KR-20260065174-A - Access Management System Capable of Performing Security Management for Visitors in a Downtown Building and Security Management Method thereof
Abstract
An access control system and a security management method capable of performing security management for visitors within an urban building are disclosed. The access control system of the present invention utilizes an access control terminal and a camera, such as a CCTV, installed within an urban building to repeatedly perform instant walk-through facial authentication on numerous one-time visitors, thereby enabling access control without requiring cooperative actions from visitors and performing security management that sanctions actions such as entering a security zone that does not match the security level.
Inventors
- 백영현
- 신요식
Assignees
- 주식회사 유니온바이오메트릭스
Dates
- Publication Date
- 20260508
- Application Date
- 20241101
Claims (5)
- In a method for tracking and managing visitor movement paths in downtown buildings, A setting step of registering an access control terminal as a local terminal, which performs an 'access control mode' installed on the outside of the entrance door of an individual space within a city building, which performs facial authentication of an entrant using a camera when there is operation or approach by an entrant, and opens or closes the entrance door according to the facial authentication result, and setting the shooting area of the said camera as a local surveillance area; A shooting step in which the local terminal operates in 'security mode' without any operation or request from an entrant, photographs the local monitoring area at a preset interval to generate an image, and uploads at least one face image to a management server by cropping out the face portion of at least one visitor captured in the image; A face authentication step in which the management server compares at least one face image uploaded by the local terminal with a registrant in the registrant information list and assigns a target identification number of at least one visitor; A security authentication step in which the management server verifies the security level of the visitor who has successfully authenticated and determines whether it corresponds to the security level of the local monitoring zone of the local terminal; and A security management method for an access control system characterized by including a response step in which the local terminal outputs a guidance message through an internal or external speaker to guide a visitor who does not correspond to the security level of the local monitoring area to leave the local monitoring area in response to a request from the management server.
- In paragraph 1, The above facial authentication step is, An identification number assignment step in which the management server assigns the subject identification number according to the face authentication result, assigning a registrant identification number to a face image that has successfully authenticated, setting a face image that has failed authentication as a monitored subject, and assigning a newly created monitored subject identification number; and A security management method for an access control system characterized by including a data generation step in which the management server generates history data including location information of the local terminal that performed the upload and the subject identification number, and matches the face images respectively and stores them in a data server.
- In paragraph 2, If the number of at least one visitor confirmed in the above face authentication step is the same as the number of at least one visitor confirmed in the previous authentication result, and the number of visitors who failed authentication in the above face authentication step is the same as the number of visitors who failed authentication in the previous authentication result, then the surveillance subject identification number designated in the previous authentication result is assigned to the visitors who failed authentication in the above face authentication step. A security management method for an access control system characterized in that the aforementioned immediate authentication result is the result of a face authentication step for at least one face image uploaded immediately by the local terminal.
- In paragraph 3, If the number of at least one visitor confirmed in the above event management step is the same as the number of visitors in the above previous authentication result and there is no monitored person in the above previous authentication result, a missing person identification number is assigned to the visitor who failed authentication in the above event management step, A security management method for an access control system characterized in that the above missing person identification number is the registrant identification number of a visitor who is not confirmed in the event management step as a visitor authenticated in the above-mentioned previous authentication result.
- In the access control system of a downtown building, A local terminal installed on the exterior of the entrance door of an individual space within a city building, which performs an 'access control mode' by using a camera to perform facial authentication of the visitor when there is operation or access by the visitor and opening or closing the entrance door according to the facial authentication result, and operates in a 'security mode' when there is no operation or request by the visitor, wherein during the security mode, the camera captures the local surveillance area at a preset interval to generate an image, and uploads at least one facial image to a management server by cropping the face portion of at least one visitor captured in the image; The management server includes at least one face image provided by the local terminal, which performs face authentication to identify the visitor by comparing it with a registrant in a list of registrant information, and identifies the security level of the visitor who has succeeded in face authentication. An access control system characterized by the fact that if the above-mentioned visitor does not correspond to the security level of the above-mentioned local monitoring area, the above-mentioned local terminal outputs a guidance message to the above-mentioned visitor through an internal or external speaker in response to a request from the above-mentioned management server, instructing the visitor to leave the above-mentioned local monitoring area.
Description
Access Management System Capable of Performing Security Management for Visitors in a Downtown Building and Security Management Method thereof The present invention relates to an access control system for a building with a large number of one-time visitors, and in particular, to an access control system capable of performing security management that sanctions the act of entering a security zone with an unsuitable security level without requesting cooperative behavior for visitor authentication every time. The access control system for downtown buildings performs authentication for regular entrants or temporary registration for one-time visitors, and controls access and manages security by restricting accessible areas within the building according to security levels. Visitor access control in typical downtown buildings is performed through terminals installed at main entrances or key security areas within the building. These terminals perform authentication procedures using various authentication methods, including biometric authentication, to allow entry only to those with the appropriate security level. For one-time visitors, terminals that process visit registration through manual entry or facial recognition may be used. Regular entrants and visitors must authenticate via a terminal to access key security areas, preventing unauthorized entry into areas with incompatible security levels. The problem is that without this terminal, there is no way to verify and manage where entrants or visitors are and what they are doing after passing through the main entrance of a downtown building. In particular, tracking the activities of registered visitors is a critical security matter. While CCTVs installed within downtown buildings film key areas, administrators are limited to visually monitoring footage recorded on NVRs (Network Video Recorders) or DVRs (Digital Video Recorders). Consequently, managing visitor movement in downtown buildings with thousands of visitors is virtually impossible. Among the various authentication methods known in the past, biometric authentication is widely used. Fingerprint recognition, facial recognition, and iris recognition are frequently used for reasons such as their excellent personal identification capabilities, difficulty of duplication, and lack of risk of loss. User authentication using biometric recognition utilizes a method in which feature point data extracted from biometric information is pre-registered, and when authentication is required, newly acquired authentication feature point data is compared with the registered feature point data. If the authentication target is not identified, a 1:N comparison is performed by comparing the authentication data with all N registered data; if there is feature point data similar to a certain level or higher, authentication is successful, and if there is no matching or similar feature point data to a certain level or higher, authentication fails. FIG. 1 is a configuration diagram of an access control system for an urban building according to the present invention. FIG. 2 is a flowchart provided for explaining the visitor tracking method of the access control system of the present invention. FIG. 3 is a cross-sectional view illustrating an example of a visitor movement situation to explain a method for generating history data, FIG. 4 is a flowchart provided for explaining the visitor security management method, and FIG. 5 is a flowchart illustrating the method of processing registration information of a monitored person according to the present invention. The present invention will be described in detail below with reference to the drawings. Referring to FIG. 1, the access control system (100) of the present invention includes a registration terminal (110), a plurality of local terminals (130), a management server (150), a data server (170), and a network (10) connecting them, and is installed in an urban building to manage visitors. A visitor refers to a person who temporarily visits a downtown building. The access control system (100) of the present invention performs access control for both visitors and regular entrants, but since the present invention relates to the access control of temporary visitors, the following description specifically explains visitor access control and omits the explanation of the method for managing regular entrants. The network (10) may be at least one selected from wired and wireless interfaces, and may be any of the various types of communication interfaces known in the past. The registration terminal (110) is equipped with a camera (110a) to acquire a face image of a visitor, extracts feature point data from the face image to generate 'visitor registration information', and performs visitor registration by providing it to the management server (150). The visitor registration information may include the purpose of the visit, the time of the visit, contact information (phone number), etc. The visitor regis