CN106203486A - A kind of entry and exit secure identification system - Google Patents
A kind of entry and exit secure identification system Download PDFInfo
- Publication number
- CN106203486A CN106203486A CN201610510795.XA CN201610510795A CN106203486A CN 106203486 A CN106203486 A CN 106203486A CN 201610510795 A CN201610510795 A CN 201610510795A CN 106203486 A CN106203486 A CN 106203486A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- control unit
- unit
- collecting device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/25—Fusion techniques
- G06F18/251—Fusion techniques of input or preprocessed data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/18—Eye characteristics, e.g. of the iris
- G06V40/197—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Data Mining & Analysis (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioinformatics & Computational Biology (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Computation (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Ophthalmology & Optometry (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of entry and exit secure identification system, memory element is for storing the original identity information of this user corresponding with the identity data of user, recognition unit is for gathering the identity data of user, and sends the user ID data gathered to control unit;Collecting unit includes the first collecting device, the second collecting device, the 3rd collecting device, is respectively used to gather the identity information of user;Display unit communicates to connect with control unit, for showing the authenticating user identification result that control unit sends;Alarm unit communicates to connect with control unit, for the instruction alert according to control unit;Feedback unit communicates to connect with control unit, stores to network high in the clouds for the information of control unit transmission being shared by network;Control unit is by obtaining the subscriber identity information that collecting unit gathers, and is compared with original identity information by above-mentioned identity information, judges whether this user is secured user according to above-mentioned comparative result.
Description
Technical field
The present invention relates to safety management technology field of entering and leaving the border, particularly relate to a kind of entry and exit secure identification system.
Background technology
Along with the continuous expansion of China's open degree, increasing trading port is flourishing, and these are local every
Personnel of it departure immigration are the most, manage entry and exit iff modes such as relying on traditional passport, visa, can not
The requirement meet the identity record to inward and outward personnel, identifying, determining;For the preventive measure of the threats such as whole world terrorism,
Need in terms of entry and exit, inward and outward personnel to be endured strict scrutiny.
Living things feature recognition refers to use different physiological features and behavior characteristics automatically target person to be carried out identification
With determine.Owing to biological identification is difficult to dislocation, forges and share, they have than traditional mark and Knowledge based engineering recognition methods
There are higher reliability and accuracy;Another exemplary advantage of bio-identification is that user is convenient and safer.Therefore will be raw
Thing feature identification is applied to entry-exit management field, becomes one of important topic of those skilled in the art's research.
Summary of the invention
The technical problem existed based on background technology, the present invention proposes a kind of entry and exit secure identification system.
The entry and exit secure identification system that the present invention proposes, including: memory element, recognition unit, collecting unit, display list
Unit, alarm unit, feedback unit, control unit;
Memory element, for storing the original identity information of this user corresponding with the identity data of user, above-mentioned user
Original identity information include the finger print information of this user, facial image information, eyeprint information;
Recognition unit, for gathering the identity data of user, and sends the user ID data gathered to control unit;
Collecting unit, including the first collecting device, the second collecting device, the 3rd collecting device;First collecting device is used for
Gathering the finger print information of user, the second collecting device is for gathering the facial image information of user, and the 3rd collecting device is used for adopting
The eyeprint information of collection user;
Display unit, communicates to connect with control unit, for showing the authenticating user identification result that control unit sends;
Alarm unit, communicates to connect with control unit, for the instruction alert according to control unit;
Feedback unit, communicates to connect with control unit, for the information that control unit sends being shared to net by network
Network high in the clouds stores;
Control unit, with memory element, recognition unit, collecting unit communication connection;
After control unit receives the user ID data that recognition unit sends, transfer out this user identity in memory element
The original identity information of this user that data are corresponding is as references object;Control unit obtain successively the first collecting device, second
The subscriber identity information that collecting device, the 3rd collecting device gather, and compare with above-mentioned original identity information, when second adopts
When the subscriber identity information that collection equipment gathers and original identity information matching degree height, control unit is by this authenticating user identification success
Information send to display unit, otherwise, when the 3rd collecting device gather subscriber identity information identical with original identity information
Time, successful for this authenticating user identification information is sent to display unit by control unit, when the user identity that collecting unit gathers
When information is low with original identity information matching degree, information failed for this authenticating user identification is sent to showing list by control unit
Unit, and send instruction to alarm unit, the subscriber identity information of collection low for matching degree is sent to feedback unit simultaneously.
Preferably, after control unit receives the user ID data that recognition unit sends, control unit transfers out storage
In unit, the original identity information of the user that this user ID data is corresponding is as references object, control unit instruction control first
Collecting device is started working, after control unit receives effective finger print information that the first collecting device sends, by above-mentioned effective finger
Stricture of vagina information contrasts with the finger print information in original identity information, if in above-mentioned effective finger print information and original identity information
The similarity of finger print information is less than preset value, and information failed for this authenticating user identification is sent to display unit by control unit,
And send instruction to alarm unit, and above-mentioned effective finger print information is sent to feedback unit, if above-mentioned effective finger print information with
The similarity of the finger print information in original identity information is not less than preset value, and control unit instruction controls the second collecting device and starts
Gather the facial image information of these three angles of user, and by the facial image information of above three angle and original identity information
In facial image information contrast, if the face's figure in the facial image information of above three angle and original identity information
As the similarity of information is above preset value, successful for this authenticating user identification information is sent to display unit by control unit,
If the facial image information of above three angle is below presetting with the similarity of the facial image information in original identity information
Value, information failed for this authenticating user identification is sent to display unit by control unit, and sends instruction to alarm unit, and will
The facial image information of above three angle sends to feedback unit, if the facial image information of above three angle and original body
In the Similarity value of the facial image information in part information at least one be not less than preset value, control unit instruction controls the 3rd
Collecting device works, and effective eyeprint information that the 3rd collecting device sends is carried out with the eyeprint information in original identity information
Relatively, if above-mentioned effective eyeprint information is different from the eyeprint information in original identity information, this user identity is recognized by control unit
Demonstrate,prove failed information to send to display unit, and send instruction to alarm unit, and above-mentioned effective eyeprint information is sent to instead
Feedback unit, if above-mentioned effective eyeprint information is identical with the eyeprint information in original identity information, control unit is by this user identity
The successful information of certification sends to display unit.
Preferably, the facial image information of the user of described memory cell storage includes the frontal one figure of this user
As information, left surface facial image information, right flank facial image information.
Preferably, the second described collecting device gathers the facial image information of these three angles of user, above three angle
Degree is the front of this user, left surface, right flank.
Preferably, the described eye iris information that eyeprint information is user.
Preferably, the identity data of described user is passport information and the VISAs of this user.
Preferably, the first described collecting device uses fingerprint capturer.
Preferably, the second described collecting device uses high-definition camera instrument.
Preferably, the 3rd described collecting device uses infrared high-definition camera.
In the present invention, in terms of three, the identity of user is verified by classification, when finger print information and the original identity of user
Finger print information in information time the match is successful, shows that this user has passed through ground floor checking, and control unit i.e. starts this user
Carrying out second layer checking, the second collecting device gathers the facial image information of these three angles of user, when three angles gathered
The similarity with the facial image information in original identity information of facial image information when being above preset value, show this use
Family is secured user, i.e. this user passes through authentication, and now successful for this authenticating user identification information is sent by control unit
To display unit, when the facial image information of three angles gathered is similar to the facial image information in original identity information
When the similarity having the facial image information of an angle in degree is less than preset value, demonstrate the need for the identity further to this user
Verifying, the 3rd collecting device i.e. starts to gather the eyeprint information of this user, when eyeprint information and the original identity of this user
During eyeprint information matches success in information, show the identity of this user by checking, now control unit is by this user identity
The successful information of certification sends to display unit;If above-mentioned in terms of three, user is carried out authentication during, use
The identity information at family is relatively low with original identity information similarity, now needs this situation is carried out counte-rplan, and control unit is i.e.
Information failed for this authenticating user identification is sent to display unit, and sends instruction, alarm unit i.e. basis to alarm unit
The instruction alert of control unit, is conducive to reminding periphery personnel and staff to notice that this dangerous situation is to take
Counter-measure, and control unit by suspicious identity information send to feedback unit, feedback unit will pass through by suspicious identity information
Network is shared and is stored to network high in the clouds, not only contributes to put above-mentioned suspicious identity information on record, and is conducive to
When dangerous situation occurs, help the investigation and evidence collection work of relevant department, ensured the identity security of inward and outward personnel further.
Accompanying drawing explanation
Fig. 1 is the structural representation of a kind of secure identification system of entering and leaving the border.
Detailed description of the invention
As it is shown in figure 1, a kind of entry and exit secure identification system that Fig. 1 is the present invention to be proposed.
Reference Fig. 1, the entry and exit secure identification system that the present invention proposes, including: memory element, recognition unit, collection list
Unit, display unit, alarm unit, feedback unit, control unit;
Memory element, for storing the original identity information of this user corresponding with the identity data of user, above-mentioned user
Original identity information include the finger print information of this user, facial image information, eyeprint information;Above-mentioned facial image information includes
The frontal one image information of this user, left surface facial image information, right flank facial image information.
Recognition unit, for gathering the identity data of user, and sends the user ID data gathered to control unit;
The identity data of above-mentioned user is passport information and the VISAs of this user, and the identity of user can be carried out only by passport information
One determines, just as the identity card of China;VISAs can this state of entrance the most qualified to this user judge, it is to avoid
Underproof personnel enter this state, tentatively screen the identity of the personnel entering this state.
Collecting unit, including the first collecting device, the second collecting device, the 3rd collecting device;First collecting device is used for
Gathering the finger print information of user, the second collecting device is for gathering the facial image information of user, and the 3rd collecting device is used for adopting
The eyeprint information of collection user;After control unit obtains the finger print information of the user that the first collecting device gathers, above-mentioned fingerprint is believed
Breath is analyzed, and picks out effective finger print information and compares foundation the most, and above-mentioned effective finger print information is the finger of complete display
Stricture of vagina information, the finger print information of complete display can help control unit rapidly finger print information to be compared judgement, it is to avoid is adopting
When the finger print information of collection is unintelligible, need the first collecting device to re-start the trouble of fingerprint collecting, also make user when operation
Easier;Above-mentioned eyeprint information is the eye iris information of user, and iris information is during " iris " that we often say is removed
Between the annulus of black pupil, this part biological characteristic information is difficult to forge, and can be further ensured that the identity security of user;Control
After unit processed obtains user's eyeprint information that the 3rd collecting device gathers, above-mentioned eyeprint information is analyzed, picks out effectively
Eyeprint information is as comparing foundation, and above-mentioned effective eyeprint information is clear and legible eyeprint information, it is ensured that control unit can be direct
Utilize the effective eyeprint information obtained to compare, not only saved the reduced time, and simplified the operation of user.Above-mentioned
One collecting device uses fingerprint capturer, for gathering the fingerprint of user;Second collecting device uses high-definition camera instrument, it is ensured that
The definition of the facial image information of the user gathered;3rd collecting device uses infrared high-definition camera, to user's eye
Iris information carries out the extraction of complete display, it is ensured that operation is comprehensive below.
Display unit, communicates to connect with control unit, for showing the authenticating user identification result that control unit sends;With
Family and staff can be by the results of display unit direct viewing to this authenticating user identification, before dangerous situation occurs, and can
Remind relevant staff to take counter-measure in time, it is to avoid the further deterioration of dangerous situation, fully ensure that surrounding enviroment and
The safety of personnel identity.
Alarm unit, communicates to connect with control unit, for the instruction alert according to control unit;This enforcement
In mode, alarm unit uses audible-visual annunciator, so can in terms of vision and audition two to periphery personnel and staff with
Stimulate, remind staff to notice potential dangerous situation fully, before dangerous situation occurs, take counter-measure in time,
As far as possible danger is down to minimum, ensures the safety of periphery personnel to the full extent.
Feedback unit, communicates to connect with control unit, for the information that control unit sends being shared to net by network
Network high in the clouds stores;So, not only contribute to the identity information of a suspect is put on record, and can occur in danger
After, help relevant department that the identity information of a suspect is extracted, thus the identity of a suspect is determined, with side
Help carrying out of relevant department's further work;Or, even without causing danger, the identity information of above-mentioned a suspect is carried out
Put on record, relevant department can be made to recognize the identity information of this suspect, by the investigation to above-mentioned a suspect's identity information,
Be conducive to relevant department to find the dangerous motivation of a suspect, thus potential danger is down to minimum.
Control unit, with memory element, recognition unit, collecting unit communication connection;
After control unit receives the user ID data that recognition unit sends, control unit should in transferring out memory element
The original identity information of the user that user ID data is corresponding controls the first collecting device as references object, control unit instruction
Starting working, user i.e. coordinates the first collecting device to gather self fingerprint, the user that the first collecting device is gathered by control unit
Finger print information be analyzed, pick out effective finger print information as comparing foundation, above-mentioned effective fingerprint is believed by control unit
Breath contrasts with the finger print information in original identity information, verify the existing collection finger print information of this user whether with pre-stored
Finger print information coincide, if the similarity of the finger print information in above-mentioned effective finger print information and original identity information is less than preset value,
It fails to match with original finger print information to show the finger print information of existing collection of this user, is now in non-security situation, controls
Information failed for this authenticating user identification is sent to display unit by unit, to inform that user and this user identity of periphery personnel recognize
Demonstrate,proving failed information, control unit also sends instruction to alarm unit, and alarm unit i.e. sends report according to the instruction of control unit
Alarming information, to remind periphery personnel and relevant staff to notice this situation in time, takes counter-measure when necessary;And control
Above-mentioned effective finger print information is sent to feedback unit by unit processed, and feedback unit will be total to by network by above-mentioned effective finger print information
Enjoy and storing to network high in the clouds, be on the one hand conducive to the suspicious identity information of above-mentioned user is put on record, on the other hand can
For the foundation that the investigation and evidence collection work offer of relevant department is strong, help carrying out of relevant department's work;If above-mentioned effective fingerprint
Information is not less than preset value with the similarity of the finger print information in original identity information, shows that the identity of this user has passed through first
Layer checking, next needs the identity to this user to carry out second layer checking, and control unit instruction controls the second collecting device and opens
Beginning to gather the facial image information of these three angles of user, above three angle is the front of user, left surface, right flank, control
The facial image information of above three angle is also contrasted, i.e. by unit processed with the facial image information in original identity information
The frontal one information of the user of collection and the frontal one information in original identity information are carried out the user contrasting, gathering
Left surface facial information and original identity information in the left surface facial information right flank of user that carries out contrasting, will gather
Facial information contrasts with the right flank facial information in original identity information, if the facial image information of above three angle
It is above preset value, the frontal one information of the user i.e. gathered with the similarity of the facial image information in original identity information
With the similarity of the frontal one information in original identity information higher than preset value, the user of collection left surface facial information with
The similarity of the left surface facial information in original identity information higher than preset value, collection user right flank facial information with
The similarity of the right flank facial information in original identity information is higher than preset value, shows the face image of these three angles of user
Information is high with the goodness of fit of the facial image information in original identity information, and this user belongs to secured user, now controls list
Successful for this authenticating user identification information is sent to display unit by unit;If the facial image information of above three angle is with original
The similarity of the facial image information in identity information is below preset value, shows the facial image information of these three angles of user
The lowest with the goodness of fit in the facial image information in original identity information, the identity of this user needs to cause relevant staff
Attention, to take next step to take action, now failed for this authenticating user identification information is sent to display unit by control unit,
To inform user and the failed information of this authenticating user identification of periphery personnel, control unit also sends instruction to alarm unit, report
Alert unit is i.e. according to the instruction alert of control unit, to remind periphery personnel and relevant staff to notice in time
This situation, takes counter-measure when necessary;And the facial image information of above three angle is sent to feedback by control unit
Unit, feedback unit the facial image information of above three angle will be shared by network and stores to network high in the clouds, and one
Aspect is conducive to putting the suspicious identity information of above-mentioned user on record, on the other hand can be the investigation and evidence collection work of relevant department
Strong foundation is provided, helps carrying out of relevant department's work;If the facial image information of above three angle and original identity
In the Similarity value of the facial image information in information at least one be not less than preset value, show now to be difficult to determine this user
Identity whether be secured user, need the identity of this user is carried out third layer checking, now control unit instruction control the
Three collecting device work, the 3rd collecting device eyeprint information to user, the 3rd collecting device is adopted by control unit
The eyeprint information of collection is analyzed, and picks out effective eyeprint information as comparing foundation, and by effective eyeprint information and original body
Eyeprint information in part information compares, if above-mentioned effective eyeprint information is different from the eyeprint information in original identity information,
Showing that now this user is insecure user, be now the generation avoiding dangerous situation, control unit is by this authenticating user identification
Failed information sends to display unit, to inform user and the failed information of this authenticating user identification of periphery personnel, controls singly
Unit also sends instruction to alarm unit, and alarm unit is i.e. according to the instruction alert of control unit, to remind periphery people
Member and relevant staff notice this situation in time, take counter-measure when necessary;And control unit is by above-mentioned effective eye
Stricture of vagina information sends to feedback unit, and feedback unit above-mentioned effective eyeprint information will be shared by network and deposit to network high in the clouds
Storage, is on the one hand conducive to putting the suspicious identity information of above-mentioned user on record, on the other hand can be that the investigation of relevant department takes
Card work provides strong foundation, helps carrying out of relevant department's work;If above-mentioned effective eyeprint information and original identity information
In eyeprint information identical, show that this user has passed through third layer checking, this user is secured user, and now control unit should
The successful information of authenticating user identification sends to display unit.
The above, the only present invention preferably detailed description of the invention, but protection scope of the present invention is not limited thereto,
Any those familiar with the art in the technical scope that the invention discloses, according to technical scheme and
Inventive concept equivalent or change in addition, all should contain within protection scope of the present invention.
Claims (9)
1. an entry and exit secure identification system, it is characterised in that including: memory element, recognition unit, collecting unit, display
Unit, alarm unit, feedback unit, control unit;
Memory element, for storing the original identity information of this user corresponding with the identity data of user, above-mentioned user's is former
Beginning identity information includes the finger print information of this user, facial image information, eyeprint information;
Recognition unit, for gathering the identity data of user, and sends the user ID data gathered to control unit;
Collecting unit, including the first collecting device, the second collecting device, the 3rd collecting device;First collecting device is used for gathering
The finger print information of user, the second collecting device is for gathering the facial image information of user, and the 3rd collecting device is used for gathering use
The eyeprint information at family;
Display unit, communicates to connect with control unit, for showing the authenticating user identification result that control unit sends;
Alarm unit, communicates to connect with control unit, for the instruction alert according to control unit;
Feedback unit, communicates to connect with control unit, for the information that control unit sends being shared to network cloud by network
End stores;
Control unit, with memory element, recognition unit, collecting unit communication connection;
After control unit receives the user ID data that recognition unit sends, transfer out this user ID data in memory element
The original identity information of this corresponding user is as references object;Control unit obtains the first collecting device, the second collection successively
The subscriber identity information that equipment, the 3rd collecting device gather, and compare with above-mentioned original identity information, when the second collection sets
When the standby subscriber identity information gathered is with original identity information matching degree height, this authenticating user identification is successfully believed by control unit
Breath sends to display unit, otherwise, when the subscriber identity information that the 3rd collecting device gathers is identical with original identity information, and control
Successful for this authenticating user identification information is sent to display unit by unit processed, the subscriber identity information gathered when collecting unit with
When original identity information matching degree is low, information failed for this authenticating user identification is sent to display unit by control unit, and to
Alarm unit sends instruction, sends the subscriber identity information of collection low for matching degree to feedback unit simultaneously.
Entry and exit secure identification system the most according to claim 1, it is characterised in that control unit receives recognition unit
After the user ID data sent, control unit transfers out the original of this user corresponding to memory element this user ID data interior
Identity information is as references object, and control unit instruction controls the first collecting device and starts working, and control unit receives first
After effective finger print information that collecting device sends, above-mentioned effective finger print information is carried out with the finger print information in original identity information
Contrast, if the similarity of the finger print information in above-mentioned effective finger print information and original identity information is less than preset value, control unit
Information failed for this authenticating user identification is sent to display unit, and sends instruction to alarm unit, and by above-mentioned effective finger
Stricture of vagina information sends to feedback unit, if above-mentioned effective finger print information is the lowest with the similarity of the finger print information in original identity information
In preset value, control unit instruction controls the second collecting device and starts to gather the facial image information of these three angles of user, and
The facial image information of above three angle is contrasted with the facial image information in original identity information, if above three
The facial image information of angle is above preset value, control unit with the similarity of the facial image information in original identity information
Successful for this authenticating user identification information is sent to display unit, if the facial image information of above three angle and original body
The similarity of the facial image information in part information is below preset value, and control unit is by information failed for this authenticating user identification
Send to display unit, and send instruction to alarm unit, and the facial image information of above three angle is sent to feedback
Unit, if in the Similarity value of the facial image information in the facial image information of above three angle and original identity information extremely
Rare one is not less than preset value, and control unit instruction controls the 3rd collecting device work, and by the 3rd collecting device transmission
Effectively eyeprint information compares with the eyeprint information in original identity information, if above-mentioned effective eyeprint information is believed with original identity
Eyeprint information in breath is different, and information failed for this authenticating user identification is sent to display unit by control unit, and to warning
Unit sends instruction, and sends above-mentioned effective eyeprint information to feedback unit, if above-mentioned effective eyeprint information and original identity
Eyeprint information in information is identical, and successful for this authenticating user identification information is sent to display unit by control unit.
Entry and exit secure identification system the most according to claim 1, it is characterised in that described memory cell storage
The facial image information of user includes the frontal one image information of this user, left surface facial image information, right flank face
Image information.
Entry and exit secure identification system the most according to claim 1, it is characterised in that the second described collecting device collection
The facial image information of these three angles of user, above three angle is the front of this user, left surface, right flank.
Entry and exit secure identification system the most according to claim 1, it is characterised in that described eyeprint information is user's
Eye iris information.
Entry and exit secure identification system the most according to claim 1, it is characterised in that the identity data of described user is
The passport information of this user and VISAs.
Entry and exit secure identification system the most according to claim 1, it is characterised in that the first described collecting device uses
Fingerprint capturer.
Entry and exit secure identification system the most according to claim 1, it is characterised in that the second described collecting device uses
High-definition camera instrument.
Entry and exit secure identification system the most according to claim 1, it is characterised in that the 3rd described collecting device uses
Infrared high-definition camera.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610510795.XA CN106203486A (en) | 2016-06-30 | 2016-06-30 | A kind of entry and exit secure identification system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610510795.XA CN106203486A (en) | 2016-06-30 | 2016-06-30 | A kind of entry and exit secure identification system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106203486A true CN106203486A (en) | 2016-12-07 |
Family
ID=57462934
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201610510795.XA Pending CN106203486A (en) | 2016-06-30 | 2016-06-30 | A kind of entry and exit secure identification system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106203486A (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106503519A (en) * | 2016-10-14 | 2017-03-15 | 国政通科技股份有限公司 | A kind of method of identification check |
| CN107169649A (en) * | 2017-05-11 | 2017-09-15 | 安徽谦通信息科技有限公司 | A kind of teacher's Intelligent examining evaluation management system |
| CN107992834A (en) * | 2017-12-11 | 2018-05-04 | 成都西华升腾科技有限公司 | For limiting the warning device of People Going Abroad |
| CN112070188A (en) * | 2020-08-28 | 2020-12-11 | 湖北中科网络科技股份有限公司 | Identity authentication method and system based on space-time uniqueness |
| CN118736652A (en) * | 2024-09-04 | 2024-10-01 | 浙江久婵物联科技有限公司 | A method for face identity verification and identity data encryption storage |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1728156A (en) * | 2005-06-27 | 2006-02-01 | 成都翔宇信息技术有限公司 | Method and system for automatic recognizing idnetity document of leaving and entering a country as well as fingerprint of biological living body |
| CN101226653A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Rapid boarding system and method based on ID card and biometric identification technology |
| CN201838011U (en) * | 2010-05-26 | 2011-05-18 | 中国科学院自动化研究所 | Identity authentication equipment based on second-generation ID cards and multimode biological features |
| CN103914686A (en) * | 2014-03-11 | 2014-07-09 | 辰通智能设备(深圳)有限公司 | Face comparison authentication method and system based on identification photo and collected photo |
-
2016
- 2016-06-30 CN CN201610510795.XA patent/CN106203486A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1728156A (en) * | 2005-06-27 | 2006-02-01 | 成都翔宇信息技术有限公司 | Method and system for automatic recognizing idnetity document of leaving and entering a country as well as fingerprint of biological living body |
| CN101226653A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | Rapid boarding system and method based on ID card and biometric identification technology |
| CN201838011U (en) * | 2010-05-26 | 2011-05-18 | 中国科学院自动化研究所 | Identity authentication equipment based on second-generation ID cards and multimode biological features |
| CN103914686A (en) * | 2014-03-11 | 2014-07-09 | 辰通智能设备(深圳)有限公司 | Face comparison authentication method and system based on identification photo and collected photo |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106503519A (en) * | 2016-10-14 | 2017-03-15 | 国政通科技股份有限公司 | A kind of method of identification check |
| CN107169649A (en) * | 2017-05-11 | 2017-09-15 | 安徽谦通信息科技有限公司 | A kind of teacher's Intelligent examining evaluation management system |
| CN107992834A (en) * | 2017-12-11 | 2018-05-04 | 成都西华升腾科技有限公司 | For limiting the warning device of People Going Abroad |
| CN112070188A (en) * | 2020-08-28 | 2020-12-11 | 湖北中科网络科技股份有限公司 | Identity authentication method and system based on space-time uniqueness |
| CN118736652A (en) * | 2024-09-04 | 2024-10-01 | 浙江久婵物联科技有限公司 | A method for face identity verification and identity data encryption storage |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN103714631B (en) | ATM cash dispenser intelligent monitor system based on recognition of face | |
| CN106203486A (en) | A kind of entry and exit secure identification system | |
| CN112789611A (en) | Identifying and verifying individuals using facial recognition | |
| CN111797677A (en) | Face recognition living body detection method based on face iris recognition and thermal imaging technology | |
| CN101635834A (en) | Automatic tracking and identifying system controlled by nerve | |
| JP2019522278A (en) | Identification method and apparatus | |
| CN104657817A (en) | Face snapshotting, comparing, identifying, retrieving, and inquiring method for bank counter | |
| CN107609373A (en) | A kind of terminal device and its method for safeguard protection | |
| CN111126219A (en) | Transformer substation personnel identity recognition system and method based on artificial intelligence | |
| CN106127183A (en) | A kind of management of social insurance system of automatic identification identity | |
| CN103440482A (en) | Method, system and device for identifying identity document holder based on hidden video | |
| CN106156815A (en) | A kind of entry and exit identification system | |
| CN106203041B (en) | A kind of medical information management system of automatic identification identity | |
| JP7054331B2 (en) | Room occupancy monitoring system | |
| DE102024127479A1 (en) | BIOMETRIC IDENTIFICATION IN A VEHICLE ENVIRONMENT | |
| CN112052779B (en) | An access control system with palm vein recognition and iris recognition | |
| CN111462417A (en) | Multi-information verification system and multi-information verification method for unmanned bank | |
| CN106169066A (en) | A kind of entry and exit identity security identification system | |
| CN107590888A (en) | A kind of building are registered one's residence gate control system | |
| CN109492509A (en) | Personal identification method, device, computer-readable medium and system | |
| CN117152871A (en) | Control method, system, electronic equipment and medium for combination of lamplight and access control | |
| CN211154002U (en) | Safety helmet and safety system | |
| JP5730000B2 (en) | Face matching system, face matching device, and face matching method | |
| JP5757708B2 (en) | Reporting device | |
| Ahmed et al. | Simplistic approach to detect cybercrimes and deter cyber criminals |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |
|
| RJ01 | Rejection of invention patent application after publication |