scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2019"


Journal ArticleDOI
TL;DR: The outcomes show better performance by the proposed system in terms of resource efficiency, agility, and scalability over the traditional IoT surveillance systems and state-of-the-art (SoA) approaches.
Abstract: In this paper, we design and implement a distributed Internet of Things (IoT) framework called IoT-guard, for an intelligent, resource-efficient, and real-time security management system. The system, consisting of edge-fog computational layers, will aid in crime prevention and predict crime events in a smart home environment (SHE). The IoT-guard will detect and confirm crime events in real-time, using Artificial Intelligence (AI) and an event-driven approach to send crime data to protective services and police units enabling immediate action while conserving resources, such as energy, bandwidth (BW), and memory and Central Processing Unit (CPU) usage. In this study, we implement an IoT-guard laboratory testbed prototype and perform evaluations on its efficiency for real-time security application. The outcomes show better performance by the proposed system in terms of resource efficiency, agility, and scalability over the traditional IoT surveillance systems and state-of-the-art (SoA) approaches.

47 citations


Journal ArticleDOI
01 Jan 2019
TL;DR: In this article, the authors argue that Europe's data protection laws must evolve to guard against pervasive inferential analytics in nascent digital technologies such as edge computing, and propose a data protection framework for edge computing.
Abstract: Europe’s data protection laws must evolve to guard against pervasive inferential analytics in nascent digital technologies such as edge computing.

40 citations


Journal ArticleDOI
TL;DR: The notion that politeness is a crucial determinant of people's perception of peacekeeping robots is advanced, with strong effects of the guard's politeness shown.
Abstract: The “intuitive” trust people feel when encountering robots in public spaces is a key determinant of their willingness to cooperate with these robots. We conducted four experiments to study this topic in the context of peacekeeping robots. Participants viewed scenarios, presented as static images or animations, involving a robot or a human guard performing an access-control task. The guards interacted more or less politely with younger and older male and female people. Our results show strong effects of the guard's politeness. The age and sex of the people interacting with the guard had no significant effect on participants' impressions of its attributes. There were no differences between responses to robot and human guards. This study advances the notion that politeness is a crucial determinant of people's perception of peacekeeping robots.

24 citations


Journal ArticleDOI
TL;DR: A stochastic optimization model that takes advantage of the total unimodularity property to find the solution in polynomial time is introduced and it is found that security and insurance are interdependent.
Abstract: As computing services are increasingly cloud-based, corporations are investing in cloud-based security measures The Security-as-a-Service (SECaaS) paradigm allows customers to outsource security to the cloud, through the payment of a subscription fee However, no security system is bulletproof, and even one successful attack can result in the loss of data and revenue worth millions of dollars To guard against this eventuality, customers may also purchase cyber insurance to receive recompense in the case of loss To achieve cost effectiveness, it is necessary to balance provisioning of security and insurance, even when future costs and risks are uncertain To this end, we introduce a stochastic optimization model to optimally provision security and insurance services in the cloud Since the model we design is a mixed integer problem, we also introduce a partial Lagrange multiplier algorithm that takes advantage of the total unimodularity property to find the solution in polynomial time We also apply sensitivity analysis to find the exact tolerance of decision variables to parameter changes We show the effectiveness of these techniques using numerical results based on real attack data to demonstrate a realistic testing environment, and find that security and insurance are interdependent

22 citations


Journal ArticleDOI
TL;DR: The results indicate that guard capacity is a viable option for improving session continuity that can be used by the network operators in combination with other techniques, such as multi-connectivity, to maintain user experience.
Abstract: Dynamic blockage of millimeter-wave (mmWave) radio propagation paths by dense moving crowds calls for advanced techniques to preserve session continuity in the emerging New Radio (NR) systems. To further improve user performance by balancing the new and ongoing session drop probabilities, we investigate the concept of guard capacity – reserving a fraction of radio resources at the NR base stations exclusively for the sessions already accepted for service. To this aim, we develop a detailed mathematical framework that takes into account the key effects in mmWave systems, including the heights of communicating entities, blocker geometry and mobility, modulation and coding schemes and antenna array geometry, as well as radio propagation and queuing specifics. Using our framework, which enables sessions to change their resource requirements during service, we demonstrate that reserving even a small fraction of bandwidth (less than $10\%$ ) exclusively for the sessions already accepted by the system allows to enhance session continuity at the expense of a slight growth in the new session drop probability as well as a small decrease in the resource utilization (approximately $5\hbox{--}7\%$ ). Furthermore, guard capacity is shown to perform better in overloaded conditions and with sessions having high data rate requirements, thus making it particularly useful for the NR systems. Our results indicate that guard capacity is a viable option for improving session continuity that can be used by the network operators in combination with other techniques, such as multi-connectivity, to maintain user experience.

21 citations


Book ChapterDOI
22 May 2019
TL;DR: In this paper, the authors discuss four different options for entering the guide wheels to the guard rail bends: when driving along a straight path of railroad switches with a straight or curved frog, the rolling stock has a free arrangement in a track; the flanges of its wheelsets either fall into the guardrail gutter without hitting the bends, or run into the bend at any point in it; when moving against the direction and along the direction when leaving the frog curve of the same direction with the railroad switch curve, the front axle of each bogie runs along the outer wheel
Abstract: The article discusses four different options for entering the guide wheels to the guard rail bends: when driving along a straight path of railroad switches with a straight or curved frog, the rolling stock has a free arrangement in a track; the flanges of its wheelsets either fall into the guard rail gutter without hitting the bends, or run into the bend at any point in it; when moving against the direction and along the direction when leaving the frog curve of the same direction with the railroad switch curve, the front axle of each bogie runs along the outer wheel flange onto the outer rail; the rear axle, depending on the insertion mode, is either pressed against the inner rail, or occupies an intermediate position, or pressed against the outer rail; in case of a directly movement from a straight path to a curved frog, the rolling stock is in a track in a free position and a impact is possible either in the working face of the core, or in the guard track bend; when directly entering the railroad switch with a curve, the reverse railroad switch impact with the front axles of the rolling stocks or bogies will occur in the check rails, the wheels of the rear axles can hit the bends of the guard rails. In all variants of the impact on the bends of guard rails when moving on the side track, they are determined by the number of strokes, the mass participating in the impact, the angle of impact, as well as the amount of transverse displacement of the rolling stock when hitting a guard rail, characterizing the work extinguished by the guard rail, and the smoothness of movement in the frog zone, methods calculating the determination of the length of the straight bends of the guard rails with straight frogs, determining the length of the rectilinear bends of the guard rails with curved frogs, determining the length of the curved bends to guard rails having a constant angle of inclination to the roadway with curvilinear frogs. Guard rails of the sideways of railroad switches take significantly greater impacts than guard rails of the forward direction. The only way to reduce the impact on these bends is to reduce the impact angles and collisions. For railroad switches with curved frogs, as well as for railroad switches with straight grogs with a railroad switch curve extending to the guard rails zone, it is best to use guard rails with curved bends that have the smallest length and provide the most secure entry to the bend.

18 citations


Journal ArticleDOI
01 Oct 2019
TL;DR: This work rigorously defines and analyzes the guard placement attack, and proposes and evaluates a generic defense mechanism that provably defends any path selection algorithm against guard placement attacks.
Abstract: Abstract The popularity of Tor has made it an attractive target for a variety of deanonymization and fingerprinting attacks. Location-based path selection algorithms have been proposed as a countermeasure to defend against such attacks. However, adversaries can exploit the location-awareness of these algorithms by strategically placing relays in locations that increase their chances of being selected as a client’s guard. Being chosen as a guard facilitates website fingerprinting and traffic correlation attacks over extended time periods. In this work, we rigorously define and analyze the guard placement attack. We present novel guard placement attacks and show that three state-of-the-art path selection algorithms—Counter-RAPTOR, DeNASA, and LASTor—are vulnerable to these attacks, overcoming defenses considered by all three systems. For instance, in one attack, we show that an adversary contributing only 0.216% of Tor’s total bandwidth can attain an average selection probability of 18.22%, 84× higher than what it would be under Tor currently. Our findings indicate that existing location-based path selection algorithms allow guards to achieve disproportionately high selection probabilities relative to the cost required to run the guard. Finally, we propose and evaluate a generic defense mechanism that provably defends any path selection algorithm against guard placement attacks. We run our defense mechanism on each of the three path selection algorithms, and find that our mechanism significantly enhances the security of these algorithms against guard placement attacks with only minimal impact to the goals or performance of the original algorithms.

15 citations


Journal ArticleDOI
01 Apr 2019
TL;DR: A novel means to quantify privacy leakage in guard selection algorithms using the metric of Max-Divergence is identified and a Monte-Carlo sampling-based method for stochastic optimization can be used to improve multi-dimensional trade-offs between security, privacy, and performance.
Abstract: Abstract Recent work has shown that Tor is vulnerable to attacks that manipulate inter-domain routing to compromise user privacy. Proposed solutions such as Counter-RAPTOR [29] attempt to ameliorate this issue by favoring Tor entry relays that have high resilience to these attacks. However, because these defenses bias Tor path selection on the identity of the client, they invariably leak probabilistic information about client identities. In this work, we make the following contributions. First, we identify a novel means to quantify privacy leakage in guard selection algorithms using the metric of Max-Divergence. Max-Divergence ensures that probabilistic privacy loss is within strict bounds while also providing composability over time. Second, we utilize Max-Divergence and multiple notions of entropy to understand privacy loss in the worst-case for Counter-RAPTOR. Our worst-case analysis provides a fresh perspective to the field, as prior work such as Counter-RAPTOR only analyzed average case-privacy loss. Third, we propose modifications to Counter-RAPTOR that incorporate worst-case Max-Divergence in its design. Specifically, we utilize the exponential mechanism (a mechanism for differential privacy) to guarantee a worst-case bound on Max-Divergence/privacy loss. For the quality function used in the exponential mechanism, we show that a Monte-Carlo sampling-based method for stochastic optimization can be used to improve multi-dimensional trade-offs between security, privacy, and performance. Finally, we demonstrate that compared to Counter-RAPTOR, our approach achieves an 83% decrease in Max-Divergence after one guard selection and a 245% increase in worst-case Shannon entropy after 5 guard selections. Notably, experimental evaluations using the Shadow emulator shows that our approach provides these privacy benefits with minimal impact on system performance.

13 citations


Journal ArticleDOI
TL;DR: Europe’s data protection laws must evolve to guard against pervasive inferential analytics in nascent digital technologies such as edge computing, according to the European Court of Justice.
Abstract: Europe’s data protection laws must evolve to guard against pervasive inferential analytics in nascent digital technologies such as edge computing.

12 citations


Journal ArticleDOI
TL;DR: A novel countermeasure called SYN‐Guard is proposed to detect and prevent SYN flooding in SDN networks and when compared with standard SDN and state‐of‐art proposals, it reduces the average response time up to 21% during an ongoing SYn flooding attack.

11 citations


Journal ArticleDOI
TL;DR: A novel parallelization technique that consists in splitting the simulation domain into several processor sub-domains, with guard regions appended at each sub-domain boundaries, and a 'hybrid' technique that offers a $\times 3$ speed-up and memory savings compared to the 'local' one.

Journal ArticleDOI
TL;DR: In this paper, a comparative analysis of DL courses of educational platforms with border guard components in the EU countries, which showed that the platform with the biggest number of border guard-oriented courses is Virtual Aula platform of FRONTEX Agency.
Abstract: The research reveals the peculiarities of the Distance Learning (DL) development in the framework of border guards training in the European Union (EU) countries. Theoretical and practical concepts, modern stage and peculiarities of border guards’ DL development were substantiated in the article. The special attention was paid to possibilities of educational web platforms, which are widely utilized in the training of personnel of the border guard agencies, namely: Web Platform Virtual Aula of the FRONTEX Agency; E-Net Web Platform of the CEPOL (The European Police College); EU Coast Guard Functions Training Portal (CGFTP); ILIAS Learning Platform of the EU Mission EUBAM (EU Border Assistance Mission to Moldova and Ukraine); Connect & Learn platform of the UNHCR (The Office of the United Nations High Commissioner for Refugees); Global eLearning Program of the UNODC (United Nations Office on Drugs and Crime). The authors have also conducted the comparative analysis of DL courses of educational platforms with border guard components in the EU countries, which showed that the platform with the biggest number of border guard-oriented courses is Virtual Aula platform of FRONTEX Agency. Suggestions and proposals on DL development and prospective directions based on the experience gained during DL introduction into the system of the border guards’ training system supported by the survey results are given in the conclusion of this article in order to facilitate the improvement of border guards’ DL systems in the EU countries. The prospects of the border guards’ DL system development are based on 5 key factors: aligning all DL training courses to the Sectoral Qualification Framework and Common Core Curricular for border guarding: unification of the skills and knowledge of European border guards; enhanced use of the Internet and social media; introduction of common educational web-platforms; organizing specialized training for the specialists in DL use and management, and developing common eLearning tools and programs.

Patent
Christoph Horst Krah1
04 Apr 2019
TL;DR: In this paper, a touch and/or proximity detection system having some components operating in the guard domain and other components operating on the ground or chassis ground domain is discussed, where the guard signal can be coupled to one or more shielding electrodes of a touch screen and to the ground pin of one of the touch sensing chips of the system.
Abstract: The disclosure relates to a touch and/or proximity detection system having some components operating in the guard domain and other components operating in the earth or chassis ground domain. A guard chip in the earth or chassis ground domain can include a voltage driver configured to produce a guard signal, for example. In some examples, the guard signal can be coupled to one or more shielding electrodes of a touch screen and to the ground pin of one or more touch sensing chips of the touch and/or proximity detection system. In this way, for example, the touch sensing chips, which can include sense amplifiers coupled to one or more sensing electrodes of the touch screen, can operate in the guard domain. In some examples, the guard chip can further include differential amplifiers and/or ADCs, allowing these components to operate in the earth or chassis ground domain.

Journal ArticleDOI
29 Mar 2019
TL;DR: This research produces a prototypes of door security control devices versatile based IoT RFID and Bluetooth, at a cost cheap, economical, and effective to use.
Abstract: Door security system wherever needed, because to protect the parts that are stored, whether in housing, warehousing, offices, or in the industrial world. Security system currently developing digitally based is by using the Internet of Things (IoT) system. Microcontrollers, HC05 Bluetooth modules and RFID modules based IoT make it possible to be a door guard. The current problem is that even though the door is locked, it still occurs theft, and assume that the cost of making security is too expensive. Solution to the problem it is making RFID and Bluetooth-based door security control prototypes with the IoT system. The purpose of this study is to make a prototype of door security control devices based RFID and Bluetooth with an IoT system. For access to the door using an ID card and Smartphone. The method used is laboratory experiments. This research produces a prototypes of door security control devices versatile based IoT RFID and Bluetooth, at a cost cheap, economical, and effective to use. Keywords: Arduino, HC05, RFID, Servo Motor, LCD

Journal ArticleDOI
TL;DR: In this paper, the authors present the results of a research aimed at analysing the level of interoperability of Ukrainian border guards, which stands for their level of professional readiness for joint actions with representatives of foreign border guard authorities.
Abstract: The paper reports on an innovative approach to evaluate the level of harmonisation of Ukrainian border guards training with the common standards for border guarding in the European Union (EU) member-states. There are different types of borders and different organisational structures in border guard agencies in the EU. The authors present the results of a research aimed at analysing the level of interoperability of Ukrainian border guards. In case of border guards’ training, interoperability stands for their level of professional readiness for joint actions with representatives of foreign border guard authorities. For this purpose, the EU border guard agencies under the supervision of the European Border and Coast Guard Agency (Frontex Agency) introduced the Interoperability Assessment Program (IAP), as the means to assess, first of all, the level of integration of the Common Core Curriculum (CCC) for basic border guards’ training into border guard authorities’ national curricula. The programme’s results provide information on the degree to which the CCC meets the requirements regarding its content. The overall CCC implementation at the NASBGSU was 77.5%, namely: by modules (General Studies – 95%; Land Border Module – 75%; Air Border Module – 81%; Sea Border Module – 58,6%); by content (General studies – 96%; Legislation – 73,9%; Practice – 80,8%). The results of the evaluation held at the National Academy of the State Border Guard Service of Ukraine named after Bohdan Khmelnytskyi, involving cadets of the Faculty of Foreign Languages and Humanities showed that Ukrainian border guards and their system of education and training are in line with the EU member-states’ common standards and the Ukrainian border guard agency personnel can be effectively used for the various operational and service activities of protecting different border sectors.

Journal ArticleDOI
TL;DR: After the national AIDS control program was launched, a sharp decline was observed in the STIs (especially of bacterial origin) as fallout.
Abstract: Sexually transmitted infections (STIs) are an important public health concern. STIs are associated with higher reproductive morbidity and also increase the risk of HIV transmission. STI prevention and control is deemed as one of the important prevention strategy for controlling HIV epidemic. After the national AIDS control program was launched, a sharp decline was observed in the STIs (especially of bacterial origin) as fallout.



Journal ArticleDOI
01 Apr 2019
TL;DR: The relevant knowledge of financial risk is expounded, the specific application of data mining in financial risk analysis is explained, and some ideas for the analysis and early warning of enterprise financial risk are provided.
Abstract: With the development of information technology, how to mine useful information from a large amount of information and effectively analyze and guard against financial risks has become an urgent problem for enterprises to solve. This paper briefly expounds the relevant knowledge of financial risk, explains the specific application of data mining in financial risk analysis, and provides some ideas for the analysis and early warning of enterprise financial risk.

Journal ArticleDOI
TL;DR: This paper presents a novel movement planning algorithm for a guard robot in an indoor environment, imitating the job of human security, and exploits the topological features of the environment to obtain a set of viewpoint candidates, and it is optimized by a cost-based set covering problem.
Abstract: This paper presents a novel movement planning algorithm for a guard robot in an indoor environment, imitating the job of human security. A movement planner is employed by the guard robot to continuously observe a certain person. This problem can be distinguished from the person following problem which continuously follows the object. Instead, the movement planner aims to reduce the movement and the energy while keeping the target person under its visibility. The proposed algorithm exploits the topological features of the environment to obtain a set of viewpoint candidates, and it is then optimized by a cost-based set covering problem. Both the robot and the target person are modeled using geodesic motion model which considers the environment shape. Subsequently, a particle model-based planner is employed, considering the chance constraints over the robot visibility, to choose an optimal action for the robot. Simulation results using 3D simulator and experiments on a real environment are provided to show the feasibility and effectiveness of our algorithm.

Patent
12 Nov 2019
TL;DR: In this article, a hotel safety management system and method based on artificial intelligence is presented, which includes a hotel reservation system, information collection system, a hotel management system, an intelligent entrance guard management control system, face detection recognition system, database storage system, and center sever; various systems are communicated with the center server; furthermore, the system further comprises a visitor management system.
Abstract: The invention discloses a hotel safety management system and method based on artificial intelligence. The safety management system at least comprises a hotel reservation system, an information collection system, a hotel management system, an intelligent entrance guard management control system, a face detection recognition system, a database storage system, and a center sever; various systems arecommunicated with the center server; furthermore, the system further comprises a visitor management system. The intelligent entrance guard is divided into public entrance guard systems at an elevator,the stair and like locations and a guest room entrance guard system; each of the public entrance guard systems and the guest room entrance guard system at least comprises a processing server and an embedded equipment terminal; the embedded equipment terminals are fixed beside the entrance guard and used for collecting the information and controlling the entrance guard to be on and off; and the processing servers are used for performing matching comparison recognition on a photo uploaded by the terminals. Through the method disclosed by the invention, the face information collection at the hotel entrance guard region and the intelligent video monitoring at the hotel public region are combined, and the method is aided by the visitor management system, thereby realizing the comprehensive artificial intelligence hotel safety management with high concealment.

Journal ArticleDOI
01 Jan 2019
TL;DR: In this article, the authors proposed a method to improve the quality of the data collected by the data collection system by using the information gathered from the data gathered by the user's friends.
Abstract: У статті обґрунтовується необхідність наукового розроблення окремого напряму – інформаційних відносин у діяльності Державної прикордонної служби України. Це пояснюється крізь призму розвитку сучасного інформаційного суспільства, в якому прогресивно зростає роль інформаційних відносин у зв’язку з розширенням прав громадян на отримання інформації шляхом подання звернення (запиту), збільшенням можливостей громадянського суспільства в контролі за органами публічної адміністрації, вдосконаленні сучасних електронних засобів в управлінні інформацією, посиленні захисту інформації, яка є важливою для окремих фізичних (юридичних) осіб, колективів, органів влади та держави. Крім таких загальних установок, актуальність дослідження зумовлена особливостями процесів, що відбуваються у сфері охорони державних кордонів, а саме: впровадженням нової системи охорони державного кордону на основі європейських практик, виникненням нових інформаційних загроз у прикордонній сфері. Саме тому та через відсутність комплексного дослідження теоретичних засад цих відносин є необхідність отримання нових знань про об’єкт дослідження, виявлення протиріч та формулювання шляхів розвитку (вдосконалення) інформаційних відносин у діяльності ДПСУ. У статті зазначено про значне зростання наукових досліджень як з інформаційних, так і прикордонних відносин, які дають змогу генерувати попередньо отримані знання (у вже наявних дослідженнях) на якісно нові закономірності розвитку інформаційних відносин у межах реалізації форм оперативно-службової діяльності ДПСУ. Проаналізовані наукові дослідження з інформаційної та прикордонної тематики дали змогу дійти висновку, що теоретична основа інформаційних відносин у діяльності ДПСУ зумовлена міжгалузевим характером широкого теоретичного масиву дослідження цих відносин у найкращих здобутках теорії інформаційного, адміністративного права та сукупності наукових досліджень, в яких розкриваються характерні особливості регулювання прикордонних відносин (правових, військових, технічних тощо). Що стосується об’єкта нашого дослідження, наукові розвідки мають стихійний і фрагментарний характер у цій сфері. Ключові слова: наукові дослідження, інформація, охорона державного кордону, інформаційні загрози, інформаційне суспільство, право на інформацію.

Journal ArticleDOI
TL;DR: The response performance and safety performance of the system are optimized and the response time is reduced, and the functions of user management, device management and unlocked control are realized.

Book ChapterDOI
03 Jul 2019
TL;DR: The aim of this paper is to provide an Expert System that is able to draw up the DPIA, and a prototype is shown.
Abstract: Starting from 25th May 2018, the EU Regulation 2016/679, known as GDPR (General Data Protection Regulation) - relating to the protection of individuals with regard to the processing and free circulation of personal data - is directly applicable in all Member States. The application of the GDPR caught a lot of companies and institutions unprepared and off guard. One of the most complex activities that the GDPR requires is the Data Protection Impact Assessment (DPIA). The aim of this paper is to provide an Expert System that is able to draw up the DPIA, and a prototype is shown.



Journal ArticleDOI
TL;DR: The research results in this paper can provide a guidance for the selection and key parameters design of the baffle of bird guard.
Abstract: Bird activities including the defecation, nesting, and flight are easy to cause electrical faults of overhead transmission lines, study on the prevention measures of bird damage to transmission lines is of great significance to ensure the stable and reliable operation of the power system. With the establishment of finite element simulation model, the effects of box of bird guard with different material on the electric field and potential distribution on transmission line insulators are studied. Besides, combined with the theory of air discharge and the results of simulation, the influence of rainwater on the air gap around the insulator breakdown characteristics is studied when the water is drained from a scupper at the bottom of the box of bird guard, and a reasonable design scheme for the box of bird guard scupper is proposed. The research results here can provide a guidance for the selection and key parameters’ design of the box of bird guard.

Patent
04 Jul 2019
TL;DR: In this paper, the authors present methods, devices, and aerial robotic vehicles for adjusting a proximity threshold implemented in a collision avoidance system based on whether a propeller guard is installed.
Abstract: Various embodiments include methods, devices, and aerial robotic vehicles for adjusting a proximity threshold implemented in a collision avoidance system based on whether propeller guards are installed. Methods may include an aerial robotic vehicle processor determining whether a propeller guard is installed, setting, a proximity threshold for collision avoidance based on the determination as to whether propeller guard(s) is/are installed on the aerial robotic vehicle, and controlling one or more motors of the aerial robotic vehicle using the proximity threshold for collision avoidance. When propeller guards are installed, the proximity threshold may be set at a smaller distance than when propeller guards are not installed. The determination of whether a propeller guard is installed may be based on sensor data from one or more sensors configured to detect or indicate the presence of a propeller guard, and/or based on rotor revolution rates determined from a motor or motor controller.

Patent
23 Apr 2019
TL;DR: In this article, an entrance guard control method and device is presented, which comprises the steps that a sound signal is collected; the sound signal was subjected to voice recognition, a recognition result was obtained, and whether the recognition result is matched with preset keywords or not is judged.
Abstract: The embodiment of the invention provides an entrance guard control method and device. The entrance guard control method comprises the steps that a sound signal is collected; the sound signal is subjected to voice recognition, a recognition result is obtained, and whether the recognition result is matched with preset keywords or not is judged; and if the recognition result is matched with the preset keywords, the sound signal is subjected to voiceprint recognition, and whether the sound corresponding to the sound signal is derived from a target user or not is confirmed; and if yes, an entranceguard is opened. Through the entrance guard control method and device, opening of the entrance guard is controlled through voice recognition and voiceprint recognition, the trouble that unlocking needs to be operated by hand is avoided, and thus convenience is improved.

Patent
05 Feb 2019
TL;DR: In this paper, an intelligent entrance guard based on a block chain technology was proposed, in which a base, a door frame, a pedal, a recognizing mechanism, a loudspeaker, an indicator lamp and two passing mechanisms.
Abstract: The invention relates to an intelligent entrance guard based on a block chain technology The intelligent entrance guard comprises a base, a door frame, a pedal, a recognizing mechanism, a loudspeaker, an indicator lamp and two passing mechanisms Each passing mechanism comprises a driving assembly and two passing assemblies Each passing assembly comprises a fixed shaft, a sleeve, a door plate and a supporting rod The recognizing mechanism comprises a lifting plate, a recognizing assembly, a rail, two lifting assemblies and two hanging rods The recognizing assembly comprises a movable plate, a camera and two movable units According to the intelligent entrance guard based on the block chain technology, data storage is conducted through the block chain technology, and the data safety degree is high; moreover, through the cooperation of the two passing mechanisms, the function of detecting people one by one is realized, it is avoided that other people follow legal persons to pass by the entrance guard, and the safety and reliability of the device are improved; furthermore, through the recognizing mechanism, the lifting plate descends to the head top positions of people, the cameratakes pictures of human faces at different angles, the human face recognizing precision is improved, and the identity verification accuracy is ensured