Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Specific facial identity-based face identification access control system and implementation method

An access control system and face recognition technology, applied in character and pattern recognition, computer parts, instruments, etc., can solve the problems of inconvenience of the owner, low efficiency of the recognition system, long recognition calculation time, etc., to reduce security risks and system integration Installation cost, the effect of solving the inefficiency of real-name authentication, and reducing living and operation and maintenance costs

Inactive Publication Date: 2015-11-11
BAOJI TRAFFIC INFORMATION ENG INST
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But these bring convenience to the security of the community, but also bring inconvenience to the owners, and the cost of property fees such as ID cards has also increased.
Taking the existing face recognition system as an example, although it has the characteristics of good security, due to the comparison of photos (videos) to photos (videos), not only the hardware investment is large, but also the recognition and calculation time is long, especially when the face When the changes (such as changing hairstyles, adding glasses, etc.) are large, the recognition degree is low, which leads to low efficiency of the recognition system, especially during rush hour. resentment and rejection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Specific facial identity-based face identification access control system and implementation method
  • Specific facial identity-based face identification access control system and implementation method
  • Specific facial identity-based face identification access control system and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention aims at the current situation of various and uneven access control system market products in the security technology link of the community, combined with the public security security portrait recognition and comparison business needs, relying on the industry-leading face recognition algorithm, adopting advanced dynamic local feature analysis technology, combined with network , database, distributed computing and other technologies, quickly realize the one-to-one comparison between the face collection information in the access control system and the system's preset facial feature codes, and help the security basic front-line units (residential communities, key units, companies, etc.) Perform access control management, and turn the unimaginable demand for comparison of tens of millions of massive photo libraries into the reality of calling feature marks (or codes) for on-site one-to-one comparison. This system not only solves the problem of low effici...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a specific facial identity-based face identification access control system and an implementation method, belonging to the technical scope of safety management. The access control system comprises image acquisition equipment used for shooting a face picture or video of a person about to enter an access control position, an access control acquisition terminal used for inputting a facial feature code by the person about to enter the access control position, and a back-stage management end being a common PC (personal computer) or an industrial computer; the image acquisition equipment, the access control acquisition terminal and the back-stage management end realize communication by means of a transmission network or a wired transmission way. The implementation method is characterized in that personnel facial feature identities are adopted to mark face photos of managed objects, one face photo can be quickly retrieved by inputting the corresponding code and is compared with the face photo shot on site to be verified, a security and protection base front-line unit is helped to perform access control management, and the condition in the past that an unimaginable million-level huge-number photo library needs to be compared is changed into the reality that a feature identity (or code) is retrieved for one to one comparing on site.

Description

technical field [0001] The invention belongs to a technical innovation in the field of portrait recognition comparison and public security prevention and control. It uses technical means to solve the problems of low recognition accuracy and retrieval errors in the current face access control system, and is helpful for strengthening community security management and prevention of public security. People's livelihood work such as the occurrence of the incident has positive practical significance. Background technique [0002] With the development of social economy and the acceleration of urbanization, the security of urban residential areas has been paid more and more attention by governments at all levels. As a technical link of community security, the market products of access control systems are also varied. All product verification methods are face, fingerprint, and password. , ID card, electric lock, alarm, door sensor and access switch and other mixed verification modes....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/00G06K9/00
Inventor 宋继伟支录奎翟建平贾宝银
Owner BAOJI TRAFFIC INFORMATION ENG INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products