ZTE Smart Vision Big Data: Smart Vision (Near Infrared) Big Data Access Control Function Description

ZTE Intelligent Vision Big Data Intelligent Vision (Near Infrared) Big Data Access Control

 

    Detailed introduction

 

    Intelligent vision (near infrared) big data access control is based on dynamic face recognition technology, combined with a new generation of self-service access control equipment with high security, high stability and high efficiency. It is used in indoor environments with high security, such as the control and management of personnel in and out of financial rooms, prisons, and vaults, and provides unified face recognition, comparison verification, and intelligent behavior analysis services.

 

    The system consists of three parts: face recognition terminal, access control equipment and application management platform deployed in the background. The face recognition terminal will perform face recognition on the person entering, and control the access control to release the person who has passed the verification.

 

    The main function:

 

    1. Face template collection

 

    Before use, it is necessary to collect the face template of the person who is allowed to enter for later identification and judgment.

 

    2. Personnel information and authority management

 

    Basic information, identity, face template and configuration management of personnel's entry and exit areas.

 

    3. Dynamic face recognition

 

    Automatically capture face avatars, extract feature values, and compare with the face template library to determine whether to enter the person.

 

    4. Access control

 

    For those who pass the verification and have this channel permission, control the gate to open the door.

 

    5. Inquiry of travel records

 

    Provide access to access records for query and retrieval.

 

    6. Abnormal statistics

 

    The number of people who are restricted from entering can be statistically inquired according to time, channel, area, etc.

 

    Features and advantages:

 

    1. Support front-end touch operation

 

    2. Flexible permission control: flexible permission settings can be made according to time, channel and area.

 

    3. Real identity authentication, can not be borrowed and copied, more secure

 

    4. Non-invasive identification, no contact required

 

    5. The light adaptability is strong, and it can also be recognized in backlight and low light conditions

 

    6. Never forget or lose, more convenient

 

6. Applicable to financial rooms, vaults, prisons and other places with high security requirements

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=326189637&siteId=291194637