Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An automatic authorization method for access control based on face recognition

An automatic authorization and face recognition technology, applied in the multimedia field, can solve the problems of easy to be stolen by others, easy to lose the radio frequency card, can not absolutely guarantee the safety of the home, etc. Improved accuracy and timeliness

Active Publication Date: 2021-03-23
绿城科技产业服务集团有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, video access control simply transmits video information to users without much intelligence. Forget and easy to crack; the disadvantage of radio frequency access control is "recognize the card but not the person", the radio frequency card is easy to lose and be stolen by others; in addition, the security risk of fingerprint access control is that fingerprints are easy to copy, and the constant pursuit of experience, With the continuous development and maturity of artificial intelligence and Internet of Things technology, the standards for access control management, personnel access safety and convenience are getting higher and higher, and face recognition access control is recognized by everyone, but in the existing system, special personnel are required to collect face information , special personnel to maintain personnel information and authorized distribution of facial recognition equipment, not only low efficiency and high cost, but also poor experience and untimely

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An automatic authorization method for access control based on face recognition
  • An automatic authorization method for access control based on face recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] This embodiment provides a method for automatic authorization of access control based on face recognition, such as figure 1 shown, including steps:

[0033] SA1. Register APP and store user information on APP, and bind organization information;

[0034] SA2, the cloud platform reviews and judges whether the binding of user and organization information is successful, if so, skip to step SA3;

[0035] SA3, the face-scanning pass function enabled by the APP;

[0036] SA4, the APP collects face information and submits it to the cloud platform;

[0037] SA5. The cloud platform obtains the information of the access control / sidewalk gate through the bound organization information;

[0038] SA6. The cloud platform obtains the device number associated with the passable access control / sidewalk gate;

[0039] SA7, the cloud platform sends the user information and face data to the corresponding access control / sidewalk gate device;

[0040] SA8. The authentication and authoriza...

Embodiment 2

[0052] This embodiment provides a method for automatic authorization of access control based on face recognition, such as figure 2 shown, including steps:

[0053] SB1. Register APP and store user information on APP, and bind organization information;

[0054] SB2. The cloud platform reviews and judges whether the binding of the user and organization information is successful, and if so, skips to step SB3;

[0055] SB3, the face-scanning pass function enabled by the APP;

[0056] SB4, the APP collects face information and submits it to the cloud platform;

[0057] SB5. The cloud platform obtains the information of the access control / sidewalk gate through the bound organization information;

[0058] SB6. The cloud platform obtains the device number associated with the passable access control / sidewalk gate;

[0059] SB7, the cloud platform sends the user information and face data to the corresponding access control / sidewalk gate device;

[0060] SB8. The face-swiping data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an automatic access control authorization method based on face recognition, comprising the following steps: S1, registering an APP and storing user information on the APP, binding organization information; S2, cloud platform reviewing and judging whether the user and organization information are bound The determination is successful, if so, skip to step S3; S3, the face scanning function enabled by the APP; S4, the APP collects face information and submits it to the cloud platform; S5, the cloud platform obtains the passed access control / sidewalk gate information through the bound organization information ; S6, the cloud platform obtains the device number associated with the passable access control / sidewalk gate; S7, the cloud platform sends user information and face data to the corresponding access control / sidewalk gate device; S8, face recognition authorization If successful, the corresponding access control / sidewalk gate can be opened by swiping face data. The invention greatly improves the efficiency of access control management, and simplifies the complexity of management of access control rights by managers.

Description

technical field [0001] The invention relates to the field of multimedia, in particular to an automatic authorization method for access control based on face recognition. Background technique [0002] With the improvement of people's living standards, people pay more attention to the safety of the home environment, and the concept of security continues to strengthen; with the improvement of this demand, intelligent access control systems have emerged, and more and more enterprises, shops, and families have installed various Various access control systems. [0003] The currently more commonly used access control systems are nothing more than video access control, password access control, radio frequency access control or fingerprint access control and so on. Among them, video access control simply transmits video information to users without much intelligence. Forget and easy to crack; the disadvantage of radio frequency access control is "recognize the card but not the pers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/37G07C9/38
CPCG07C9/38G07C9/37
Inventor 张福军陆昕鲍碧波吕大海杜家祥
Owner 绿城科技产业服务集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products