CN109493475A - A method of based on biological characteristic as fence - Google Patents

A method of based on biological characteristic as fence Download PDF

Info

Publication number
CN109493475A
CN109493475A CN201811293058.4A CN201811293058A CN109493475A CN 109493475 A CN109493475 A CN 109493475A CN 201811293058 A CN201811293058 A CN 201811293058A CN 109493475 A CN109493475 A CN 109493475A
Authority
CN
China
Prior art keywords
employee
fence
mobile device
information
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811293058.4A
Other languages
Chinese (zh)
Other versions
CN109493475B (en
Inventor
王伟
桂艳峰
丁俊
丁俊一
陈电波
王凤周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Uusafe Co Ltd
Original Assignee
Uusafe Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Uusafe Co Ltd filed Critical Uusafe Co Ltd
Priority to CN201811293058.4A priority Critical patent/CN109493475B/en
Publication of CN109493475A publication Critical patent/CN109493475A/en
Application granted granted Critical
Publication of CN109493475B publication Critical patent/CN109493475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of methods based on biological characteristic as fence, when employee enters fence from import and export, identifying system acquires worker's information, server is sent by the message that employee enters fence, server searches the corresponding mobile device of employee, and the mobile device is managed, when employee leaves fence from import and export, identifying system acquires worker's information, server is sent by the message that employee leaves fence, server sends employee's fence status information to mobile device.The present invention has the advantage that when employee enters fence, being necessarily identified system acquisition identity information, such as face identification system ensure that accuracy in the present invention;When employee leaves fence, control will not be directly released, needs employee to request to release, prevents other people from taking away mobile device from fence.

Description

A method of based on biological characteristic as fence
Technical field
The present invention relates to mobile security fields, and in particular to a method of based on biological characteristic as fence.
Background technique
The mechanisms such as government, enterprise all pay much attention to always network security, the computer of many units be can not with the external world into Row data interaction, to prevent unit information from revealing, but the function of present mobile device is stronger and stronger, clarity of such as taking pictures, Scanning speed, Wireless data transmission speed etc., this mobile device can replace computer outwardly to divulge a secret, and makes list There is very big hidden danger in the network security of position.
Certainly, also have unit by the way of fence, be mostly used geographical location and time, or with attendance checking system pair It connects.The fence of existing mobile device not can guarantee the mobile device of employee all in illegal state, have very more Loophole, and still with certain information of unit in the mobile device of employee, it is easily stolen to take, cause certain information to be let out Dew.
Summary of the invention
The purpose of the present invention is to provide a kind of methods based on biological characteristic as fence, to solve existing electricity Sub- fence, the weak defect of the mobile device control ability to employee.
To achieve the above object, the technical scheme is that a kind of method based on biological characteristic as fence, The following steps are included:
Step 1: establishing fence, an inlet and outlet are arranged in fence boundary, and identifying system is arranged in import and export;
Step 2: when employee enters fence from import and export, identifying system acquire worker's information, by employee into The message for entering fence is sent to server, and server searches the corresponding mobile device of employee, and the mobile device is managed;
Step 3: when employee leaves fence from import and export, identifying system acquire worker's information, by employee from The message for opening fence is sent to server, and server sends employee's fence status information to mobile device;
Step 4: employee operates requirement on the mobile apparatus and releases control, after server receives information, it is desirable that identification person Work information, employee send identity information to server by mobile device captured identity information;
Step 5: server verifies the identity information of employee, and the worker's information received and employee's archive information are carried out It compares, if information is inconsistent, then enters step 6, otherwise enter step 7;
Step 6: the worker's information and employee's archive information that server acknowledges receipt of are inconsistent, return to control and release mistake Message is lost to mobile device;
Step 7: worker's information that server acknowledges receipt of is consistent with employee's archive information, then inquires the movement automatically The position of equipment then sends control and releases failed message to mobile device if the position of mobile equipment is located in fence;Such as The position of mobile equipment is located at outside fence, then releases the control of the mobile device.
The identifying system is one or more in face identification system, iris authentication system and fingerprint recognition system.
The control refers to: control software client is equipped in mobile device, server sends control order to shifting When dynamic equipment, control software client receives order, and forbidden moves equipment generates number with all facilities in addition to server According to interaction.
In step 4, employee acquires face information by the camera in mobile device and is sent to server.
In step 4, employee acquires finger print information by the fingerprint capturer in mobile device and is sent to server.
In step 4, employee acquires iris information by the iris capturing device in mobile device and is sent to server.
Further include step 8: control software client also monitors the heartbeat of employee by mobile device, when loss employee's heartbeat Time reach given threshold after, then control of the starting to mobile device.
The present invention has the advantage that
(1) in the present invention, when employee enters fence, system acquisition identity information, such as recognition of face are necessarily identified System ensure that accuracy;
(2) when employee leaves fence, control will not be directly released, needs employee to request to release, prevents other people from electricity Mobile device is taken away in sub- fence;
(3) heartbeat of employee is monitored, but after mobile device leaves employee for a period of time, i.e. control mobile device automatically, with Ensure the information security in mobile device.
Detailed description of the invention
Fig. 1 is the flow chart that employee of the present invention passes in and out fence;
Fig. 2 is the flow chart that employee of the present invention releases control.
Specific embodiment
The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention..
Embodiment 1
As shown in Figure 1 and Figure 2, a method of based on biological characteristic as fence, comprising the following steps:
Step 1: establishing fence, an inlet and outlet are arranged in fence boundary, and identifying system is arranged in import and export;
Step 2: when employee enters fence from import and export, identifying system acquire worker's information, by employee into The message for entering fence is sent to server, and server searches the corresponding mobile device of employee, and the mobile device is managed;
Step 3: when employee leaves fence from import and export, identifying system acquire worker's information, by employee from The message for opening fence is sent to server, and server sends employee's fence status information to mobile device;
Step 4: employee operates requirement on the mobile apparatus and releases control, after server receives information, it is desirable that identification person Work information, employee send identity information to server by mobile device captured identity information;
Step 5: server verifies the identity information of employee, and the worker's information received and employee's archive information are carried out It compares, if information is inconsistent, then enters step 6, otherwise enter step 7;
Step 6: the worker's information and employee's archive information that server acknowledges receipt of are inconsistent, return to control and release mistake Message is lost to mobile device;
Step 7: worker's information that server acknowledges receipt of is consistent with employee's archive information, then inquires the movement automatically The position of equipment then sends control and releases failed message to mobile device if the position of mobile equipment is located in fence;Such as The position of mobile equipment is located at outside fence, then releases the control of the mobile device.
The identifying system is fingerprint recognition system.Fingerprint recognition system is arranged at gate inhibition, when employee passes in and out electronics It when fence, needs brush finger line with opening gate, at this moment collects worker's information.
The control refers to: control software client is equipped in mobile device, server sends control order to shifting When dynamic equipment, control software client receives order, and forbidden moves equipment generates number with all facilities in addition to server According to interaction, mobile device is within fence, then manages interface and the function control such as disabling bluetooth, WiFi, phase of mobile device Machine, cellular data, USB debugging etc., and application installation black and white lists etc..
In step 4, employee acquires face information by the camera in mobile device and is sent to server.It can also pass through Fingerprint capturer acquisition finger print information in mobile device is sent to server.Even pass through the iris capturing device in mobile device Acquisition iris information is sent to server.The Employee Profile of server storage, include the face information of employee, finger print information and Iris information.
Fence state refers to that employee is in inside fence and also refers to outside fence that the present invention is by two identifications of setting Two fingerprint machines are arranged in system, the present embodiment, one of them is checked card when entering fence, and opening gate enters fence, can send Fence state is to employee;The other is out fence when check card, opening gate, fence, can send fence state to employee out.It reminds Employee pays close attention to mobile phone state.
Embodiment 2
The present embodiment and embodiment 1 are almost the same, the difference is that the identifying system that the present embodiment uses is face knowledge Other system, convenient for accurate monitoring employee disengaging, because many inlet and outlet are all the method using gate inhibition, gate inhibition after employee's brush finger line It opens, so that reaching record employee passes in and out information, but is easy to appear employee's brush finger line, the feelings that several employees enter together Condition, it is such just to produce loophole.So the present embodiment use face identification system, guarantee can capture all employees into Information out does not generate omission.
Embodiment 3
The present embodiment and embodiment 2 are almost the same, the difference is that joined step 8 in method: control software client End also monitors the heartbeat of employee by mobile device, and after the time for losing employee's heartbeat reaching given threshold, then starting is to shifting The control of dynamic equipment.
In this way when employee is outside fence, does not use mobile device, mobile device can be managed, and prevent other people from looking into The mobile device (such as mobile phone) for readding employee, steals some information of unit in mobile device.Information security is further ensured.

Claims (7)

1. a kind of method based on biological characteristic as fence, which comprises the following steps:
Step 1: establishing fence, an inlet and outlet are arranged in fence boundary, and identifying system is arranged in import and export;
Step 2: when employee enters fence from import and export, identifying system acquires worker's information, and employee is entered electricity The message of sub- fence is sent to server, and server searches the corresponding mobile device of employee, and the mobile device is managed;
Step 3: when employee leaves fence from import and export, identifying system acquires worker's information, and employee is left electricity The message of sub- fence is sent to server, and server sends employee's fence status information to mobile device;
Step 4: employee operates requirement on the mobile apparatus and releases control, after server receives information, it is desirable that identification employee's letter Breath, employee send identity information to server by mobile device captured identity information;
Step 5: server verifies the identity information of employee, and the worker's information received is compared with employee's archive information It is right, if information is inconsistent, then 6 are entered step, otherwise enters step 7;
Step 6: the worker's information and employee's archive information that server acknowledges receipt of are inconsistent, return to control releasing and unsuccessfully disappear Cease mobile device;
Step 7: worker's information that server acknowledges receipt of is consistent with employee's archive information, then inquires the mobile device automatically Position then send control if the position of mobile equipment is located in fence and release failed message to mobile device;Such as shifting Dynamic device location is located at outside fence, then releases the control of the mobile device.
2. a kind of method as described in claim 1, which is characterized in that the identifying system is face identification system, iris It is one or more in identifying system and fingerprint recognition system.
3. a kind of method as described in claim 1, which is characterized in that the control refers to: being equipped with pipe in mobile device Software client is controlled, when mobile device is arrived in server transmission control order, control software client is to receive order, forbids moving Dynamic equipment generates data interaction with all facilities in addition to server.
4. a kind of method as described in claim 1, which is characterized in that in step 4, employee passes through the camera in mobile device Acquisition face information is sent to server.
5. a kind of method as described in claim 1, which is characterized in that in step 4, employee is adopted by the fingerprint in mobile device Storage acquisition finger print information is sent to server.
6. a kind of method as described in claim 1, which is characterized in that in step 4, employee is adopted by the iris in mobile device Storage acquisition iris information is sent to server.
7. a kind of method as claimed in claim 3, which is characterized in that further include step 8: control software client also passes through shifting The heartbeat of dynamic monitoring of tools employee then starts the pipe to mobile device after the time for losing employee's heartbeat reaching given threshold Control.
CN201811293058.4A 2018-11-01 2018-11-01 Method for serving as electronic fence based on biological characteristics Active CN109493475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811293058.4A CN109493475B (en) 2018-11-01 2018-11-01 Method for serving as electronic fence based on biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811293058.4A CN109493475B (en) 2018-11-01 2018-11-01 Method for serving as electronic fence based on biological characteristics

Publications (2)

Publication Number Publication Date
CN109493475A true CN109493475A (en) 2019-03-19
CN109493475B CN109493475B (en) 2021-12-31

Family

ID=65693476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811293058.4A Active CN109493475B (en) 2018-11-01 2018-11-01 Method for serving as electronic fence based on biological characteristics

Country Status (1)

Country Link
CN (1) CN109493475B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992509A (en) * 2019-12-16 2020-04-10 三只松鼠股份有限公司 Equipment monitoring system and method for production workshop
CN112001638A (en) * 2020-08-25 2020-11-27 瑞洲建设集团有限公司 Building site management system based on internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205827478U (en) * 2016-07-20 2016-12-21 ***通信集团山东有限公司潍坊分公司 A kind of safe communication system based on apparatus management/control
CN106375956A (en) * 2016-09-14 2017-02-01 得豆科技(北京)有限公司 Electronic fence method and device for mobile terminal
CN106559258A (en) * 2016-10-11 2017-04-05 北京元心科技有限公司 Mobile terminal management-control method and system
CN107730428A (en) * 2017-10-17 2018-02-23 贾俊力 Job site intelligent monitoring administration system and its control method
US20180225898A1 (en) * 2017-02-03 2018-08-09 Gto Access Systems, Llc Method and system for controlling a movable barrier

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205827478U (en) * 2016-07-20 2016-12-21 ***通信集团山东有限公司潍坊分公司 A kind of safe communication system based on apparatus management/control
CN106375956A (en) * 2016-09-14 2017-02-01 得豆科技(北京)有限公司 Electronic fence method and device for mobile terminal
CN106559258A (en) * 2016-10-11 2017-04-05 北京元心科技有限公司 Mobile terminal management-control method and system
US20180225898A1 (en) * 2017-02-03 2018-08-09 Gto Access Systems, Llc Method and system for controlling a movable barrier
CN107730428A (en) * 2017-10-17 2018-02-23 贾俊力 Job site intelligent monitoring administration system and its control method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110992509A (en) * 2019-12-16 2020-04-10 三只松鼠股份有限公司 Equipment monitoring system and method for production workshop
CN110992509B (en) * 2019-12-16 2022-04-12 三只松鼠股份有限公司 Equipment monitoring system and method for production workshop
CN112001638A (en) * 2020-08-25 2020-11-27 瑞洲建设集团有限公司 Building site management system based on internet of things
CN112001638B (en) * 2020-08-25 2024-01-23 瑞洲建设集团有限公司 Building site management system based on internet of things

Also Published As

Publication number Publication date
CN109493475B (en) 2021-12-31

Similar Documents

Publication Publication Date Title
CN106453874B (en) Mobile phone control method and system
KR20200006987A (en) Access control method, access control device, system and storage medium
US9652953B2 (en) Surveillance of a secure area
US20210196169A1 (en) Methods and System for Monitoring and Assessing Employee Moods
US20110050875A1 (en) Method and apparatus for detecting behavior in a monitoring system
CN108694760B (en) Access control card issuing method, access control card management method, visitor system and self-service terminal
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
CN105426869A (en) Face recognition system and recognition method based on railway security check
KR20160025768A (en) Attendance Management System Using Face Recognition
CN109003347A (en) A kind of anti-cheating movable attendance checking terminal
CN103971487A (en) Security monitoring system and method
CN105574498A (en) Face recognition system and recognition method based on customs security check
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
CN109493475A (en) A method of based on biological characteristic as fence
AU2020200067A1 (en) A Method and System for Reporting, Securing and Controlling Mobile Phones Which are Lost (Misplaced\Stolen)
KR101573887B1 (en) Security Managing System Regulating Selectively a Function of the Smartphone and Controlling Method for the same
CN201765619U (en) Stranger portrait early warning system based on portrait biometric identification technology
CN106572324A (en) Energy-efficient smart monitoring device
CN105138321B (en) The control method and system of terminal
CN112669501B (en) Access control method, device and computer readable storage medium
CN206058301U (en) A kind of Prison Management System Developed
CN109903416A (en) Pinpoint patrolling management system and method
CN105243738A (en) ATM operation monitoring system and method based on face recognition
CN105447362A (en) Safety monitoring method and system
CN109089073A (en) For the monitoring method of more scenes, device and system locating for smart machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant