scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2020"


Proceedings ArticleDOI
TL;DR: This work builds OFFLINE MODEL GUARD to enable privacy-preserving machine learning on the predominant mobile computing platform ARM—even in offline scenarios and guarantees privacy of client data, secrecy of provided models, and integrity of processing algorithms.
Abstract: Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data) should remain private while also the intellectual property of service providers (e.g., model parameters) must be protected. Cryptographic techniques offer secure solutions for this, but have an unacceptable overhead and moreover require frequent network interaction. In this work, we design a practically efficient hardware-based solution. Specifically, we build Offline Model Guard (OMG) to enable privacy-preserving machine learning on the predominant mobile computing platform ARM - even in offline scenarios. By leveraging a trusted execution environment for strict hardware-enforced isolation from other system components, OMG guarantees privacy of client data, secrecy of provided models, and integrity of processing algorithms. Our prototype implementation on an ARM HiKey 960 development board performs privacy-preserving keyword recognition using TensorFlow Lite for Microcontrollers in real time.

24 citations


Proceedings ArticleDOI
09 Mar 2020
TL;DR: In this paper, the authors design a hardware-based solution called Offline Model Guard (OMG) to enable privacy-preserving machine learning on the pre-dominant mobile computing platform ARM.
Abstract: Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data) should remain private while also the intellectual property of service providers (e.g., model parameters) must be protected. Cryptographic techniques offer secure solutions for this, but have an unacceptable overhead and moreover require frequent network interaction. In this work, we design a practically efficient hardware-based solution. Specifically, we build Offline Model Guard (OMG) to enable privacy-preserving machine learning on the pre-dominant mobile computing platform ARM---even in offline scenarios. By leveraging a trusted execution environment for strict hardware-enforced isolation from other system components, OMG guarantees privacy of client data, secrecy of provided models, and integrity of processing algorithms. Our prototype implementation on an ARM HiKey 960 development board performs privacy-preserving keyword recognition using TensorFlow Lite for Microcontrollers in real time.

23 citations


Journal ArticleDOI
01 Feb 2020
TL;DR: In this paper, the authors introduced a model of the system of professional training of border guards in European Union (EU) countries, designed to facilitate the introduction of European best practices into the training of the staff of the State Border Guard Service of Ukraine.
Abstract: The article introduces a model of the system of professional training of border guards in European Union (EU) countries, designed to facilitate the introduction of European best practices into the system of professional training of the staff of the State Border Guard Service of Ukraine. It is substantiated that the modern features of joint professional activity of border guards in EU countries, the need for its harmonization and development of common standards for the preparation and organization of network interaction, as well as the objective need for generalization and implementation of best practices in the training of personnel of the national border guard agency requires detailed study of the experience of the border guard agencies in EU countries. It is determined that the preparation of border guards in the EU countries is carried out in accordance with the common European standards, the main of which are the unified training programs and the sectoral qualifications framework for border protection sphere in the EU countries. The system of professional training of border guards in the EU countries is interpreted as a dynamic, purposeful integration of elements characterized by a functional structure and containing interconnected and interdependent components: target, legislative and regulatory; institutional and managerial; organizational; theoretical and methodological; content-technological; diagnostic and result. This training system is built on the interconnections of components and their interrelations, which integrates them into a holistic structure. The author analyzed the possibility of using this experience with the purpose of its introduction into the system of professional training of the personnel of the State Border Guard Service of Ukraine.

14 citations


Journal ArticleDOI
TL;DR: The studies show the WireGuard being a better choice in terms of other well-known procedures to inaugurate a secure and trusted VPN as well as an extra focus on the state of art protocol, Wire guard.
Abstract: The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly high charge. Virtual Private Network (VPN) is commonly used in business situations to provide secure communication channels over public infrastructure such as Internet. Virtual Private Networks (VPNs) provide a secure encrypted communication between remote networks worldwide by using Internet Protocol (IP) tunnels and a shared medium like the Internet. The paper follows and sets standards for different types of protocols and techniques, the VPN (Virtual Private Network) architectural feature is made to deliver dependable and safe network that is not in line with regular networks that provide a higher trust and a higher secure channel between user and organization. The current study took place to summaries the usage of existing VPNs protocol and to show the strength of every VPN. Through different studies that have been made by other researchers as well as an extra focus on the state of art protocol, Wire guard. It is also worthy to mention that wire guard compared with other protocols such as IPsec and GRE. The studies show the WireGuard being a better choice in terms of other well-known procedures to inaugurate a secure and trusted VPN.

12 citations


DOI
26 Jun 2020
TL;DR: Decision support system for selecting color guard with VIKOR and Borda methods has been made as a tool to select permanent members in the marching band at the Sei Rampah High School.
Abstract: Decision support system for selecting color guard with VIKOR and Borda methods. It has been made as a tool to select color guard at the Sei Rampah High School. The criteria used in the decision support system for color guard selection are: height, weight, agility, stamina, and body language. Color guard selection activities are a routine activity every year, so GINADA marching band coach Sei Rampah hereby selects to select permanent members in the marching band. Decision Support System in an organization can be seen as important in supporting the smooth running of activities and achieving an organizational goal. SPK can come in various forms, ranging from simple forms of data processing to complex application forms, and can also be used to accelerate and improve the quality of the decision-making process in the organization.

9 citations


Reference BookDOI
17 Dec 2020
TL;DR: The Facility Manager's Guide to Security as mentioned in this paper discusses the layout of the facility in order to provide security for workers, plants, processes, and products, covering distances and separation, fencing, access control, intrusion detection systems, pass key, key control systems, locks, hasps, and gates.
Abstract: Covering everything required to build and manage a security system, Facility Manager’s Guide to Security discusses the layout of the facility in order to provide security for workers, plants, processes, and products. The book covers distances and separation, fencing, access control, intrusion detection systems, pass key, key control systems, locks, hasps, and gates. It also explores more sophisticated systems such as closed circuit television, microwave transmitters, lasers, lighting, clear zone, and computer systems and control electronic systems. In addition, non-hardware aspects of security are examined, including security clearances and background checks, guards, rounds, shift work, training, and procedure development. Written by a former defense department official with 30 years of experience in the defense sector, this valuable book explains all aspect s of facility security. Facility managers will discover useful strategies for managing security personnel, guards, guard dogs, rounds shift work, training, procedure development, and other non-hardware elements of a security program.

6 citations


Proceedings ArticleDOI
15 May 2020
TL;DR: An overview of security aspects of a cyber security in smart cities is provided and a survey has been conducted and the findings have been analyzed of a case study to come up with recommendations for building a conceptualizing security framework for smart cities.
Abstract: Smart cities have evolved in the last years, leading the cities to implement initiatives related to technical aspects to improve quality of life. City-rankings have become a central tool for assessing the attractiveness of urban regions. The development of smart cities, however, is not without risk. Cities and citizens are putting more and more responsibilities in urban systems. Hence, all key stakeholders should provide an effective safety and security response to any situation affecting their citizens or organizations. Special attention should be paid with respect to development of services aimed at reducing cybercrime. To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed. The paper provides an overview of security aspects of a cyber security in smart cities. It starts with exploration of various definitions, threats, and risks in cyber security as well as threats from environments both internal and external and how these threats are currently mitigated with tools, processes and technologies as smart cities utilizes IoT with big data. Presently, most of the data is transmitted and collected online. Hackers usually try to exploit the vulnerabilities using various tools in order to know more about the customers and then misuse the customer’s information. Enterprises, on the other hand, continue to collect more information in order to improve services, infrastructure, and security. They collect tons of data from customers in order to complete their requirements for the different services they provide. The main concern with the collected data is that it can be vulnerable to misuse by hackers. Building a security framework based on concepts and repositories of big data and leveraging on the intelligence of predictive analytics can help build a security system that can counter these threats and help to guard from these risk and threats to a large extent. Various concepts, applications, and technologies interact to cover every aspect of the digital citizen’s life. Understanding this privacy-challenging environment is the basic requirement for the development of effective protection mechanisms. Thus, the paper aims to address sentiments on cyber security technologies and cybercrime awareness in order to come up with recommendations for innovative solutions. A survey has been conducted and the findings have been analyzed of a case study to come up with recommendations for building a conceptualizing security framework for smart cities. The survey is conducted in the United Arab Emirates (UAE), one of the most advanced countries in the MENA region, who is applying smart city concepts.

6 citations


Journal ArticleDOI
23 Oct 2020
TL;DR: In this paper, the authors focus on the representation of historical events in literary texts by pointing at the tension between their factual and fictional elements, focusing on the fable and the setting of Mikhail Bulgakov's novel The White Guard and his novel-based play The Days of the Turbins.
Abstract: This article focuses on the representation of historical events in literary texts by pointing at the tension between their factual and fictional elements. The fable and the setting of Mikhail Bulgakov’s novel The White Guard and his novel-based play The Days of the Turbins serve as examples. Almost one hundred years after its first (incomplete) publication, Bulgakov’s novel remains an object of heated debates and is a pivot point for a broad range of current historical, ideological, and cultural clashes between Ukraine and Russia. Against this background, the sophisticated form of Bulgakov’s narratives and the author’s cult status encourage the reader to consider his works both as historical testimonies and poetic prophecies. More importantly, the historical contextualization of The White Guard and The Days of the Turbins goes far beyond their narrated time and the events of the year 1918: it also includes the ideology of smenovekhovstvo, the dramatic changes in Soviet politics of korenizatsiya and the self-identification of the intelligentsiya in the late Soviet era.

5 citations



Journal ArticleDOI
07 Sep 2020

5 citations


Journal ArticleDOI
TL;DR: The security of home smart devices and their communication will be researched by using other academic articles to support facts found and solutions will be given to shield ourselves from security attacks.
Abstract: Nowadays, technology has evolved to be in our daily lives to assist in making our lives easier. We now have technology helping us in our lives at home. Devices used to create our “smart home” have done a great deal in making our lives at home less burdensome, but sadly, these devices have secured our personal lives to be more accessible to outsiders. In this paper, the security of home smart devices and their communication will be researched by using other academic articles to support facts found. The operation of the devices will be discussed along with security risks and future trends on security attacks. The results found will be crucial to knowing exactly how well our own home is protected. After understanding where the risks lie and a demonstration of how hackers can take control of our smart home, solutions will be given to shield ourselves from security attacks. We protect our homes from physical threats by locking doors, but it is time we guard ourselves from cyber threats as well.

Posted Content
TL;DR: Borders on the number of cameras needed to guard the city's aerial space (roofs, walls, and ground) using cameras with 180-degree range of vision (the region in front of the guard), which is common for most commercial cameras are presented.
Abstract: Drones and other small unmanned aerial vehicles are starting to get permission to fly within city limits. While video cameras are easily available in most cities, their purpose is to guard the streets at ground level. Guarding the aerial space of a city with video cameras is a problem that so far has been largely ignored. In this paper, we present bounds on the number of cameras needed to guard the city's aerial space (roofs, walls, and ground) using cameras with 180-degree range of vision (the region in front of the guard), which is common for most commercial cameras. We assume all buildings are vertical and have a rectangular base. Each camera is placed at a top corner of a building. We considered the following two versions: (i) buildings have an axis-aligned ground base and, (ii) buildings have an arbitrary orientation. We give necessary and sufficient results for (i), necessary results for (ii), and conjecture sufficiency results for (ii). Specifically, for (i) we prove a sufficiency bound of 2k + k/4 +4 on the number of vertex guards, while for (ii) we show that 3k + 1 vertex guards are sometimes necessary, where k is the total number of buildings in the city.

Journal ArticleDOI
31 May 2020
TL;DR: The similarities and differences that can be seen between the Spanish Civil Guard, a Hispanic police institution, and the recently created National Guard of Mexico, this allows for a brief comparative sketch to be presented below as a way to understand the evolution of this police forces and how public security has been conceived and implemented as discussed by the authors.
Abstract: While in culturally Anglo-Saxon countries the tendency to have military style police has become less and less common, in those of Latin culture it is the opposite. In some cases, there is even a way of understanding security with a parallel approach of the States, operating simultaneously, one of a military nature and one of a civil nature. On this text we will focus on highlighting the similarities and differences that can be seen between the Spanish Civil Guard, a Hispanic police institution, and the recently created the National Guard of Mexico, this allows for a brief comparative sketch to be presented below as a way to understanding the evolution of this police forces and how public security has been conceived and implemented in both countries.


Journal ArticleDOI
TL;DR: In this article, the authors described the teaching activities of English for specific purposes in future border guard Automobile Transport Masters training at the National Academy of the State Border Guard Service of Ukraine named after Bohdan Khmelnytskyi.
Abstract: The article describes the teaching activities of English for specific purposes in future border guard Automobile Transport Masters training at the National Academy of the State Border Guard Service of Ukraine named after Bohdan Khmelnytskyi. The main attention is paid to developing of Working Curriculum anchored on the notion of “English for specific purposes” (ESP) for the educational program of the second (master’s) level of higher education on specialty 274 “Automobile Transport”. The purpose of this research is to study the ESP teaching activities in future border guard Automobile Transport Masters training. The methodology of the course is aimed at developing the border guards’ professional communicative competency, which would facilitate their effective service in the border crossing points. The course program provides border guards with the opportunity to develop language competence to communicate with foreigners while conducting border surveillance activities and border checks. The structure of this educational program takes into account the elements of the PROJECT TUNING and the categories of BLOOM TAXONOMY. The classification of the types of teaching activities of ESP in future border guard Automobile Transport Masters training has been determined and substantiated. They include five components: warm ups, vocabulary, reading, listening, grammar and speaking with their corresponding activities. The results of its implementation are the number of officers in experimental group who had high and middle levels of English language proficiency increased by 25 %; and the number of officers in control group who had high and middle levels of English language proficiency increased by 6%.

Proceedings ArticleDOI
01 Dec 2020
TL;DR: GTFuzz as discussed by the authors extracts Guard Tokens according to the target locations first and then exploits them to direct the fuzzing, which is an effective technique to find bugs in programs with the guidance of user-specified target locations.
Abstract: Directed grey-box fuzzing is an effective technique to find bugs in programs with the guidance of user-specified target locations. However, it can hardly reach a target location guarded by certain syntax tokens (Guard Tokens for short), which is often seen in programs with string operations or grammar/lexical parsing. Only the test inputs containing Guard Tokens are likely to reach the target locations, which challenges the effectiveness of mutation-based fuzzers. In this paper, a Guard Token directed grey-box fuzzer called GTFuzz is presented, which extracts Guard Tokens according to the target locations first and then exploits them to direct the fuzzing. Specifically, to ensure the new test cases generated from mutations contain Guard Tokens, new strategies of seed prioritization, dictionary generation, and seed mutation are also proposed, so as to make them likely to reach the target locations. Experiments on real-world software show that GTFuzz can reach the target locations, reproduce crashes, and expose bugs more efficiently than the state-of-the-art grey-box fuzzers (i.e., AFL, AFLGO and FairFuzz). Moreover, GTFuzz identified 23 previously undiscovered bugs in LibXML2 and MJS.

Proceedings ArticleDOI
01 Aug 2020
TL;DR: The possibility of using flexible guard times to mitigate the problem of the increased delay and the reduced network capacity of TS-LoRa is explored and the potential of the solution to improve the above-mentioned performance metrics is shown.
Abstract: TS-LoRa is an autonomous time-slotted communication protocol for LoRa-based networks. As with other synchronous protocols, TS-LoRa bases its operation on repeated frames where each frame consists of a number of slots while guard times are added in between successive transmissions to tolerate slight desynchronisations until the next synchronisation. The number of slots in the frames depends on the payload size, the radio duty cycle rules, the application duty cycle requirements, and the number of nodes in the network. Due to the low bitrate of LoRa transmissions, the guard times are much longer compared to other traditional time-division protocols. Those longer guard times lead to larger in size frames and, thus, to increased delay and lower capacity. In this paper, a delay and capacity analysis of TS-LoRa is provided and the possibility of using flexible guard times to mitigate the problem of the increased delay and the reduced network capacity is explored. The potential of the solution to improve the above-mentioned performance metrics is shown through numerical simulations while the practicality of the flexible guard times is assessed through testbed experiments.

Proceedings ArticleDOI
01 Aug 2020
TL;DR: The article presents an architecture for creating a guard system built with intelligent software agents that connect with the physical world through a sensor network.
Abstract: The article presents an architecture for creating a guard system built with intelligent software agents that connect with the physical world through a sensor network. The Guard System is part of the Virtual Physical Space (ViPS). In ViPS, it is built as an Internet-of-Things ecosystem consisting of autonomous intelligent components.

Journal ArticleDOI
01 Jan 2020
TL;DR: Investigation of the Guard Plus system’s function are presented through wbk Institute of Production Science in the following article and it is shown that the system enables this by detecting the preload loss due to wear.
Abstract: Ziel der Instandhaltung von Werkzeugmaschinen ist die Verfügbarkeitsabsicherung, um hohe Bauteilqualität und Produktivität zu gewährleisten. Die Kenntnis des Vorschubachsenzustandes, im Besonderen des Kugelgewindetriebs, ist daher von enormer Wichtigkeit. Das „Guard-Plus“-System, eine Entwicklung der August Steinmeyer GmbH und der ifm diagnostics GmbH, ermöglicht dies durch Detektion des Vorspannungsverlustes aufgrund von Verschleiß. Untersuchungen zur Systemfunktion wurden in diesem Beitrag durch das wbk Institut für Produktionstechnik durchgeführt. The aim of machine tool maintenance is to ensure availability in order to guarantee high product quality and productivity. Knowledge of the wear condition of feed axes involved, especially the ball screw, is therefore of enormous importance. The Guard Plus system, a joint development of August Steinmeyer GmbH and ifm diagnostics GmbH, enables this by detecting the preload loss due to wear. Investigation of the system’s function are presented through wbk Institute of Production Science in the following article.

Book ChapterDOI
28 Oct 2020
TL;DR: In this paper, the authors propose a privacy guard gateway (PGG) to mitigate privacy issues related to cloud-based devices, such as profiling and linkage, without the user's activities being stored during the operation.
Abstract: The Internet of Things is a technology which is dominating our lives, making it more comfortable, safer and smarter. Using smart speakers as voice assistants for smart homes provides valuable service and an easy control of IoT devices, despite allowing the emergence of privacy threats and disclosing sensitive data about users. In this paper, we propose to associate with any smart personal assistant a privacy guard gateway (PGG for short) in order to mitigate privacy issues related to cloud-based devices, like profiling and linkage. In an original way, the PGG system is based on a noise addition mechanism that injects dummy requests according to some selected strategy, without the user’s activities being stored during the operation. A case study of our approach is experimented with a Google Home Assistant, in order to show its effectiveness.

Book ChapterDOI
16 Nov 2020
TL;DR: In this article, a toolchain that combines the PRECiSA floating-point static analyzer, the Frama-C software verification suite, and the PVS theorem prover is presented.
Abstract: In floating-point programs, guard instability occurs when the control flow of a conditional statement diverges from its ideal execution under real arithmetic. This phenomenon is caused by the presence of round-off errors in floating-point computations. Writing programs that correctly handle guard instability often requires expertise on finite precision arithmetic. This paper presents a fully automatic toolchain that generates and formally verifies a guard-stable floating-point C program from its functional specification in real arithmetic. The generated program is instrumented to soundly detect when unstable guards may occur and, in these cases, to issue a warning. The proposed approach combines the PRECiSA floating-point static analyzer, the Frama-C software verification suite, and the PVS theorem prover.

Patent
02 Jan 2020
TL;DR: A forearm guard compressive sleeve is designed to mitigate the effects of environmental and mechanical hazards, limit the deleterious effects of an athlete's perspiration and muscle stress and imbue the user with psychological confidence in his or her athletic performance as mentioned in this paper.
Abstract: A forearm guard compressive sleeve is disclosed which functions as a protective guard in athletic endeavors and as fashion apparel and as an advertising and promotional medium. The sleeve is constructed to mitigate the effects of environmental and mechanical hazards, limit the deleterious effects of an athlete's perspiration and muscle stress and imbue the user with psychological confidence in his or her athletic performance. The inventive forearm guard incorporates Near Field Communication components including one of more NFC tags which enable access via NFC-enabled mobile smart phones or computers to the Internet. A method is disclosed enabling celebrity athletes or personnel using the inventive forearm guard to transfer wireless personalized information to fans and supporters including sending virtual autographs and mementos.

Patent
06 Aug 2020
TL;DR: A convertible guard device for a fire heating appliance is described in this paper, where the panels can be arranged in a guard configuration and a tabletop configuration, and the base portion may define a fire area and an inner surface having a ledge extending therefrom, the ledge configured to receive a perimeter edge of the panels when the panels are arranged in the tabletop configuration.
Abstract: A convertible guard device for a fire heating appliance. The guard device having a plurality of panels and a base portion, wherein the panels may be configured to be arranged in a guard configuration and a tabletop configuration. The base portion may define a fire area and have an upper surface configured to receive the panels arranged in the guard configuration, and an inner surface having a ledge extending therefrom, the ledge configured to receive a perimeter edge of the panels when the panels are arranged in the tabletop configuration.

Proceedings ArticleDOI
12 Dec 2020
TL;DR: In this article, the authors proposed an intelligent feeding system that can reduce the calculating workload of the IoT development board, as well as lowering the power consumption and guard the pool against water pollution.
Abstract: 1The system can reduce the calculating workload of the IoT development board, as well as lowering the power consumption and guard the pool against water pollution. The intelligent feeding system offered by this study can effectively ease the workforce of the aquaculture industry. In the future, cage culture can also implement such a method to increase the safety of the operators. According to the experimental result of this study, the approach is feasible.

Journal ArticleDOI
TL;DR: We Stand on Guard as mentioned in this paper explores American foreign policy relating to national security, imperial military activity, and resource policy, and the comic critiques its 2015 comic, We Stand On Guard.
Abstract: Brian K. Vaughan and Steve Skroce’s 2015 comic, We Stand on Guard, explores American foreign policy relating to national security, imperial military activity, and resource policy. The comic critiqu...


Journal ArticleDOI
08 May 2020
TL;DR: In this article, a methodological model of comparative-pedagogical study of professional training of border guards in the European Union countries has been implemented on the basis of the generalized experience of the border guard agencies of the EU countries and the works of domestic and foreign scientists.
Abstract: The methodological model of comparative-pedagogical study of professional training of border guards in the European Union countries has been implemented on the basis of the generalized experience of the border guard agencies of the European Union countries and the works of domestic and foreign scientists. Highlightedrelevance of comparative-pedagogical research in this field and development of the correspondent model indicate the benchmarks for the development of the system of training of Ukrainian border guards in the context of European integration. In this regard, it is of particular interest to systematize and summarize the experience of the border guard agencies of the EU countries and the FRONTEX Agency, which are training personnel for European border guard agencies. The developed methodological model covers four levels: theoretical-analytical, comprehension-methodological, general-interpretative and comparatively-resultative. The levels describe methodological approaches, methods of their implementation, principles of comparative studies and take into account the chronological boundaries of formation and development of unified professional training of border guards in the European Union. The question of application of the considered methodological model in practice with the purpose of conducting research of the system of professional training of border protectionspecialists in the countries of the European Union has been considered. The author analyzed the possibility of using this experience with the purpose of its introduction into the system of professional training of the personnel of the Border Guard Service of Ukraine.

Patent
28 May 2020
TL;DR: The guard structure for a saddle riding vehicle includes a body frame, a guard member fixed to the body frame and guarding a vehicle body, and a stay connecting the guard member to the frame as discussed by the authors.
Abstract: The guard structure for a saddle riding vehicle includes a body frame, a guard member fixed to the body frame and guarding a vehicle body, a stay connecting the guard member to the body frame The stay includes a frame connection section connected to the body frame side, a guard member connection section connected to the guard member, and a linking section that connect the frame connection section and the guard member connection section The stay is formed in a U shape by the frame connection section and the guard member connection section, which are disposed to face each other, and the linking section

Journal ArticleDOI
TL;DR: In this paper, the authors discuss the benefits of applying guard extraction as part of the modeling work in a modular control architecture, where reusable resources are composed using specifications, and show with an example from the development of an industrial demonstrator that even if the specification language is limited to invariant propositions, in practice many common safety specifications can be expressed when combined with a notion of which transitions are allowed to be restricted.

Patent
31 Jan 2020
TL;DR: In this article, an entrance guard control method and device, equipment, and a storage medium are described. But the method comprises the following steps of receiving request information for requesting the opening of an entrance guards; outputting a first voice according to the request information, and collecting a second voice in response to the first voice; determining whether to open the entrance guard ornot according to second voice; generating response information in response, and sending the response information to the entry guard equipment.
Abstract: The invention discloses an entrance guard control method and device, equipment, and a storage medium. The method comprises the following steps of receiving request information for requesting the opening of an entrance guard; outputting a first voice according to the request information, and collecting a second voice in response to the first voice; determining whether to open the entrance guard ornot according to the second voice; generating response information in response to the entrance guard determined to be opened according to the second voice; and sending the response information to theentrance guard equipment. Through the method disclosed by the invention, the convenience and the convenience of the entrance guard control is increased.