[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108806025A - Realize the entrance guard authorization method and device of visitor's temporary visit - Google Patents

Realize the entrance guard authorization method and device of visitor's temporary visit Download PDF

Info

Publication number
CN108806025A
CN108806025A CN201710304241.9A CN201710304241A CN108806025A CN 108806025 A CN108806025 A CN 108806025A CN 201710304241 A CN201710304241 A CN 201710304241A CN 108806025 A CN108806025 A CN 108806025A
Authority
CN
China
Prior art keywords
donor
visitor
gate inhibition
identity
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710304241.9A
Other languages
Chinese (zh)
Inventor
朱佳
贾镕企
卓松
李俊聪
范铭
彭诗辉
罗挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710304241.9A priority Critical patent/CN108806025A/en
Publication of CN108806025A publication Critical patent/CN108806025A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

This disclosure relates to a kind of entrance guard authorization method that realizing visitor's temporary visit, the method includes:The temporary visit of artificial visitor is authorized to carry out carrying out authentication to the donor in gate inhibition's mandate;After the authentication of the donor passes through, initiates the registration of visitor's identity and obtain visitor's identity information;Access permission is configured according to the temporary visit that the visitor's identity information is the visitor, the access permission is for controlling visitor's passage gate inhibition's banister.The temporary visit that the method and device that the gate inhibition of the realization visitor's temporary visit provided using the disclosure is authorized can be directed to visitor improves gate inhibition's mandate efficiency.

Description

Realize the entrance guard authorization method and device of visitor's temporary visit
Technical field
This disclosure relates to field of computer technology more particularly to a kind of entrance guard authorization method for realizing visitor's temporary visit and Device.
Background technology
Currently, being usually provided with gate inhibition's banister in building, ensure to cannot be introduced into building to carry out the personnel of gate inhibition's mandate with this Portion in the world ensures the safety inside building with this.
In the daily work, it is inevitably present the temporary visit of visitor, for security consideration, is then needed for visitor Temporary visit carry out gate inhibition's mandate, by gate inhibition authorize be visitor temporary visit configure access permission so that visitor Can pass through corresponding gate inhibition's banister according to the access permission being configured, and enter inside building.
However, existing entrance guard authorization method is all based on greatly artificial realization, once the temporary visit of visitor has exceeded expection Duty range, can not only increase the operating pressure of reception personnel, cause visitor's stand-by period long, seriously affect gate inhibition and award The efficiency of power, and inevitably there is careless omission, reduce the safety of visitor's temporary visit.
Invention content
Based on this, one of the disclosure is designed to provide a kind of entrance guard authorization method for realizing visitor's temporary visit, uses In solve the problems, such as in the prior art be directed to visitor's temporary visit gate inhibition authorize it is less efficient.
In addition, another object of the present disclosure is to provide a kind of camera focusing detection device, for solving existing skill Gate inhibition in art for visitor's temporary visit authorizes less efficient problem.
In order to solve the above-mentioned technical problem, technical solution used by the disclosure is:
A kind of entrance guard authorization method for realizing visitor's temporary visit, including:The temporary visit of artificial visitor is authorized to carry out door Prohibit in authorizing and authentication is carried out to the donor;After the authentication of the donor passes through, visitor's identity is initiated Registration obtains visitor's identity information;Access permission, institute are configured according to the temporary visit that the visitor's identity information is the visitor Access permission is stated for controlling visitor's passage gate inhibition's banister.
A kind of gate inhibition's authorization device for realizing visitor's temporary visit, including:Donor's authentication module is used for donor It carries out carrying out authentication to the donor in gate inhibition's mandate for the temporary visit of visitor;Visitor's identity Registration Module, is used for After the authentication of the donor passes through, initiates the registration of visitor's identity and obtain visitor's identity information;Access permission configures Module, for configuring access permission according to the temporary visit that the visitor's identity information is the visitor, the access permission is used In control visitor's passage gate inhibition's banister.
Compared with prior art, the disclosure has the advantages that:
The authentication of donor is carried out in the temporary visit for authorizing artificial visitor carries out gate inhibition's mandate, and in donor Authentication by after initiate visitor's identity registration, obtain visitor's identity information, and then according to visitor's identity information be visit The temporary visit of visitor configures access permission, realizes visitor according to the corresponding gate inhibition's banister of access permission passage configured.
That is, the initiation of the authentication and the registration of visitor's identity carried out by donor, realizes self-service progress The gate inhibition of visitor's temporary visit authorizes, and discharges manpower with this, and the gate inhibition improved for visitor's temporary visit authorizes efficiency, simultaneously It avoids the problem that causing the safety of visitor's temporary visit to reduce due to there is careless omission.
In addition, the registration of visitor's identity is only carried out in the authentication of donor after, i.e., only it is allowed to as visitor Temporary visit carry out donor's identity of gate inhibition's mandate and be only legal, visitor's temporary visit is further strengthened with this Safety.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not The disclosure can be limited.
Description of the drawings
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is the schematic diagram of the implementation environment involved by the disclosure;
Fig. 2 is a kind of flow of entrance guard authorization method for realizing visitor's temporary visit shown according to an exemplary embodiment Figure;
Fig. 3 be in Fig. 2 corresponding embodiments step 210 in the flow chart of one embodiment;
Fig. 4 be in Fig. 3 corresponding embodiments step 215 in the flow chart of one embodiment;
Fig. 5 be in Fig. 3 corresponding embodiments step 215 in the flow chart of another embodiment;
Fig. 6 is a kind of specific implementation schematic diagram of entrance guard authorization method that realizing visitor's temporary visit in an application scenarios;
Fig. 7 is a kind of frame of gate inhibition's authorization device for realizing visitor's temporary visit shown according to an exemplary embodiment Figure;
Fig. 8 is that gate inhibition authorizes trigger module 710 in the block diagram of one embodiment in Fig. 7 corresponding embodiments;
Fig. 9 be in Fig. 8 corresponding embodiments identity authenticating unit 715 in the block diagram of one embodiment;
Figure 10 be in Fig. 8 corresponding embodiments identity authenticating unit 715 in the block diagram of another embodiment;
Figure 11 is a kind of the hard of gate inhibition's authorization device for realizing visitor's temporary visit shown according to an exemplary embodiment Part structure diagram.
Through the above attached drawings, it has been shown that the specific embodiment of the disclosure will be hereinafter described in more detail, these attached drawings It is not intended to limit the scope of this disclosure concept by any means with verbal description, but is by referring to specific embodiments Those skilled in the art illustrate the concept of the disclosure.
Specific implementation mode
Here will explanation be executed to exemplary embodiment in detail, the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of schematic diagram of the implementation environment involved by entrance guard authorization method for realizing visitor's temporary visit.The reality It is guest system 100 to apply environment, and guest system 100 includes visitor's accommodation 110, access control equipment 130, guest server 150 and data analytics server 170.
Wherein, camera, scanner, printer etc. are installed on visitor's accommodation 110, for guest system 100 It takes pictures to donor's progress face, the access card of donor and the identity card of visitor are scanned, prepare visitor for visitor Card etc..
Access control equipment 130 can be used for access control banister and execute clearance action.Access control equipment 130 can be arranged Have entrance guard card reader, gate inhibition's PIN PAD, gate inhibition's fingerprint input device or recognition of face gate inhibition's device etc., with by swiping the card, The modes such as password, fingerprint, recognition of face identify the access permission for authorizing current gate inhibition banister personnel, and then realize gate inhibition's banister The execution of clearance action.
Access control equipment 130 will also be equipped with memory, with by the memory to authorizing current gate inhibition banister personnel The relevant information of identity information and gate inhibition's banister be associated storage, which can be gate inhibition's card information, Men Jinquan Limit etc..
Guest server 150 authorizes for realizing the gate inhibition of visitor's temporary visit, under the cooperation of visitor's accommodation 110 Visitor's temporary visit is completed in the initiation that the gate inhibition for completing visitor's temporary visit authorizes under the cooperation of access control equipment 130 The configuration of access permission, and the personnel for authorizing current gate inhibition's banister are identified under the cooperation of data analytics server 170, in turn Realize the corresponding gate inhibition's banister of access permission passage that visitor is configured according to it.
Data analytics server 170 is then that guest server 150 provides data analysis clothes by external server interface Business, for example, the identity information of current gate inhibition's banister personnel authorize to be associated with, carries out authorizing current gate inhibition road in recognition of face Face characteristic matching of lock personnel etc..
Certainly, in different application scenarios, flexible deployment can be carried out to guest system 100 according to practical application request, For example, guest server 150 and data analytics server 170 can be deployed as the same server in guest system 100, or Person enables visitor's accommodation 110 be provided simultaneously with the function of guest server 150 and data analytics server 170, and the disclosure is not This is limited.
Referring to Fig. 2, in one exemplary embodiment, it is a kind of to realize that the entrance guard authorization method of visitor's temporary visit is suitable for Guest system 100 in implementation environment shown in Fig. 1, this kind realize that the entrance guard authorization method of visitor's temporary visit can be by visitor System 100 executes, and may comprise steps of:
Step 210, the temporary visit of artificial visitor is authorized to carry out carrying out authentication to donor in gate inhibition's mandate.
Donor can be the personnel of visitor's temporary visit, can also be the reception personnel in building.Pass through donor couple The temporary visit of visitor carries out gate inhibition's mandate, so that visitor, which can enter, carries out temporary visit inside building.
It should be appreciated that the premise that donor carries out the temporary visit of visitor gate inhibition's mandate is:Donor be allowed to for The temporary visit of visitor carries out gate inhibition's mandate, increases the safety of visitor's temporary visit with this.
As a result, in order to ensure donor is allowed to carry out gate inhibition's mandate for the temporary visit of visitor, it is necessary first to right Donor carries out authentication.In the present embodiment, it is to carry out visitor's temporary visit by triggering to carry out authentication to donor Gate inhibition authorize initiate, i.e., when triggering carry out visitor's temporary visit gate inhibition authorize when, donor's identity will be initiated first and tested The process of card, and then whether by authentication judge whether the donor is allowed to the interim visit for visitor according to donor It asks and carries out gate inhibition's mandate.
When donor is by authentication, that is, indicate really to register the identity of the donor in guest system, Also the identity for having turned out the donor is legal, therefore, can judge the donor be allowed to temporary visit to visitor into What row gate inhibition authorized.
Corresponding, if donor's authentication fails, the identity for having turned out the donor is illegal, and then judges that this is awarded Power people is not allowed to the temporary visit to visitor and carries out gate inhibition's mandate.
The authentication to donor is realized in the temporary visit for authorizing artificial visitor carries out gate inhibition's mandate as a result, it will Be conducive to subsequently improve the safety that the gate inhibition of visitor's temporary visit authorizes.
Step 230, it after the authentication of donor passes through, initiates the registration of visitor's identity and obtains visitor's identity information.
As previously mentioned, only donor's authentication by when, just show that donor is allowed to the interim of visitor It accesses and carries out gate inhibition's mandate, the visitor's identity enrollment process initiated after donor is by authentication as a result, is only The permitted polymerization process of guest system.
Visitor's identity enrollment process can be realized by scanning the identity card of visitor, can also input identity card by visitor Number, the relevant informations such as cell-phone number realize, can also be realized by the fingerprint of typing visitor, be not limited herein.
For visitor, you can visitor's identity registration is carried out according to any one of the above or a variety of realization methods, The registration of visitor's identity can determine the visitor's identity information corresponding to the visitor after finishing, and be faced the visitor with this basis When access carry out gate inhibition's mandate.
Corresponding to the different realization methods of visitor's identity enrollment process, visitor's identity information can be the identification card number of visitor Code, phone number, finger print information etc., can unique mark visitor's identity, be not also defined herein.
It is further appreciated that the possible more than one of visitor that donor is received, at this point, for multiple visitors' Same donor, the authentication carried out are directed to visitor's identity that the same donor is initiated without being repeated as many times Registration then needs repeatedly, i.e., for same donor, it is only necessary to an authentication is carried out, and for the more of the same donor A visitor needs to initiate multiple visitor's identity registration, each to be obtained in the visitor's identity enrollment process initiated each time Visitor's identity information corresponding to a visitor.
Step 250, access permission is configured according to the temporary visit that visitor's identity information is visitor.
Wherein, access permission is registered to be formed in access control equipment for gate inhibition's banister, and then passes through the registration Access permission controls corresponding gate inhibition's banister and executes clearance action.Access permission can be directed to all gate inhibition's banisters, also may be used To be gate inhibition's banister only for some working region, herein and it is not limited.
The access permission configured by the temporary visit of visitor will be used to control visitor's passage gate inhibition's banister.I.e. as the visitor When the access permission configured is consistent with access control equipment for the access permission set by gate inhibition's banister, visitor can be according to this The corresponding gate inhibition's banister of access permission passage.
For example, being gate inhibition road of the access permission only for working region where donor of the temporary visit configuration of visitor Lock so that visitor can only pass in and out in the working region where the donor, and can not pass in and out and be different from donor place work Other working regions for making region, the safety of visitor's temporary visit is ensured with this.
Further, effective time will be also arranged in the access permission configured by the temporary visit of visitor, that is, be more than effective The range access permission of time will be recovered, i.e., visitor can not be further according to the corresponding gate inhibition's banister of access permission passage.For example, Effective time could be provided as 24 hours, and the safety of visitor's temporary visit is improved with this.
For the temporary visit configuration access permission of visitor initiated after obtaining visitor's identity information in the present embodiment 's.That is, when obtaining visitor's identity information, that is, indicate the identity registration that corresponding visitor has been completed in guest system, Bian Kewei The temporary visit of the visitor carries out gate inhibition's mandate, that is, configures access permission.
Further, can also be that its preparation is visited by calling printer interface in order to facilitate visitor's passage gate inhibition's banister Visitor's card so that visitor only needs to block the corresponding gate inhibition's banister that can pass through by brushing visitor.Wherein, the entrained visitor of visitor's card Card information is uniquely corresponding to visitor's identity information, bar code, Quick Response Code, the number which can be randomly generated Word, letter etc. combine, so that the scanner installed on gate inhibition's banister is read out, and according to the visitor's card information read Execute clearance action.
Certainly, if being equipped with id card scanner on gate inhibition's banister, visitor can also execute brush by its identity card Card behavior, is not limited herein.
By process as described above, the gate inhibition of visitor's temporary visit of self-service progress in guest system authorizes, and allows mandate People can not handled the temporary visit demand of visitor at any time by time restriction, not only avoid falling into a long wait for visitor, be improved The visiting efficiency of visitor and flexibility, improve the experience sense of visitor's temporary visit, additionally it is possible to effectively discharge reception personnel Operating pressure, reduce cost of human resources, improve the reception efficiency of visitor.
In addition, in guest system only after donor's authentication passes through, the registration of visitor's identity can be initiated, is strengthened The safety of visitor's temporary visit.
Referring to Fig. 3, in one exemplary embodiment, step 210 may comprise steps of:
Step 211, trigger action when artificial visitor being authorized to carry out gate inhibition's mandate is intercepted, authorized mode selects to refer to It enables.
The process that authentication can be the donor's authentication carried out by recognition of face is carried out to donor, also may be used Can also be the donor's authentication carried out by password to be by the process of the donor's authentication for progress of swiping the card Process can also be the process of the donor's authentication carried out by fingerprint, not be limited herein.
Correspondingly, what donor can select can be used for verify own identification authorization will there are many, for example, authorizing Mode can be recognition of face, swipe the card, password, fingerprint etc..
Based on this, trigger action when artificial visitor being authorized to carry out gate inhibition's mandate is the selection for carrying out authorization, by This authorization selection instruction intercepted will be used to indicate that the selected authorization of donor, i.e., according to authorization Selection instruction can determine the selected authorization of donor.For example, triggering when artificial visitor being authorized to carry out gate inhibition's mandate Operation is to have clicked recognition of face, then the mandate of donor's selection can be determined according to thus obtained authorization selection instruction Mode is recognition of face.
Step 213, the authorization of donor's selection is determined according to authorization selection instruction.
Step 215, the authentication of donor, authorized person part letter are carried out according to the authorization of donor's selection Breath determines that the authentication of donor passes through by the acquisition of donor's identity information.
After the authorization for determining donor's selection, donor's authentication is just initiated according to the authorization Journey, and then authorized people's identity information in donor's authentication process itself.
Donor's identity information can unique mark donor's identity, donor's identity information may include donor ID card No., work card number, phone number, base extension, seating area number and other relevant informations, herein simultaneously It is not limited.
When obtaining donor's identity information, that is, indicate really to step on the identity of the donor in guest system Note, the identity for also having turned out the donor is legal, at this point, the authentication that donor is carried out passes through, can judge that this is awarded Power people is allowed to the temporary visit to visitor to carry out gate inhibition's mandate.
Corresponding, if donor's identity information can not be obtained, the identity for having turned out the donor is illegal, at this point, awarding The authentication that power people is carried out fails, then the donor is not allowed to the temporary visit to visitor and carries out gate inhibition's mandate.
For donor, authentication will be carried out according to its selected authorization, and pass through it in authentication It can determine donor's identity information corresponding to the donor afterwards, and be the temporary visit progress gate inhibition of visitor on this basis It authorizes.
Gate inhibition is carried out to visitor by being donor and authorizes to be equipped with a variety of different authorizations, i.e., so that donor can be with Arbitrarily select different modes to carry out donor's authentication, for example, the donor to forget Password can select by fingerprint into Row donor's authentication, or, forget that the donor with card can carry out donor's authentication by recognition of face, with This ensure that the high efficiency of authentication is implemented, and also be provided simultaneously with very high versatility.
Furthermore, it is possible to one of which authorization is used only, it can also be using two kinds or more of authorization come to awarding It weighs people and carries out authentication, specifically according to practical application scene will be adjusted flexibly, both enhance authentication Flexibility, and ensure that the reliability of authentication simultaneously, and then strengthen the safety of visitor's temporary visit.
Referring to Fig. 4, in one exemplary embodiment, authorization includes recognition of face, i.e., by recognition of face to awarding It weighs people and carries out authentication, and then pass through rear authorized people's identity information in recognition of face.
Correspondingly, step 215 may comprise steps of:
Step 2151, the face image data of donor is acquired.
After determining that the selected authorization of donor of authorization selection instruction instruction is recognition of face, just touch Hair carries out the acquisition of the face image data of donor.
Specifically, the camera laid in guest system is started by utilizing camera interface, and by camera to authorizing People carries out head portrait shooting, with the head portrait photo of this authorized people, the as face image data of donor.
Further, to ensure carried out between follow-up face image data and pre-stored face representation data The success rate matched can also carry out Face datection to face image data, confirm face image data as face using this, otherwise after It is continuous to execute step 2151, the face image data of donor is resurveyed, until face image data passes through Face datection.
Step 2153, the matching between face image data and pre-stored face representation data is carried out, is matched Spend highest face representation data.
Face representation data are the face characteristic description for being allowed to carry out the personnel of gate inhibition's mandate for visitor, pass through face Data are indicated to complete the face characteristic identification of donor, and then determine whether donor can be determined by authentication Whether donor is allowed to carry out gate inhibition's mandate for visitor.
It should be appreciated that being stored with a large amount of face representation data in guest system, that is to say, that energy in same guest system Enough it is personnel's more than one that visitor carries out gate inhibition's mandate.
As a result, after collecting the face image data of donor, it would be desirable to the face image data and face table Registration obtains the highest face representation data of matching degree according to being matched, with this, and the highest face representation data of the matching degree It is as described, is thus facilitated in the recognition of face subsequently carried out by the face characteristic of the obtained donor of recognition of face, Associated personnel identity information can be obtained by matching obtained face representation data, and believed in this, as donor's identity Therefore breath so that donor is by authentication, and confirms that donor is allowed to carry out gate inhibition for the temporary visit of visitor It authorizes.
Step 2155, authorized by carrying out personnel identity information association to the highest face representation data of matching degree People's identity information.
It should be noted that being not only the storage of face representation data, it is also associated with face representation data and corresponding people Member's identity information carries out in advance, i.e., is completed in the deployment phase of guest system.
Specifically, in the deployment phase of guest system, the facial image of a large amount of personnel is acquired, and pass through deep learning face Image obtains face representation data, after being matched between face representation data and personnel identity information, corresponding storage face The personnel identity information for indicating data and pairing, to form the pass between face representation data and corresponding personnel identity information Connection, so that the face recognition process conducted in guest system uses.
Therefore, the personnel of the highest face representation data of Corresponding matching degree are can be obtained by the association of personnel identity information Identity information, as the obtained donor's identity information of personnel's identity information.
Certainly, if failing to obtain by the association of personnel identity information corresponding with the highest face representation data of matching degree Personnel identity information indicates donor's authentication failure, then needs return to step 2151, resurvey the face of donor Image data.
By process as described above, the authentication of donor is carried out using recognition of face, extends authentication Versatility and reliability, it is advantageously ensured that the safety of visitor's temporary visit.
Further, after step 215, method as described above can also include the following steps:
The secondary verification of donor's identity is initiated according to donor's identity information, is obtained by the secondary verification judgement of donor's identity Whether the donor's identity information obtained matches with donor.
It is appreciated that for carrying out authentication to donor by recognition of face, it may be due to existing for recognition of face Error and cause obtain donor's identity information inaccuracy.
Based on this, after obtaining donor's identity information, the secondary verification of donor's identity will be initiated, acquisition is determined with this Donor's identity information it is whether accurate.
Specifically, authentication can be carried out by the identification information pair donor of unique mark donor's identity, need It is noted that the identification information is contained in donor's identity information, for example, the identification information can be donor ID card No., work card number, phone number, base extension, seating area number etc..
When donor returns to some above-mentioned identification information in response to the secondary verification of donor's identity, you can according to the mark Information is matched with identification information included in donor's identity information of acquisition, and then is obtained according to matching result judgement Whether the donor's identity information obtained matches with donor.If matching, you can judge that the donor's identity information obtained is certain It is donor, that is, determines that the identity of donor is secondary and be verified.
Pass through the secondary verification of the identity carried out to donor, it is ensured that the accuracy of donor's identity information avoids pair The erroneous grants of visitor's temporary visit ensure that the safety of visitor's temporary visit with this.
Certainly, it in different application scenarios, can neatly be selected to carry out body to donor according to practical application request The number of part verification carries out the secondary verification of donor's identity, waits for that donor's identity is secondary and be verified for example, when recognition of face The registration of visitor's identity is initiated later, or, when being different from the identification of recognition of face, only in donor's identity one-time authentication By the way that the registration of visitor's identity can be initiated later, it is not limited herein, to be conducive to subsequently improve visitor's temporary visit Flexibility.
Referring to Fig. 5, in a further exemplary embodiment, authorization includes being different from the identification of recognition of face, Authentication is carried out to donor by being different from other identification methods of recognition of face, for example, being different from recognition of face Identification can be swipe the card, password, fingerprint etc., and then pass through rear authorized people's identity information in authentication.
Step 215 may comprise steps of:
Step 2157, gate inhibition's card information of donor is acquired.
Access card has carried out the registration of access permission in access control equipment, can access control by the access permission Banister executes clearance action, i.e., when the access permission of access card and access control equipment are the access permission set by gate inhibition's banister When being consistent, donor can pass in and out gate inhibition's banister by brush access card.
Certainly, the function of access card is not limited in current gate inhibition's banister, and being alternatively arranged as the work of donor proves, example Such as, access card is the job card of donor, is not defined herein.
Determining that the selected authorization of donor of authorization selection instruction instruction is to be different from recognition of face After identification, in the present embodiment, which is to swipe the card, and just triggering carries out the people of donor The acquisition of face image data.
Specifically, gate inhibition's card is scanned by starting the scanner laid in guest system, it is authorized with this Gate inhibition's card information of people.Gate inhibition's card information can be number combination, monogram, can also be bar code form, Quick Response Code Form etc., herein without limiting.
It should be appreciated that if the identification for being different from recognition of face is password, just triggering carries out the Password Input of donor, To collect the encrypted message of donor.If the identification for being different from recognition of face is fingerprint, just triggering carries out donor's Fingerprint collecting etc., to collect the finger print information of donor.
Step 2159, personnel identity information association is carried out to gate inhibition's card information by the gate inhibition's control device that links, is awarded Weigh people's identity information.
It should be appreciated that in order to facilitate personnel's passage gate inhibition's banister, it is just pre- in access control equipment when installing gate inhibition's banister Being associated with for gate inhibition's card information and personnel identity information is first carried out.
Specifically, the corresponding personnel identity information of personnel for acquiring this gate inhibition's banister that allows to pass through, carries out for those personnel The registration of access permission obtains corresponding gate inhibition's card information by the registration of access permission, i.e. gate inhibition's card information can be from people Extraction is formed in member's identity information, such as the card number that works, and can also be that random information has been carried out by personnel identity information What coding generated, such as Quick Response Code can also be and other generating modes are encrypted etc. to personnel identity information, herein not It is defined.
After being matched between gate inhibition's card information and personnel identity information, the people of corresponding storage gate inhibition's card information and pairing Member's identity information, to form the association between gate inhibition's card information and corresponding personnel identity information, for institute in guest system The identification procedure for being different from recognition of face carried out uses.
Therefore, the association of personnel identity information is carried out by the gate inhibition's control device that links, you can obtain corresponding access card letter The personnel identity information of breath, as the obtained donor's identity information of personnel's identity information.
Wherein, the linkage is the deployment phase realization in guest system, that is, establishes the communication with access control equipment Connection, for example, the communication connection can be cable LAN connection, the connection of wireless Wi-Fi connection, wireless blue tooth etc., herein It is not limited.The linkage with access control equipment can be realized by the communication connection established, and then get gate inhibition The relevant information stored in control device, for example, personnel identity information etc..
By process as described above, in guest system, donor's authentication can both be carried out by recognition of face, It will also be carried out by the identification for being different from recognition of face.
For the donor's authentication carried out by recognition of face, if due to authorizing face to be made Variation in type can also be via being different from recognition of face for example, worn glasses, and when leading to not pass through recognition of face Identification carry out authentication, be not allowed to carry out the feelings of gate inhibition's mandate for visitor to avoid being mistakenly considered donor Condition ensure that the reliability of guest system.
In one exemplary embodiment, after step 230, method as described above can also include the following steps:
Receive and store visitor gate inhibition's banister access behavioral data.
The access behavioral data of visitor is generated when visitor passes through gate inhibition's banister according to the access permission configured.
It is necessarily that each gate inhibition's banister is equipped with gate inhibition for example, for the access control equipment of a normal operation Permission, only when the access permission that visitor is configured is consistent with the access permission that gate inhibition's banister is set, which can Current gate inhibition's banister.
It is corresponding, it will will produce access behavioral data, example when visitor passes through gate inhibition's banister according to its access permission Such as, which can be that visitor blocks generated charge time, gate inhibition position when swipe the card behavior by visitor Etc..
Specifically, when visitor passes through gate inhibition's banister according to its access permission, charge time can be read in gate inhibition's banister And gate inhibition position, and charge time and gate inhibition position are reported into access control equipment, it is stored by access control equipment Form the access behavioral data of visitor.
When visitor terminates temporary visit, i.e., visitor is left by the gate inhibition's banister initially entered, then access control equipment will The access behavioral data of the visitor feeds back to guest system so that guest system receives and stores the access behavior number of the visitor According to.
By visitor access behavioral data record visitor enter behavior and come in and go out behavior, so that it is guaranteed that visitor visits temporarily The safety asked.
Further, in addition to receiving and storing the access behavioral data of visitor, guest system can also be by donor's identity Information is associated with visitor's identity information, and is stored to donor's identity information and associated visitor's identity information, with this Record the identity of donor and visitor, it is ensured that visitor's temporary visit record is kept on file, while also giving donor and visitor's quilt The psychological hint of record, and then the safety of visitor's temporary visit is further increased, while donor can also be avoided indiscriminate With the right for carrying out gate inhibition's mandate for visitor's temporary visit.
Fig. 6 is a kind of specific implementation schematic diagram of entrance guard authorization method that realizing visitor's temporary visit in an application scenarios, In conjunction with concrete application scene shown in fig. 6 and implementation environment shown in FIG. 1, to being directed to the interim of visitor in the embodiment of the present disclosure The process for accessing progress gate inhibition's mandate is described.
In the gate inhibition for carrying out visitor's temporary visit authorizes, donor's selection carries out authentication by recognition of face, and Authentication by when initiate the registration of visitor's identity to obtain visitor's identity information, and then by visitor's identity information in gate inhibition Gate inhibition's mandate is carried out for the temporary visit of visitor in control device, in order to which follow-up access control equipment executes putting for gate inhibition's banister Action is made.
Wherein, in order to ensure the reliability of visitor's temporary visit, identity has also been carried out before initiating the registration of visitor's identity Secondary verification confirms that donor's information matches with donor with this.
To be that visitor prepares visitor in order to facilitate visitor's passage gate inhibition's banister in addition, after obtaining visitor's identity information Card so that visitor can stick into out Administrative Area by brushing visitor.
Specifically, visitor's card information that gate inhibition's banister scanning visitor's card is entrained, and the visitor that scanning is obtained blocks letter Breath reports to access control equipment, is verified to visitor's identity information by access control equipment, logical in visitor's authentication Out-of-date access control banister executes clearance action so that visitor, which enters, carries out temporary visit inside building.
It is corresponding, when visitor's temporary visit to be terminated, visitor is brushed again and is blocked so that gate inhibition's banister will scan again To visitor's card information report to access control equipment, and visitor's identity information is tested again by access control equipment Card, when visitor's identity is verified again, access control banister executes clearance action, while being recovered as the door of the guest configuration Prohibit permission so that visitor leaves building and terminates temporary visit.
In various embodiment of that present disclosure, by way of the network interconnection, the operating pressure of reception personnel has been disperseed, has improved Efficiency is authorized to the gate inhibition of visitor's temporary visit, at the same time, the right of gate inhibition's mandate is carried out by the artificial visitor of grant authorization, So that donor realizes that one-to-one interaction, existing careless omission when avoiding one-to-many are visited to improve visitor with visitor temporarily The flexibility and safety asked.
Following is embodiment of the present disclosure, can be used for executing the door of realization visitor's temporary visit involved by the disclosure Prohibit authorization method.For those undisclosed details in the apparatus embodiments, the realization visitor involved by the disclosure is please referred to face When the entrance guard authorization method embodiment that accesses.
Referring to Fig. 7, in one exemplary embodiment, a kind of packet of gate inhibition's authorization device 700 for realizing visitor's temporary visit It includes but is not limited to:Donor's authentication module 710, visitor's identity Registration Module 730 and access permission configuration module 750.
Wherein, donor's authentication module 710 is used to authorize the temporary visit of artificial visitor to carry out right in gate inhibition's mandate Donor carries out authentication.
Visitor's identity Registration Module 730 is used for after the authentication of donor passes through, and is initiated the registration of visitor's identity and is obtained Obtain visitor's identity information.
Access permission configuration module 750 is used to configure access permission according to the temporary visit that visitor's identity information is visitor, Access permission is for controlling visitor's passage gate inhibition's banister.
Referring to Fig. 8, in one exemplary embodiment, donor's authentication module 710 includes but not limited to:Instruction is detectd Listen unit 711, mode determination unit 713 and identity authenticating unit 715.
Wherein, instruction intercepts unit 711 for intercepting trigger action when artificial visitor being authorized to carry out gate inhibition's mandate, obtains Authorization selection instruction.
Mode determination unit 713 is used to determine the authorization of donor's selection according to authorization selection instruction.
Identity authenticating unit 715 is used to carry out the authentication of donor according to the authorization that donor selects, and obtains Donor's identity information determines that the authentication of donor passes through by the acquisition of donor's identity information.
Referring to Fig. 9, in one exemplary embodiment, authorization includes recognition of face.
Correspondingly, identity authenticating unit 715 includes but not limited to:Face collecting unit 7151, face matching unit 7153 With the first identity information associative cell 7155.
Wherein, face collecting unit 7151 is used to acquire the face image data of donor.
Face matching unit 7153 is used to carry out between face image data and pre-stored face representation data Match, obtains the highest face representation data of matching degree.
First identity information associative cell 7155 be used for by the highest face representation data of matching degree into administrative staff's body Part information association, authorized people's identity information.
In one exemplary embodiment, donor's authentication module 710 further includes but is not limited to:The secondary verification of identity is single Member.
Wherein, the secondary authentication unit of identity is used to initiate the secondary verification of donor's identity according to donor's identity information, leads to It crosses the secondary verification of donor's identity and judges whether the donor's identity information obtained matches with donor;If it has, then determining The identity of donor is secondary to be verified.
Referring to Fig. 10, in one exemplary embodiment, authorization includes being different from the identification of recognition of face.
Correspondingly, identity authenticating unit 715 includes but not limited to:Access card information acquisition unit 7157 and the second identity letter Cease associative cell 7159.
Wherein, access card information acquisition unit 7157 is used to acquire gate inhibition's card information of donor.
Second identity information associative cell 7159 is used for through the gate inhibition's control device that links to gate inhibition's card information into administrative staff Identity information is associated with, authorized people's identity information.
In one exemplary embodiment, device 700 as described above further includes but is not limited to:Behavioral data memory module.
Wherein, behavioral data memory module passes through for receiving and storing visitor in the access behavioral data of gate inhibition's banister The access behavioral data record visitor's of visitor enters behavior and the behavior that comes in and goes out.
Wherein, the access behavioral data of visitor is generated when visitor passes through gate inhibition's banister according to the access permission configured 's.
It should be noted that the gate inhibition's authorization device for realization visitor's temporary visit that above-described embodiment is provided is for visit It, only the example of the division of the above functional modules, can in practical application when the temporary visit of visitor carries out gate inhibition's mandate As needed to complete above-mentioned function distribution by different function modules, that is, realize that the gate inhibition of visitor's temporary visit authorizes dress The internal structure set will be divided into different function modules, to complete all or part of the functions described above.
In addition, the gate inhibition's authorization device for realization visitor's temporary visit that above-described embodiment is provided is visited with visitor is realized temporarily The embodiment for the entrance guard authorization method asked belongs to same design, and wherein modules execute the concrete mode of operation in method It is described in detail in embodiment, details are not described herein again.
Figure 11 is a kind of the hard of gate inhibition's authorization device for realizing visitor's temporary visit shown according to an exemplary embodiment Part structure diagram.The hardware configuration is an example for being applicable in the disclosure, is not construed as to the use scope of the disclosure Any restrictions can not be construed to the disclosure and need to rely on the hardware configuration.
It is larger that this kind realizes that gate inhibition's authorization device 800 of visitor's temporary visit can generate due to the difference of configuration or performance Difference, as shown in figure 11, which includes:Power supply 810, interface 830, at least a storage medium 850 and at least one Central processing unit (CPU, Central Processing Units) 870.
Wherein, power supply 810 is used to provide operating voltage for each hardware device on device 800.
Interface 830 includes an at least wired or wireless network interface 831, at least a string and translation interface 833, at least one defeated Enter output interface 835 and at least USB interface 837 etc., is used for and external device communication.
The carrier that storage medium 850 is stored as resource, can be random storage medium, disk or CD etc., thereon The resource stored includes operating system 851, application program 853 and data 855 etc., storage mode can be of short duration storage or It permanently stores.Wherein, operating system 851 be used for manage and control device 800 on each hardware device and application program 853, Can be Windows ServerTM, Mac OS to realize calculating and processing of the central processing unit 870 to mass data 855 XTM, UnixTM, LinuxTM, FreeBSDTM etc..Application program 853 is special based at least one is completed on operating system 851 Surely the computer program to work, which may include an at least module (not shown), each module, have been separately included Sequence of operations instruction to device 800.Data 855 can be stored in photo in disk, picture etc..
Central processing unit 870 may include the processor of one or more or more, and be set as being situated between by bus and storage Matter 850 communicates, for operation and the mass data 855 in processing storage medium 850.
As described in detail above, being applicable in the device 800 of the disclosure will award for the temporary visit of visitor progress gate inhibition Power, i.e., the form that the sequence of operations stored in storage medium 850 instruction is read by central processing unit 870 are awarded to carry out gate inhibition Power, to be authorized by gate inhibition so that access permission passage gate inhibition's banister that visitor is configured according to it, realizes temporary visit.
In addition, also can equally realize the disclosure by hardware circuit or hardware circuit combination software instruction, therefore, realize The disclosure is not limited to the combination of any specific hardware circuit, software and the two.
The above, only the preferable examples embodiment of the disclosure, the embodiment for being not intended to limit the disclosure, this Field those of ordinary skill can very easily carry out corresponding flexible or repair according to the central scope and spirit of the disclosure Change, therefore the protection domain of the disclosure should be subject to the protection domain required by claims.

Claims (12)

1. a kind of entrance guard authorization method for realizing visitor's temporary visit, which is characterized in that including:
The temporary visit of artificial visitor is authorized to carry out carrying out authentication to the donor in gate inhibition's mandate;
After the authentication of the donor passes through, initiates the registration of visitor's identity and obtain visitor's identity information;
Access permission is configured according to the temporary visit that the visitor's identity information is the visitor, the access permission is for controlling Visitor's passage gate inhibition's banister.
2. the method as described in claim 1, which is characterized in that the temporary visit for authorizing artificial visitor carries out gate inhibition's mandate In to the donor carry out authentication, including:
Intercept trigger action when the artificial visitor of the mandate carries out gate inhibition's mandate, authorized mode selection instruction;
The authorization of donor's selection is determined according to the authorization selection instruction;
The authorization selected according to the donor carries out the authentication of the donor, authorized people's identity information, Determine that the authentication of the donor passes through by the acquisition of donor's identity information.
3. method as claimed in claim 2, which is characterized in that the authorization includes recognition of face, described according to described The authorization of donor's selection carries out the authentication of the donor, authorized people's identity information, including:
Acquire the face image data of the donor;
The matching between the face image data and pre-stored face representation data is carried out, the highest people of matching degree is obtained Face indicates data;
By carrying out personnel identity information association to the highest face representation data of the matching degree, donor's identity is obtained Information.
4. method as claimed in claim 3, which is characterized in that the authorization according to donor selection carries out institute State the authentication of donor, after authorized people's identity information, the method further includes:
The secondary verification of donor's identity is initiated according to donor's identity information, is sentenced by the secondary verification of donor's identity Whether the donor's identity information that breaks matches with the donor;
It is verified if it has, then determining that the identity of the donor is secondary.
5. method as claimed in claim 2, which is characterized in that the authorization includes being different from the identity knowledge of recognition of face Not, the authorization according to donor selection carries out the authentication of the donor, authorized person part letter Breath, including:
Acquire gate inhibition's card information of the donor;
By linking, gate inhibition's control device carries out personnel identity information association to gate inhibition's card information, obtains the mandate person Part information.
6. the method as described in claim 1, which is characterized in that the facing for the visitor according to the visitor's identity information When access configuration access permission after, the method further includes:
The visitor is received and stored in the access behavioral data of gate inhibition's banister, passes through the access behavioral data of the visitor Record the visitor enters behavior and discrepancy behavior, wherein
The access behavioral data of the visitor is when the visitor passes through gate inhibition's banister according to the access permission configured It generates.
7. a kind of gate inhibition's authorization device for realizing visitor's temporary visit, which is characterized in that including:
Donor's authentication module, for authorize artificial visitor temporary visit carry out gate inhibition's mandate in the donor into Row authentication;
Visitor's identity Registration Module is initiated the registration of visitor's identity and is obtained after passing through in the authentication of the donor Visitor's identity information;
Access permission configuration module, for configuring gate inhibition's power according to the temporary visit that the visitor's identity information is the visitor Limit, the access permission is for controlling visitor's passage gate inhibition's banister.
8. device as claimed in claim 7, which is characterized in that donor's authentication module includes:
Unit is intercepted in instruction, for intercepting trigger action when the artificial visitor of the mandate carries out gate inhibition's mandate, is awarded Power mode selection instruction;
Mode determination unit, the authorization for determining donor's selection according to the authorization selection instruction;
Identity authenticating unit, the authorization for being selected according to the donor carry out the authentication of the donor, obtain To donor's identity information, determine that the authentication of the donor passes through by the acquisition of donor's identity information.
9. device as claimed in claim 8, which is characterized in that the authorization includes recognition of face, the authentication Unit includes:
Face collecting unit, the face image data for acquiring the donor;
Face matching unit, for carrying out the matching between the face image data and pre-stored face representation data, Obtain the highest face representation data of matching degree;
First identity information associative cell, for by carrying out personnel identity letter to the highest face representation data of the matching degree Breath association, obtains donor's identity information.
10. device as claimed in claim 9, which is characterized in that donor's authentication module further includes:
The secondary authentication unit of identity passes through institute for initiating the secondary verification of donor's identity according to donor's identity information It states the secondary verification of donor's identity and judges whether the donor's identity information obtained matches with the donor;If It is, it is determined that the identity of the donor is secondary to be verified.
11. device as claimed in claim 8, which is characterized in that the authorization includes being different from the identity of recognition of face Identification, the identity authenticating unit include:
Access card information acquisition unit, gate inhibition's card information for acquiring the donor;
Second identity information associative cell, for carrying out personnel identity to gate inhibition's card information by the gate inhibition's control device that links Information association obtains donor's identity information.
12. device as claimed in claim 7, which is characterized in that described device further includes:
Behavioral data memory module passes through for receiving and storing the visitor in the access behavioral data of gate inhibition's banister The access behavioral data of the visitor records entrance behavior and the discrepancy behavior of the visitor, wherein
The access behavioral data of the visitor is when the visitor passes through gate inhibition's banister according to the access permission configured It generates.
CN201710304241.9A 2017-05-03 2017-05-03 Realize the entrance guard authorization method and device of visitor's temporary visit Pending CN108806025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710304241.9A CN108806025A (en) 2017-05-03 2017-05-03 Realize the entrance guard authorization method and device of visitor's temporary visit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710304241.9A CN108806025A (en) 2017-05-03 2017-05-03 Realize the entrance guard authorization method and device of visitor's temporary visit

Publications (1)

Publication Number Publication Date
CN108806025A true CN108806025A (en) 2018-11-13

Family

ID=64054428

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710304241.9A Pending CN108806025A (en) 2017-05-03 2017-05-03 Realize the entrance guard authorization method and device of visitor's temporary visit

Country Status (1)

Country Link
CN (1) CN108806025A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472907A (en) * 2018-12-27 2019-03-15 深圳市多度科技有限公司 The current method, apparatus of visitor and door access machine are controlled in door access machine
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN109741500A (en) * 2018-12-29 2019-05-10 北京方正数码有限公司 A kind of setting of the temporary password of smart lock and its verification method
CN109741499A (en) * 2018-12-29 2019-05-10 深圳市多度科技有限公司 The updating method of user information and device of door access machine
CN109785476A (en) * 2018-12-07 2019-05-21 深圳云天励飞技术有限公司 Welcome's management method, system, electronic equipment and storage medium
CN110070651A (en) * 2019-04-25 2019-07-30 华翔翔能电气股份有限公司 Visitor's passing method, access control system, terminal and the storage medium of access control system
CN110322603A (en) * 2019-06-18 2019-10-11 广东汇泰龙科技股份有限公司 A kind of temporary password security protection method and system for intelligent door lock
CN110335388A (en) * 2019-06-28 2019-10-15 北京睿家科技有限公司 Right management method and device
CN111986049A (en) * 2020-08-25 2020-11-24 中广核(深圳)运营技术与辐射监测有限公司 Nuclear power station control area passing authorization query terminal and query method
CN111986353A (en) * 2020-08-20 2020-11-24 福建省家联宝智能科技有限公司 Take face intelligent access control machine of NPU calculation and infrared temperature measurement
CN112700580A (en) * 2020-12-21 2021-04-23 新疆品宣生物科技有限责任公司 Intelligent traffic management access control system and intelligent traffic management method
CN114005208A (en) * 2021-12-30 2022-02-01 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN115223281A (en) * 2022-07-19 2022-10-21 中国核电工程有限公司 Access control system and access control method
CN116992424A (en) * 2023-09-28 2023-11-03 杭州行至云起科技有限公司 Authorization code using method, device and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390297A (en) * 2012-05-08 2013-11-13 新谊整合科技股份有限公司 Multiple security control security system and security information processing method
CN104184589A (en) * 2014-08-26 2014-12-03 重庆邮电大学 Identity authentication method, terminal device and system
CN104463113A (en) * 2014-11-28 2015-03-25 福建星网视易信息系统有限公司 Face recognition method and device and access control system
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN105227307A (en) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 Auth method and system and server data processing method and server
CN105550553A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Permission management method, terminal, device and system
CN105574967A (en) * 2015-12-16 2016-05-11 温州大学 Intelligent access control system and operation method thereof
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN108257268A (en) * 2018-01-15 2018-07-06 广安众道电子商务有限公司 A kind of intelligent entrance guard method for unlocking based on owner

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390297A (en) * 2012-05-08 2013-11-13 新谊整合科技股份有限公司 Multiple security control security system and security information processing method
CN105227307A (en) * 2014-06-03 2016-01-06 阿里巴巴集团控股有限公司 Auth method and system and server data processing method and server
CN104184589A (en) * 2014-08-26 2014-12-03 重庆邮电大学 Identity authentication method, terminal device and system
CN104463113A (en) * 2014-11-28 2015-03-25 福建星网视易信息系统有限公司 Face recognition method and device and access control system
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN105550553A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Permission management method, terminal, device and system
CN105574967A (en) * 2015-12-16 2016-05-11 温州大学 Intelligent access control system and operation method thereof
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN108257268A (en) * 2018-01-15 2018-07-06 广安众道电子商务有限公司 A kind of intelligent entrance guard method for unlocking based on owner

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN109785476B (en) * 2018-12-07 2021-09-14 深圳云天励飞技术有限公司 Welcome management method and system, electronic device and storage medium
CN109785476A (en) * 2018-12-07 2019-05-21 深圳云天励飞技术有限公司 Welcome's management method, system, electronic equipment and storage medium
CN109472907A (en) * 2018-12-27 2019-03-15 深圳市多度科技有限公司 The current method, apparatus of visitor and door access machine are controlled in door access machine
CN109741500A (en) * 2018-12-29 2019-05-10 北京方正数码有限公司 A kind of setting of the temporary password of smart lock and its verification method
CN109741499A (en) * 2018-12-29 2019-05-10 深圳市多度科技有限公司 The updating method of user information and device of door access machine
CN110070651A (en) * 2019-04-25 2019-07-30 华翔翔能电气股份有限公司 Visitor's passing method, access control system, terminal and the storage medium of access control system
CN110322603A (en) * 2019-06-18 2019-10-11 广东汇泰龙科技股份有限公司 A kind of temporary password security protection method and system for intelligent door lock
CN110335388A (en) * 2019-06-28 2019-10-15 北京睿家科技有限公司 Right management method and device
CN111986353A (en) * 2020-08-20 2020-11-24 福建省家联宝智能科技有限公司 Take face intelligent access control machine of NPU calculation and infrared temperature measurement
CN111986049A (en) * 2020-08-25 2020-11-24 中广核(深圳)运营技术与辐射监测有限公司 Nuclear power station control area passing authorization query terminal and query method
CN111986049B (en) * 2020-08-25 2024-04-30 中广核(深圳)运营技术与辐射监测有限公司 Nuclear power station control area passing authorization query terminal and query method
CN112700580A (en) * 2020-12-21 2021-04-23 新疆品宣生物科技有限责任公司 Intelligent traffic management access control system and intelligent traffic management method
CN112700580B (en) * 2020-12-21 2023-02-21 新疆品宣生物科技有限责任公司 Intelligent traffic management access control system and intelligent traffic management method
CN114005208A (en) * 2021-12-30 2022-02-01 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN114005208B (en) * 2021-12-30 2022-03-18 深圳灏鹏科技有限公司 Access control method, device, equipment and storage medium
CN115223281A (en) * 2022-07-19 2022-10-21 中国核电工程有限公司 Access control system and access control method
CN116992424A (en) * 2023-09-28 2023-11-03 杭州行至云起科技有限公司 Authorization code using method, device and system
CN116992424B (en) * 2023-09-28 2024-02-02 杭州行至云起科技有限公司 Authorization code using method, device and system

Similar Documents

Publication Publication Date Title
CN108806025A (en) Realize the entrance guard authorization method and device of visitor's temporary visit
US8752145B1 (en) Biometric authentication with smart mobile device
CN106068512B (en) Method and apparatus for verifying user on the mobile device
US9953151B2 (en) System and method identifying a user to an associated device
US10650132B1 (en) Efficient startup and logon
US8918851B1 (en) Juxtapositional image based authentication system and apparatus
US8407762B2 (en) System for three level authentication of a user
KR102214247B1 (en) Method and apparatus for service implementation
US11496471B2 (en) Mobile enrollment using a known biometric
WO2014075011A1 (en) Limited use tokens granting permission for biometric identity verfication
JP5603766B2 (en) Information processing system, information processing method, and program
CN103971039B (en) Access control system and method with GPS location verification
CN109413086A (en) Line coker tests the method and device of identity information
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
US10482225B1 (en) Method of authorization dialog organizing
US20060026427A1 (en) Method and system for entity authentication using an untrusted device and a trusted device
AU2013205126A1 (en) Facial recognition streamlined login
CN109684802A (en) A kind of method and system providing a user artificial intelligence platform
CN110516427B (en) Terminal user identity authentication method and device, storage medium and computer equipment
CN112329004A (en) Method and device for face recognition and face password
US11823512B1 (en) Smart access control system using an electronic card
JP7188660B1 (en) System, Control Server, Control Server Control Method, Method, and Program
JP2004013865A (en) Personal identification method by associative memory
CN107995213A (en) Short message sending control method and device
WO2021197288A1 (en) Multi step authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181113

RJ01 Rejection of invention patent application after publication