CN111091642A - Intelligent security system and working method thereof - Google Patents

Intelligent security system and working method thereof Download PDF

Info

Publication number
CN111091642A
CN111091642A CN201911419469.8A CN201911419469A CN111091642A CN 111091642 A CN111091642 A CN 111091642A CN 201911419469 A CN201911419469 A CN 201911419469A CN 111091642 A CN111091642 A CN 111091642A
Authority
CN
China
Prior art keywords
person
subsystem
face image
information
human
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911419469.8A
Other languages
Chinese (zh)
Inventor
梁芳
张振
吴思宇
毛翔宇
张飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201911419469.8A priority Critical patent/CN111091642A/en
Publication of CN111091642A publication Critical patent/CN111091642A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an intelligent security system and a working method thereof, wherein the method comprises the following steps: after a first face image of a person captured by a verification camera is matched with second face information in a read certificate, the first face image is matched with face images of a plurality of internal persons stored in a person certificate verification subsystem in advance and face images contained in a plurality of pieces of received reservation application information, and the identity of the person is verified; if the person is determined to be an internal person or the person is determined to be a visitor, a control instruction is sent to the access control subsystem, so that the access control subsystem opens a gate according to the control instruction; and if the person is determined to be a stranger, outputting prompt information for prompting the person to apply for visiting appointment. Through the mode, the identity of the personnel passing in and out can be checked conveniently and quickly, the process of checking the identity of the personnel is simplified, the accuracy of checking the identity of the personnel passing in and out is improved, and therefore the safety of the area where the intelligent security system is located is improved.

Description

Intelligent security system and working method thereof
Technical Field
The invention relates to the technical field of security, in particular to an intelligent security system and a working method thereof.
Background
Places such as organ units, schools, enterprises, factories, scenic spots and communities needing to limit personnel access often need to verify the identity of the personnel to pass through so as to ensure the safety of the personnel.
At present, the verification of the personnel who pass in and out mostly adopts the traditional manual verification mode, for example, the manual verification of the identification cards, the work cards, the visitor cards and other certificates of the personnel who pass in and out is used for verifying the identity of the personnel who pass in and out. However, the conventional manual verification method is prone to have safety problems, for example, situations that an individual person falsify a certificate and uses a counterfeit certificate are prone to occur, which causes problems that the person certificate is difficult to be identified artificially, the accuracy of the identity of the person who enters and exits cannot be ensured, and the verification record of the identity of the person who enters and exits cannot be kept, so that the safety problems are prone to occur. In addition, the traditional method for registering the identity information of the person entering or exiting by handwriting is easy to have many problems. For example, the identity information of the people who enter and exit is slow in handwriting registration, which easily causes the phenomenon that the people who enter and exit need to queue for registration and is inconvenient for the people to enter and exit; the handwriting registration is easy to have the problem of illegible handwriting; paper registration data for registering identity information of people who enter and exit is easy to damage; if the paper registration data is lost, personal privacy information such as identity information, mobile phone numbers and the like of registered personnel is easily leaked; when paper registration data is more, it is time-consuming and labor-consuming to find the registration information of the personnel who pass in and out in a certain period of time, and the situation of omission is easy to occur, and the like.
In summary, the traditional manual check of the identity of the person who goes in and out has the problems of low safety and complicated registration of the identity information of the person who goes out.
Therefore, how to provide a convenient and fast way for verifying the identity of the entering and exiting personnel with high safety becomes a problem to be solved at present.
Disclosure of Invention
The embodiment of the invention provides an intelligent security system and a working method thereof, which are used for providing a convenient and rapid mode with higher safety for verifying the identity of an entering person and an exiting person.
In a first aspect, an embodiment of the present invention provides a working method of an intelligent security system, where the intelligent security system includes a people identity verification subsystem and an access control subsystem; wherein, a camera is arranged in the human evidence verification subsystem; the person certificate verification subsystem and the access control subsystem are in wireless communication; the method comprises the following steps:
the person-certificate-verifying subsystem captures a first face image of a person in a shooting area of the camera through the camera and reads certificate information of a certificate in a certificate reading area of the person-certificate-verifying subsystem; the certificate information comprises a second face image and first identity information;
the human certificate checking subsystem matches the first human face image with the second human face information and checks whether the first human face image is matched with the second human face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person;
the human license verification subsystem simultaneously matches the first human face image with human face images of a plurality of internal persons pre-stored by the human license verification subsystem and human face images contained in a plurality of received reservation application information, and verifies the identity of the person;
if it is determined that the face images of the plurality of internal persons exist, the person verification subsystem determines that the persons are internal persons and sends a first control instruction to the access control subsystem, so that the access control subsystem opens a gate according to the first control instruction;
if the fact that the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information is determined, the person is determined to be a visitor by the people verification subsystem, and a second control instruction is sent to the access control subsystem, so that the access control subsystem opens the gate machine according to the second control instruction;
if the human face images of the plurality of internal personnel are determined, the human face images matched with the first human face images do not exist in the human face images contained in the plurality of reservation application information, the person verification subsystem determines that the personnel are strangers and outputs prompt information for prompting the personnel to apply for the reservation of visiting.
In one possible design, the intelligent security system further comprises a security management subsystem; the person certificate verification subsystem and the security management subsystem are in wireless communication; after the human witness verification subsystem determines that the person is an internal person, the method further comprises:
the people's identity card verification subsystem sends the identity card information and the current time of the personnel to the security management subsystem so that the security management server generates the entry and exit records of the personnel according to the identity card information and the current time;
after the witness verification subsystem determines that the person is a visitor, the method further comprises:
the witness verification subsystem sends the first appointment application information and the current time of the personnel to the security management subsystem, so that the safety management server generates the visiting record of the personnel according to the first appointment application information and the current time.
In one possible design, the method further includes:
if the first face image and the second face image are determined not to be matched, the person verification subsystem determines that the first identity information is not matched with the person, and determines that the person is a stranger;
and the testimony verification subsystem sends the result that the first face image is not matched with the first identity information to the security management subsystem, so that the security management subsystem counts the testimony matching failure records of the personnel according to the first identity information and the first face image.
In one possible design, the document includes an identification card, a radio frequency identification RFID card; the RFID card at least comprises one or more of an employee card, a visitor card and an entrance guard card.
In a second aspect, an embodiment of the present invention provides an intelligent security system, where the intelligent security system includes a people identity verification subsystem and an access control subsystem; wherein, a camera is arranged in the human evidence verification subsystem; the person certificate verification subsystem and the access control subsystem are in wireless communication; wherein the content of the first and second substances,
the human evidence verification subsystem is used for:
capturing a first face image of a person in a shooting area of the camera through the camera, and reading certificate information of a certificate in a certificate reading area of the people certificate verification subsystem; the certificate information comprises a second face image and first identity information;
matching the first face image with the second face information, and checking whether the first face image is matched with the second face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person;
simultaneously matching the first face image with face images of a plurality of internal persons pre-stored by the human license verification subsystem and face images contained in a plurality of received reservation application information, and verifying the identity of the person;
if the face images of the plurality of internal persons are determined to have the face images matched with the first face image, determining that the persons are internal persons, and sending a first control instruction to the access control subsystem;
if the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, determining that the person is a visitor, and sending a second control instruction to the access control subsystem;
if the human face images of the plurality of internal people and the human face images contained in the plurality of reservation application information are determined not to have the human face image matched with the first human face image, the person verification subsystem determines that the person is a stranger and outputs prompt information for prompting the person to apply for a visit reservation;
and the access control subsystem is used for opening a gate machine according to the first control instruction or the second control instruction.
In one possible design, the intelligent security system further comprises a security management subsystem; the person certificate verification subsystem and the security management subsystem are in wireless communication; the human authentication verification subsystem is further configured to:
sending certificate information and current time of the personnel to the security management subsystem;
the security management server is specifically configured to:
generating an entry and exit record of the personnel according to the certificate information and the current time;
the human authentication verification subsystem is further configured to:
sending first appointment application information and current time of the personnel to the security management subsystem;
the security management server is further configured to:
and generating the visiting record of the personnel according to the first appointment application information and the current time.
In one possible design, the human authentication verification subsystem is further configured to:
if the first face image is determined to be not matched with the second face image, determining that the first identity information is not matched with the person, and determining that the person is a stranger;
sending the result that the first face image is not matched with the first identity information to the security management subsystem;
the security management subsystem is further configured to:
and counting the record of the personnel's witness matching failure according to the first identity information and the first face image.
In one possible design, the document includes an identification card, a radio frequency identification RFID card; the RFID card at least comprises one or more of an employee card, a visitor card and an entrance guard card.
In a third aspect, an embodiment of the present invention provides an intelligent security system, where the intelligent security system includes: at least one processor and memory; wherein the memory is to store one or more computer programs; the one or more computer programs stored in the memory, when executed by the at least one processor, enable the smart security system to perform the method of the first aspect or any one of the possible designs of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, which stores computer instructions that, when executed on a computer, enable the computer to perform the method of the first aspect or any one of the possible designs of the first aspect.
The invention has the following beneficial effects:
in the embodiment of the invention, a first face image of a person in a shooting area of a camera is captured through the camera, and certificate information of a certificate in a certificate reading area of a certificate verification subsystem is read; the certificate information comprises a second face image and first identity information; matching the first face image with the second face information, and checking whether the first face image is matched with the second face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person; the person certificate verifying subsystem simultaneously matches the first face image with face images of a plurality of internal persons pre-stored by the person certificate verifying subsystem and face images contained in a plurality of received reservation application information, and verifies the identity of the person; if the face images of the plurality of internal persons are determined to have the face images matched with the first face image, determining that the persons are internal persons, and sending a first control instruction to the access control subsystem to enable the access control subsystem to open a gate machine according to the first control instruction; if the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, determining that the person is a visitor, and sending a second control instruction to the access control subsystem to enable the access control subsystem to open a gate machine according to the second control instruction; and if the face images of the plurality of internal persons and the face images contained in the plurality of reservation application information do not have the face image matched with the first face image, determining that the person is a stranger, and outputting prompt information for prompting the person to apply for a visit reservation. Through the mode, the identity of the personnel passing in and out can be checked conveniently and quickly, the process of checking the identity of the personnel is simplified, the accuracy of checking the identity of the personnel passing in and out is improved, and therefore the safety of the area where the intelligent security system is located is improved.
Drawings
Fig. 1 is a schematic structural diagram of an intelligent security system according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a working method of an intelligent security system according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an intelligent security system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an intelligent security system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The shapes and sizes of the various elements in the drawings are not to scale and are merely intended to illustrate the invention.
The terms "first" and "second" in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the term "comprises" and any variations thereof, which are intended to cover non-exclusive protection. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In the embodiment of the present invention, "a plurality" may mean at least two, for example, two, three, or more, and the embodiment of the present invention is not limited.
In order to facilitate understanding of the technical solutions in the embodiments of the present invention by those skilled in the art, the following describes an embodiment of the operation of the intelligent security system with reference to the structure of the intelligent security system shown in fig. 1 as an application scenario of the embodiments of the present invention.
As shown in fig. 1, the smart security system 100 includes: a human authentication verification subsystem 101 and an entrance guard subsystem 102. Wherein, the witness verification subsystem 101 is in wireless communication with the gate prohibition subsystem 102. For example, the witness verification subsystem 101 may communicate with the door disablement subsystem 102 via bluetooth or WiFi.
Optionally, the intelligent security system 100 may perform a personal verification on the person who enters and exits the area in which the personal identity verification needs to be performed through the personal verification subsystem 101, and determine the identity of the person who enters and exits the area. For example, the human authentication sub-system 101 captures a first face image of a person in a shooting area of a camera (not shown in fig. 1) through the camera, and reads certificate information (including a second face image and the first identity information) of a certificate located in a certificate reading area of the human authentication sub-system 101. Then, the human authentication verification subsystem 101 may match the first human face image with the second human face image, and verify whether the first human face image is matched with the second human face image. And if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person. Thereafter, the human verification subsystem 101 may determine the identity of the employee based on the first facial image information. The process by which the witness verification subsystem determines the identity of the employee is described below.
For example, the human license verification subsystem 101 may match the first human face image with human face images of a plurality of internal persons pre-stored by the human license verification subsystem 101 and human face images included in the received plurality of reservation application information, and verify the identity of the person. If the human-certificate-verifying subsystem 101 determines that the human face images matched with the first human face image exist in the human face images of the plurality of internal people, the human-certificate-verifying subsystem 101 can determine that the person is an internal person; if the person verification subsystem 101 determines that the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, the person verification subsystem 101 can determine that the person is a visitor; if the human authentication verification subsystem 101 determines that the human face images of the plurality of internal people and the human face images included in the plurality of reservation application information do not have a human face image matched with the first human face image, the human authentication verification subsystem 101 may determine that the person is a stranger.
For example, when the human verification subsystem 101 determines that the employee is an inside person, a first control instruction may be sent to the access control subsystem 102 to control the access control subsystem 102 to open a gate (not shown in fig. 1) and allow the employee to enter and exit the gate. When the human card verification subsystem 101 determines that the person is a visitor, a second control instruction may be sent to the access control subsystem 102 to control the access control subsystem 102 to open a gate and allow the employee to enter and exit the gate. When the person is determined to be a stranger by the person verification subsystem 101, prompt information can be output to prompt the person to apply for a visit reservation.
In the embodiment of the invention, the identity of the personnel who need to enter and exit the gate is verified through the people's identity card verification subsystem, the identity of the person who enters and exits is not required to be verified manually, and the entering and exiting record or the visiting record of the person who enters and exits is not required to be registered manually, so that on one hand, the identity of the person who enters and exits can be verified conveniently and rapidly, the identity verification process of the person is simplified, on the other hand, the identity verification accuracy of the person who enters and exits is improved, and therefore, the safety of the area where the intelligent security system is located is improved.
The working process of the intelligent security system in the embodiment of the invention is described in detail below.
Fig. 2 is a schematic flow chart of a working method of an intelligent security system according to an embodiment of the present invention. The method can be applied to the intelligent security system shown in the figure 2 or a similar intelligent security system. In fig. 2, the execution subject is a human verification sub-system as an example. As shown in fig. 2, the method flow includes:
s201, capturing a first face image of a person in a shooting area of a camera through the camera, and reading certificate information of a certificate in a certificate reading area of a certificate verification subsystem; the certificate information comprises a second face image and first identity information.
Optionally, the certificate reading area of the people's certificate verification subsystem may read information in an Identification card and Radio Frequency Identification (RFID) card. The RFID card may be an employee card, a visitor card, an access control card, or the like, and the embodiment of the present invention is not limited. If the RFID card is an employee card, the employee card may include a face image and identity information (e.g., a job number, a position, a department, etc.) of the employee. If the RFID card is an access card, the access card may include a face image and identity information (e.g., a cell phone number, a living unit, a house number, etc.) of the resident. If the RFID card is a visitor card, the visitor card may include a face image and identity information (e.g., a phone number, an identification number, etc.) of the visitor.
Optionally, in the process that the person verification sub-system captures the first face image of the person in the capturing area of the camera through the camera, the camera may adjust the capturing focus according to the environment information, so as to improve the sharpness of the first face image captured by the camera to the person in the capturing area of the camera. For example, the camera can adjust the shooting focus of the camera according to the light intensity state (such as a strong light state, a normal light state, a weak light state and the like), the color temperature and the like, so that the first face image of the person can be shot by obtaining the better shooting focus of image quality parameters (such as color saturation, brightness and other parameters), the first face image information with higher definition can be obtained, and further, when the first face image is matched with other face images by a subsequent human-certificate verification subsystem, the phenomenon of recognition errors caused by the fact that the definition of the first face image is not high can be avoided, and the accuracy of the human-certificate verification subsystem for recognizing the face image is improved.
S202, matching the first face image with the second face information, and checking whether the first face image is matched with the second face image. If the first face image is determined not to be matched with the second face image, S203 is executed, otherwise, the first identity information is determined to be matched with the person, and S204 is executed.
Optionally, after the first face image and the second face image are acquired by the human-card verification subsystem, whether the first face image and the second face image are matched is judged at first, so that the situations of falsely using the certificate and using the counterfeit certificate can be avoided, and the accuracy of the identity of the verification personnel can be further improved.
S203, determining that the first identity information is not matched with the person, and determining that the person is a stranger; and sending the result that the first face image is not matched with the first identity information to a security management subsystem, so that the security management subsystem counts the record of the personnel's witness matching failure according to the first identity information and the first face image.
Optionally, the security management subsystem may count a record of the failure of the witness matching of the person according to the first identity information and the first face image. In a specific implementation process, the security management subsystem can preset a frequency threshold value of first face image matching failure of each person, and then if the security management subsystem determines that the frequency of matching failure of a certain person exceeds the frequency threshold value, and most of the matching failure of the person is caused by the fact that the first face image of the person is matched with different face images to cause failure, the security management subsystem can determine that the person needs key verification and output early warning information to remind the security personnel that the person possibly has fake certificates and use fake certificates, so that the security personnel can find the person in time, and the potential safety hazard problem is avoided.
S204, simultaneously matching the first face image with face images of a plurality of internal persons pre-stored by a person certificate verification subsystem and face images contained in a plurality of received reservation application information, and verifying the identity of the person; if the person is determined to be an internal person, executing S205; if the person is determined to be a visitor, executing S206; if the person is determined to be a stranger, S207 is executed.
Optionally, in a specific implementation process, if the human-image verification subsystem determines that the human-image matched with the first human-image exists in the human-image images of the multiple internal persons, the human-image verification subsystem may determine that the person is an internal person; if the person certificate verification subsystem determines that the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, the person certificate verification subsystem can determine that the person is a visitor; if the person verification subsystem determines that the face images of the plurality of internal persons and the face images contained in the plurality of reservation application information do not have the face image matched with the first face image, the person verification subsystem can determine that the person is a stranger.
Optionally, the multiple reservation application information received by the human-license verification subsystem may be reservation application information sent by the user to the human-license verification subsystem through the client, or reservation application information input by the user operating on the human-license verification subsystem, and the like. Each reservation application information in the plurality of reservation application information may further include identity information (e.g., an identification number, a mobile phone number, etc.) of a person corresponding to each reservation application.
And S205, sending a first control instruction to the access control subsystem, and controlling the access control subsystem to open a gate.
Optionally, after the human evidence verification subsystem determines that the person is an internal person, a first control instruction may be sent to the access control subsystem to control the access control subsystem to open the gate, so that the person may pass through the gate. The people's card verification subsystem can also send the certificate information and the current time of the personnel to the security management subsystem, so that the security management server generates the entry and exit records of the personnel according to the certificate information and the current time, the entry and exit records of the personnel are not required to be manually and manually registered, the phenomenon that the personnel need to be queued for registration is avoided, and the personnel can enter and exit conveniently. In addition, the problem that the personal privacy of the personnel who enter and exit is easily revealed when the paper registration data is lost can be avoided, and the security of the personal privacy of the personnel who enter and exit is guaranteed.
And S206, sending a second control instruction to the access control subsystem for controlling the access control subsystem to open the gate.
Optionally, after the human evidence verification subsystem determines that the person is a visitor, a second control instruction may be sent to the access control subsystem, so as to control the access control subsystem to open the gate, so that the person may pass through the gate. The testimony verification subsystem can also send the first appointment application information and the current time of the personnel to the security management subsystem, so that the security management server can generate the visiting record of the personnel according to the first appointment application information and the current time, manual hand-writing registration of the access records of the personnel is not needed, the phenomenon that the personnel need to be queued for registration is avoided, and the personnel can conveniently enter and exit. In addition, the problem that the personal privacy of the personnel who enter and exit is easily revealed when the paper registration data is lost can be avoided, and the security of the personal privacy of the personnel who enter and exit is guaranteed.
And S207, outputting prompt information for prompting the person to apply for a visiting appointment.
Optionally, when the person verification subsystem determines that the person is a stranger, a prompt message may be output to prompt the person to apply for a visit reservation. Specifically, the prompt message may include a procedure step of applying for the visiting appointment and a path of applying for the visiting appointment (for example, a path of wechat public number, an official website, a person certificate verification subsystem, etc.), so as to facilitate the person to apply for the visiting appointment.
As can be seen from the above description, in the embodiment of the present invention, the first face image of the person in the shooting area of the camera is captured by the camera, and the certificate information of the certificate in the certificate reading area of the certificate verification subsystem is read; the certificate information comprises a second face image and first identity information; matching the first face image with the second face information, and checking whether the first face image is matched with the second face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person; the person certificate verifying subsystem simultaneously matches the first face image with face images of a plurality of internal persons pre-stored by the person certificate verifying subsystem and face images contained in a plurality of received reservation application information, and verifies the identity of the person; if the face images of the plurality of internal persons are determined to have the face images matched with the first face image, determining that the persons are internal persons, and sending a first control instruction to the access control subsystem to enable the access control subsystem to open a gate machine according to the first control instruction; if the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, determining that the person is a visitor, and sending a second control instruction to the access control subsystem to enable the access control subsystem to open a gate machine according to the second control instruction; and if the face images of the plurality of internal persons and the face images contained in the plurality of reservation application information do not have the face image matched with the first face image, determining that the person is a stranger, and outputting prompt information for prompting the person to apply for a visit reservation. Through the mode, the identity of the personnel passing in and out can be checked conveniently and quickly, the process of checking the identity of the personnel is simplified, the accuracy of checking the identity of the personnel passing in and out is improved, and therefore the safety of the area where the intelligent security system is located is improved.
Based on the same invention concept, the embodiment of the invention provides an intelligent security system. Fig. 3 is a schematic structural diagram of an intelligent security system according to an embodiment of the present invention.
As shown in fig. 3, the intelligent security system 300 includes a people certification verification subsystem 301 and an access control subsystem 302; wherein, a camera (not shown in fig. 3) is arranged in the human authentication and verification subsystem 301; the person certificate verification subsystem 301 and the access control subsystem 302 are in wireless communication; wherein the content of the first and second substances,
a human authentication verification subsystem 301 for:
capturing a first face image of a person in a shooting area of the camera through the camera, and reading certificate information of a certificate in a certificate reading area of the certificate verification subsystem 301; the certificate information comprises a second face image and first identity information;
matching the first face image with the second face information, and checking whether the first face image is matched with the second face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person;
simultaneously, matching the first face image with the face images of a plurality of internal persons pre-stored by the person verification subsystem 301 and the face images contained in the received plurality of reservation application information to verify the identity of the person;
if the face images of the plurality of internal persons are determined to have the face images matched with the first face image, determining that the person is an internal person, and sending a first control instruction to the access control subsystem 302;
if the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, determining that the person is a visitor, and sending a second control instruction to the access control subsystem 302;
if it is determined that the face images of the plurality of internal persons and the face images contained in the plurality of reservation application information do not have a face image matched with the first face image, the person verification subsystem 301 determines that the person is a stranger and outputs prompt information for prompting the person to apply for a visit reservation;
and the door access subsystem 302 is used for opening a gate (not shown in fig. 3) according to the first control instruction or the second control instruction.
In one possible design, the smart security system 300 further includes a security management subsystem (not shown in fig. 3); the witness verification subsystem 301 and the security management subsystem are in wireless communication; the human authentication verification subsystem 301 is also operable to:
sending certificate information and current time of the personnel to a security management subsystem;
the security management server is specifically configured to:
generating an entry and exit record of the person according to the certificate information and the current time;
the human authentication verification subsystem 301 is also operable to:
sending first appointment application information and current time of the person to a security management subsystem;
the security management server is further configured to:
and generating the visiting record of the person according to the first appointment application information and the current time.
In one possible design, the human verification subsystem 301 is further configured to:
if the first face image is determined to be not matched with the second face image, determining that the first identity information is not matched with the person, and determining that the person is a stranger;
sending a result that the first face image is not matched with the first identity information to a security management subsystem;
the security management subsystem is further configured to:
and counting the record of the personnel's certificate matching failure according to the first identity information and the first face image.
In one possible design, the document includes an identification card, a radio frequency identification RFID card; the RFID card at least comprises one or more of an employee card, a visitor card and an entrance guard card.
The intelligent security system 300 in the embodiment of the present invention and the working method of the intelligent security system shown in fig. 2 are based on the invention under the same conception, and through the foregoing detailed description of the working method of the intelligent security system, a person skilled in the art can clearly understand the implementation process of the intelligent security system 300 in the embodiment, so for the brevity of the description, no further description is provided here.
Based on the same invention concept, the embodiment of the invention provides an intelligent security system. Fig. 4 is a schematic structural diagram of an intelligent security system according to an embodiment of the present invention.
As shown in fig. 4, the smart security system 400 includes:
a memory 401 for storing one or more computer instructions;
at least one processor 402 for reading computer instructions in the memory 401 to enable the electronic device 400 to implement all or part of the steps in the embodiment shown in fig. 2.
Optionally, the memory 401 may include a high-speed random access memory, and may further include a nonvolatile memory, such as a magnetic disk storage device, a flash memory device, or other nonvolatile solid state storage devices, and the like, which is not limited in the embodiments of the present invention.
Alternatively, processor 402 may be a general purpose processor (CPU), or an ASIC, or FPGA, or may be one or more integrated circuits for controlling program execution.
In some embodiments, the memory 401 and the processor 402 may be implemented on the same chip, or in other embodiments, they may be implemented separately on separate chips, which is not limited in this embodiment of the present invention.
Based on the same inventive concept, an embodiment of the present invention provides a computer-readable storage medium, where computer instructions are stored, and when the computer instructions are executed by a computer, the computer instructions cause the computer to perform the steps of the working method of the intelligent security system.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. The working method of the intelligent security system is characterized in that the intelligent security system comprises a people identity verification subsystem and an access control subsystem; wherein, a camera is arranged in the human evidence verification subsystem; the person certificate verification subsystem and the access control subsystem are in wireless communication; the method comprises the following steps:
the person-certificate-verifying subsystem captures a first face image of a person in a shooting area of the camera through the camera and reads certificate information of a certificate in a certificate reading area of the person-certificate-verifying subsystem; the certificate information comprises a second face image and first identity information;
the human certificate checking subsystem matches the first human face image with the second human face information and checks whether the first human face image is matched with the second human face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person;
the human license verification subsystem simultaneously matches the first human face image with human face images of a plurality of internal persons pre-stored by the human license verification subsystem and human face images contained in a plurality of received reservation application information, and verifies the identity of the person;
if it is determined that the face images of the plurality of internal persons exist, the person verification subsystem determines that the persons are internal persons and sends a first control instruction to the access control subsystem, so that the access control subsystem opens a gate according to the first control instruction;
if the fact that the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information is determined, the person is determined to be a visitor by the people verification subsystem, and a second control instruction is sent to the access control subsystem, so that the access control subsystem opens the gate machine according to the second control instruction;
if the human face images of the plurality of internal personnel are determined, the human face images matched with the first human face images do not exist in the human face images contained in the plurality of reservation application information, the person verification subsystem determines that the personnel are strangers and outputs prompt information for prompting the personnel to apply for the reservation of visiting.
2. The method of claim 1, wherein the smart security system further comprises a security management subsystem; the person certificate verification subsystem and the security management subsystem are in wireless communication; after the human witness verification subsystem determines that the person is an internal person, the method further comprises:
the people's identity card verification subsystem sends the identity card information and the current time of the personnel to the security management subsystem so that the security management server generates the entry and exit records of the personnel according to the identity card information and the current time;
after the witness verification subsystem determines that the person is a visitor, the method further comprises:
the witness verification subsystem sends the first appointment application information and the current time of the personnel to the security management subsystem, so that the safety management server generates the visiting record of the personnel according to the first appointment application information and the current time.
3. The method of claim 2, wherein the method further comprises:
if the first face image and the second face image are determined not to be matched, the person verification subsystem determines that the first identity information is not matched with the person, and determines that the person is a stranger;
and the testimony verification subsystem sends the result that the first face image is not matched with the first identity information to the security management subsystem, so that the security management subsystem counts the testimony matching failure records of the personnel according to the first identity information and the first face image.
4. The method of any of claims 1-3, wherein the document comprises an identification card, a Radio Frequency Identification (RFID) card; the RFID card at least comprises one or more of an employee card, a visitor card and an entrance guard card.
5. An intelligent security system is characterized in that the intelligent security system comprises a people identity verification subsystem and an access control subsystem; wherein, a camera is arranged in the human evidence verification subsystem; the person certificate verification subsystem and the access control subsystem are in wireless communication; wherein the content of the first and second substances,
the human evidence verification subsystem is used for:
capturing a first face image of a person in a shooting area of the camera through the camera, and reading certificate information of a certificate in a certificate reading area of the people certificate verification subsystem; the certificate information comprises a second face image and first identity information;
matching the first face image with the second face information, and checking whether the first face image is matched with the second face image; if the first face image is determined to be matched with the second face image, determining that the first identity information is matched with the person;
simultaneously matching the first face image with face images of a plurality of internal persons pre-stored by the human license verification subsystem and face images contained in a plurality of received reservation application information, and verifying the identity of the person;
if the face images of the plurality of internal persons are determined to have the face images matched with the first face image, determining that the persons are internal persons, and sending a first control instruction to the access control subsystem;
if the face image information matched with the first face image information exists in the face images contained in the plurality of reservation application information, determining that the person is a visitor, and sending a second control instruction to the access control subsystem;
if the human face images of the plurality of internal people and the human face images contained in the plurality of reservation application information are determined not to have the human face image matched with the first human face image, the person verification subsystem determines that the person is a stranger and outputs prompt information for prompting the person to apply for a visit reservation;
and the access control subsystem is used for opening a gate machine according to the first control instruction or the second control instruction.
6. The intelligent security system of claim 5, wherein the intelligent security system further comprises a security management subsystem; the person certificate verification subsystem and the security management subsystem are in wireless communication; the human authentication verification subsystem is further configured to:
sending certificate information and current time of the personnel to the security management subsystem;
the security management server is specifically configured to:
generating an entry and exit record of the personnel according to the certificate information and the current time;
the human authentication verification subsystem is further configured to:
sending first appointment application information and current time of the personnel to the security management subsystem;
the security management server is further configured to:
and generating the visiting record of the personnel according to the first appointment application information and the current time.
7. The intelligent security system of claim 6, wherein the witness verification subsystem is further configured to:
if the first face image is determined to be not matched with the second face image, determining that the first identity information is not matched with the person, and determining that the person is a stranger;
sending the result that the first face image is not matched with the first identity information to the security management subsystem;
the security management subsystem is further configured to:
and counting the record of the personnel's witness matching failure according to the first identity information and the first face image.
8. The smart security system as recited in any one of claims 5-7, wherein the document comprises an identification card, a Radio Frequency Identification (RFID) card; the RFID card at least comprises one or more of an employee card, a visitor card and an entrance guard card.
9. An intelligent security system is characterized by comprising at least one processor and a memory;
the memory for storing one or more computer programs;
the one or more computer programs stored by the memory, when executed by the at least one processor, cause the smart security system to perform the method of any of claims 1-4.
10. A computer-readable storage medium having stored thereon computer instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1-4.
CN201911419469.8A 2019-12-31 2019-12-31 Intelligent security system and working method thereof Pending CN111091642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911419469.8A CN111091642A (en) 2019-12-31 2019-12-31 Intelligent security system and working method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911419469.8A CN111091642A (en) 2019-12-31 2019-12-31 Intelligent security system and working method thereof

Publications (1)

Publication Number Publication Date
CN111091642A true CN111091642A (en) 2020-05-01

Family

ID=70398053

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911419469.8A Pending CN111091642A (en) 2019-12-31 2019-12-31 Intelligent security system and working method thereof

Country Status (1)

Country Link
CN (1) CN111091642A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112435388A (en) * 2020-10-26 2021-03-02 北京北排水环境发展有限公司 Access control system for underground regeneration water plant
CN112598352A (en) * 2020-12-25 2021-04-02 深圳市穗深冷气设备有限公司 Storehouse management and control method, system and device and computer readable storage medium
CN113793691A (en) * 2021-09-17 2021-12-14 北京声智科技有限公司 Questionnaire survey method, server and terminal equipment
CN114241652A (en) * 2022-02-23 2022-03-25 深圳市华正联实业有限公司 Queuing number-taking control method and device and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204155327U (en) * 2014-09-01 2015-02-11 上海智达商投资管理合伙企业(有限合伙) A kind of visiting personnel based on recognition of face register checking device
CN107507118A (en) * 2017-08-22 2017-12-22 深圳市来吉智能科技有限公司 A kind of three-dimensional safety of person vehicle prevention and control system
CN108022338A (en) * 2017-11-15 2018-05-11 安恩达科技(深圳)有限公司 The control method of access control system and access control system
CN108830975A (en) * 2018-04-27 2018-11-16 安徽继远软件有限公司 A kind of Intelligent human-face identification gate control system and control method
US20190147676A1 (en) * 2017-10-13 2019-05-16 Alcatraz AI, Inc. System and method for optimizing a facial recognition-based system for controlling access to a building
CN110570551A (en) * 2019-08-01 2019-12-13 重庆远通电子技术开发有限公司 Intelligent security system and working method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204155327U (en) * 2014-09-01 2015-02-11 上海智达商投资管理合伙企业(有限合伙) A kind of visiting personnel based on recognition of face register checking device
CN107507118A (en) * 2017-08-22 2017-12-22 深圳市来吉智能科技有限公司 A kind of three-dimensional safety of person vehicle prevention and control system
US20190147676A1 (en) * 2017-10-13 2019-05-16 Alcatraz AI, Inc. System and method for optimizing a facial recognition-based system for controlling access to a building
CN108022338A (en) * 2017-11-15 2018-05-11 安恩达科技(深圳)有限公司 The control method of access control system and access control system
CN108830975A (en) * 2018-04-27 2018-11-16 安徽继远软件有限公司 A kind of Intelligent human-face identification gate control system and control method
CN110570551A (en) * 2019-08-01 2019-12-13 重庆远通电子技术开发有限公司 Intelligent security system and working method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112435388A (en) * 2020-10-26 2021-03-02 北京北排水环境发展有限公司 Access control system for underground regeneration water plant
CN112598352A (en) * 2020-12-25 2021-04-02 深圳市穗深冷气设备有限公司 Storehouse management and control method, system and device and computer readable storage medium
CN113793691A (en) * 2021-09-17 2021-12-14 北京声智科技有限公司 Questionnaire survey method, server and terminal equipment
CN114241652A (en) * 2022-02-23 2022-03-25 深圳市华正联实业有限公司 Queuing number-taking control method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN111091642A (en) Intelligent security system and working method thereof
US10650259B2 (en) Human face recognition method and recognition system based on lip movement information and voice information
CN108062673B (en) Payment method, terminal device and computer-readable storage medium
US20220078185A1 (en) Method and device for authenticating identity information, and server
CN109285234B (en) Face recognition attendance checking method and device, computer device and storage medium
CN110443016B (en) Information leakage prevention method, electronic device and storage medium
US10403076B2 (en) Method for securing and verifying a document
US20210006558A1 (en) Method, apparatus and system for performing authentication using face recognition
US20090254464A1 (en) Time and attendance system and method
KR20060009333A (en) System and method for selectively activating biometric sensors
US11074330B2 (en) Biometric recognition method
US10523671B1 (en) Mobile enrollment using a known biometric
CN108959884B (en) Human authentication verification device and method
KR102308805B1 (en) Electronic identification card, system and method for proving authenticity of the electronic identification card
CN110633642B (en) Identity information verification method and device, terminal equipment and storage medium
CN111382661A (en) Method and system for spoof detection using dual frequency fluorescence
CN107920070A (en) Identity identifying method, server and system
EP2763106A2 (en) Access control system and method with GPS location validation
JP2011150497A (en) Person identification device, person identification method, and software program thereof
Najam et al. A novel hybrid biometric electronic voting system: Integrating finger print and face recognition
CN112183167A (en) Attendance checking method, authentication method, living body detection method, device and equipment
US20240028698A1 (en) System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration
CN109639664A (en) Login validation method, apparatus and system
US20200019689A1 (en) Biometric recognition method
JP2005293172A (en) Identification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200501