according to the positioning information; accordingto the motion trend of the to-be-authenticated person and the position information of at least one pre-selected gate machine, determining the pre-selected gate machine closest to the to-be-authenticated person as a target gate machine from the at least one pre-selected gate machine; determining a distance between the target gate and the to-be-authenticated person according to the position information and the positioning information of the target gate and taking the distance as a first distance; and when the first distance meets a preset condition, enabling the target gate to complete authentication of the to-be-authenticated person according to the security authentication starting instruction. According to the method, the to-be-authenticated person can be quickly authenticated, so that thegate authentication passing efficiency is better.

Description

technical field [0001] The present application relates to the field of access control authentication, and in particular to a method, system and computer storage medium for gate pass authentication. Background technique [0002] At present, in the process of security inspection, if people want to pass through the security gate, they often use card swiping or face recognition. However, in the process of swiping card and face recognition, they generally need to go through the background authentication process, which takes a relatively long time. It is relatively long, making it difficult for people to pass quickly when they come and go, and there is no gate system based on location information on the market. Contents of the invention [0003] The purpose of the present application is to disclose a gate passing authentication method, system and computer storage medium, so as to realize rapid authentication of persons to be authenticated who need to pass through the gates, ther...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/32G07C9/38G07C9/28H04W4/021H04W4/029H04W52/02H04W64/00
CPCG07C9/32G07C9/38G07C9/28H04W4/021H04W4/029H04W52/0248H04W64/006Y02D30/70
Inventor 苏国汉
Owner GUANGDONG BOZHILIN ROBOT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products