Access control system and its control method, electronic equipment
A control method and technology of an access control system, applied in the field of access control security, can solve the problems of large space occupied, high price and high hardware cost of the gate, and achieve the effects of saving space, preventing users from retrograde, and shortening the length.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] like figure 1 , figure 2 , image 3 As shown, this embodiment provides an access control system, which can be used in an unmanned convenience store. The unmanned convenience store is a closed space 1 with a plurality of shelves 2 placed inside. An access control system 3 is set at the user entrance 11 of the unmanned convenience store to identify the user's identity, allow legal users to enter the closed space 1 , and prevent illegal users from entering the closed space 1 . An access control system 3 is set at the user exit 12 of the unmanned convenience store, without identifying the user's identity, allowing the user to leave the closed space 1 and preventing illegal users from entering the closed space 1 through the user exit. Of course, in other embodiments, the closed space 1 can also be a relatively closed space such as a subway station, a residential area, etc., and the access control system 3 can be used for the entrance and exit of these occasions. In this ...
Embodiment 2
[0099] The hardware structure of Embodiment 2 is exactly the same as that of Embodiment 1. The electronic device 34 of Embodiment 2 includes a memory 341 and a processor 342. The memory 341 is provided with a storage medium for storing executable program codes. The executable program code is taken to run a computer program corresponding to the executable program code, so as to execute several steps in an access control system control method.
[0100] Most of the technical features of the access control system control method described in Embodiment 2 are the same as those of the access control system control method described in Embodiment 1. Figure 13 As shown, the passing detection step S10 specifically includes the following steps S91-S94.
[0101] In the passing detection step S10 described in Embodiment 1, the method of judging whether there are people in the second area and the third area within a preset time is used to determine whether someone passes through the access ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


