Gate channel anti-cheating control method, device, equipment and storage medium

文档序号:1923293 发布日期:2021-12-03 浏览:25次 中文

阅读说明:本技术 一种闸机通道防欺骗控制方法、装置、设备及存储介质 (Gate channel anti-cheating control method, device, equipment and storage medium ) 是由 张俊明 李碧丹 田之进 于 2020-05-27 设计创作,主要内容包括:本申请实施例公开了一种闸机通道防欺骗控制方法、装置、设备及存储介质。本申请实施例提供的技术方案通过在监视目标进入授权请求模块前的授权获取区域即开始对监视目标进行图像追踪并分配目标ID,在授权请求模块通过对监视目标的授权请求时,对监视目标的目标ID进行授权,并根据通道区域内监视目标的目标ID的授权情况确定通道区域内是否存在非授权人员,以及时发现尾随或冒名顶替等欺骗行为,提高对闸机通道防欺骗的效果。(The embodiment of the application discloses a gate channel anti-cheating control method, a gate channel anti-cheating control device, gate channel anti-cheating equipment and a storage medium. According to the technical scheme provided by the embodiment of the application, the monitoring target starts to be subjected to image tracking and is allocated with the target ID when the monitoring target enters the authorization acquisition area before the authorization request module, when the authorization request module requests the authorization of the monitoring target, the target ID of the monitoring target is authorized, whether unauthorized people exist in the channel area is determined according to the authorization condition of the target ID of the monitoring target in the channel area, cheating behaviors such as trailing or imposition are discovered in time, and the anti-cheating effect of the gate channel is improved.)

1. A gate channel anti-cheating control method is characterized by comprising the following steps:

carrying out image tracking on a monitoring target entering a monitoring area based on image information, and allocating a target ID to the monitoring target, wherein the monitoring area comprises an authorization acquisition area in front of an authorization request module and a channel area corresponding to a gate channel;

authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened;

and judging whether the monitoring target of the unauthorized target ID exists in the passage area or not, and outputting passage indication information for indicating whether unauthorized people exist in the passage area or not.

2. The gate passageway anti-spoofing control method according to claim 1, wherein after said judging whether or not there is a monitoring target of an unauthorized target ID in the passageway area and outputting passageway indication information indicating whether or not there is an unauthorized person in the passageway area, further comprising:

and if the monitoring target of the unauthorized target ID exists in the channel area, performing channel exception processing.

3. The gate passageway anti-spoofing control method of claim 1, wherein the image tracking of the monitored target entering the monitored area based on the image information and the assignment of the target ID to the monitored target comprises:

and carrying out image tracking on the monitored target entering the monitoring area based on the image information, determining the monitored target entering the authorized acquisition area, and distributing a target ID for the monitored target entering the authorized acquisition area.

4. The gate channel anti-spoofing control method of claim 1, wherein the authorizing the authorization information of the authorized person as the target ID of the monitoring target of the authorized acquisition area according to the authorization request module and notifying the gate of allowing the gate to be opened for the target ID comprises:

informing an authorization request module to acquire authentication information;

determining whether an authorization request cheating action exists according to the image tracking condition of the monitoring target in the authorization acquisition area;

if the authorization request cheating action exists, performing authorization exception processing;

if the authorization request cheating action does not exist, authorizing the target ID of the monitoring target in the authorization acquisition area according to the authorization information of the authorization personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

5. The gate passageway anti-spoofing control method according to claim 1, wherein said judging whether or not a monitoring target of an unauthorized target ID exists in the passageway area and outputting passageway indication information indicating whether or not an unauthorized person exists in the passageway area includes:

determining a target ID of each monitoring target in the channel area, and judging whether an unauthorized target ID exists in the channel area;

if an unauthorized target ID exists in the channel area, channel indication information indicating that unauthorized persons exist in the channel area is output;

if the unauthorized target ID does not exist in the channel area, continuously judging whether the unauthorized target ID exists in the channel area or not until the unauthorized target ID exists in the channel area or the monitoring target leaves the channel area.

6. The gate passageway anti-spoofing control method according to any one of claims 1 to 5, wherein after the image tracking of the monitored target entering the monitored area based on the image information and the assignment of the target ID to the monitored target, further comprising:

identifying monitoring targets in the image information to obtain characteristic information of each monitoring target;

and performing target information matching on the plurality of image information based on the characteristic information to confirm the same monitoring target in different image information.

7. The gate passage anti-spoofing control method of claim 6, wherein said performing target information matching on a plurality of image information based on said feature information to confirm the same monitoring target in different image information comprises:

determining feature docking areas of a plurality of image information, the feature docking areas including overlapping areas and/or non-overlapping areas;

estimating the moving position of the monitoring target according to the traffic pace based on the non-overlapping areas of the plurality of image information, and performing target information matching based on the moving position to confirm the same monitoring target in the non-overlapping areas of different image information;

and performing target information matching on the overlapping areas of the plurality of image information according to the characteristic information based on the overlapping areas of the plurality of image information to confirm the same monitoring target of different image information in the overlapping areas.

8. The gate passage anti-spoofing control method according to claim 7, wherein the matching of the target information for the overlapping area of the plurality of image information based on the overlapping area of the plurality of image information according to the feature information to confirm the same monitoring target of different image information in the overlapping area comprises:

based on the overlapping area of the image information, tracing the image information corresponding to the shooting visual angle according to the time stamp;

and performing target information matching on the plurality of image information according to the characteristic information of the plurality of image information corresponding to the shooting visual angles and based on the priority levels of the characteristic information so as to confirm the same monitoring target of different image information in the overlapping area.

9. The gate channel anti-spoofing control method according to any one of claims 1 to 5, wherein after the authorization information of the authorized person is authorized by the authorization request module to the target ID of the monitoring target in the authorized acquisition area and the gate is notified to allow the gate to be opened for the target ID, the method further comprises:

and according to the authorization information of the authorization request module to a plurality of authorized personnel continuously, informing the gate to keep the channel open according to the system parameters.

10. The gate channel anti-cheating control device is characterized by comprising a target tracking module, an ID authorization module and a target monitoring module, wherein:

the target tracking module is used for carrying out image tracking on a monitored target entering a monitoring area based on image information and distributing a target ID (identity) for the monitored target, wherein the monitoring area comprises an authorization acquisition area in front of the authorization request module and a channel area corresponding to a gate channel;

the ID authorization module is used for authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module and informing the gate of allowing the target ID to be opened;

and the target monitoring module is used for judging whether a monitoring target of an unauthorized target ID exists in the channel area or not and outputting channel indication information for indicating whether an unauthorized person exists in the channel area or not.

11. The gate passageway fraud prevention control apparatus of claim 10, further comprising:

and the exception handling module is used for carrying out channel exception handling if the monitoring target of the unauthorized target ID exists in the channel area.

12. The gate channel anti-cheating control system is characterized by comprising a background information processing module, an image tracking module, an authorization request module and a gate control module, wherein:

the image tracking module is used for carrying out image tracking on a monitoring target entering the monitoring area based on the image information;

the authorization request module is used for collecting authentication information of authorization request personnel in the waiting area and generating authorization information according to the authentication information;

the system comprises a background information processing module, a monitoring area and a gateway channel, wherein the background information processing module is used for distributing a target ID for a monitoring target entering the monitoring area, and the monitoring area comprises an authorization acquisition area in front of an authorization request module and a channel area corresponding to a gateway channel; authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened; judging whether a monitoring target of an unauthorized target ID exists in the channel area or not, and outputting channel indication information for indicating whether an unauthorized person exists in the channel area or not;

and the gate control module is controlled by the background information processing module to control the gate to open or close the channel.

13. A computer device, comprising: a memory and one or more processors;

the memory for storing one or more programs;

when executed by the one or more processors, cause the one or more processors to implement the gate lane spoofing prevention control method of any of claims 1-9.

14. A storage medium containing computer-executable instructions for performing the gate channel anti-spoofing control method of any of claims 1-9 when executed by a computer processor.

Technical Field

The embodiment of the application relates to the field of monitoring of gate machines for passers-by, in particular to a gate machine channel anti-cheating control method, device, equipment and storage medium.

Background

In places such as entrances and exits of places strictly requiring passersby to be consistent with authorized persons, such as bus stations, subway stations, office buildings, residential quarters and the like, people passage gate machines and other equipment are often arranged to carry out authorization verification on the passing persons, after an authorization request person passes the verification, a gate machine passage is opened, and the person obtaining authorization can pass through the gate machine passage.

At present, a method for preventing cheating of a gate of a pedestrian passageway mainly comprises the steps of examining a gate authorization request through a face recognition device or a physical medium (such as an access card) device, carrying out anti-trailing judgment by using an infrared device or video monitoring in the gate passageway, controlling the gate passageway to be closed at any time when a person or a tail is detected, and preventing unauthorized persons from passing through the gate passageway.

However, after obtaining the gate authorization, the authorized person may replace the passing gate or the unauthorized person to pass the gate with the authorized person, and the anti-cheating effect of the gate passage is not ideal.

Disclosure of Invention

The embodiment of the application provides a method, a device, equipment and a storage medium for controlling anti-cheating of a gate channel, so as to improve the anti-cheating effect of the gate channel.

In a first aspect, an embodiment of the present application provides a gate passage anti-spoofing control method, including:

carrying out image tracking on a monitoring target entering a monitoring area based on image information, and allocating a target ID to the monitoring target, wherein the monitoring area comprises an authorization acquisition area in front of an authorization request module and a channel area corresponding to a gate channel;

authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened;

judging whether a monitoring target of an unauthorized target ID exists in the channel area or not, and outputting channel indication information for indicating whether an unauthorized person exists in the channel area or not;

further, after the determining whether the monitoring target of the unauthorized target ID exists in the passage area and outputting passage indication information indicating whether an unauthorized person exists in the passage area, the method further includes:

and if the monitoring target of the unauthorized target ID exists in the channel area, performing channel exception processing.

Further, the image tracking of the monitored target entering the monitoring area based on the image information and the assignment of the target ID to the monitored target include:

and carrying out image tracking on the monitored target entering the monitoring area based on the image information, determining the monitored target entering the authorized acquisition area, and distributing a target ID for the monitored target entering the authorized acquisition area.

Further, the authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorization personnel by the authorization request module, and notifying the gate to allow the gate to open the target ID, includes:

informing an authorization request module to acquire authentication information;

determining whether an authorization request cheating action exists according to the image tracking condition of the monitoring target in the authorization acquisition area;

if the authorization request cheating action exists, performing authorization exception processing;

if the authorization request cheating action does not exist, authorizing the target ID of the monitoring target in the authorization acquisition area according to the authorization information of the authorization personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

Further, the determining whether an authorization request spoofing action exists according to the image tracking condition of the monitoring target in the authorization acquisition area includes:

determining whether the distance between each monitoring target relative to the monitoring target requesting authorization is smaller than a specified distance requirement or not according to the position of each monitoring target in the authorization acquisition area;

if so, determining that an authorization request cheating action exists;

otherwise, it is determined that there is no authorization request spoofing action. Further, the determining whether a monitoring target of an unauthorized target ID exists in the passage area and outputting passage indication information indicating whether an unauthorized person exists in the passage area includes:

determining a target ID of each monitoring target in the channel area, and judging whether an unauthorized target ID exists in the channel area;

if an unauthorized target ID exists in the channel area, channel indication information indicating that unauthorized persons exist in the channel area is output;

if the unauthorized target ID does not exist in the channel area, continuously judging whether the unauthorized target ID exists in the channel area or not until the unauthorized target ID exists in the channel area or the monitoring target leaves the channel area.

Further, after the image tracking is performed on the monitored target entering the monitoring area based on the image information and the target ID is assigned to the monitored target, the method further includes:

identifying monitoring targets in the image information to obtain characteristic information of each monitoring target;

and performing target information matching on the plurality of image information based on the characteristic information to confirm the same monitoring target in different image information.

Further, the performing target information matching on the plurality of image information based on the feature information to confirm the same monitoring target in different image information includes:

determining feature docking areas of a plurality of image information, the feature docking areas including overlapping areas and/or non-overlapping areas;

estimating the moving position of the monitoring target according to the traffic pace based on the non-overlapping areas of the plurality of image information, and performing target information matching based on the moving position to confirm the same monitoring target in the non-overlapping areas of different image information;

and performing target information matching on the overlapping areas of the plurality of image information according to the characteristic information based on the overlapping areas of the plurality of image information to confirm the same monitoring target of different image information in the overlapping areas.

Further, the performing, based on the overlapping area of the multiple pieces of image information, object information matching on the overlapping area of the multiple pieces of image information according to the feature information to confirm the same monitoring object in the overlapping area of different pieces of image information includes:

based on the overlapping area of the image information, tracing the image information corresponding to the shooting visual angle according to the time stamp;

and performing target information matching on the plurality of image information according to the characteristic information of the plurality of image information corresponding to the shooting visual angles and based on the priority levels of the characteristic information so as to confirm the same monitoring target of different image information in the overlapping area.

Further, after the authorizing information of the authorized person is authorized to the target ID of the monitoring target in the authorized acquisition area according to the authorization request module, and the gate is notified to allow the target ID to be opened, the method further includes:

and according to the authorization information of the authorization request module to a plurality of authorized personnel continuously, informing the gate to keep the channel open according to the system parameters.

In a second aspect, an embodiment of the present application provides a gate passage anti-spoofing control device, including a target tracking module, an ID authorization module, and a target monitoring module, where:

the target tracking module is used for carrying out image tracking on a monitored target entering a monitoring area based on image information and distributing a target ID (identity) for the monitored target, wherein the monitoring area comprises an authorization acquisition area in front of the authorization request module and a channel area corresponding to a gate channel;

the ID authorization module is used for authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module and informing the gate of allowing the target ID to be opened;

and the target monitoring module is used for judging whether a monitoring target of an unauthorized target ID exists in the channel area or not and outputting channel indication information for indicating whether an unauthorized person exists in the channel area or not.

Further, the gate passage anti-spoofing control device further comprises an exception handling module, which is used for handling passage exception if the monitoring target with unauthorized target ID exists in the passage area.

Further, the target tracking module is specifically configured to: and carrying out image tracking on the monitored target entering the monitoring area based on the image information, determining the monitored target entering the authorized acquisition area, and distributing a target ID for the monitored target entering the authorized acquisition area.

Further, the ID authorization module is specifically configured to:

informing an authorization request module to acquire authentication information;

determining whether an authorization request cheating action exists according to the image tracking condition of the monitoring target in the authorization acquisition area;

if the authorization request cheating action exists, performing authorization exception processing;

if the authorization request cheating action does not exist, authorizing the target ID of the monitoring target in the authorization acquisition area according to the authorization information of the authorization personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

Further, when determining whether an authorization request spoofing action exists according to the image tracking condition of the monitoring target in the authorization acquisition area, the ID authorization module specifically includes:

determining whether the distance between each monitoring target relative to the monitoring target requesting authorization is smaller than a specified distance requirement or not according to the position of each monitoring target in the authorization acquisition area;

if so, determining that an authorization request cheating action exists;

otherwise, it is determined that there is no authorization request spoofing action. Further, the target monitoring module is specifically configured to:

determining a target ID of each monitoring target in the channel area, and judging whether an unauthorized target ID exists in the channel area;

if an unauthorized target ID exists in the channel area, channel indication information indicating that unauthorized persons exist in the channel area is output;

if the unauthorized target ID does not exist in the channel area, continuously judging whether the unauthorized target ID exists in the channel area or not until the unauthorized target ID exists in the channel area or the monitoring target leaves the channel area.

Further, the device also comprises an overlapped target matching module, a target identification module and a target identification module, wherein the overlapped target matching module is used for identifying monitoring targets in the image information to obtain characteristic information of each monitoring target;

and performing target information matching on the plurality of image information based on the characteristic information to confirm the same monitoring target in different image information.

Further, when the overlapped target matching module performs target information matching on the plurality of image information based on the feature information to determine the same monitoring target in different image information, the overlapping target matching module specifically includes:

determining feature docking areas of a plurality of image information, the feature docking areas including overlapping areas and/or non-overlapping areas;

estimating the moving position of the monitoring target according to the traffic pace based on the non-overlapping areas of the plurality of image information, and performing target information matching based on the moving position to confirm the same monitoring target in the non-overlapping areas of different image information;

and performing target information matching on the overlapping areas of the plurality of image information according to the characteristic information based on the overlapping areas of the plurality of image information to confirm the same monitoring target of different image information in the overlapping areas.

Further, the overlapping target matching module, when performing target information matching on the overlapping regions of the plurality of image information according to the feature information based on the overlapping regions of the plurality of image information to confirm the same monitoring target in the overlapping regions of different image information, specifically includes:

based on the overlapping area of the image information, tracing the image information corresponding to the shooting visual angle according to the time stamp;

and performing target information matching on the plurality of image information according to the characteristic information of the plurality of image information corresponding to the shooting visual angles and based on the priority levels of the characteristic information so as to confirm the same monitoring target of different image information in the overlapping area.

Further, after the ID authorization module authorizes the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized person and notifies the gate to allow the gate to open the target ID, the ID authorization module further includes:

and according to the authorization information of the authorization request module to a plurality of authorized personnel continuously, informing the gate to keep the channel open according to the system parameters.

In a third aspect, an embodiment of the present application provides a gate channel anti-spoofing control system, including a background information processing module, an image tracking module, an authorization request module, and a gate control module, where:

the image tracking module is used for carrying out image tracking on a monitoring target entering the monitoring area based on the image information;

the authorization request module is used for collecting authentication information of authorization request personnel in the waiting area and generating authorization information according to the authentication information;

the system comprises a background information processing module, a monitoring area and a gateway channel, wherein the background information processing module is used for distributing a target ID for a monitoring target entering the monitoring area, and the monitoring area comprises an authorization acquisition area in front of an authorization request module and a channel area corresponding to a gateway channel; authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened; judging whether a monitoring target of an unauthorized target ID exists in the channel area or not, and outputting channel indication information for indicating whether an unauthorized person exists in the channel area or not;

and the gate control module is controlled by the background information processing module to control the gate to open or close the channel.

In a fourth aspect, an embodiment of the present application provides a computer device, including: a memory and one or more processors;

the memory for storing one or more programs;

when executed by the one or more processors, cause the one or more processors to implement the gate lane anti-spoofing control method of the first aspect.

In a fifth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions for performing the gate channel anti-spoofing control method as described in the first aspect when executed by a computer processor.

According to the embodiment of the application, the monitoring target starts to be subjected to image tracking and is allocated with the target ID when the monitoring target enters the authorization acquisition area before the authorization request module, when the authorization request module requests the authorization of the monitoring target, the target ID of the monitoring target is authorized, whether unauthorized people exist in the channel area is determined according to the authorization condition of the authorization ID of the monitoring target in the channel area, and deception behaviors such as trailing or imposition are discovered, so that the deception prevention effect on the gate channel is improved.

Drawings

Fig. 1 is a flowchart of a gate passage anti-spoofing control method provided in an embodiment of the present application;

fig. 2 is a flowchart of another anti-spoofing control method for gate gates according to an embodiment of the present disclosure;

fig. 3 is a flowchart of another anti-spoofing control method for gate gates according to an embodiment of the present disclosure;

fig. 4 is a schematic structural diagram of a gate passage anti-spoofing control device provided in an embodiment of the present application;

fig. 5 is a block diagram of a gate passage anti-spoofing control system according to an embodiment of the present application;

fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present application.

Detailed Description

In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.

Fig. 1 is a flowchart of a gate channel anti-spoofing control method according to an embodiment of the present disclosure, where the gate channel anti-spoofing control method according to the embodiment of the present disclosure may be executed by a gate channel anti-spoofing control device, and the gate channel anti-spoofing control device may be implemented by hardware and/or software and is integrated in a computer device.

The following description will be given taking an example in which the gate passage fraud prevention control apparatus executes a gate passage fraud prevention control method. Referring to fig. 1, the gate passage anti-spoofing control method includes:

s101: and carrying out image tracking on a monitoring target entering a monitoring area based on the image information, and allocating a target ID to the monitoring target, wherein the monitoring area comprises an authorization acquisition area in front of the authorization request module and a channel area corresponding to a gate channel.

The authorization request module is used for acquiring the authentication information of the authorization request personnel, matching the authentication information with the registration information in the database, and authorizing the authorization request personnel and generating the authorization information after the matching is successful. The authentication information can be biometric information such as face information, fingerprint information, voiceprint information, pass information and the like or physical medium information, and is acquired through corresponding acquisition equipment (such as a camera, a fingerprint reading module, a voice acquisition module, a card reader and the like).

The image information is shot and acquired by a camera device arranged around the gate, human body identification processing is carried out on the image information, a monitoring target in the image information is determined, and image tracking is carried out on the monitoring target. Wherein the image information is in particular video information. Illustratively, the human body recognition process may be performed by a YOLOv3 target detection algorithm and determine a monitoring target. After the monitoring target is detected, the position of the detected target is predicted and tracked by a target tracker (such as a target tracker based on the siemese _ fc target tracking algorithm) so as to realize image tracking of the monitoring target.

When the image tracking of the monitored targets is carried out, a target tracker is allocated to each monitored target, the predicted position of each monitored target in the next frame of image information is obtained through the target tracker, then the detected position and the predicted position of each monitored target are paired one by one through Hungary matching to form a tracking fragment corresponding to each monitored target, the tracking fragments of the same monitored target are combined to form a tracking chain, and the multi-target tracking in a monitored area is realized.

Further, whether the monitoring target enters the monitoring area or not is judged according to the position of the monitoring target in the image information. The division of the monitoring area in the image information can be determined according to the installation position and the posture of the camera device, and the authorized acquisition area and the channel area of the monitoring area are determined in the image information in an image recognition or manual demarcation mode.

Further, after it is determined that the monitoring target enters the monitoring area, a target ID is assigned to the monitoring target entered in the monitoring area. The target ID may be assigned based on a set ID assignment or randomly generated. In other embodiments, the target ID assignment to the monitoring target may be performed when the monitoring target is detected, that is, the target ID is assigned to each monitoring target in the image information.

S102: and authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

For example, after receiving the authorization request module to generate the authorization information, according to the authorization request module or the authorization acquisition area corresponding to the authorization information, the monitoring target corresponding to the authorization information (for example, the monitoring target closest to the corresponding gate or the authorization request module) is determined, and the target ID of the monitoring target is authorized to indicate that the monitoring target has passed the authentication of the authorization request module, and may enter and pass through the channel area of the gate.

Further, after the target ID is authorized, a channel opening instruction is initiated to the gate corresponding to the authorization information to notify the gate to allow opening of the target ID, so that authorized personnel (a monitored target for which the target ID is authorized) who pass the authentication can conveniently pass through the channel of the gate.

S103: and judging whether the monitoring target of the unauthorized target ID exists in the passage area or not, and outputting passage indication information for indicating whether unauthorized people exist in the passage area or not.

Illustratively, the monitoring target in the channel area is continuously monitored according to the image tracking result, and the authorization condition of the target ID of the monitoring target in the channel area is continuously judged to judge whether unauthorized people (the monitoring target with the unauthorized target ID) exist in the channel area.

Further, when an unauthorized object ID is detected in the monitoring object in the passage area, passage indication information indicating the presence of an unauthorized person in the passage area is output. If an unauthorized object ID is not detected, the authorization of the object ID of the monitoring object in the tunnel region is continuously detected.

After step S103, step S104 may be further included: and performing channel exception processing.

Illustratively, when an unauthorized object ID is detected in a monitoring object of a passage area and passage indication information indicating the presence of an unauthorized person in the passage area is output, passage abnormality processing is performed in response to the passage detection result.

The channel abnormity processing comprises informing a gate to close a channel, prompting alarm through field voice, sound and light, images and the like, the mode of channel abnormity processing can be specifically determined according to the conditions of field hardware equipment, channel abnormity alarm information can be generated, and the channel abnormity alarm information is stored in a background for management personnel to process.

The monitoring target starts to be subjected to image tracking and is allocated with the target ID when the monitoring target enters the authorization acquisition area before the authorization request module, when the authorization request module requests the authorization of the monitoring target, the target ID of the monitoring target is authorized, whether unauthorized persons exist in the channel area is determined according to the authorization condition of the authorization ID of the monitoring target in the channel area, channel abnormity processing is carried out when the unauthorized persons exist in the channel area, cheating behaviors such as trailing or imposition are discovered in time, and the anti-cheating effect of the gate channel is improved.

Fig. 2 is a flowchart of another gate way anti-spoofing control method provided in an embodiment of the present application, which is an embodiment of the gate way anti-spoofing control method. Referring to fig. 2, the gate passage anti-spoofing control method includes:

s201: and carrying out image tracking on the monitored target entering the monitoring area based on the image information, determining the monitored target entering the authorized acquisition area, and distributing a target ID for the monitored target entering the authorized acquisition area.

The monitoring area comprises an authorization acquisition area in front of the authorization request module and a channel area corresponding to the gate channel.

The above embodiments can be referred to as a tracking method for the monitored target, and the description of the embodiment is omitted. In the present embodiment, a monitoring target entering the authorized acquisition area is determined according to the situation of image tracking, and a target ID is assigned to the monitoring target when the monitoring target enters the authorized acquisition area.

S202: and informing the authorization request module to acquire the authentication information.

Specifically, when a monitoring target in the authorization acquisition area is detected, an information acquisition notification is sent to the authorization request module to notify the authorization request module to acquire authentication information of an authorization request person, so as to verify the authorization request person waiting for identity verification in the authorization acquisition area.

And after receiving the information acquisition notice, the authorization request module acquires authentication information of personnel in front of the authorization request module. And after the authentication information is collected, matching the authentication information with the registration information in the database, and after the matching is successful, authorizing the authorization request personnel and generating the authorization information.

S203: and judging whether an authorization request cheating action exists or not. If so, go to step S204, otherwise go to step S205.

Specifically, in the process of acquiring and matching the authentication information by the authorization request module, whether authorization request cheating action exists is determined continuously according to the image tracking condition of the monitoring target in the authorization acquisition area. For example, it is determined whether or not there is interference with the acquisition of the authentication information based on the position of each monitoring target in the waiting area, or whether or not there is interference with the acquisition of the authentication information based on the posture motion of each detection target.

For example, taking the situation that the location of the monitoring target determines whether there is an authorization request spoofing as an example: determining whether the distance between each monitoring target relative to the monitoring target requesting authorization is smaller than a specified distance requirement or not according to the position of each monitoring target in the authorization acquisition area; if so, determining that an authorization request cheating action exists; otherwise, it is determined that there is no authorization request spoofing action. Specifically, in the process of acquiring the authentication information by the authorization request module, a monitoring target closest to the authorization request module in the authorization acquisition area is determined, the monitoring target is considered to be an authorization request person, the distance between other monitoring targets and the authorization request person is determined, when the distance is smaller than or equal to a specified distance requirement (for example, 20-30 cm), a monitoring target too close to the authorization request person is considered to exist, and the authorization request cheating action is determined to exist.

And when determining that the authorization request spoofing behavior exists, jumping to step S204, otherwise, continuously and dynamically monitoring whether the authorization request spoofing behavior exists until the authorization request personnel passes the verification and obtains the authorization, and jumping to step S205.

Taking the face acquisition module as an example of the authorization request module, when an authorization request person stands before the authorization request module to acquire faces, if the distance between the person behind the authorization request person and the authorization request person is too close, the authorization request module may acquire a plurality of faces to cause acquisition of wrong authentication information, and at this time, it may be considered that authorization request spoofing is performed. Meanwhile, when the authentication information is collected, the position of each monitoring target in the authorization acquisition area can be determined according to the image tracking condition, and the authorization request module can determine the position of an authorization request person in the collection face changing process according to the position of the monitoring target and the position mapping relation of the collection picture, or determine the authentication information of the authorization request person by combining the face size in the collection picture.

In other embodiments, whether the authorization request spoofing action exists or not can be judged according to the action posture of each monitoring target in the screen information. For example, whether the authorization request personnel has the action of blocking the face or not is detected, and the situation that monitoring targets other than the authorization request personnel are close to the authorization request module is detected.

S204: and performing authorization exception processing.

Specifically, if the authorization request spoofing action exists, authorization exception processing is performed. The authorization exception processing comprises informing the gate to close a channel, prompting and alarming by field voice, sound and light, images and the like, the authorization exception processing mode can be specifically determined according to the conditions of field hardware equipment, authorization exception alarm information can be generated, and the authorization exception alarm information is stored in a background for management personnel to process.

Further, after determining that the authorization request cheating action exists and performing authorization exception processing, ending the gate channel cheating prevention control process.

S205: and authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

Illustratively, if the authorization request cheating action does not exist, authorizing the target ID of the monitoring target in the authorization acquisition area according to the authorization information of the authorization personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

Specifically, after the authorization request module collects the authentication information and matches the authentication information with the corresponding registration information, the authorization request module generates authorization information, and the gate channel anti-spoofing control device authorizes the target ID of the monitoring target (for example, the monitoring target closest to the authorization request module) sending the authorization request in the authorization acquisition area according to the authorization information. The authorization method for the target ID may be recording in a form of a table, a linked list, and a pointer, or recording in a form of a tag, which is not limited in this embodiment. If the collected authentication information is not successfully matched with the registration information, the process jumps to step S204 to perform authorization exception processing or the process jumps to step S202 to notify the authorization request module to perform authentication information collection.

Further, after the target ID of the monitoring target is authorized, a channel opening instruction is sent to the gate machine to inform the gate machine to allow opening of the target ID.

S206: and judging whether an unauthorized target ID exists in the channel area.

Illustratively, a target ID of each monitoring target in the channel region is determined, and it is determined whether an unauthorized target ID exists within the channel region. Specifically, monitoring targets entering the passage area is continuously performed, a target ID of each monitoring target in the passage area is determined, the authorization condition of each target ID is continuously checked, and whether unauthorized target IDs exist is judged. If an unauthorized target ID exists in the tunnel region, go to step S207, otherwise go to step 208.

S207: and performing channel exception processing.

Specifically, if an unauthorized target ID exists in the channel region, channel indication information indicating that an unauthorized person exists in the channel region is output, and channel exception handling is performed. The channel exception handling may refer to the way of handling the channel exception in the foregoing embodiment, and is not described in detail in this embodiment.

Further, after the channel exception processing is carried out, the gate channel anti-cheating control process is finished.

S208: and judging whether the monitoring target corresponding to the authorized target ID leaves the channel area. If so, the anti-spoofing process of the authorized target ID is ended, otherwise, the process returns to step S206.

For example, if the unauthorized target ID does not exist in the tunnel region, it is continuously determined whether the unauthorized target ID exists in the tunnel region until the unauthorized target ID exists in the tunnel region or the monitoring target leaves the tunnel region.

Specifically, when the unauthorized target ID is not detected in the channel area, whether the monitoring target corresponding to the authorized target ID leaves the channel area or not is continuously judged according to the image tracking result, when the target ID leaves the channel area, the corresponding authorized person is considered to pass through the gate successfully, and the anti-cheating flow of the authorized target ID is ended.

If the monitoring target corresponding to the authorized target ID is still in the channel region, the process returns to step S206 to continuously and dynamically determine the authorization condition of the target ID in the channel region.

The monitoring target starts to be subjected to image tracking and is allocated with the target ID when the monitoring target enters the authorization acquisition area before the authorization request module, when the authorization request module requests the authorization of the monitoring target, the target ID of the monitoring target is authorized, whether unauthorized persons exist in the channel area is determined according to the authorization condition of the authorization ID of the monitoring target in the channel area, channel abnormity processing is carried out when the unauthorized persons exist in the channel area, cheating behaviors such as trailing or imposition are discovered in time, and the anti-cheating effect of the gate channel is improved. Meanwhile, the authorization condition of the target ID is continuously verified in the whole structure that the authorized personnel pass through the gate channel, the condition that the authorization request module is followed or impossibly replaced after verification is carried out is reduced, and when the authorization request module collects authentication information, whether authorization request cheating behaviors exist or not is reduced, the condition that impossibly replacement is verified is reduced, and the anti-cheating effect of the gate on the channel is improved.

Fig. 3 is a flowchart of another gate way anti-spoofing control method provided in an embodiment of the present application, which is an embodiment of the gate way anti-spoofing control method. Referring to fig. 3, the gate passage anti-spoofing control method includes:

s301: and carrying out image tracking on a monitoring target entering a monitoring area based on the image information, and allocating a target ID to the monitoring target, wherein the monitoring area comprises an authorization acquisition area in front of the authorization request module and a channel area corresponding to a gate channel.

S302: the monitoring target in the image information is identified, and the characteristic information of each monitoring target is obtained.

For example, a plurality of cameras are installed in the field, and the cameras may be one or more sets of image acquisition devices arranged around the gate, and the sets of image acquisition devices may be composed of one or more sets of image acquisition and processing equipment, and the image acquisition and processing equipment may be in the same integrated module or may be physically separated and arranged on different modules.

Further, after the monitoring target in each image information is recognized, the feature information of each monitoring target is confirmed. The characteristic information may be one or more of the combination of target body type (such as head type, hair style, shoulder width, etc.), clothing, carrying object, gait, walking pace, time stamp, etc. The feature information may be obtained based on an existing target detection technology, such as a neural network based on deep learning, a Scale-invariant feature transform (SIFT) algorithm, and the like, which is not limited in this embodiment.

S303: and performing target information matching on the plurality of image information based on the characteristic information to confirm the same monitoring target in different image information.

In the present embodiment, different imaging devices capture images of different monitoring ranges, and adjacent monitoring ranges have a characteristic docking area through which a monitoring target passes when moving from one monitoring range to another.

The overlapping area exists, so that the image information generated by the image pickup device is shot by the image pickup device.

Illustratively, according to the characteristic information of each detection target, the monitoring targets of the two image information in the characteristic butt joint area are subjected to target information matching, so that the same monitoring target in different image information is confirmed, and the condition that the monitoring target is lost or misplaced when the monitoring target passes through gate channels with different lengths is ensured.

The monitoring target information matching can match two pieces of characteristic information, when the number of the matched characteristic information reaches a preset matching number requirement, the two corresponding monitoring targets are considered to be the same person, the monitoring targets correspond to the same target ID in different image information, and the target IDs of the monitoring targets are kept unchanged when the monitoring targets move from one monitoring range to another monitoring range.

Specifically, the target information matching is performed on the plurality of image information based on the feature information to confirm the same monitoring target in different image information, and specifically includes steps S3031 to S3033:

s3031: determining a feature docking area of the plurality of image information, the feature docking area comprising an overlapping area and/or a non-overlapping area.

Wherein the feature docking area comprises an overlapping area and/or a non-overlapping area. An overlapping region is understood to be a region in which the views of adjacent monitoring areas are identical or overlap, the image information corresponding to both monitoring areas appearing simultaneously in the overlapping region during the movement of the monitoring object from one monitoring area to the other and passing through the overlapping region. The non-overlapping region is understood to be a non-overlapping transition region between adjacent monitoring ranges, and when a monitoring target moves from one monitoring range to another monitoring range and passes through the non-overlapping region, the monitoring target does not appear in the image information corresponding to the two monitoring ranges, that is, the monitoring target will disappear from the previous image information in the direction of the non-overlapping region and will appear from the non-overlapping region to the next image information.

Specifically, a characteristic docking area between image information captured by a plurality of different image capturing devices is determined and the type of the characteristic docking area is determined. It is understood that one image information may correspond to a plurality of feature docking areas.

Alternatively, the determination of the overlapping area and/or the non-overlapping area may be automatically or manually determined according to the installation position, the installation angle, and the monitoring range of the image pickup device. For example, the overlap area is determined by defining a feature butt area based on image information captured by each imaging device or by matching the overlap area by a feature point matching algorithm.

S3032: and estimating the moving position of the monitoring target according to the traffic pace based on the non-overlapping areas of the plurality of image information, and performing target information matching based on the moving position to confirm the same monitoring target in the non-overlapping areas by different image information.

Specifically, for the non-overlapping area of a plurality of image information adjacent to each other in the monitoring range, when the monitoring target enters the non-overlapping area, the target information matching cannot be performed on the two image information according to the characteristic information such as the body type, the clothing, the carried object, and the gait of the target. The time and the position of the monitoring target in the next image information after passing through the non-overlapping area can be estimated according to the passing pace and the position of the monitoring target in the previous image information, so that the same monitoring target of different image information in the non-overlapping area is confirmed, and the condition that the monitoring target is lost or misplaced when the monitoring target passes through the non-overlapping area is ensured not to occur. Optionally, the traffic pace of the monitoring target may be calculated according to the moving distance and the time stamp of the monitoring target in the image information.

S3033: and performing target information matching on the overlapping areas of the plurality of image information according to the characteristic information based on the overlapping areas of the plurality of image information to confirm the same monitoring target of different image information in the overlapping areas.

For example, for an overlapping area of a plurality of image information adjacent to each other in the monitoring range, since the monitoring target appears in the plurality of image information at the same time when the monitoring target enters the overlapping area, target information matching can be performed on the two image information according to the characteristic information of the target body type, clothing, carrying objects, gait, and the like.

Specifically, the matching of the target information to the overlapping area includes steps S30331 to S30332:

s30331: and based on the overlapping area of the plurality of image information, tracing the image information corresponding to the shooting visual angle according to the time stamp.

Specifically, before matching the target information in the overlapping area for the image information captured by different image capturing devices (taking two image information having the overlapping area as an example), the previous image information having the corresponding capturing angle of view to the capturing angle of the next image information (that is, the same or similar capturing angle of view) is traced back in reverse according to the timestamp, and the target information matching in the next step is performed based on the plurality of image information corresponding to the capturing angle of view.

It can be understood that the shooting angles of the same monitored target in the image information corresponding to the shooting angle are closer, and at the moment, the characteristic information of the monitored target in different image information is closer, so that the accuracy of target information matching is effectively improved.

It should be explained that the previous image information and the next image information in this embodiment are understood as image information obtained by two adjacent image capturing devices in the monitored area. Optionally, the time length corresponding to the reverse tracing of the image information corresponding to each camera is determined according to the installation position and the installation angle of the camera.

S30332: and performing target information matching on the plurality of image information according to the characteristic information of the plurality of image information corresponding to the shooting visual angles and based on the priority levels of the characteristic information so as to confirm the same monitoring target of different image information in the overlapping area.

Specifically, the characteristic information of each monitoring target in the plurality of image information corresponding to the shooting visual angle is acquired, and the plurality of characteristic information of two image information are matched between different image information. Specifically, when image information is matched, according to the priority levels of different pieces of feature information, the feature information of two pieces of image information is sequentially matched according to the sequence of the priority levels from high to low, when a target matching condition is met, the matching of the current set of image information target information is considered to be successful, the matching of the next set of feature information is carried out, otherwise, the matching of the current set of image information target information is considered to be failed, and the matching of the next set of feature information is carried out.

Further, after the monitoring targets in the plurality of image information are successfully matched, the same monitoring target matched in the plurality of image information shares the same target ID to confirm the same monitoring target in the overlapping area of different image information.

Optionally, the target matching condition may be to determine the number of types of feature information that needs to be successfully matched according to priority levels of different feature information, and it may be understood that the higher the priority level is, the fewer types of feature information that need to be successfully matched are. After the corresponding amount of feature information is successfully matched, the corresponding group of image information target information is considered to be successfully matched, and the next group of feature information can be matched.

For example, assuming that the priority levels of the target body type, the clothing, the carried object and the gait are sequentially reduced, after the target body type is successfully matched, the target information is considered to be successfully matched, and the matching of the next group of feature information can be performed; otherwise, continuing to match the clothing with the carried object, considering that the target information is successfully matched after the clothing and the carried object are successfully matched, and matching the next group of characteristic information; otherwise, continuing the matching of other characteristic information until all the characteristic information is matched.

S304: and authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

S305: and according to the authorization information of the authorization request module to a plurality of authorized personnel continuously, informing the gate to keep the channel open according to the system parameters.

Specifically, when the authorization request module continuously and successfully collects authentication information and successfully matches registration information to continuously generate authorization information for a plurality of authorized persons, the gate is informed to keep the channel open according to system parameters, and the channel passing efficiency is improved until channel abnormity or authorization abnormity occurs or the time from the nearest authorized target ID exceeds the channel opening time threshold.

S306: and judging whether the monitoring target of the unauthorized target ID exists in the passage area or not, and outputting passage indication information for indicating whether unauthorized people exist in the passage area or not.

S307: and if the monitoring target of the unauthorized target ID exists in the channel area, performing channel exception processing.

The monitoring target starts to be subjected to image tracking and is allocated with the target ID when the monitoring target enters the authorization acquisition area before the authorization request module, when the authorization request module requests the authorization of the monitoring target, the target ID of the monitoring target is authorized, whether unauthorized persons exist in the channel area is determined according to the authorization condition of the authorization ID of the monitoring target in the channel area, channel abnormity processing is carried out when the unauthorized persons exist in the channel area, cheating behaviors such as trailing or imposition are discovered in time, and the anti-cheating effect of the gate channel is improved. Meanwhile, the monitoring targets in the overlapping area are matched and exchanged, relay target tracking in the overlapping area is achieved, the condition that the targets are lost or misplaced is reduced, the image tracking effect of the monitoring targets is improved, the gate channels are continuously opened when target IDs are continuously and normally authorized, the passing efficiency of the channels is improved, and the use experience is optimized.

Fig. 4 is a schematic structural diagram of a gate passage anti-spoofing control device according to an embodiment of the present application. Referring to fig. 4, the gate passage anti-spoofing control device provided in the present embodiment includes a target tracking module 41, an ID authorization module 42, and a target monitoring module 43.

The target tracking module 41 is configured to perform image tracking on a monitored target entering a monitoring area based on image information, and allocate a target ID to the monitored target, where the monitoring area includes an authorization acquisition area in front of the authorization request module and a channel area corresponding to a gate channel; the ID authorization module 42 is used for authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module and informing the gate of allowing the target ID to be opened; and the object monitoring module 43 is configured to determine whether a monitoring object of an unauthorized object ID exists in the passage area, and output passage indication information indicating whether an unauthorized person exists in the passage area.

In a possible embodiment, the system may further include an exception handling module 44, configured to perform channel exception handling if there is a monitoring target with an unauthorized target ID in the channel region.

In a possible embodiment, the exception handling module 44 handles the channel exception condition, specifically includes notifying a gate to close a channel, prompting an alarm by a field voice, sound and light, or an image, and the like, and the channel exception handling mode may be specifically determined according to the condition of a hardware device on the field, and may further generate channel exception alarm information, and store the channel exception alarm information in a background for a manager to handle.

The monitoring target starts to be subjected to image tracking and is allocated with the target ID when the monitoring target enters the authorization acquisition area before the authorization request module, when the authorization request module requests the authorization of the monitoring target, the target ID of the monitoring target is authorized, whether unauthorized persons exist in the channel area is determined according to the authorization condition of the authorization ID of the monitoring target in the channel area, channel abnormity processing is carried out when the unauthorized persons exist in the channel area, cheating behaviors such as trailing or imposition are discovered in time, and the anti-cheating effect of the gate channel is improved.

In a possible embodiment, the target tracking module 41 is specifically configured to: and carrying out image tracking on the monitored target entering the monitoring area based on the image information, determining the monitored target entering the authorized acquisition area, and distributing a target ID for the monitored target entering the authorized acquisition area.

In a possible embodiment, the ID authorization module 42 is specifically configured to:

informing an authorization request module to acquire authentication information;

determining whether an authorization request cheating action exists according to the image tracking condition of the monitoring target in the authorization acquisition area;

if the authorization request cheating action exists, performing authorization exception processing;

if the authorization request cheating action does not exist, authorizing the target ID of the monitoring target in the authorization acquisition area according to the authorization information of the authorization personnel by the authorization request module, and informing the gate to allow the target ID to be opened.

In a possible embodiment, when determining whether there is an authorization request spoofing action according to the image tracking condition of the monitoring target in the authorization acquisition area, the ID authorization module 42 specifically includes:

determining whether the distance between each monitoring target relative to the monitoring target requesting authorization is smaller than a specified distance requirement or not according to the position of each monitoring target in the authorization acquisition area;

if so, determining that an authorization request cheating action exists; otherwise, it is determined that there is no authorization request spoofing action.

In a possible embodiment, the target monitoring module 43 is specifically configured to:

determining a target ID of each monitoring target in the channel area, and judging whether an unauthorized target ID exists in the channel area;

if an unauthorized target ID exists in the channel area, channel indication information indicating that unauthorized persons exist in the channel area is output;

if the unauthorized target ID does not exist in the channel area, continuously judging whether the unauthorized target ID exists in the channel area or not until the unauthorized target ID exists in the channel area or the monitoring target leaves the channel area.

In a possible embodiment, the apparatus further includes an overlapped target matching module, configured to identify a monitored target in the plurality of image information, and obtain feature information of each monitored target;

and performing target information matching on the plurality of image information based on the characteristic information to confirm the same monitoring target in different image information.

In a possible embodiment, when the overlapping target matching module performs target information matching on a plurality of image information based on the feature information to identify the same monitoring target in different image information, the overlapping target matching module specifically includes:

determining feature docking areas of a plurality of image information, the feature docking areas including overlapping areas and/or non-overlapping areas;

estimating the moving position of the monitoring target according to the traffic pace based on the non-overlapping areas of the plurality of image information, and performing target information matching based on the moving position to confirm the same monitoring target in the non-overlapping areas of different image information;

and performing target information matching on the overlapping areas of the plurality of image information according to the characteristic information based on the overlapping areas of the plurality of image information to confirm the same monitoring target of different image information in the overlapping areas.

In a possible embodiment, when the overlapping target matching module performs target information matching on the overlapping regions of the multiple pieces of image information according to the feature information based on the overlapping regions of the multiple pieces of image information to confirm the same monitoring target in the overlapping regions of different pieces of image information, the method specifically includes:

based on the overlapping area of the image information, tracing the image information corresponding to the shooting visual angle according to the time stamp;

and performing target information matching on the plurality of image information according to the characteristic information of the plurality of image information corresponding to the shooting visual angles and based on the priority levels of the characteristic information so as to confirm the same monitoring target of different image information in the overlapping area.

In a possible embodiment, the ID authorization module 42, after authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization request module and notifying the gate to allow the gate to be turned on for the target ID, further includes: and according to the authorization information of the authorization request module to a plurality of authorized personnel continuously, informing the gate to keep the channel open according to the system parameters.

Fig. 5 is a block diagram of a gate passage anti-spoofing control system according to an embodiment of the present disclosure. Referring to fig. 5, the gate passage anti-spoofing control system provided in the present embodiment includes a background information processing module 51, an image tracking module 52, an authorization request module 53, and a gate control module 54.

The image tracking module 52 is configured to perform image tracking on a monitoring target entering the monitoring area based on the image information; the authorization request module 53 is configured to collect authentication information of authorization requesting personnel in the waiting area, and generate authorization information according to the authentication information; a background information processing module 51, configured to allocate a target ID to a monitored target entering a monitoring area, where the monitoring area includes an authorization obtaining area before the authorization request module 53 and a channel area corresponding to a gate channel; authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module 53, and informing the gate to allow the target ID to be opened; judging whether a monitoring target of an unauthorized target ID exists in the channel area or not, and outputting channel indication information for indicating whether an unauthorized person exists in the channel area or not; and the gate control module 54 is controlled by the background information processing module 51 to control the gate to open or close the channel.

As described above, by starting image tracking and assigning the target ID to the monitoring target in the authorization acquisition area before the monitoring target enters the authorization request module 53, when the authorization request module 53 requests authorization of the monitoring target, the target ID of the monitoring target is authorized, and whether unauthorized persons exist in the passage area is determined according to the authorization condition of the authorization ID of the monitoring target in the passage area, and when the unauthorized persons exist in the passage area, the background information processing module 51 can further perform passage exception processing, and when fraudulent behaviors such as trailing or imposition are discovered, the fraud prevention effect on the passage of the gate is improved.

The embodiment of the application also provides computer equipment which can integrate the gate channel anti-cheating control device provided by the embodiment of the application. Fig. 6 is a schematic structural diagram of a computer device according to an embodiment of the present application. Referring to fig. 6, the computer apparatus includes: an input device 63, an output device 64, a memory 62, and one or more processors 61; the memory 62 for storing one or more programs; when the one or more programs are executed by the one or more processors 61, the one or more processors 61 are caused to implement the gate passage anti-spoofing control method provided in the above-described embodiment. Wherein the input device 63, the output device 64, the memory 62 and the processor 61 may be connected by a bus or other means, as exemplified by the bus connection in fig. 6.

The memory 62 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the gate way anti-spoofing control method according to any embodiment of the present application (for example, the target tracking module 61, the ID authorization module 62, the target monitoring module 63, and the exception handling module 64 in the gate way anti-spoofing control device). The memory 62 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory 62 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 62 may further include memory located remotely from the processor 61, which may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.

The input device 63 is operable to receive input numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 64 may include a display device such as a display screen.

The processor 61 executes various functional applications and data processing of the device by executing software programs, instructions and modules stored in the memory 62, that is, implements the above-described gate channel anti-spoofing control method.

The gate channel anti-cheating control device, the gate channel anti-cheating control system and the gate channel anti-cheating control computer can be used for executing the gate channel anti-cheating control method provided by any embodiment and have corresponding functions and beneficial effects.

Embodiments of the present application further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the gate way anti-spoofing control method provided in the above embodiments, the gate way anti-spoofing control method including: carrying out image tracking on a monitoring target entering a monitoring area based on image information, and allocating a target ID to the monitoring target, wherein the monitoring area comprises an authorization acquisition area in front of an authorization request module and a channel area corresponding to a gate channel; authorizing the target ID of the monitoring target in the authorized acquisition area according to the authorization information of the authorized personnel by the authorization request module, and informing the gate to allow the target ID to be opened; and judging whether the monitoring target of the unauthorized target ID exists in the passage area or not, and outputting passage indication information for indicating whether unauthorized people exist in the passage area or not.

Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.

Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the above-mentioned gate way anti-spoofing control method, and may also perform related operations in the gate way anti-spoofing control method provided in any embodiments of the present application.

The apparatus, the system, the computer device and the storage medium for controlling anti-spoofing of a gate channel provided in the foregoing embodiments may execute the method for controlling anti-spoofing of a gate channel provided in any embodiment of the present application, and reference may be made to the method for controlling anti-spoofing of a gate channel provided in any embodiment of the present application without detailed technical details described in the foregoing embodiments.

The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

23页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种比赛投票方法、装置、计算机设备和存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!