CN111275850A - Access control method and system - Google Patents

Access control method and system Download PDF

Info

Publication number
CN111275850A
CN111275850A CN201811379785.2A CN201811379785A CN111275850A CN 111275850 A CN111275850 A CN 111275850A CN 201811379785 A CN201811379785 A CN 201811379785A CN 111275850 A CN111275850 A CN 111275850A
Authority
CN
China
Prior art keywords
information
door lock
light
identity
control signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811379785.2A
Other languages
Chinese (zh)
Inventor
刘若鹏
栾琳
孙福恭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kuang Chi Intelligent Photonic Technology Ltd
Original Assignee
Kuang Chi Intelligent Photonic Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kuang Chi Intelligent Photonic Technology Ltd filed Critical Kuang Chi Intelligent Photonic Technology Ltd
Priority to CN201811379785.2A priority Critical patent/CN111275850A/en
Publication of CN111275850A publication Critical patent/CN111275850A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an access control method and a system, wherein the method comprises the following steps: s1, the photon key transmits a light signal containing first identity identification information to the light-operated door lock; s2, the light-operated door lock receives the first identity information and verifies the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device; s3, the video recognition device receives the first control signal, acquires each second identity recognition information from the current monitoring area and verifies the second identity recognition information, and if the verification is passed, the video recognition device sends a second control signal to the light-operated door lock; and S4, the light-operated door lock receives the second control signal and opens the door lock switch. According to the invention, the video identification device is arranged, the verification of the second identity identification information in the monitoring area is added on the basis of passing the optical signal authentication, and the light-operated door lock is opened after the second identity identification information passes the verification, so that the condition that external personnel enter the door at the tail is avoided, and the safety of the access control system is improved.

Description

Access control method and system
Technical Field
The invention relates to the field of access control systems, in particular to an access control method and system.
Background
The visible light communication is a communication mode using light waves as transmission media, and utilizes high-speed bright and dark flashing signals which are emitted by fluorescent lamps or light emitting diodes and cannot be seen by naked eyes to transmit information, and has the following outstanding advantages that ① visible light communication is a green resource, electromagnetic radiation does not exist, communication can be carried out when ② light exists, a communication blind area is avoided, convenience and rapidness are achieved, ③ visible light communication emission power is high, ④ does not need a radio frequency spectrum team certificate, ⑤ is wide in transmission frequency band, large in communication capacity, good in confidentiality and strong in anti-electromagnetic interference capability, and therefore the visible light communication is gradually popularized and applied in an access control system.
The existing access control system based on visible light communication comprises a photon key and a light-operated door lock, wherein the photon key is provided with unlocking password information, when the light-operated door lock is opened, the photon key transmits the unlocking password information to the light-operated door lock in a light signal mode, and the light-operated door lock receives the signal and then performs door opening action. However, the existing visible light communication access control system only has a double-queue-license mechanism, namely, when an optical signal passes through the queue license, the optical control door lock is opened immediately, which causes the situation that an alien person enters the door along with a card swiping person to happen occasionally, and the safety of the access control system is greatly reduced.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the problem of current light-operated access control system, external personnel can follow the personnel of punching the card and get into the door, lead to access control system security to reduce is solved.
In order to achieve the above object, the present invention provides an access control method, comprising:
s1, the photon key transmits a light signal containing first identity identification information to the light-operated door lock;
s2, the light-operated door lock receives the first identity information and verifies the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device;
s3, the video recognition device receives the first control signal, acquires each second identity recognition information from the current monitoring area and verifies the second identity recognition information, and if the verification is passed, the video recognition device sends a second control signal to the light-operated door lock;
and S5, the light-operated door lock receives the second control signal and opens the door lock switch.
Further, the obtaining and verifying each second identification information from the current monitoring area includes:
s31, when the video recognition device judges that the number of the human bodies in the current monitoring area is 1, directly sending a second control signal to the light-operated door lock;
or, the obtaining and verifying each second identification information from the current monitoring area includes:
and S32, when the video recognition device judges that the number of the human bodies in the current monitoring area is multiple, obtaining each second identity recognition information from the current monitoring area and verifying, and if the verification is passed, sending a second control signal to the light-operated door lock.
Further, the obtaining of each second identification information from the current monitoring area includes:
when the quantity of the second identification information acquired in the monitoring area exceeds the preset quantity, the video recognition device sends the monitoring picture of the current monitoring area and the recognition effect of the second identification information to preset terminal equipment, and the recognition result comprises the second identification information which passes the verification and the second identification information which does not pass the verification.
Further, the method comprises:
when the second identification information is not verified, the photon key sends the optical signal containing the first identification information to the light-operated door lock again;
and the light-operated door lock verifies the first identity identification information received again, and if the verification is passed, a second control signal is sent to the light-operated door lock to unlock a door lock switch.
Further, the method comprises:
when the video identification device judges that the second identity identification information which fails in verification exists in the current monitoring area, a third control signal is sent to the alarm;
the alarm receives the third control signal and sends out prompt information.
Further, the second identification information is face information.
Further, the first identity information includes fingerprint information, and also includes one or more of authority information, door opening number information, and photon key ID information.
Further, the authority information includes one of the following authority information: only one door may be opened, multiple doors may be opened, or all doors may be opened.
The inventor also provides an access control system, which comprises a photon key, a light-operated door lock and a video identification device;
the photon key is used for transmitting an optical signal containing first identity identification information to the light-operated door lock;
the light-operated door lock is used for receiving first identity information and verifying the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device;
the video identification device is used for receiving the first control signal, acquiring each second identity identification information from the current monitoring area, verifying the second identity identification information, and sending a second control signal to the light-operated door lock if the verification is passed;
and the light-operated door lock is used for receiving a second control signal and opening a door lock switch.
Further, the video identification device is used for directly sending a second control signal to the light-operated door lock when the number of the human bodies in the current monitoring area is judged to be 1;
or the video identification device is used for acquiring each second identity identification information from the current monitoring area and verifying when the number of the human bodies in the current monitoring area is judged to be multiple, and sending a second control signal to the light-operated door lock if the verification is passed.
Different from the prior art, the access control method and the access control system in the technical scheme comprise the following steps: s1, the photon key transmits a light signal containing first identity identification information to the light-operated door lock; s2, the light-operated door lock receives the first identity information and verifies the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device; s3, the video recognition device receives the first control signal, acquires each second identity recognition information from the current monitoring area and verifies the second identity recognition information, and if the verification is passed, the video recognition device sends a second control signal to the light-operated door lock; and S4, the light-operated door lock receives the second control signal and opens the door lock switch. According to the invention, the video identification device is arranged, the verification of the second identity identification information in the monitoring area is added on the basis of the passing of the optical signal team certificate, and the light-operated door lock is opened after the second identity identification information passes the verification, so that the condition that external personnel enter the door at the tail is avoided, and the safety of the access control system is improved.
Drawings
Fig. 1 is a flowchart of an access control method according to an embodiment of the present invention;
fig. 2 is a flowchart of a door access control method according to another embodiment of the present invention;
fig. 3 is a schematic view of an access control system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile phone according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a light-operated door lock according to an embodiment of the present invention.
The attached drawings illustrate:
101. a photon key; 102. a light-operated door lock; 103. a video recognition device; 104. (ii) a
11. An information input/output module; 12. a microprocessor module; 13. a wireless communication module; 14. a drive module; 15. a light emitting module;
21. a photoelectric detection module; 22. a logarithmic amplification module; 23. an operational amplification module; 24. a comparator module; 25. a microcontroller; 26. a memory module.
Detailed Description
To explain technical contents, structural features, and objects and effects of the technical solutions in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Fig. 1 is a flowchart of a method for controlling an access control system according to an embodiment of the present invention. The method comprises the following steps:
s1, the photon key emits a light signal containing the first identity information to the light-operated door lock.
In this embodiment, the first identity information includes fingerprint information or palm print information, and preferably, the first identity information is fingerprint information. When the photon key receives the information sending instruction, the first identity identification information input by the user is collected and sent to the light-operated door lock.
The photon key can be a photon card with an information acquisition button, and can also be a terminal electronic device, such as a mobile phone, a tablet computer and the like. When the photon key is the photon card, a fingerprint acquisition button is arranged on the photon card, a user can input fingerprint information by pressing the fingerprint acquisition button, and then a processor inside the photon key generates a light signal to be sent to the light-operated door lock.
And S2, the light-operated door lock receives the first identity information and verifies the first identity information, and if the first identity information passes the verification, the light-operated door lock sends a first control signal to the video identification device.
In this embodiment, a storage medium is provided in the light-operated door lock, the storage medium stores a fingerprint identification algorithm, and when a fingerprint identification team certificate needs to be performed, the microprocessor in the light-operated door lock acquires the fingerprint identification algorithm from the storage medium and runs the fingerprint identification algorithm. Certainly, the storage medium can also be a cloud disk, a server hard disk and the like, when fingerprint identification authentication is needed, the microprocessor in the photon key sends an authentication request to the server, the server receives the queue authentication request and then calls a fingerprint identification algorithm in the storage medium to perform fingerprint identification queue authentication, and information with the queue authentication result is sent to the processor of the light-operated door lock.
S3, the video recognition device receives the first control signal, and acquires each second identity recognition information from the current monitoring area and verifies the second identity recognition information; and if the verification is passed, sending a second control signal to the light-operated door lock.
The monitoring area refers to the area range of the picture which can be shot by the video recognition device, and the installation range of the video recognition device can be set according to actual needs. The video identification device receives the first control signal, which indicates that the first identification information received by the current light-operated door lock passes the verification, but does not exclude the possibility that a foreign person enters the door with a formal person (carrying a photon key capable of passing the verification), so that the second identification information needs to be extracted and identified to prevent the above situation from happening. Specifically, after the video recognition device receives the first control signal, the monitoring picture in the current monitoring area can be transmitted to the face recognition module. The face recognition module compares the second identity recognition information in the monitoring picture one by one, and sends a second control signal to the light-operated door lock after the comparison is passed. The video recognition device is an electronic component with an image shooting recognition function, such as a camera.
And S4, the light-operated door lock receives the second control signal and opens the door lock switch.
And the light-operated door lock receives a second control signal, which indicates that the face information identified in the current monitoring area passes verification, so that a door lock switch can be opened.
Fig. 2 is a flowchart of a door access control method according to another embodiment of the present invention. The method comprises the following steps:
s1, the photon key emits a light signal containing the first identity information to the light-operated door lock.
In this embodiment, the first identity information includes fingerprint information or palm print information, and preferably, the first identity information is fingerprint information. When the photon key receives the information sending instruction, the first identity identification information input by the user is collected and sent to the light-operated door lock.
The photon key can be a photon card with an information acquisition button, and can also be a terminal electronic device, such as a mobile phone, a tablet computer and the like. When the photon key is the photon card, a fingerprint acquisition button is arranged on the photon card, fingerprint information can be input by pressing the fingerprint acquisition button by using a key, and then a processor inside the photon key generates a light signal to be sent to the light-operated door lock.
In some embodiments, the first identification information further includes one or more of authority information, door opening number information, and photon key ID information. And when the photon key is a mobile phone, the ID number of the photon key is the card number of the SIM card of the mobile phone.
The mobile phone in this embodiment may be as shown in fig. 4, and includes an information input and output module 11, a microprocessor module 12, a wireless communication module 13, a driving module 14, and a light emitting module 15. The information input/output module 11 is used for inputting and displaying information, and may be a touch screen or a combination of a keyboard and a display screen. The microprocessor module 12 is used for controlling the driving module 14 or transmitting information through the wireless communication module 13 according to the information transmitted from the information input/output module 11 and the wireless communication module 13. The microprocessor module 12 is burned with a data frame for unlocking, the data frame includes an authority field, a door opening number field, a door lock ID number field and a photon key ID number field, the door lock ID number field includes a plurality of door lock ID numbers, namely, from the door lock ID number 1 to the door lock ID number N, and the door lock ID number is used as an unlocking password. The driving module 14 is configured to drive the light emitting module 15 to emit a light signal containing the authority information according to the control signal output by the microprocessor module 12.
The light-operated door lock in this embodiment may be as shown in fig. 5, and includes a photodetection module 21, a logarithmic amplifier module 22, an operational amplifier module 23, a comparator module 24, a microcontroller module 25, and a memory module 26; the photoelectric detection module 21 is configured to receive the optical signal and convert the optical signal into a current signal; the logarithmic amplifier module 22 is used for converting the current signal into a voltage signal; the operational amplifier module 23 is used for calculating an average value of the voltage signal volt value; the comparator module 24 determines the level of the voltage signal according to the average value, and transmits the determination result to the microcontroller module 25; the microcontroller module 25 is used for controlling the door lock to be opened or closed according to the electric signal output by the comparator; the memory module 26 is used for storing the log file and the door lock ID number, and the microcontroller module 25 is electrically connected to a server (not shown in the figure), so that the server can fetch the log file, and further, the management of the access control system is facilitated.
Returning to the step in fig. 2, S2, the light-operated door lock receives the first identity information and performs authentication, and if the authentication passes, sends a first control signal to the video identification device.
In this embodiment, a storage medium is provided in the light-operated door lock, the storage medium stores a fingerprint identification algorithm, and when fingerprint identification authentication is required, a microprocessor in the light-operated door lock acquires the fingerprint identification algorithm from the storage medium and operates the fingerprint identification algorithm. Certainly, the storage medium can also be a cloud disk, a server hard disk and the like, when fingerprint identification authentication is needed, the microprocessor in the photon key sends an authentication request to the server, the server receives the queue authentication request and then calls a fingerprint identification algorithm in the storage medium to perform fingerprint identification queue authentication, and information with the queue authentication result is sent to the processor of the light-operated door lock.
S3, the video recognition device receives the first control signal, and acquires each second identity recognition information from the current monitoring area and verifies the second identity recognition information; and if the verification is passed, sending a second control signal to the light-operated door lock.
The monitoring area refers to the area range of the picture which can be shot by the video recognition device, and the installation range of the video recognition device can be set according to actual needs. The video identification device receives the first control signal, which indicates that the first identification information received by the current light-operated door lock passes the verification, but does not exclude the possibility that a foreign person enters the door with a formal person (carrying a photon key capable of passing the verification), so that the second identification information needs to be extracted and identified to prevent the above situation from happening. Specifically, after the video recognition device receives the first control signal, the monitoring picture in the current monitoring area can be transmitted to the face recognition module. The face recognition module compares the second identity recognition information in the monitoring picture one by one, and sends a second control signal to the light-operated door lock after the comparison is passed. The video recognition device is an electronic component with an image shooting recognition function, such as a camera.
And S4, the light-operated door lock receives the second control signal and opens the door lock switch.
And the light-operated door lock receives a second control signal, which indicates that the face information identified in the current monitoring area passes verification, so that a door lock switch can be opened.
To further enhance the security of the access control system, in certain embodiments, the method comprises: and when the second identity identification information which is not verified exists in the monitoring picture, adding identification information to the second identity identification information which is not verified. The identification information is a physical quantity that represents that "the second identification information that does not pass the verification" is different from "the second identification information that passes the verification".
The identification information may be pictures, characters, etc. For example, the second identification information is face information, the identification information may be character information added below the face information that does not pass authentication, such as "illegal face", or may be face information that does not pass the authentication by framing a frame in a regular pattern (such as a circle or a square).
In certain embodiments, the method further comprises: when the second identification information which is not verified exists in the monitoring picture, a third control signal is sent to the alarm; the alarm receives the third control signal and sends out prompt information. The prompt information includes but is not limited to: the system comprises a door lock, a door lock.
In some embodiments, obtaining and verifying each second identification information from the current monitoring area includes:
and S31, when the video recognition device judges that the number of the human bodies in the current monitoring area is 1, directly sending a second control signal to the light-operated door lock.
Generally, in a practical application process, the identification of a face image on an image frame generally includes the following steps: human body information on the image is identified based on skin color, then the human face image is screened out based on the block size, and then the screened human face image is compared with the human face image stored in advance to distinguish the human face image with successful authentication and the human face image with unsuccessful team authentication. In order to further simplify the algorithm steps of the identification process, when the video identification device judges that the number of the human bodies in the monitoring picture is 1, a second control signal is sent to the light-operated door lock. In short, when there are only 1 piece of human body information in the monitoring screen, since the first identification information (e.g., fingerprint information) has already been verified, there is no need to perform verification of the second identification information (e.g., face information).
Or, the obtaining and verifying each second identification information from the current monitoring area includes:
and S32, when the video recognition device judges that the number of the human bodies in the current monitoring area is multiple, obtaining each second identity recognition information from the current monitoring area and verifying, and if the verification is passed, sending a second control signal to the light-operated door lock.
When the number of the human bodies in the monitoring picture is judged to be multiple, even if the first identity identification information received by the light-operated door lock passes verification, the fact that someone is legal in the monitoring picture can only be explained, and whether the identities of other people are legal or not cannot be ensured. Therefore, the human face identification authentication can be carried out on all human bodies in the current monitoring picture, and the second control signal is sent to the light-operated door lock when all human faces pass the authentication, so that the light-operated door lock is opened, and the safety of the access control system is improved.
To facilitate better management of personnel, in some embodiments, the rights information includes one of the following rights information: only one door may be opened, multiple doors may be opened, or all doors may be opened. Therefore, when more personnel need to be managed, different authorities of the personnel can be prevented through authority information setting, so that the management of the personnel is enhanced. For example, for some areas with higher security level, only the authority information is set for a plurality of designated personnel, and other personnel have no access authority, thereby facilitating the management of the personnel.
In some embodiments, the access control system can be used as a security door lock to prevent external people from entering the door, and can be connected with a background attendance system to realize the collection of attendance data. Specifically, taking the example that the first identification information includes fingerprint information, after the person I sends the optical signal to the light-operated door lock, the light-operated door lock records corresponding time period information, and the time period information can be used as card punching time and sent to a background attendance system for statistics, so that the attendance statistics function is realized.
When the personnel quantity in the monitoring area is more, there may be the condition that some people's face information can't be discerned, has brought certain potential safety hazard for access control system, therefore in this embodiment, obtains each second identification information from current monitoring area and includes: when the quantity of the second identification information acquired in the monitoring area exceeds the preset quantity, the video recognition device sends the monitoring picture of the current monitoring area and the recognition effect of the second identification information to preset terminal equipment, and the recognition result comprises the second identification information which passes the verification and the second identification information which does not pass the verification.
For example, the preset number is 20, and when more than 20 faces appear in the monitored area, the video recognition device sends the captured current monitoring picture to the terminal device, preferably, the terminal device is a terminal device which is carried by a security personnel or observed in real time, and includes a mobile phone, a tablet, a personal computer, and the like. The security personnel can observe the current monitoring picture and repeatedly check the personnel information which is not verified and the personnel information which is not marked (namely, the personnel information is not judged to be verified by the video identification device and is not judged to be not verified), so that the safety of the access control system is effectively improved.
In an actual application scenario, a situation that some internal person (i.e., a person whose fingerprint and face team certificate both can pass verification) needs to take a visitor (a person whose fingerprint and face do not pass verification) to enter a door may occur, and as the face of the visitor is not entered in advance, the door lock cannot be opened. To address the above-mentioned issues, in certain embodiments, the method comprises: when the second identification information is not verified, the photon key sends the optical signal containing the first identification information to the light-operated door lock again; and the light-operated door lock verifies the first identity identification information received again, and if the verification is passed, a second control signal is sent to the light-operated door lock to unlock a door lock switch. In short, when the second identification information is not authenticated successfully, if the photon key receives the first identification information that can pass the verification again, it indicates that the insider still has to insist on unlocking the light-operated door lock on the premise that the insider knows the person who cannot pass the verification, and at this time, it can be determined that the inside person carries the guest to enter the door. Like this, through above-mentioned mode, can effectively avoid the condition emergence that external personnel still can't get into in the door under inside personnel accompany.
In certain embodiments, the method comprises: when the video identification device judges that the second identity identification information which fails in verification exists in the current monitoring area, a third control signal is sent to the alarm; the alarm receives the third control signal and sends out prompt information. The prompt information includes but is not limited to: the system comprises a door lock, a door lock.
Referring to fig. 3, the inventor provides an access control system, which includes a photon key 101, a light-operated door lock 102, and a video recognition device 103;
the photon key 101 is used for transmitting an optical signal containing first identity identification information to the light-operated door lock;
the light-operated door lock 102 is used for receiving first identity information and verifying the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device;
the video identification device 103 is used for receiving the first control signal, acquiring each second identity identification information from the current monitoring area, verifying the second identity identification information, and sending a second control signal to the light-operated door lock if the verification is passed;
the optically controlled door lock 102 is configured to receive a second control signal and open a door lock switch.
Further, the video identification device is used for directly sending a second control signal to the light-operated door lock when the number of the human bodies in the current monitoring area is judged to be 1; or the video identification device is used for acquiring each second identity identification information from the current monitoring area and verifying when the number of the human bodies in the current monitoring area is judged to be multiple, and sending a second control signal to the light-operated door lock if the verification is passed.
In short, when there are only 1 person, since the first identification information (e.g., fingerprint information) has already been verified, there is no need to perform verification of the second identification information (e.g., face). According to the scheme, the face features are further extracted and identified when the video identification device monitors the plurality of pieces of human body information, so that the algorithm steps of the identification process are simplified, and the identification efficiency is improved.
It should be noted that the above embodiments are only examples of the present invention, and those skilled in the art can make other changes and modifications to these embodiments once they know the basic inventive concept of the present invention, so that although the above embodiments have been described herein, they do not limit the scope of the present invention, and all equivalent structures or equivalent processes using the contents of the present specification and drawings, or directly or indirectly using other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An access control method, comprising the steps of:
s1, the photon key transmits a light signal containing first identity identification information to the light-operated door lock;
s2, the light-operated door lock receives the first identity information and verifies the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device;
s3, the video recognition device receives the first control signal, and acquires each second identity recognition information from the current monitoring area and verifies the second identity recognition information; if the verification is passed, a second control signal is sent to the light-operated door lock;
and S4, the light-operated door lock receives the second control signal and opens the door lock switch.
2. The access control method of claim 1, wherein obtaining and verifying each second identification information from the current monitored area comprises:
s31, when the video recognition device judges that the number of the human bodies in the current monitoring area is 1, directly sending a second control signal to the light-operated door lock;
or, the obtaining and verifying each second identification information from the current monitoring area includes:
and S32, when the video recognition device judges that the number of the human bodies in the current monitoring area is multiple, obtaining each second identity recognition information from the current monitoring area and verifying, and if the verification is passed, sending a second control signal to the light-operated door lock.
3. The access control method of claim 1, wherein obtaining each second identification information from the current monitored area comprises:
when the quantity of the second identification information acquired in the monitoring area exceeds the preset quantity, the video recognition device sends the monitoring picture of the current monitoring area and the recognition effect of the second identification information to preset terminal equipment, and the recognition result comprises the second identification information which passes the verification and the second identification information which does not pass the verification.
4. The access control method of claim 1, wherein the method comprises:
when the second identification information is not verified, the photon key sends the optical signal containing the first identification information to the light-operated door lock again;
and the light-operated door lock verifies the first identity identification information received again, and if the verification is passed, a second control signal is sent to the light-operated door lock to unlock a door lock switch.
5. The access control method according to claim 1 or 4, characterized in that the method comprises:
when the video identification device judges that the second identity identification information which fails in verification exists in the current monitoring area, a third control signal is sent to the alarm;
the alarm receives the third control signal and sends out prompt information.
6. The door access control method according to claim 1, wherein the second identification information is face information.
7. The door access control method of claim 1, wherein the first identity information includes fingerprint information, and further includes one or more of authority information, door opening number information, and photon key ID information.
8. The access control method of claim 7, wherein the rights information comprises one of the following rights information: only one door may be opened, multiple doors may be opened, or all doors may be opened.
9. The access control system is characterized by comprising a photon key, a light-operated door lock and a video recognition device;
the photon key is used for transmitting an optical signal containing first identity identification information to the light-operated door lock;
the light-operated door lock is used for receiving first identity information and verifying the first identity information, and if the first identity information passes the verification, a first control signal is sent to the video identification device;
the video identification device is used for receiving the first control signal, acquiring each second identity identification information from the current monitoring area, verifying the second identity identification information, and sending a second control signal to the light-operated door lock if the verification is passed;
and the light-operated door lock is used for receiving a second control signal and opening a door lock switch.
10. The door access control system of claim 9,
the video identification device is used for directly sending a second control signal to the light-operated door lock when the number of the human bodies in the current monitoring area is judged to be 1;
or the video identification device is used for acquiring each second identity identification information from the current monitoring area and verifying when the number of the human bodies in the current monitoring area is judged to be multiple, and sending a second control signal to the light-operated door lock if the verification is passed.
CN201811379785.2A 2018-11-19 2018-11-19 Access control method and system Pending CN111275850A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811379785.2A CN111275850A (en) 2018-11-19 2018-11-19 Access control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811379785.2A CN111275850A (en) 2018-11-19 2018-11-19 Access control method and system

Publications (1)

Publication Number Publication Date
CN111275850A true CN111275850A (en) 2020-06-12

Family

ID=70999907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811379785.2A Pending CN111275850A (en) 2018-11-19 2018-11-19 Access control method and system

Country Status (1)

Country Link
CN (1) CN111275850A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330861A (en) * 2020-07-30 2021-02-05 深圳Tcl新技术有限公司 Face unlocking method of intelligent door lock, terminal equipment and readable storage medium
CN113141258A (en) * 2021-04-27 2021-07-20 夏时雨 Safety identity authentication system based on visible light bidirectional interaction

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542639A (en) * 2011-11-16 2012-07-04 深圳光启高等理工研究院 Fingerprint access control method and system, door key and fingerprint lock
CN102682505A (en) * 2012-04-27 2012-09-19 深圳光启创新技术有限公司 Access identity authentication method
CN202600802U (en) * 2012-03-31 2012-12-12 深圳光启创新技术有限公司 Light-controlled access control system based on mobile phone fingerprint identification
CN103295281A (en) * 2012-02-29 2013-09-11 深圳光启创新技术有限公司 Light-operated lock system and implementation method thereof
CN103366423A (en) * 2012-03-31 2013-10-23 深圳光启创新技术有限公司 Light-operated access control system based on cellphone fingerprint identification
CN104504783A (en) * 2014-10-30 2015-04-08 苏州佑瑞检测技术有限公司 Personnel access safety detection system
CN204496502U (en) * 2015-03-24 2015-07-22 深圳光启智能光子技术有限公司 Authentication terminal and authentication terminal system
CN205427998U (en) * 2016-03-15 2016-08-03 郑州大学 Novel ID card and face identification integrate access control system
CN105989685A (en) * 2015-12-18 2016-10-05 许昌学院 Intelligent community monitoring management method
CN205788363U (en) * 2016-05-25 2016-12-07 象山赛柏斯智能科技有限公司 A kind of multiple authentication Gate-ban Monitoring System of Home House
CN107170087A (en) * 2017-05-12 2017-09-15 胡渐佳 Automatic identification is entered the gate control system of trailing personnel
CN107293017A (en) * 2017-06-28 2017-10-24 苏州见真物联科技有限公司 A kind of safe community gate control system
CN108806040A (en) * 2018-05-25 2018-11-13 中国电子科技集团公司第三十八研究所 It is a kind of to take precautions against the fast open gate control system and its control method broken in

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542639A (en) * 2011-11-16 2012-07-04 深圳光启高等理工研究院 Fingerprint access control method and system, door key and fingerprint lock
CN103295281A (en) * 2012-02-29 2013-09-11 深圳光启创新技术有限公司 Light-operated lock system and implementation method thereof
CN202600802U (en) * 2012-03-31 2012-12-12 深圳光启创新技术有限公司 Light-controlled access control system based on mobile phone fingerprint identification
CN103366423A (en) * 2012-03-31 2013-10-23 深圳光启创新技术有限公司 Light-operated access control system based on cellphone fingerprint identification
CN102682505A (en) * 2012-04-27 2012-09-19 深圳光启创新技术有限公司 Access identity authentication method
CN104504783A (en) * 2014-10-30 2015-04-08 苏州佑瑞检测技术有限公司 Personnel access safety detection system
CN204496502U (en) * 2015-03-24 2015-07-22 深圳光启智能光子技术有限公司 Authentication terminal and authentication terminal system
CN105989685A (en) * 2015-12-18 2016-10-05 许昌学院 Intelligent community monitoring management method
CN205427998U (en) * 2016-03-15 2016-08-03 郑州大学 Novel ID card and face identification integrate access control system
CN205788363U (en) * 2016-05-25 2016-12-07 象山赛柏斯智能科技有限公司 A kind of multiple authentication Gate-ban Monitoring System of Home House
CN107170087A (en) * 2017-05-12 2017-09-15 胡渐佳 Automatic identification is entered the gate control system of trailing personnel
CN107293017A (en) * 2017-06-28 2017-10-24 苏州见真物联科技有限公司 A kind of safe community gate control system
CN108806040A (en) * 2018-05-25 2018-11-13 中国电子科技集团公司第三十八研究所 It is a kind of to take precautions against the fast open gate control system and its control method broken in

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330861A (en) * 2020-07-30 2021-02-05 深圳Tcl新技术有限公司 Face unlocking method of intelligent door lock, terminal equipment and readable storage medium
CN113141258A (en) * 2021-04-27 2021-07-20 夏时雨 Safety identity authentication system based on visible light bidirectional interaction

Similar Documents

Publication Publication Date Title
KR101439348B1 (en) Attendance management system using face recognitionaccess control unit
KR101610657B1 (en) Three-dimensional virtual entrance control and communicable disease control system and method based on entrance control data
US7907753B2 (en) Access control system with symbol recognition
JP2020520511A (en) Access control method and apparatus, system, electronic device, program and medium
CN106652106A (en) Door lock control method, device and terminal
US20110050875A1 (en) Method and apparatus for detecting behavior in a monitoring system
CN105913513A (en) Control method and system for door lock system
KR102107203B1 (en) Parking breaker open/close system using portable phone of resident to automatically enter vehicle by parking breaker using KIOSK terminal or tablet PC
CN103795540A (en) Mobile device, authentication device and authentication system
US11145151B2 (en) Frictionless access control system for a building
CN103701604A (en) Identity-authenticating method and system based on mobile-phone screen
KR101577036B1 (en) Access authentication system and method based ip camera
KR102033057B1 (en) Method And Digital Door Lock Apparatus for Providing Situational Awareness by using Detecting Object of Blind Area
CN111275850A (en) Access control method and system
KR20140117264A (en) Entry management aparatus and method for controlling access using digital door lock and wireless telecommunication terminal
KR101573887B1 (en) Security Managing System Regulating Selectively a Function of the Smartphone and Controlling Method for the same
EP3828837A1 (en) Frictionless security processing
CN106157417B (en) A kind of iris identification method, device, smart lock and intelligent identifying system
CN205582055U (en) Accessible passageway safety identification system of intelligence
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
CN112601054A (en) Pickup picture acquisition method and device, storage medium and electronic equipment
CN205451215U (en) Gate inhibition system
US11823512B1 (en) Smart access control system using an electronic card
CN108650624A (en) A kind of terminal anti-theft method and terminal
Liu et al. Stop unauthorized access to your smart devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200612

RJ01 Rejection of invention patent application after publication