CN116824756A - Access control method, system, computer equipment and storage medium - Google Patents

Access control method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN116824756A
CN116824756A CN202311075951.0A CN202311075951A CN116824756A CN 116824756 A CN116824756 A CN 116824756A CN 202311075951 A CN202311075951 A CN 202311075951A CN 116824756 A CN116824756 A CN 116824756A
Authority
CN
China
Prior art keywords
door
request instruction
door opening
instruction
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311075951.0A
Other languages
Chinese (zh)
Inventor
黎志亮
祝保清
陈亦辉
谢光波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Konze Electronic Technology Co ltd
Original Assignee
Guangzhou Konze Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Konze Electronic Technology Co ltd filed Critical Guangzhou Konze Electronic Technology Co ltd
Priority to CN202311075951.0A priority Critical patent/CN116824756A/en
Publication of CN116824756A publication Critical patent/CN116824756A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • G06V20/53Recognition of crowd images, e.g. recognition of crowd congestion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30196Human being; Person
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30242Counting objects in image

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Quality & Reliability (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)

Abstract

The application discloses an access control method, an access control system, computer equipment and a storage medium, wherein the access control method comprises the following steps: receiving a door opening request instruction input by a client; recording and storing the door opening request instruction and the corresponding time; sending a door opening instruction to a corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client; judging whether the door opening request instruction is a door entering request instruction or not; if yes, sending an image acquisition instruction to a corresponding client; receiving image information acquired by a corresponding client; processing according to the received image information to obtain the actual number of people entering the door; judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction; if yes, the first abnormal reminding information is sent to the management end; the application effectively solves the problems of easy mixing by external personnel and large potential safety hazard.

Description

Access control method, system, computer equipment and storage medium
Technical Field
The application relates to the technical field of access control, in particular to an access control method, an access control system, computer equipment and a storage medium.
Background
At present, various access control systems such as resident communities, offices or schools are available, and the access control systems comprise: the entrance guard system is characterized in that the entrance guard system is a simple entrance guard system based on the biological recognition technology such as a card punching system, fingerprint recognition and the like, and the face recognition entrance guard system is used for continuously strengthening the entrance guard opening mode, and as a resident community and a campus, the entrance guard system is easy to be crossed by foreign personnel, has potential safety hazards, and is usually a entrance guard for ensuring the safety of residents or students.
Disclosure of Invention
The application aims to provide an access control method, an access control system, computer equipment and a storage medium, which aim to solve the problems that the access control method, the access control system, the computer equipment and the storage medium are easy to be mixed in by external personnel and have great potential safety hazards.
To achieve the purpose, the application adopts the following technical scheme:
provided is an access control method, comprising:
receiving a door opening request instruction input by a client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises people number information;
recording and storing the door opening request instruction and the corresponding time;
sending a door opening instruction to a corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client;
judging whether the door opening request instruction is a door entering request instruction or not;
if yes, sending an image acquisition instruction to a corresponding client;
receiving image information acquired by a corresponding client;
processing according to the received image information to obtain the actual number of people entering the door;
judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction;
if yes, the first abnormality reminding information is sent to the management end.
As a preferred scheme of the access control method, after the step of sending the abnormality reminding information to the management end if yes, the method includes:
marking the door opening request instruction as abnormal information;
and recording and storing the abnormal information.
As a preferable scheme of the access control method, the method further comprises:
receiving alarm information sent by an alarm terminal;
and sending a unified control instruction to each client according to the alarm information, wherein the unified control instruction is used for controlling the doors of each client to be opened or closed in a unified way.
As a preferred solution of the access control method, after the step of sending a unified control instruction to each client according to the alarm information, where the unified control instruction is used to control the door of each client to be opened or closed in a unified manner, the access control method includes:
and stopping receiving the door opening request instruction input by the client according to the alarm information.
As a preferable scheme of the access control method, the method further comprises:
receiving a door opening management instruction sent by a management terminal, wherein the door opening management instruction comprises client information;
and sending a door opening instruction to a corresponding client according to the door opening management instruction.
As a preferred scheme of the access control method, the door opening management instruction sent by the receiving management end, before the step of receiving the door opening management instruction including the client information, includes:
receiving a temporary request instruction of a client, wherein the temporary request instruction comprises client information;
and sending the temporary request instruction to a management end.
As a preferable scheme of the access control method, the method further comprises:
receiving door state abnormality information sent by a client;
and sending second abnormality reminding information to the management end according to the door state abnormality information.
The application also provides an access control system, which comprises:
the first receiving unit is used for receiving a door opening request instruction input by a client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises information of the number of people;
the first storage unit is used for recording and storing the door opening request instruction and the corresponding time;
the first sending unit is used for sending a door opening instruction to the corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client;
the first judging unit is used for judging whether the door opening request instruction is a door entering request instruction or not;
the second sending unit is used for sending an image acquisition instruction to the corresponding client;
the second receiving unit is used for receiving the image information acquired by the corresponding client;
the image processing unit is used for processing and obtaining the actual number of people entering the door according to the received image information;
the second judging unit is used for judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction;
and the third sending unit is used for sending the first abnormal reminding information to the management end.
The application also provides a computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the access control method as described in any one of the above.
The application also provides a computer readable storage medium having stored thereon a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the access control method as described in any of the above.
The application has the beneficial effects that: according to the access control method, the access control system, the computer equipment and the storage medium, the information of the number of people is arranged in the door opening request instruction, the user inputs the total number of people needing to enter the door when opening the door, the acquired image information is used for obtaining the actual number of people entering the door, whether the actual number of people exceeds the number of people in the information of the number of people in the door opening request instruction is judged, if the actual number of people exceeds the number of people in the information of the number of people in the door opening request instruction, the first abnormal reminding information is sent to the management end to remind a manager to pay attention, the manager can know the situation in time through each monitoring video, know and judge the directions and purposes of the more people in time, if the abnormality is timely inquired on site and carried away, the safety coefficient is improved, and the safety of residents or students is ensured.
Drawings
In order to more clearly illustrate the technical solution of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below. It is evident that the drawings described below are only some embodiments of the present application and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a flow chart of an access control method according to an embodiment of the present application;
FIG. 2 is a schematic block diagram of an access control system according to an embodiment of the present application;
FIG. 3 is a block diagram of a computer device according to an embodiment of the present application;
the achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
Other advantages and effects of the present disclosure will become readily apparent to those skilled in the art from the following disclosure, which describes embodiments of the present disclosure by way of specific examples. It will be apparent that the described embodiments are merely some, but not all embodiments of the present disclosure. The disclosure may be embodied or practiced in other different specific embodiments, and details within the subject specification may be modified or changed from various points of view and applications without departing from the spirit of the disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
Referring to fig. 1, an embodiment of the present application provides an access control method, including:
s1, receiving a door opening request instruction input by a client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises information of the number of people;
s2, recording and storing the door opening request instruction and the corresponding time;
s3, sending a door opening instruction to the corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client;
s4, judging whether the door opening request instruction is a door entering request instruction or not;
s5, if yes, sending an image acquisition instruction to a corresponding client;
s6, receiving image information acquired by a corresponding client;
s7, processing according to the received image information to obtain the actual number of people entering the door;
s8, judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction;
and S9, if so, sending first abnormal reminding information to the management end.
The step S1 is that the client is a controller arranged at one entrance guard, and the inside and the outside of the entrance guard are respectively provided with a card punching device which can integrate the functions of card reading, fingerprint, face recognition, code scanning and the like; the card punching device outside the entrance guard is provided with a digital key for a user to input the number of people needing to enter the door, the entrance guard is provided with an electric lock such as a magnetic lock and the like, the entrance guard is also provided with a camera, the controller is respectively and electrically connected with the card punching device, the electric lock and the camera, and the controller is connected with an entrance guard system in a wired or wireless mode, such as through switch connection and the like; when a user enters and exits, the gate is opened through the internal and external card punching device, and when the user needs to enter the gate, the external card punching device adopts modes of punching cards, fingerprint identification, face recognition, code scanning and the like to open the gate, and meanwhile the number of people needing to enter the gate, namely the number of people, namely the own and the total number of carried families, relatives or friends, needs to be input through a digital key, the controller sends a door opening request instruction to the first receiving unit, the first receiving unit receives the door opening request instruction input by the client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises the number information.
In step S2, the first storage unit records and stores the door opening request command and the corresponding time, that is, records information such as the type, time and the number of people carried by the user when the user enters and exits the door, and can quickly search and screen the door when the user is in some special situations, so that the door opening request command is more convenient and efficient.
In step S3, the first sending unit sends a door opening command to the corresponding client according to the door opening request command, that is, to the corresponding controller, and the controller controls the electric lock to open according to the door opening command, thereby opening the gate.
In step S4, the first determining unit determines whether the door opening request command is a door opening request command, for example: the judgment is made by whether the information of the number of people is carried or not.
In step S5, if the first determining unit determines that the door opening request command is a door opening request command, the second sending unit sends an image acquisition command to the corresponding client and to the corresponding controller, and the controller controls the camera to acquire the door opening image when the door is opened.
In step S6, the controller sends the image information collected by the camera to the second receiving unit, and the second receiving unit receives the image information collected by the corresponding client.
As described in step S7, the image processing unit processes the received image information to obtain the actual number of people entering the door, and the specific processing manner of the image is as follows: the method comprises the steps of processing an acquired gate entrance image by using a head-shoulder detection algorithm to obtain information of the number of people, wherein the head-shoulder detection algorithm can draw a plurality of unidirectional single trip wires to cover people with different heights to enter and exit, and the people can cross any one trip wire to give an alarm; the alarm is only given once when crossing a plurality of lines in the same direction.
As described in step S8, the second determining unit determines whether the actual number of people obtained by the processing of the image processing unit exceeds the number of people in the number of people information in the entrance request instruction, that is, the number of people entered by the user when the user enters the entrance.
As described in step S9, if the second determining unit determines that the actual number of people obtained by the processing of the image processing unit exceeds the number of people in the number information in the entrance request instruction, the third sending unit sends the first abnormal reminding information to the management end, where the management end may be a computer in the management room, a computer or a mobile phone of a manager, etc., so as to remind the manager of the abnormal person entering at the moment, and the manager may know the situation in time through each monitoring camera, and determine the directions and purposes of the multiple entering people, for example: if the number of people entering the door is small, or extraneous personnel are mixed, the movement and the purpose of the user can be monitored in real time if the extraneous personnel are extraneous, and if the user is abnormal, the user can inquire on site in time and take away the user.
In the above embodiment, the information of the number of people is set in the door opening request instruction, the user inputs the total number of people needing to enter the door while opening the door, the acquired image information obtains the actual number of people entering the door, and judges whether the actual number of people exceeds the number of people in the information of the number of people in the door opening request instruction, if yes, the first abnormal reminding information is sent to the management end to remind the management personnel, the management personnel can know the situation in time through each monitoring video, know and judge the going and the purposes of the more people in time, if abnormal people are inquired in the scene and are taken away in time, the safety coefficient is improved, and the safety of the households or students is ensured.
In some embodiments, after the step S9 of sending the anomaly alert information to the management end if yes, the method includes:
s10: marking the door opening request instruction as abnormal information;
and S11, recording and storing the abnormal information.
The third sending unit marks the door opening request instruction as abnormal information after sending the first abnormal reminding information, the second storage unit records and stores the abnormal information, so that subsequent managers can count and screen the abnormal information conveniently, if some users are easy to frequently have the abnormal information, the managers can uniformly or one by one remind the users to input the door entering number accurately, and notice whether irrelevant people are mixed in the door entering process, actively remind the passengers not to automatically click the door entering process, improve the safety consciousness, ensure the personal and property safety of all the users, and be safer and more reliable.
In some embodiments, further comprising:
s12: receiving alarm information sent by an alarm terminal;
and S13, sending a unified control instruction to each client according to the alarm information, wherein the unified control instruction is used for controlling the doors of each client to be opened or closed in a unified way.
As described in steps S12 to S13, the third receiving unit receives the alarm information sent by the alarm end, where the alarm end may be a smoke alarm, a manual alarm, etc., for example: when a fire disaster occurs, the smoke alarm triggers and sends out alarm information; when a thief appears, a manager presses a manual alarm, and the manual alarm sends out alarm information; the fourth sending unit sends corresponding unified control instructions to each client, namely controllers at each entrance guard, according to the types of the alarm information, and the controllers control each gate to be opened or closed in a unified mode according to the unified control instructions, for example: when fire breaks out, all gates are opened uniformly; when a thief exists in the door, the doors are closed uniformly.
Further, after the step S13 of sending a unified control instruction to each client according to the alarm information, where the unified control instruction is used to control the door of each client to be opened or closed in a unified manner, the method includes:
s14: and stopping receiving the door opening request instruction input by the client according to the alarm information.
In step S14, after the fourth sending unit sends the unified control instruction, the stopping unit stops receiving the door opening request instruction input by the client according to the alarm information, so as to prevent the situation that other people can still open the gate after the gate is closed in a unified manner; such as: the thief uses the IC card of the user to open the gate to escape, etc.
In some embodiments, further comprising:
s15, receiving a door opening management instruction sent by a management end, wherein the door opening management instruction comprises client information;
s16, sending a door opening command to the corresponding client according to the door opening management command.
As described in steps S15-S16, a manager may control opening of any gate through the management end, and when the manager needs to remotely open one gate, the management end sends a door opening management instruction to the fourth receiving unit, and the fourth receiving unit receives the door opening management instruction sent by the management end, where the door opening management instruction includes client information; and the fifth sending unit is used for sending a door opening command to the corresponding client, namely a controller of the corresponding client according to the door opening management command, and the controller is used for controlling the electric lock of the gate to be opened so as to realize the function of remotely controlling the gate to be opened by the management terminal.
Further, before the step S15 of receiving the door-opening management instruction sent by the management end, the door-opening management instruction includes client information, the method includes:
s1501: receiving a temporary request instruction of a client, wherein the temporary request instruction comprises client information;
s1502: and sending the temporary request instruction to a management end.
As described in steps S1501-S1502, when an external person temporarily needs to enter or a user cannot open a gate due to some special situations, the temporary request button on the card punching device may be used to send a temporary request instruction, the fifth receiving unit receives the temporary request instruction, the sixth sending unit sends the temporary request instruction to the management end, the management end knows the temporary gate opening request of the corresponding client according to the client information in the temporary request instruction, and the management person can communicate with the interphone through the monitoring camera arranged at the corresponding gate inhibition place to know the situation and then determine whether to open the gate.
In some embodiments, further comprising:
s17, receiving door state abnormal information sent by a client;
and S18, sending second abnormality reminding information to the management end according to the door state abnormality information.
As described in steps S17 to S18, when the gate cannot be automatically closed for a long time, the electric lock is abnormal, the controller sends corresponding gate state abnormal information to the sixth receiving unit, the seventh sending unit sends second abnormal reminding information to the management end according to the gate state abnormal information after the sixth receiving unit receives the gate state abnormal information, reminds the management personnel to check at the corresponding gate, and timely takes out the foreign matter if the gate is blocked by the foreign matter and cannot be normally closed; if the electric lock is damaged, the electric lock is replaced in time, so that the safety of the protection or students is ensured.
Referring to fig. 2, the embodiment of the application further provides an access control system, which includes:
the first receiving unit is used for receiving a door opening request instruction input by a client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises information of the number of people;
the first storage unit is used for recording and storing the door opening request instruction and the corresponding time;
the first sending unit is used for sending a door opening instruction to the corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client;
the first judging unit is used for judging whether the door opening request instruction is a door entering request instruction or not;
the second sending unit is used for sending an image acquisition instruction to the corresponding client;
the second receiving unit is used for receiving the image information acquired by the corresponding client;
the image processing unit is used for processing and obtaining the actual number of people entering the door according to the received image information;
the second judging unit is used for judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction;
and the third sending unit is used for sending the first abnormal reminding information to the management end.
In some embodiments, the access control system further comprises:
a marking unit configured to mark the door opening request instruction as abnormal information;
and the second storage unit is used for recording and storing the abnormal information.
In some embodiments, the access control system further comprises:
the third receiving unit is used for receiving the alarm information sent by the alarm terminal;
and the fourth sending unit is used for sending a unified control instruction to each client according to the alarm information.
Further, the access control system includes:
and the stopping unit stops receiving the door opening request instruction input by the client according to the alarm information.
In some embodiments, the access control system further comprises:
the fourth receiving unit is used for receiving a door opening management instruction sent by the management end;
and the fifth sending unit is used for sending a door opening instruction to the corresponding client according to the door opening management instruction.
Further, the access control system further includes:
a fifth receiving unit, configured to receive a temporary request instruction of the client;
and the sixth sending unit is used for sending the temporary request instruction to the management end.
In some embodiments, the access control system further comprises:
a sixth receiving unit, configured to receive door state anomaly information sent by the client;
and the seventh sending unit is used for sending second abnormality reminding information to the management end according to the door state abnormality information.
Referring to fig. 3, in an embodiment of the present application, there is further provided a computer device, which may be a server, and an internal structure thereof may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer is configured to provide computing and control capabilities. The memory of the computer device includes a storage medium, an internal memory. The storage medium stores an operating system, computer programs, and a database. The memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer equipment is used for storing user information, door opening type, corresponding time, abnormal information and the like in the door opening request instruction. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, may implement the access control method described in any of the above embodiments.
It will be appreciated by those skilled in the art that the architecture shown in fig. 3 is merely a block diagram of a portion of the architecture in connection with the present inventive arrangements and is not intended to limit the computer devices to which the present inventive arrangements are applicable.
The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor can implement the access control method according to any of the above embodiments.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by hardware associated with a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided by the present application and used in embodiments may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual speed data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
In the description of the present application, it should be understood that the terms "middle," "length," "upper," "lower," "front," "rear," "vertical," "horizontal," "inner," "outer," "radial," "circumferential," and the like indicate an orientation or a positional relationship based on that shown in the drawings, merely for convenience of description and to simplify the description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus should not be construed as limiting the application.
In the present application, unless expressly stated or limited otherwise, a first feature "on" a second feature may be that the first and second features are in direct contact, or that the first and second features are in indirect contact via an intervening medium. The meaning of "a plurality of" means at least two, e.g., two, three, etc., unless explicitly defined otherwise.
In the present application, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; may be mechanically connected, may be electrically connected or may be in communication with each other; either directly or indirectly, through intermediaries, or both, may be in communication with each other or in interaction with each other, unless expressly defined otherwise. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art according to the specific circumstances.
The above description is for the purpose of illustrating the embodiments of the present application and is not to be construed as limiting the application, but is intended to cover all modifications, equivalents, improvements and alternatives falling within the spirit and principles of the application.

Claims (10)

1. A method of controlling access, comprising:
receiving a door opening request instruction input by a client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises people number information;
recording and storing the door opening request instruction and the corresponding time;
sending a door opening instruction to a corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client;
judging whether the door opening request instruction is a door entering request instruction or not;
if yes, sending an image acquisition instruction to a corresponding client;
receiving image information acquired by a corresponding client;
processing according to the received image information to obtain the actual number of people entering the door;
judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction;
if yes, the first abnormality reminding information is sent to the management end.
2. The entrance guard method according to claim 1, wherein after the step of sending the abnormality notification to the management side if yes, the method includes:
marking the door opening request instruction as abnormal information;
and recording and storing the abnormal information.
3. The access control method of claim 1, further comprising:
receiving alarm information sent by an alarm terminal;
and sending a unified control instruction to each client according to the alarm information, wherein the unified control instruction is used for controlling the doors of each client to be opened or closed in a unified way.
4. The entrance guard method according to claim 3, wherein after the step of sending a unified control instruction to each client according to the alarm information, the unified control instruction is used to control the door of each client to be opened or closed in a unified manner, the method comprises:
and stopping receiving the door opening request instruction input by the client according to the alarm information.
5. The access control method of claim 1, further comprising:
receiving a door opening management instruction sent by a management terminal, wherein the door opening management instruction comprises client information;
and sending a door opening instruction to a corresponding client according to the door opening management instruction.
6. The access control method according to claim 5, wherein the door opening management instruction sent by the receiving management end, before the step of including client information, includes:
receiving a temporary request instruction of a client, wherein the temporary request instruction comprises client information;
and sending the temporary request instruction to a management end.
7. The access control method of claim 1, further comprising:
receiving door state abnormality information sent by a client;
and sending second abnormality reminding information to the management end according to the door state abnormality information.
8. An access control system, comprising:
the first receiving unit is used for receiving a door opening request instruction input by a client, wherein the door opening request instruction comprises user information, the door opening request instruction is a door entering request instruction or a door exiting request instruction, and the door entering request instruction further comprises information of the number of people;
the first storage unit is used for recording and storing the door opening request instruction and the corresponding time;
the first sending unit is used for sending a door opening instruction to the corresponding client according to the door opening request instruction, wherein the door opening instruction is used for controlling the opening of a door of the corresponding client;
the first judging unit is used for judging whether the door opening request instruction is a door entering request instruction or not;
the second sending unit is used for sending an image acquisition instruction to the corresponding client;
the second receiving unit is used for receiving the image information acquired by the corresponding client;
the image processing unit is used for processing and obtaining the actual number of people entering the door according to the received image information;
the second judging unit is used for judging whether the actual number of people exceeds the number of people in the number information in the door-entering request instruction;
and the third sending unit is used for sending the first abnormal reminding information to the management end.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the access control method of any one of claims 1 to 7.
10. A computer readable storage medium having stored thereon a computer program, which when executed by a processor, implements the steps of the access control method as claimed in any one of claims 1 to 7.
CN202311075951.0A 2023-08-25 2023-08-25 Access control method, system, computer equipment and storage medium Pending CN116824756A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311075951.0A CN116824756A (en) 2023-08-25 2023-08-25 Access control method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311075951.0A CN116824756A (en) 2023-08-25 2023-08-25 Access control method, system, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116824756A true CN116824756A (en) 2023-09-29

Family

ID=88139507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311075951.0A Pending CN116824756A (en) 2023-08-25 2023-08-25 Access control method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116824756A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700477A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for safety control of nuclear power plants
CN107578502A (en) * 2017-08-24 2018-01-12 上海与德科技有限公司 A kind of cell caller management method and device
CN207037867U (en) * 2017-07-11 2018-02-23 张奕 A kind of intelligent radio alarm security access control system
CN108122318A (en) * 2017-12-22 2018-06-05 广州云系信息科技有限公司 Visitor verifies passing method and system
CN207742714U (en) * 2018-01-19 2018-08-17 广州众威能信息科技有限公司 A kind of band is got tickets the automatic gate of function
CN109102610A (en) * 2018-08-31 2018-12-28 安徽恒杰保安服务有限公司 A kind of cell safety security safety door prohibition system
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN113450483A (en) * 2021-06-25 2021-09-28 广州欧轩网络科技有限公司 Gate control system
CN113611027A (en) * 2021-07-30 2021-11-05 北京晶品赛思科技有限公司 Warehouse-out detection method, system, equipment and readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700477A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for safety control of nuclear power plants
CN207037867U (en) * 2017-07-11 2018-02-23 张奕 A kind of intelligent radio alarm security access control system
CN107578502A (en) * 2017-08-24 2018-01-12 上海与德科技有限公司 A kind of cell caller management method and device
CN108122318A (en) * 2017-12-22 2018-06-05 广州云系信息科技有限公司 Visitor verifies passing method and system
CN207742714U (en) * 2018-01-19 2018-08-17 广州众威能信息科技有限公司 A kind of band is got tickets the automatic gate of function
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN109102610A (en) * 2018-08-31 2018-12-28 安徽恒杰保安服务有限公司 A kind of cell safety security safety door prohibition system
CN113450483A (en) * 2021-06-25 2021-09-28 广州欧轩网络科技有限公司 Gate control system
CN113611027A (en) * 2021-07-30 2021-11-05 北京晶品赛思科技有限公司 Warehouse-out detection method, system, equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US10902707B1 (en) Video monitoring and alarm verification technology
US10854067B1 (en) Connected door hinge
US9030562B2 (en) Use of a two- or three-dimensional barcode as a diagnostic device and a security device
CN109658554B (en) Intelligent residential district security protection system based on big data
CN107728514A (en) A kind of intelligent building security protection monitoring system
JP4445310B2 (en) Security system
CN108198318B (en) Real-name system channel access control method and system
CN206115524U (en) Door control system for building
CN110580762A (en) Intelligent household access control system and method
CN113971782A (en) Comprehensive monitoring information management method and system
CN112598352A (en) Storehouse management and control method, system and device and computer readable storage medium
CN115273369A (en) Intelligent household security monitoring device and monitoring method thereof
KR20150033402A (en) Apparatus and Method for Unmanned Safety Guard Based on Video Recognition
KR102345479B1 (en) Building entrance control system
KR101728158B1 (en) Fire safety management and security agency system, and method therefor
JP2009108575A (en) Room entrance/exit control system
CN105469472B (en) intelligent access control method and system
EP2333735A1 (en) Filtering video events in a secured area using loose coupling within a security system
CN116824756A (en) Access control method, system, computer equipment and storage medium
CN115862196A (en) Identity verification method and device based on intelligent lock and intelligent lock
CN210776878U (en) Intelligent household access control system
KR20150137539A (en) Door lock controlling apparatus using mobile terminal and method thereof
JP5800758B2 (en) Plant equipment monitoring device
CN210954707U (en) Intelligent comprehensive community service system
CN105869243A (en) Access control security management method and management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination