Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Face recognition security system based on Internet of Things and operation method

A face recognition and security system technology, applied in the field of face recognition security systems, can solve the problems of uncertain data timeliness, low efficiency, and low security, and achieve high security prevention and tracking capabilities, improved comparison speed, The effect of safety improvement

Pending Publication Date: 2020-10-02
深圳市顺易通信息技术有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the face recognition device itself stores multiple real face features, its security is low, and it is easy to steal face feature data, delete or replace the face feature data in the device, resulting in legitimate personnel being unable to be detected by face Identify device identification
[0003] Face recognition equipment lacks flexibility and scalability in use. When the equipment fails and needs to be replaced, all facial feature data in the equipment needs to be re-collected. Due to the uncertain timeliness of data re-collection, it seriously affects production efficiency; The facial features collected by the face recognition device can only be used for personal identification on this device, and cannot be used for cross-device recognition
If personnel changes, it is necessary to perform repeated addition, modification or deletion operations in multiple devices, which is cumbersome and inefficient
[0004] When there is a lot of data stored in the face recognition device, the pressure on device comparison is too great, resulting in a long time for comparison and recognition, which cannot meet the application scenarios that require timeliness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition security system based on Internet of Things and operation method
  • Face recognition security system based on Internet of Things and operation method
  • Face recognition security system based on Internet of Things and operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] Embodiment 1: The operation method of the face recognition security system based on the Internet of Things comprises the following steps:

[0037] Step 1: Collect face feature values:

[0038] Upload and store all applicant data on the cloud server through the face collection device and client;

[0039] Step 2: Operation control terminal application identification:

[0040] When the applicant uses the operation control terminal to send a request for unlocking the security cabinet with a seal to the cloud server, the cloud server carries out identity verification to the applicant, and checks whether the applicant has the authority to open the storage drawer and to be returned. Verify the legitimacy of the seal. The legitimacy of the seal is whether the currently applied seal has the right to be applied by the applicant, and whether the seal is being used by others. If the verification is valid, the cloud server side judges whether the storage drawer requested by the app...

Embodiment 2

[0054] Embodiment 2: as figure 1 , 2 As shown, the operation method of the face recognition safe based on the Internet of Things comprises the following steps:

[0055] Step 1: Collect face feature values; when it is necessary to add or update applicant data in a business scenario, the manager will lead the newly added or updated applicants to the face recognition device for collection, and use the collection immediately after each collection The obtained face features are compared with the face of the current applicant. After the comparison is successful, the applicant data is encrypted and uploaded to the cloud server through the client. The applicant data includes: name, number, face data, access Face recognition security cabinet number and storage drawer number, seal number, face data and the corresponding parameters and timeout time of the face recognition security cabinet number accessed, the face collection device collects multiple face data for the same person, and th...

Embodiment 3

[0071] Embodiment 3: as figure 1 , 3 As shown, the operation method of the face recognition safe based on the Internet of Things comprises the following steps:

[0072] Step 1: Collect facial feature values; upload and store all applicant data on the cloud server through the face collection device and client;

[0073] Step 2: The operator applies for identification;

[0074] When the applicant uses the operation control terminal to send a request to the cloud server to unlock the security cabinet for storing the seal, the cloud server acquires the position of the drawer where the seal is located, the address of the face recognition device, the timeout time and face data, and executes Step 3, when the face data comparison of the face recognition device queue is timed out, delete the timed out face data, and the cloud server side records timeout information and business processing data;

[0075] Step 3: Identify and operate the safe:

[0076] The face recognition device judg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a face recognition security system based on the Internet of Things and an operation method. The security system comprises a plurality of face recognition security cabinets based on the Internet of Things, a cloud server side and an operation control terminal, and each face recognition security cabinet comprises a control cabinet body and a plurality of storage drawers arranged in the transverse direction and the longitudinal direction; the control cabinet body is provided with an intelligent electric control lock controller, an RFID reader-writer, face recognition equipment and a router, and each storage drawer is provided with an intelligent electric control lock and an RFID antenna and used for storing a seal with an RFID electronic tag. The intelligent electric control lock is electrically connected with the intelligent electric control lock controller; the intelligent electric control lock controller is electrically connected with the face recognition equipment; the RFID antenna is electrically connected with the RFID reader-writer; the RFID reader-writer and the face recognition device are electrically connected with the router, and the router is connected with the cloud server side through a network. The invention further comprises an operation method of the face recognition security system based on the Internet of Things. The operation method comprises the steps: 1, collecting face feature values: 2, applying for recognition by the operation end; 3, recognizing and operating the security cabinet.

Description

technical field [0001] The invention relates to the field of security technology, in particular to a face recognition security system and an operation method based on the Internet of Things. Background technique [0002] The current face recognition method used in security cabinets is to store multiple authorized face features in the face recognition device and compare them in real time. Since the face recognition device itself stores multiple real face features, its security is low, and it is easy to steal face feature data, delete or replace the face feature data in the device, resulting in legitimate personnel being unable to be detected by face Identify device identification. [0003] Face recognition equipment lacks flexibility and scalability in use. When the equipment fails and needs to be replaced, all facial feature data in the equipment needs to be re-collected. Due to the uncertain timeliness of data re-collection, it seriously affects production efficiency; The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07F17/12G07C9/00G06K17/00
CPCG06K17/0029G07C9/00563G07C9/00658G07F17/12
Inventor 祁琳
Owner 深圳市顺易通信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products