CN108806025A - Realize the entrance guard authorization method and device of visitor's temporary visit - Google Patents
Realize the entrance guard authorization method and device of visitor's temporary visit Download PDFInfo
- Publication number
- CN108806025A CN108806025A CN201710304241.9A CN201710304241A CN108806025A CN 108806025 A CN108806025 A CN 108806025A CN 201710304241 A CN201710304241 A CN 201710304241A CN 108806025 A CN108806025 A CN 108806025A
- Authority
- CN
- China
- Prior art keywords
- donor
- visitor
- gate inhibition
- identity
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
This disclosure relates to a kind of entrance guard authorization method that realizing visitor's temporary visit, the method includes:The temporary visit of artificial visitor is authorized to carry out carrying out authentication to the donor in gate inhibition's mandate;After the authentication of the donor passes through, initiates the registration of visitor's identity and obtain visitor's identity information;Access permission is configured according to the temporary visit that the visitor's identity information is the visitor, the access permission is for controlling visitor's passage gate inhibition's banister.The temporary visit that the method and device that the gate inhibition of the realization visitor's temporary visit provided using the disclosure is authorized can be directed to visitor improves gate inhibition's mandate efficiency.
Description
Technical field
This disclosure relates to field of computer technology more particularly to a kind of entrance guard authorization method for realizing visitor's temporary visit and
Device.
Background technology
Currently, being usually provided with gate inhibition's banister in building, ensure to cannot be introduced into building to carry out the personnel of gate inhibition's mandate with this
Portion in the world ensures the safety inside building with this.
In the daily work, it is inevitably present the temporary visit of visitor, for security consideration, is then needed for visitor
Temporary visit carry out gate inhibition's mandate, by gate inhibition authorize be visitor temporary visit configure access permission so that visitor
Can pass through corresponding gate inhibition's banister according to the access permission being configured, and enter inside building.
However, existing entrance guard authorization method is all based on greatly artificial realization, once the temporary visit of visitor has exceeded expection
Duty range, can not only increase the operating pressure of reception personnel, cause visitor's stand-by period long, seriously affect gate inhibition and award
The efficiency of power, and inevitably there is careless omission, reduce the safety of visitor's temporary visit.
Invention content
Based on this, one of the disclosure is designed to provide a kind of entrance guard authorization method for realizing visitor's temporary visit, uses
In solve the problems, such as in the prior art be directed to visitor's temporary visit gate inhibition authorize it is less efficient.
In addition, another object of the present disclosure is to provide a kind of camera focusing detection device, for solving existing skill
Gate inhibition in art for visitor's temporary visit authorizes less efficient problem.
In order to solve the above-mentioned technical problem, technical solution used by the disclosure is:
A kind of entrance guard authorization method for realizing visitor's temporary visit, including:The temporary visit of artificial visitor is authorized to carry out door
Prohibit in authorizing and authentication is carried out to the donor;After the authentication of the donor passes through, visitor's identity is initiated
Registration obtains visitor's identity information;Access permission, institute are configured according to the temporary visit that the visitor's identity information is the visitor
Access permission is stated for controlling visitor's passage gate inhibition's banister.
A kind of gate inhibition's authorization device for realizing visitor's temporary visit, including:Donor's authentication module is used for donor
It carries out carrying out authentication to the donor in gate inhibition's mandate for the temporary visit of visitor;Visitor's identity Registration Module, is used for
After the authentication of the donor passes through, initiates the registration of visitor's identity and obtain visitor's identity information;Access permission configures
Module, for configuring access permission according to the temporary visit that the visitor's identity information is the visitor, the access permission is used
In control visitor's passage gate inhibition's banister.
Compared with prior art, the disclosure has the advantages that:
The authentication of donor is carried out in the temporary visit for authorizing artificial visitor carries out gate inhibition's mandate, and in donor
Authentication by after initiate visitor's identity registration, obtain visitor's identity information, and then according to visitor's identity information be visit
The temporary visit of visitor configures access permission, realizes visitor according to the corresponding gate inhibition's banister of access permission passage configured.
That is, the initiation of the authentication and the registration of visitor's identity carried out by donor, realizes self-service progress
The gate inhibition of visitor's temporary visit authorizes, and discharges manpower with this, and the gate inhibition improved for visitor's temporary visit authorizes efficiency, simultaneously
It avoids the problem that causing the safety of visitor's temporary visit to reduce due to there is careless omission.
In addition, the registration of visitor's identity is only carried out in the authentication of donor after, i.e., only it is allowed to as visitor
Temporary visit carry out donor's identity of gate inhibition's mandate and be only legal, visitor's temporary visit is further strengthened with this
Safety.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not
The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is the schematic diagram of the implementation environment involved by the disclosure;
Fig. 2 is a kind of flow of entrance guard authorization method for realizing visitor's temporary visit shown according to an exemplary embodiment
Figure;
Fig. 3 be in Fig. 2 corresponding embodiments step 210 in the flow chart of one embodiment;
Fig. 4 be in Fig. 3 corresponding embodiments step 215 in the flow chart of one embodiment;
Fig. 5 be in Fig. 3 corresponding embodiments step 215 in the flow chart of another embodiment;
Fig. 6 is a kind of specific implementation schematic diagram of entrance guard authorization method that realizing visitor's temporary visit in an application scenarios;
Fig. 7 is a kind of frame of gate inhibition's authorization device for realizing visitor's temporary visit shown according to an exemplary embodiment
Figure;
Fig. 8 is that gate inhibition authorizes trigger module 710 in the block diagram of one embodiment in Fig. 7 corresponding embodiments;
Fig. 9 be in Fig. 8 corresponding embodiments identity authenticating unit 715 in the block diagram of one embodiment;
Figure 10 be in Fig. 8 corresponding embodiments identity authenticating unit 715 in the block diagram of another embodiment;
Figure 11 is a kind of the hard of gate inhibition's authorization device for realizing visitor's temporary visit shown according to an exemplary embodiment
Part structure diagram.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail, these attached drawings
It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments
Those skilled in the art illustrate the concept of the disclosure.
Specific implementation mode
Here will explanation be executed to exemplary embodiment in detail, the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of schematic diagram of the implementation environment involved by entrance guard authorization method for realizing visitor's temporary visit.The reality
It is guest system 100 to apply environment, and guest system 100 includes visitor's accommodation 110, access control equipment 130, guest server
150 and data analytics server 170.
Wherein, camera, scanner, printer etc. are installed on visitor's accommodation 110, for guest system 100
It takes pictures to donor's progress face, the access card of donor and the identity card of visitor are scanned, prepare visitor for visitor
Card etc..
Access control equipment 130 can be used for access control banister and execute clearance action.Access control equipment 130 can be arranged
Have entrance guard card reader, gate inhibition's PIN PAD, gate inhibition's fingerprint input device or recognition of face gate inhibition's device etc., with by swiping the card,
The modes such as password, fingerprint, recognition of face identify the access permission for authorizing current gate inhibition banister personnel, and then realize gate inhibition's banister
The execution of clearance action.
Access control equipment 130 will also be equipped with memory, with by the memory to authorizing current gate inhibition banister personnel
The relevant information of identity information and gate inhibition's banister be associated storage, which can be gate inhibition's card information, Men Jinquan
Limit etc..
Guest server 150 authorizes for realizing the gate inhibition of visitor's temporary visit, under the cooperation of visitor's accommodation 110
Visitor's temporary visit is completed in the initiation that the gate inhibition for completing visitor's temporary visit authorizes under the cooperation of access control equipment 130
The configuration of access permission, and the personnel for authorizing current gate inhibition's banister are identified under the cooperation of data analytics server 170, in turn
Realize the corresponding gate inhibition's banister of access permission passage that visitor is configured according to it.
Data analytics server 170 is then that guest server 150 provides data analysis clothes by external server interface
Business, for example, the identity information of current gate inhibition's banister personnel authorize to be associated with, carries out authorizing current gate inhibition road in recognition of face
Face characteristic matching of lock personnel etc..
Certainly, in different application scenarios, flexible deployment can be carried out to guest system 100 according to practical application request,
For example, guest server 150 and data analytics server 170 can be deployed as the same server in guest system 100, or
Person enables visitor's accommodation 110 be provided simultaneously with the function of guest server 150 and data analytics server 170, and the disclosure is not
This is limited.
Referring to Fig. 2, in one exemplary embodiment, it is a kind of to realize that the entrance guard authorization method of visitor's temporary visit is suitable for
Guest system 100 in implementation environment shown in Fig. 1, this kind realize that the entrance guard authorization method of visitor's temporary visit can be by visitor
System 100 executes, and may comprise steps of:
Step 210, the temporary visit of artificial visitor is authorized to carry out carrying out authentication to donor in gate inhibition's mandate.
Donor can be the personnel of visitor's temporary visit, can also be the reception personnel in building.Pass through donor couple
The temporary visit of visitor carries out gate inhibition's mandate, so that visitor, which can enter, carries out temporary visit inside building.
It should be appreciated that the premise that donor carries out the temporary visit of visitor gate inhibition's mandate is:Donor be allowed to for
The temporary visit of visitor carries out gate inhibition's mandate, increases the safety of visitor's temporary visit with this.
As a result, in order to ensure donor is allowed to carry out gate inhibition's mandate for the temporary visit of visitor, it is necessary first to right
Donor carries out authentication.In the present embodiment, it is to carry out visitor's temporary visit by triggering to carry out authentication to donor
Gate inhibition authorize initiate, i.e., when triggering carry out visitor's temporary visit gate inhibition authorize when, donor's identity will be initiated first and tested
The process of card, and then whether by authentication judge whether the donor is allowed to the interim visit for visitor according to donor
It asks and carries out gate inhibition's mandate.
When donor is by authentication, that is, indicate really to register the identity of the donor in guest system,
Also the identity for having turned out the donor is legal, therefore, can judge the donor be allowed to temporary visit to visitor into
What row gate inhibition authorized.
Corresponding, if donor's authentication fails, the identity for having turned out the donor is illegal, and then judges that this is awarded
Power people is not allowed to the temporary visit to visitor and carries out gate inhibition's mandate.
The authentication to donor is realized in the temporary visit for authorizing artificial visitor carries out gate inhibition's mandate as a result, it will
Be conducive to subsequently improve the safety that the gate inhibition of visitor's temporary visit authorizes.
Step 230, it after the authentication of donor passes through, initiates the registration of visitor's identity and obtains visitor's identity information.
As previously mentioned, only donor's authentication by when, just show that donor is allowed to the interim of visitor
It accesses and carries out gate inhibition's mandate, the visitor's identity enrollment process initiated after donor is by authentication as a result, is only
The permitted polymerization process of guest system.
Visitor's identity enrollment process can be realized by scanning the identity card of visitor, can also input identity card by visitor
Number, the relevant informations such as cell-phone number realize, can also be realized by the fingerprint of typing visitor, be not limited herein.
For visitor, you can visitor's identity registration is carried out according to any one of the above or a variety of realization methods,
The registration of visitor's identity can determine the visitor's identity information corresponding to the visitor after finishing, and be faced the visitor with this basis
When access carry out gate inhibition's mandate.
Corresponding to the different realization methods of visitor's identity enrollment process, visitor's identity information can be the identification card number of visitor
Code, phone number, finger print information etc., can unique mark visitor's identity, be not also defined herein.
It is further appreciated that the possible more than one of visitor that donor is received, at this point, for multiple visitors'
Same donor, the authentication carried out are directed to visitor's identity that the same donor is initiated without being repeated as many times
Registration then needs repeatedly, i.e., for same donor, it is only necessary to an authentication is carried out, and for the more of the same donor
A visitor needs to initiate multiple visitor's identity registration, each to be obtained in the visitor's identity enrollment process initiated each time
Visitor's identity information corresponding to a visitor.
Step 250, access permission is configured according to the temporary visit that visitor's identity information is visitor.
Wherein, access permission is registered to be formed in access control equipment for gate inhibition's banister, and then passes through the registration
Access permission controls corresponding gate inhibition's banister and executes clearance action.Access permission can be directed to all gate inhibition's banisters, also may be used
To be gate inhibition's banister only for some working region, herein and it is not limited.
The access permission configured by the temporary visit of visitor will be used to control visitor's passage gate inhibition's banister.I.e. as the visitor
When the access permission configured is consistent with access control equipment for the access permission set by gate inhibition's banister, visitor can be according to this
The corresponding gate inhibition's banister of access permission passage.
For example, being gate inhibition road of the access permission only for working region where donor of the temporary visit configuration of visitor
Lock so that visitor can only pass in and out in the working region where the donor, and can not pass in and out and be different from donor place work
Other working regions for making region, the safety of visitor's temporary visit is ensured with this.
Further, effective time will be also arranged in the access permission configured by the temporary visit of visitor, that is, be more than effective
The range access permission of time will be recovered, i.e., visitor can not be further according to the corresponding gate inhibition's banister of access permission passage.For example,
Effective time could be provided as 24 hours, and the safety of visitor's temporary visit is improved with this.
For the temporary visit configuration access permission of visitor initiated after obtaining visitor's identity information in the present embodiment
's.That is, when obtaining visitor's identity information, that is, indicate the identity registration that corresponding visitor has been completed in guest system, Bian Kewei
The temporary visit of the visitor carries out gate inhibition's mandate, that is, configures access permission.
Further, can also be that its preparation is visited by calling printer interface in order to facilitate visitor's passage gate inhibition's banister
Visitor's card so that visitor only needs to block the corresponding gate inhibition's banister that can pass through by brushing visitor.Wherein, the entrained visitor of visitor's card
Card information is uniquely corresponding to visitor's identity information, bar code, Quick Response Code, the number which can be randomly generated
Word, letter etc. combine, so that the scanner installed on gate inhibition's banister is read out, and according to the visitor's card information read
Execute clearance action.
Certainly, if being equipped with id card scanner on gate inhibition's banister, visitor can also execute brush by its identity card
Card behavior, is not limited herein.
By process as described above, the gate inhibition of visitor's temporary visit of self-service progress in guest system authorizes, and allows mandate
People can not handled the temporary visit demand of visitor at any time by time restriction, not only avoid falling into a long wait for visitor, be improved
The visiting efficiency of visitor and flexibility, improve the experience sense of visitor's temporary visit, additionally it is possible to effectively discharge reception personnel
Operating pressure, reduce cost of human resources, improve the reception efficiency of visitor.
In addition, in guest system only after donor's authentication passes through, the registration of visitor's identity can be initiated, is strengthened
The safety of visitor's temporary visit.
Referring to Fig. 3, in one exemplary embodiment, step 210 may comprise steps of:
Step 211, trigger action when artificial visitor being authorized to carry out gate inhibition's mandate is intercepted, authorized mode selects to refer to
It enables.
The process that authentication can be the donor's authentication carried out by recognition of face is carried out to donor, also may be used
Can also be the donor's authentication carried out by password to be by the process of the donor's authentication for progress of swiping the card
Process can also be the process of the donor's authentication carried out by fingerprint, not be limited herein.
Correspondingly, what donor can select can be used for verify own identification authorization will there are many, for example, authorizing
Mode can be recognition of face, swipe the card, password, fingerprint etc..
Based on this, trigger action when artificial visitor being authorized to carry out gate inhibition's mandate is the selection for carrying out authorization, by
This authorization selection instruction intercepted will be used to indicate that the selected authorization of donor, i.e., according to authorization
Selection instruction can determine the selected authorization of donor.For example, triggering when artificial visitor being authorized to carry out gate inhibition's mandate
Operation is to have clicked recognition of face, then the mandate of donor's selection can be determined according to thus obtained authorization selection instruction
Mode is recognition of face.
Step 213, the authorization of donor's selection is determined according to authorization selection instruction.
Step 215, the authentication of donor, authorized person part letter are carried out according to the authorization of donor's selection
Breath determines that the authentication of donor passes through by the acquisition of donor's identity information.
After the authorization for determining donor's selection, donor's authentication is just initiated according to the authorization
Journey, and then authorized people's identity information in donor's authentication process itself.
Donor's identity information can unique mark donor's identity, donor's identity information may include donor
ID card No., work card number, phone number, base extension, seating area number and other relevant informations, herein simultaneously
It is not limited.
When obtaining donor's identity information, that is, indicate really to step on the identity of the donor in guest system
Note, the identity for also having turned out the donor is legal, at this point, the authentication that donor is carried out passes through, can judge that this is awarded
Power people is allowed to the temporary visit to visitor to carry out gate inhibition's mandate.
Corresponding, if donor's identity information can not be obtained, the identity for having turned out the donor is illegal, at this point, awarding
The authentication that power people is carried out fails, then the donor is not allowed to the temporary visit to visitor and carries out gate inhibition's mandate.
For donor, authentication will be carried out according to its selected authorization, and pass through it in authentication
It can determine donor's identity information corresponding to the donor afterwards, and be the temporary visit progress gate inhibition of visitor on this basis
It authorizes.
Gate inhibition is carried out to visitor by being donor and authorizes to be equipped with a variety of different authorizations, i.e., so that donor can be with
Arbitrarily select different modes to carry out donor's authentication, for example, the donor to forget Password can select by fingerprint into
Row donor's authentication, or, forget that the donor with card can carry out donor's authentication by recognition of face, with
This ensure that the high efficiency of authentication is implemented, and also be provided simultaneously with very high versatility.
Furthermore, it is possible to one of which authorization is used only, it can also be using two kinds or more of authorization come to awarding
It weighs people and carries out authentication, specifically according to practical application scene will be adjusted flexibly, both enhance authentication
Flexibility, and ensure that the reliability of authentication simultaneously, and then strengthen the safety of visitor's temporary visit.
Referring to Fig. 4, in one exemplary embodiment, authorization includes recognition of face, i.e., by recognition of face to awarding
It weighs people and carries out authentication, and then pass through rear authorized people's identity information in recognition of face.
Correspondingly, step 215 may comprise steps of:
Step 2151, the face image data of donor is acquired.
After determining that the selected authorization of donor of authorization selection instruction instruction is recognition of face, just touch
Hair carries out the acquisition of the face image data of donor.
Specifically, the camera laid in guest system is started by utilizing camera interface, and by camera to authorizing
People carries out head portrait shooting, with the head portrait photo of this authorized people, the as face image data of donor.
Further, to ensure carried out between follow-up face image data and pre-stored face representation data
The success rate matched can also carry out Face datection to face image data, confirm face image data as face using this, otherwise after
It is continuous to execute step 2151, the face image data of donor is resurveyed, until face image data passes through Face datection.
Step 2153, the matching between face image data and pre-stored face representation data is carried out, is matched
Spend highest face representation data.
Face representation data are the face characteristic description for being allowed to carry out the personnel of gate inhibition's mandate for visitor, pass through face
Data are indicated to complete the face characteristic identification of donor, and then determine whether donor can be determined by authentication
Whether donor is allowed to carry out gate inhibition's mandate for visitor.
It should be appreciated that being stored with a large amount of face representation data in guest system, that is to say, that energy in same guest system
Enough it is personnel's more than one that visitor carries out gate inhibition's mandate.
As a result, after collecting the face image data of donor, it would be desirable to the face image data and face table
Registration obtains the highest face representation data of matching degree according to being matched, with this, and the highest face representation data of the matching degree
It is as described, is thus facilitated in the recognition of face subsequently carried out by the face characteristic of the obtained donor of recognition of face,
Associated personnel identity information can be obtained by matching obtained face representation data, and believed in this, as donor's identity
Therefore breath so that donor is by authentication, and confirms that donor is allowed to carry out gate inhibition for the temporary visit of visitor
It authorizes.
Step 2155, authorized by carrying out personnel identity information association to the highest face representation data of matching degree
People's identity information.
It should be noted that being not only the storage of face representation data, it is also associated with face representation data and corresponding people
Member's identity information carries out in advance, i.e., is completed in the deployment phase of guest system.
Specifically, in the deployment phase of guest system, the facial image of a large amount of personnel is acquired, and pass through deep learning face
Image obtains face representation data, after being matched between face representation data and personnel identity information, corresponding storage face
The personnel identity information for indicating data and pairing, to form the pass between face representation data and corresponding personnel identity information
Connection, so that the face recognition process conducted in guest system uses.
Therefore, the personnel of the highest face representation data of Corresponding matching degree are can be obtained by the association of personnel identity information
Identity information, as the obtained donor's identity information of personnel's identity information.
Certainly, if failing to obtain by the association of personnel identity information corresponding with the highest face representation data of matching degree
Personnel identity information indicates donor's authentication failure, then needs return to step 2151, resurvey the face of donor
Image data.
By process as described above, the authentication of donor is carried out using recognition of face, extends authentication
Versatility and reliability, it is advantageously ensured that the safety of visitor's temporary visit.
Further, after step 215, method as described above can also include the following steps:
The secondary verification of donor's identity is initiated according to donor's identity information, is obtained by the secondary verification judgement of donor's identity
Whether the donor's identity information obtained matches with donor.
It is appreciated that for carrying out authentication to donor by recognition of face, it may be due to existing for recognition of face
Error and cause obtain donor's identity information inaccuracy.
Based on this, after obtaining donor's identity information, the secondary verification of donor's identity will be initiated, acquisition is determined with this
Donor's identity information it is whether accurate.
Specifically, authentication can be carried out by the identification information pair donor of unique mark donor's identity, need
It is noted that the identification information is contained in donor's identity information, for example, the identification information can be donor
ID card No., work card number, phone number, base extension, seating area number etc..
When donor returns to some above-mentioned identification information in response to the secondary verification of donor's identity, you can according to the mark
Information is matched with identification information included in donor's identity information of acquisition, and then is obtained according to matching result judgement
Whether the donor's identity information obtained matches with donor.If matching, you can judge that the donor's identity information obtained is certain
It is donor, that is, determines that the identity of donor is secondary and be verified.
Pass through the secondary verification of the identity carried out to donor, it is ensured that the accuracy of donor's identity information avoids pair
The erroneous grants of visitor's temporary visit ensure that the safety of visitor's temporary visit with this.
Certainly, it in different application scenarios, can neatly be selected to carry out body to donor according to practical application request
The number of part verification carries out the secondary verification of donor's identity, waits for that donor's identity is secondary and be verified for example, when recognition of face
The registration of visitor's identity is initiated later, or, when being different from the identification of recognition of face, only in donor's identity one-time authentication
By the way that the registration of visitor's identity can be initiated later, it is not limited herein, to be conducive to subsequently improve visitor's temporary visit
Flexibility.
Referring to Fig. 5, in a further exemplary embodiment, authorization includes being different from the identification of recognition of face,
Authentication is carried out to donor by being different from other identification methods of recognition of face, for example, being different from recognition of face
Identification can be swipe the card, password, fingerprint etc., and then pass through rear authorized people's identity information in authentication.
Step 215 may comprise steps of:
Step 2157, gate inhibition's card information of donor is acquired.
Access card has carried out the registration of access permission in access control equipment, can access control by the access permission
Banister executes clearance action, i.e., when the access permission of access card and access control equipment are the access permission set by gate inhibition's banister
When being consistent, donor can pass in and out gate inhibition's banister by brush access card.
Certainly, the function of access card is not limited in current gate inhibition's banister, and being alternatively arranged as the work of donor proves, example
Such as, access card is the job card of donor, is not defined herein.
Determining that the selected authorization of donor of authorization selection instruction instruction is to be different from recognition of face
After identification, in the present embodiment, which is to swipe the card, and just triggering carries out the people of donor
The acquisition of face image data.
Specifically, gate inhibition's card is scanned by starting the scanner laid in guest system, it is authorized with this
Gate inhibition's card information of people.Gate inhibition's card information can be number combination, monogram, can also be bar code form, Quick Response Code
Form etc., herein without limiting.
It should be appreciated that if the identification for being different from recognition of face is password, just triggering carries out the Password Input of donor,
To collect the encrypted message of donor.If the identification for being different from recognition of face is fingerprint, just triggering carries out donor's
Fingerprint collecting etc., to collect the finger print information of donor.
Step 2159, personnel identity information association is carried out to gate inhibition's card information by the gate inhibition's control device that links, is awarded
Weigh people's identity information.
It should be appreciated that in order to facilitate personnel's passage gate inhibition's banister, it is just pre- in access control equipment when installing gate inhibition's banister
Being associated with for gate inhibition's card information and personnel identity information is first carried out.
Specifically, the corresponding personnel identity information of personnel for acquiring this gate inhibition's banister that allows to pass through, carries out for those personnel
The registration of access permission obtains corresponding gate inhibition's card information by the registration of access permission, i.e. gate inhibition's card information can be from people
Extraction is formed in member's identity information, such as the card number that works, and can also be that random information has been carried out by personnel identity information
What coding generated, such as Quick Response Code can also be and other generating modes are encrypted etc. to personnel identity information, herein not
It is defined.
After being matched between gate inhibition's card information and personnel identity information, the people of corresponding storage gate inhibition's card information and pairing
Member's identity information, to form the association between gate inhibition's card information and corresponding personnel identity information, for institute in guest system
The identification procedure for being different from recognition of face carried out uses.
Therefore, the association of personnel identity information is carried out by the gate inhibition's control device that links, you can obtain corresponding access card letter
The personnel identity information of breath, as the obtained donor's identity information of personnel's identity information.
Wherein, the linkage is the deployment phase realization in guest system, that is, establishes the communication with access control equipment
Connection, for example, the communication connection can be cable LAN connection, the connection of wireless Wi-Fi connection, wireless blue tooth etc., herein
It is not limited.The linkage with access control equipment can be realized by the communication connection established, and then get gate inhibition
The relevant information stored in control device, for example, personnel identity information etc..
By process as described above, in guest system, donor's authentication can both be carried out by recognition of face,
It will also be carried out by the identification for being different from recognition of face.
For the donor's authentication carried out by recognition of face, if due to authorizing face to be made
Variation in type can also be via being different from recognition of face for example, worn glasses, and when leading to not pass through recognition of face
Identification carry out authentication, be not allowed to carry out the feelings of gate inhibition's mandate for visitor to avoid being mistakenly considered donor
Condition ensure that the reliability of guest system.
In one exemplary embodiment, after step 230, method as described above can also include the following steps:
Receive and store visitor gate inhibition's banister access behavioral data.
The access behavioral data of visitor is generated when visitor passes through gate inhibition's banister according to the access permission configured.
It is necessarily that each gate inhibition's banister is equipped with gate inhibition for example, for the access control equipment of a normal operation
Permission, only when the access permission that visitor is configured is consistent with the access permission that gate inhibition's banister is set, which can
Current gate inhibition's banister.
It is corresponding, it will will produce access behavioral data, example when visitor passes through gate inhibition's banister according to its access permission
Such as, which can be that visitor blocks generated charge time, gate inhibition position when swipe the card behavior by visitor
Etc..
Specifically, when visitor passes through gate inhibition's banister according to its access permission, charge time can be read in gate inhibition's banister
And gate inhibition position, and charge time and gate inhibition position are reported into access control equipment, it is stored by access control equipment
Form the access behavioral data of visitor.
When visitor terminates temporary visit, i.e., visitor is left by the gate inhibition's banister initially entered, then access control equipment will
The access behavioral data of the visitor feeds back to guest system so that guest system receives and stores the access behavior number of the visitor
According to.
By visitor access behavioral data record visitor enter behavior and come in and go out behavior, so that it is guaranteed that visitor visits temporarily
The safety asked.
Further, in addition to receiving and storing the access behavioral data of visitor, guest system can also be by donor's identity
Information is associated with visitor's identity information, and is stored to donor's identity information and associated visitor's identity information, with this
Record the identity of donor and visitor, it is ensured that visitor's temporary visit record is kept on file, while also giving donor and visitor's quilt
The psychological hint of record, and then the safety of visitor's temporary visit is further increased, while donor can also be avoided indiscriminate
With the right for carrying out gate inhibition's mandate for visitor's temporary visit.
Fig. 6 is a kind of specific implementation schematic diagram of entrance guard authorization method that realizing visitor's temporary visit in an application scenarios,
In conjunction with concrete application scene shown in fig. 6 and implementation environment shown in FIG. 1, to being directed to the interim of visitor in the embodiment of the present disclosure
The process for accessing progress gate inhibition's mandate is described.
In the gate inhibition for carrying out visitor's temporary visit authorizes, donor's selection carries out authentication by recognition of face, and
Authentication by when initiate the registration of visitor's identity to obtain visitor's identity information, and then by visitor's identity information in gate inhibition
Gate inhibition's mandate is carried out for the temporary visit of visitor in control device, in order to which follow-up access control equipment executes putting for gate inhibition's banister
Action is made.
Wherein, in order to ensure the reliability of visitor's temporary visit, identity has also been carried out before initiating the registration of visitor's identity
Secondary verification confirms that donor's information matches with donor with this.
To be that visitor prepares visitor in order to facilitate visitor's passage gate inhibition's banister in addition, after obtaining visitor's identity information
Card so that visitor can stick into out Administrative Area by brushing visitor.
Specifically, visitor's card information that gate inhibition's banister scanning visitor's card is entrained, and the visitor that scanning is obtained blocks letter
Breath reports to access control equipment, is verified to visitor's identity information by access control equipment, logical in visitor's authentication
Out-of-date access control banister executes clearance action so that visitor, which enters, carries out temporary visit inside building.
It is corresponding, when visitor's temporary visit to be terminated, visitor is brushed again and is blocked so that gate inhibition's banister will scan again
To visitor's card information report to access control equipment, and visitor's identity information is tested again by access control equipment
Card, when visitor's identity is verified again, access control banister executes clearance action, while being recovered as the door of the guest configuration
Prohibit permission so that visitor leaves building and terminates temporary visit.
In various embodiment of that present disclosure, by way of the network interconnection, the operating pressure of reception personnel has been disperseed, has improved
Efficiency is authorized to the gate inhibition of visitor's temporary visit, at the same time, the right of gate inhibition's mandate is carried out by the artificial visitor of grant authorization,
So that donor realizes that one-to-one interaction, existing careless omission when avoiding one-to-many are visited to improve visitor with visitor temporarily
The flexibility and safety asked.
Following is embodiment of the present disclosure, can be used for executing the door of realization visitor's temporary visit involved by the disclosure
Prohibit authorization method.For those undisclosed details in the apparatus embodiments, the realization visitor involved by the disclosure is please referred to face
When the entrance guard authorization method embodiment that accesses.
Referring to Fig. 7, in one exemplary embodiment, a kind of packet of gate inhibition's authorization device 700 for realizing visitor's temporary visit
It includes but is not limited to:Donor's authentication module 710, visitor's identity Registration Module 730 and access permission configuration module 750.
Wherein, donor's authentication module 710 is used to authorize the temporary visit of artificial visitor to carry out right in gate inhibition's mandate
Donor carries out authentication.
Visitor's identity Registration Module 730 is used for after the authentication of donor passes through, and is initiated the registration of visitor's identity and is obtained
Obtain visitor's identity information.
Access permission configuration module 750 is used to configure access permission according to the temporary visit that visitor's identity information is visitor,
Access permission is for controlling visitor's passage gate inhibition's banister.
Referring to Fig. 8, in one exemplary embodiment, donor's authentication module 710 includes but not limited to:Instruction is detectd
Listen unit 711, mode determination unit 713 and identity authenticating unit 715.
Wherein, instruction intercepts unit 711 for intercepting trigger action when artificial visitor being authorized to carry out gate inhibition's mandate, obtains
Authorization selection instruction.
Mode determination unit 713 is used to determine the authorization of donor's selection according to authorization selection instruction.
Identity authenticating unit 715 is used to carry out the authentication of donor according to the authorization that donor selects, and obtains
Donor's identity information determines that the authentication of donor passes through by the acquisition of donor's identity information.
Referring to Fig. 9, in one exemplary embodiment, authorization includes recognition of face.
Correspondingly, identity authenticating unit 715 includes but not limited to:Face collecting unit 7151, face matching unit 7153
With the first identity information associative cell 7155.
Wherein, face collecting unit 7151 is used to acquire the face image data of donor.
Face matching unit 7153 is used to carry out between face image data and pre-stored face representation data
Match, obtains the highest face representation data of matching degree.
First identity information associative cell 7155 be used for by the highest face representation data of matching degree into administrative staff's body
Part information association, authorized people's identity information.
In one exemplary embodiment, donor's authentication module 710 further includes but is not limited to:The secondary verification of identity is single
Member.
Wherein, the secondary authentication unit of identity is used to initiate the secondary verification of donor's identity according to donor's identity information, leads to
It crosses the secondary verification of donor's identity and judges whether the donor's identity information obtained matches with donor;If it has, then determining
The identity of donor is secondary to be verified.
Referring to Fig. 10, in one exemplary embodiment, authorization includes being different from the identification of recognition of face.
Correspondingly, identity authenticating unit 715 includes but not limited to:Access card information acquisition unit 7157 and the second identity letter
Cease associative cell 7159.
Wherein, access card information acquisition unit 7157 is used to acquire gate inhibition's card information of donor.
Second identity information associative cell 7159 is used for through the gate inhibition's control device that links to gate inhibition's card information into administrative staff
Identity information is associated with, authorized people's identity information.
In one exemplary embodiment, device 700 as described above further includes but is not limited to:Behavioral data memory module.
Wherein, behavioral data memory module passes through for receiving and storing visitor in the access behavioral data of gate inhibition's banister
The access behavioral data record visitor's of visitor enters behavior and the behavior that comes in and goes out.
Wherein, the access behavioral data of visitor is generated when visitor passes through gate inhibition's banister according to the access permission configured
's.
It should be noted that the gate inhibition's authorization device for realization visitor's temporary visit that above-described embodiment is provided is for visit
It, only the example of the division of the above functional modules, can in practical application when the temporary visit of visitor carries out gate inhibition's mandate
As needed to complete above-mentioned function distribution by different function modules, that is, realize that the gate inhibition of visitor's temporary visit authorizes dress
The internal structure set will be divided into different function modules, to complete all or part of the functions described above.
In addition, the gate inhibition's authorization device for realization visitor's temporary visit that above-described embodiment is provided is visited with visitor is realized temporarily
The embodiment for the entrance guard authorization method asked belongs to same design, and wherein modules execute the concrete mode of operation in method
It is described in detail in embodiment, details are not described herein again.
Figure 11 is a kind of the hard of gate inhibition's authorization device for realizing visitor's temporary visit shown according to an exemplary embodiment
Part structure diagram.The hardware configuration is an example for being applicable in the disclosure, is not construed as to the use scope of the disclosure
Any restrictions can not be construed to the disclosure and need to rely on the hardware configuration.
It is larger that this kind realizes that gate inhibition's authorization device 800 of visitor's temporary visit can generate due to the difference of configuration or performance
Difference, as shown in figure 11, which includes:Power supply 810, interface 830, at least a storage medium 850 and at least one
Central processing unit (CPU, Central Processing Units) 870.
Wherein, power supply 810 is used to provide operating voltage for each hardware device on device 800.
Interface 830 includes an at least wired or wireless network interface 831, at least a string and translation interface 833, at least one defeated
Enter output interface 835 and at least USB interface 837 etc., is used for and external device communication.
The carrier that storage medium 850 is stored as resource, can be random storage medium, disk or CD etc., thereon
The resource stored includes operating system 851, application program 853 and data 855 etc., storage mode can be of short duration storage or
It permanently stores.Wherein, operating system 851 be used for manage and control device 800 on each hardware device and application program 853,
Can be Windows ServerTM, Mac OS to realize calculating and processing of the central processing unit 870 to mass data 855
XTM, UnixTM, LinuxTM, FreeBSDTM etc..Application program 853 is special based at least one is completed on operating system 851
Surely the computer program to work, which may include an at least module (not shown), each module, have been separately included
Sequence of operations instruction to device 800.Data 855 can be stored in photo in disk, picture etc..
Central processing unit 870 may include the processor of one or more or more, and be set as being situated between by bus and storage
Matter 850 communicates, for operation and the mass data 855 in processing storage medium 850.
As described in detail above, being applicable in the device 800 of the disclosure will award for the temporary visit of visitor progress gate inhibition
Power, i.e., the form that the sequence of operations stored in storage medium 850 instruction is read by central processing unit 870 are awarded to carry out gate inhibition
Power, to be authorized by gate inhibition so that access permission passage gate inhibition's banister that visitor is configured according to it, realizes temporary visit.
In addition, also can equally realize the disclosure by hardware circuit or hardware circuit combination software instruction, therefore, realize
The disclosure is not limited to the combination of any specific hardware circuit, software and the two.
The above, only the preferable examples embodiment of the disclosure, the embodiment for being not intended to limit the disclosure, this
Field those of ordinary skill can very easily carry out corresponding flexible or repair according to the central scope and spirit of the disclosure
Change, therefore the protection domain of the disclosure should be subject to the protection domain required by claims.
Claims (12)
1. a kind of entrance guard authorization method for realizing visitor's temporary visit, which is characterized in that including:
The temporary visit of artificial visitor is authorized to carry out carrying out authentication to the donor in gate inhibition's mandate;
After the authentication of the donor passes through, initiates the registration of visitor's identity and obtain visitor's identity information;
Access permission is configured according to the temporary visit that the visitor's identity information is the visitor, the access permission is for controlling
Visitor's passage gate inhibition's banister.
2. the method as described in claim 1, which is characterized in that the temporary visit for authorizing artificial visitor carries out gate inhibition's mandate
In to the donor carry out authentication, including:
Intercept trigger action when the artificial visitor of the mandate carries out gate inhibition's mandate, authorized mode selection instruction;
The authorization of donor's selection is determined according to the authorization selection instruction;
The authorization selected according to the donor carries out the authentication of the donor, authorized people's identity information,
Determine that the authentication of the donor passes through by the acquisition of donor's identity information.
3. method as claimed in claim 2, which is characterized in that the authorization includes recognition of face, described according to described
The authorization of donor's selection carries out the authentication of the donor, authorized people's identity information, including:
Acquire the face image data of the donor;
The matching between the face image data and pre-stored face representation data is carried out, the highest people of matching degree is obtained
Face indicates data;
By carrying out personnel identity information association to the highest face representation data of the matching degree, donor's identity is obtained
Information.
4. method as claimed in claim 3, which is characterized in that the authorization according to donor selection carries out institute
State the authentication of donor, after authorized people's identity information, the method further includes:
The secondary verification of donor's identity is initiated according to donor's identity information, is sentenced by the secondary verification of donor's identity
Whether the donor's identity information that breaks matches with the donor;
It is verified if it has, then determining that the identity of the donor is secondary.
5. method as claimed in claim 2, which is characterized in that the authorization includes being different from the identity knowledge of recognition of face
Not, the authorization according to donor selection carries out the authentication of the donor, authorized person part letter
Breath, including:
Acquire gate inhibition's card information of the donor;
By linking, gate inhibition's control device carries out personnel identity information association to gate inhibition's card information, obtains the mandate person
Part information.
6. the method as described in claim 1, which is characterized in that the facing for the visitor according to the visitor's identity information
When access configuration access permission after, the method further includes:
The visitor is received and stored in the access behavioral data of gate inhibition's banister, passes through the access behavioral data of the visitor
Record the visitor enters behavior and discrepancy behavior, wherein
The access behavioral data of the visitor is when the visitor passes through gate inhibition's banister according to the access permission configured
It generates.
7. a kind of gate inhibition's authorization device for realizing visitor's temporary visit, which is characterized in that including:
Donor's authentication module, for authorize artificial visitor temporary visit carry out gate inhibition's mandate in the donor into
Row authentication;
Visitor's identity Registration Module is initiated the registration of visitor's identity and is obtained after passing through in the authentication of the donor
Visitor's identity information;
Access permission configuration module, for configuring gate inhibition's power according to the temporary visit that the visitor's identity information is the visitor
Limit, the access permission is for controlling visitor's passage gate inhibition's banister.
8. device as claimed in claim 7, which is characterized in that donor's authentication module includes:
Unit is intercepted in instruction, for intercepting trigger action when the artificial visitor of the mandate carries out gate inhibition's mandate, is awarded
Power mode selection instruction;
Mode determination unit, the authorization for determining donor's selection according to the authorization selection instruction;
Identity authenticating unit, the authorization for being selected according to the donor carry out the authentication of the donor, obtain
To donor's identity information, determine that the authentication of the donor passes through by the acquisition of donor's identity information.
9. device as claimed in claim 8, which is characterized in that the authorization includes recognition of face, the authentication
Unit includes:
Face collecting unit, the face image data for acquiring the donor;
Face matching unit, for carrying out the matching between the face image data and pre-stored face representation data,
Obtain the highest face representation data of matching degree;
First identity information associative cell, for by carrying out personnel identity letter to the highest face representation data of the matching degree
Breath association, obtains donor's identity information.
10. device as claimed in claim 9, which is characterized in that donor's authentication module further includes:
The secondary authentication unit of identity passes through institute for initiating the secondary verification of donor's identity according to donor's identity information
It states the secondary verification of donor's identity and judges whether the donor's identity information obtained matches with the donor;If
It is, it is determined that the identity of the donor is secondary to be verified.
11. device as claimed in claim 8, which is characterized in that the authorization includes being different from the identity of recognition of face
Identification, the identity authenticating unit include:
Access card information acquisition unit, gate inhibition's card information for acquiring the donor;
Second identity information associative cell, for carrying out personnel identity to gate inhibition's card information by the gate inhibition's control device that links
Information association obtains donor's identity information.
12. device as claimed in claim 7, which is characterized in that described device further includes:
Behavioral data memory module passes through for receiving and storing the visitor in the access behavioral data of gate inhibition's banister
The access behavioral data of the visitor records entrance behavior and the discrepancy behavior of the visitor, wherein
The access behavioral data of the visitor is when the visitor passes through gate inhibition's banister according to the access permission configured
It generates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710304241.9A CN108806025A (en) | 2017-05-03 | 2017-05-03 | Realize the entrance guard authorization method and device of visitor's temporary visit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710304241.9A CN108806025A (en) | 2017-05-03 | 2017-05-03 | Realize the entrance guard authorization method and device of visitor's temporary visit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108806025A true CN108806025A (en) | 2018-11-13 |
Family
ID=64054428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710304241.9A Pending CN108806025A (en) | 2017-05-03 | 2017-05-03 | Realize the entrance guard authorization method and device of visitor's temporary visit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108806025A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109472907A (en) * | 2018-12-27 | 2019-03-15 | 深圳市多度科技有限公司 | The current method, apparatus of visitor and door access machine are controlled in door access machine |
CN109598831A (en) * | 2018-11-20 | 2019-04-09 | 北京千丁互联科技有限公司 | A kind of visitor's access control system control method and its device based on image recognition |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of the temporary password of smart lock and its verification method |
CN109741499A (en) * | 2018-12-29 | 2019-05-10 | 深圳市多度科技有限公司 | The updating method of user information and device of door access machine |
CN109785476A (en) * | 2018-12-07 | 2019-05-21 | 深圳云天励飞技术有限公司 | Welcome's management method, system, electronic equipment and storage medium |
CN110070651A (en) * | 2019-04-25 | 2019-07-30 | 华翔翔能电气股份有限公司 | Visitor's passing method, access control system, terminal and the storage medium of access control system |
CN110322603A (en) * | 2019-06-18 | 2019-10-11 | 广东汇泰龙科技股份有限公司 | A kind of temporary password security protection method and system for intelligent door lock |
CN110335388A (en) * | 2019-06-28 | 2019-10-15 | 北京睿家科技有限公司 | Right management method and device |
CN111986049A (en) * | 2020-08-25 | 2020-11-24 | 中广核(深圳)运营技术与辐射监测有限公司 | Nuclear power station control area passing authorization query terminal and query method |
CN111986353A (en) * | 2020-08-20 | 2020-11-24 | 福建省家联宝智能科技有限公司 | Take face intelligent access control machine of NPU calculation and infrared temperature measurement |
CN112700580A (en) * | 2020-12-21 | 2021-04-23 | 新疆品宣生物科技有限责任公司 | Intelligent traffic management access control system and intelligent traffic management method |
CN114005208A (en) * | 2021-12-30 | 2022-02-01 | 深圳灏鹏科技有限公司 | Access control method, device, equipment and storage medium |
CN115223281A (en) * | 2022-07-19 | 2022-10-21 | 中国核电工程有限公司 | Access control system and access control method |
CN116992424A (en) * | 2023-09-28 | 2023-11-03 | 杭州行至云起科技有限公司 | Authorization code using method, device and system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103390297A (en) * | 2012-05-08 | 2013-11-13 | 新谊整合科技股份有限公司 | Multiple security control security system and security information processing method |
CN104184589A (en) * | 2014-08-26 | 2014-12-03 | 重庆邮电大学 | Identity authentication method, terminal device and system |
CN104463113A (en) * | 2014-11-28 | 2015-03-25 | 福建星网视易信息系统有限公司 | Face recognition method and device and access control system |
CN104484929A (en) * | 2014-12-22 | 2015-04-01 | 唐玉勇 | Novel community safety application system and implementing method |
CN105227307A (en) * | 2014-06-03 | 2016-01-06 | 阿里巴巴集团控股有限公司 | Auth method and system and server data processing method and server |
CN105550553A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Permission management method, terminal, device and system |
CN105574967A (en) * | 2015-12-16 | 2016-05-11 | 温州大学 | Intelligent access control system and operation method thereof |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN105913527A (en) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud |
CN108257268A (en) * | 2018-01-15 | 2018-07-06 | 广安众道电子商务有限公司 | A kind of intelligent entrance guard method for unlocking based on owner |
-
2017
- 2017-05-03 CN CN201710304241.9A patent/CN108806025A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103390297A (en) * | 2012-05-08 | 2013-11-13 | 新谊整合科技股份有限公司 | Multiple security control security system and security information processing method |
CN105227307A (en) * | 2014-06-03 | 2016-01-06 | 阿里巴巴集团控股有限公司 | Auth method and system and server data processing method and server |
CN104184589A (en) * | 2014-08-26 | 2014-12-03 | 重庆邮电大学 | Identity authentication method, terminal device and system |
CN104463113A (en) * | 2014-11-28 | 2015-03-25 | 福建星网视易信息系统有限公司 | Face recognition method and device and access control system |
CN104484929A (en) * | 2014-12-22 | 2015-04-01 | 唐玉勇 | Novel community safety application system and implementing method |
CN105550553A (en) * | 2015-06-30 | 2016-05-04 | 宇龙计算机通信科技(深圳)有限公司 | Permission management method, terminal, device and system |
CN105574967A (en) * | 2015-12-16 | 2016-05-11 | 温州大学 | Intelligent access control system and operation method thereof |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN105913527A (en) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud |
CN108257268A (en) * | 2018-01-15 | 2018-07-06 | 广安众道电子商务有限公司 | A kind of intelligent entrance guard method for unlocking based on owner |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109598831A (en) * | 2018-11-20 | 2019-04-09 | 北京千丁互联科技有限公司 | A kind of visitor's access control system control method and its device based on image recognition |
CN109785476B (en) * | 2018-12-07 | 2021-09-14 | 深圳云天励飞技术有限公司 | Welcome management method and system, electronic device and storage medium |
CN109785476A (en) * | 2018-12-07 | 2019-05-21 | 深圳云天励飞技术有限公司 | Welcome's management method, system, electronic equipment and storage medium |
CN109472907A (en) * | 2018-12-27 | 2019-03-15 | 深圳市多度科技有限公司 | The current method, apparatus of visitor and door access machine are controlled in door access machine |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of the temporary password of smart lock and its verification method |
CN109741499A (en) * | 2018-12-29 | 2019-05-10 | 深圳市多度科技有限公司 | The updating method of user information and device of door access machine |
CN110070651A (en) * | 2019-04-25 | 2019-07-30 | 华翔翔能电气股份有限公司 | Visitor's passing method, access control system, terminal and the storage medium of access control system |
CN110322603A (en) * | 2019-06-18 | 2019-10-11 | 广东汇泰龙科技股份有限公司 | A kind of temporary password security protection method and system for intelligent door lock |
CN110335388A (en) * | 2019-06-28 | 2019-10-15 | 北京睿家科技有限公司 | Right management method and device |
CN111986353A (en) * | 2020-08-20 | 2020-11-24 | 福建省家联宝智能科技有限公司 | Take face intelligent access control machine of NPU calculation and infrared temperature measurement |
CN111986049A (en) * | 2020-08-25 | 2020-11-24 | 中广核(深圳)运营技术与辐射监测有限公司 | Nuclear power station control area passing authorization query terminal and query method |
CN111986049B (en) * | 2020-08-25 | 2024-04-30 | 中广核(深圳)运营技术与辐射监测有限公司 | Nuclear power station control area passing authorization query terminal and query method |
CN112700580A (en) * | 2020-12-21 | 2021-04-23 | 新疆品宣生物科技有限责任公司 | Intelligent traffic management access control system and intelligent traffic management method |
CN112700580B (en) * | 2020-12-21 | 2023-02-21 | 新疆品宣生物科技有限责任公司 | Intelligent traffic management access control system and intelligent traffic management method |
CN114005208A (en) * | 2021-12-30 | 2022-02-01 | 深圳灏鹏科技有限公司 | Access control method, device, equipment and storage medium |
CN114005208B (en) * | 2021-12-30 | 2022-03-18 | 深圳灏鹏科技有限公司 | Access control method, device, equipment and storage medium |
CN115223281A (en) * | 2022-07-19 | 2022-10-21 | 中国核电工程有限公司 | Access control system and access control method |
CN116992424A (en) * | 2023-09-28 | 2023-11-03 | 杭州行至云起科技有限公司 | Authorization code using method, device and system |
CN116992424B (en) * | 2023-09-28 | 2024-02-02 | 杭州行至云起科技有限公司 | Authorization code using method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108806025A (en) | Realize the entrance guard authorization method and device of visitor's temporary visit | |
US8752145B1 (en) | Biometric authentication with smart mobile device | |
CN106068512B (en) | Method and apparatus for verifying user on the mobile device | |
US9953151B2 (en) | System and method identifying a user to an associated device | |
US10650132B1 (en) | Efficient startup and logon | |
US8918851B1 (en) | Juxtapositional image based authentication system and apparatus | |
US8407762B2 (en) | System for three level authentication of a user | |
KR102214247B1 (en) | Method and apparatus for service implementation | |
US11496471B2 (en) | Mobile enrollment using a known biometric | |
WO2014075011A1 (en) | Limited use tokens granting permission for biometric identity verfication | |
JP5603766B2 (en) | Information processing system, information processing method, and program | |
CN103971039B (en) | Access control system and method with GPS location verification | |
CN109413086A (en) | Line coker tests the method and device of identity information | |
CN105337974A (en) | Account authorization method, account login method, account authorization device and client end | |
US10482225B1 (en) | Method of authorization dialog organizing | |
US20060026427A1 (en) | Method and system for entity authentication using an untrusted device and a trusted device | |
AU2013205126A1 (en) | Facial recognition streamlined login | |
CN109684802A (en) | A kind of method and system providing a user artificial intelligence platform | |
CN110516427B (en) | Terminal user identity authentication method and device, storage medium and computer equipment | |
CN112329004A (en) | Method and device for face recognition and face password | |
US11823512B1 (en) | Smart access control system using an electronic card | |
JP7188660B1 (en) | System, Control Server, Control Server Control Method, Method, and Program | |
JP2004013865A (en) | Personal identification method by associative memory | |
CN107995213A (en) | Short message sending control method and device | |
WO2021197288A1 (en) | Multi step authentication method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181113 |
|
RJ01 | Rejection of invention patent application after publication |