[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109961541A - A kind of method of access control, computer equipment and readable storage medium storing program for executing - Google Patents

A kind of method of access control, computer equipment and readable storage medium storing program for executing Download PDF

Info

Publication number
CN109961541A
CN109961541A CN201711433530.5A CN201711433530A CN109961541A CN 109961541 A CN109961541 A CN 109961541A CN 201711433530 A CN201711433530 A CN 201711433530A CN 109961541 A CN109961541 A CN 109961541A
Authority
CN
China
Prior art keywords
visitor
information
gate inhibition
identification information
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711433530.5A
Other languages
Chinese (zh)
Inventor
张斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201711433530.5A priority Critical patent/CN109961541A/en
Priority to PCT/CN2018/119993 priority patent/WO2019128681A1/en
Publication of CN109961541A publication Critical patent/CN109961541A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/02Reservations, e.g. for tickets, services or events
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of method of access control, computer equipment and readable storage medium storing program for executing, wherein this method comprises: receiving the room identification information of visitor's input, generates corresponding identifying code according to room identification information;Obtain the visitor's identity information that visitor generates according to identifying code;Visitor's identity information is verified according to room identification information corresponding authentication information, switch control is carried out to gate inhibition according to verification result;Method, computer equipment and readable storage medium storing program for executing of the invention can obtain the identity information of visitor, i.e. so that visitor needs to input the identity information of visitor itself by two dimensional code to complete authentication, visitor is realized to enter from registration, the problems such as visitor registers deceptive information is avoided whereby, and house-owner can accurately identify visitor and access control at any time.

Description

A kind of method of access control, computer equipment and readable storage medium storing program for executing
Technical field
The present invention relates to the communications field more particularly to a kind of methods of access control, computer equipment and readable storage medium Matter.
Background technique
The daily control entered to visitor is weaker, moreover, mainly being controlled by manpower.Such as: it is required that visitor The information such as visitor's title and access address are registered, still, the information that property can not but provide visitor is screened and checked.And And since part visitor worries because of identity information leakage possible trouble, false identities information can be deliberately provided to object Industry, in this way, just bringing uncertain and hidden danger to the safety of cell.
Summary of the invention
It is a primary object of the present invention to propose a kind of method of access control, computer equipment and readable storage medium storing program for executing, It aims at visitor to enter from registering, house-owner can accurately identify visitor and access control at any time, to overcome conventional cell door In taboo the problems such as visitor's deceptive information.
According to an aspect of the invention, there is provided a kind of method of access control, which comprises
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to Verification result carries out switch control to gate inhibition.
It is optionally, described that switch control is carried out to gate inhibition according to verification result, comprising:
What is be verified according to the corresponding authentication information of the room identification information to the visitor's identity information In the case of, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through according to the room identification information corresponding authentication information And in the case where needing to verify visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, it is logical for house-owner The verifying channel is crossed to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner System.
Optionally, the visitor's identity information is verified according to the room identification information corresponding authentication information After not passing through, the method also includes:
The reminder message whether inquiry visitor continues requests verification is sent to gate inhibition or visitor's terminal.
Optionally, the room identification information for receiving visitor's input generates corresponding according to the room identification information Before identifying code, the method also includes:
Receive permission visitor's authentication information that house-owner is issued by verifying terminal;Permission visitor's authentication letter Breath has timeliness;
It is described that the visitor's identity information is verified according to the room identification information corresponding authentication information, Include:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
Optionally, the identifying code includes: the identifying code of the verifying Termination ID of the corresponding house-owner of the room identification information.
Optionally, the authentication information includes at least one of following register: address list, preset permission visitor's register And preset forbid visitor's register.
According to the second aspect of the invention, it provides a kind of computer equipment, including memory, processor and is stored in On the memory and the computer program that can run on the processor, the processor realize one when executing described program The following steps of the method for kind access control:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to Verification result carries out switch control to gate inhibition.
Optionally, the processor execute it is described according to verification result to gate inhibition carry out switch control when, specifically include:
What is be verified according to the corresponding authentication information of the room identification information to the visitor's identity information In the case of, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through according to the room identification information corresponding authentication information And in the case where needing to verify visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, it is logical for house-owner The verifying channel is crossed to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner System.
Optionally, the processor is being executed according to the corresponding authentication information of the room identification information to the visit After objective identity information verifying does not pass through, following steps are also executed: sending whether inquiry visitor continues to gate inhibition or visitor's terminal The reminder message of requests verification.
Optionally, the processor is executing the room identification information for receiving visitor's input, knows according to the room Before other information generates corresponding identifying code, following steps are also executed: receiving the permission visitor that house-owner is issued by verifying terminal Authentication information;Permission visitor's authentication information has timeliness;
The processor is executing the room identification information for receiving visitor's input, raw according to the room identification information When at corresponding identifying code, specifically include:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
According to the third aspect of the present invention, a kind of computer readable storage medium is provided, is deposited on the storage medium The step of containing computer program, a kind of method of above-mentioned access control realized when described program is executed by processor.
The present invention has the beneficial effect that: a kind of method and device of access control provided by the embodiment of the present invention, so that Visitor needs the identity information for inputting visitor itself by two dimensional code to complete authentication, realizes visitor and enters from registration, The problems such as visitor registers deceptive information is avoided whereby, and house-owner can accurately identify visitor and access control at any time,
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the method for access control of first embodiment of the invention;
Fig. 2 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 1;
Fig. 3 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 2;
Fig. 4 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 3;
Fig. 5 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 4;
Fig. 6 is a kind of structural schematic diagram of computer equipment of third embodiment of the invention.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Embodiment to facilitate the understanding of the present invention carries out implementation process of the invention below by several specific embodiments Detailed elaboration.
Fig. 1 is the flow diagram of first embodiment of the invention.According to Fig. 1, in the first embodiment of the invention, it provides A kind of method of access control is based on access control system, which comprises
S1: receiving the room identification information of visitor's input, generates corresponding identifying code according to the room identification information;
S2: the visitor's identity information that visitor generates according to the identifying code is obtained;
S3: verifying the visitor's identity information according to the corresponding authentication information of the room identification information, Switch control is carried out to gate inhibition according to verification result.
This is realized so that visitor needs the identity information for inputting visitor itself by two dimensional code to complete authentication Visitor enters from registering, and avoids the problems such as visitor registers deceptive information whereby, and house-owner can accurately identify visit at any time Visitor and access control, meanwhile, it overcomes in the gate inhibition of conventional cell, people's card is not corresponding, visitor's deceptive information, permission are difficult to recycle, The problems such as bring environmental disruption and higher improvement cost is transformed in hardware device.Moreover, not divulging out room in verification process Main information helps to improve the security performance of house-owner.
Fig. 1 is a kind of flow diagram of the method for access control of first embodiment of the invention, according to Fig. 1, the present invention A kind of method for access control that first embodiment provides is based on access control system, comprising:
S1: receiving the room identification information of visitor's input, generates corresponding identifying code according to the room identification information;
Wherein, in the present embodiment, the form of room identification information is not defined, can is room number, Or the information in other rooms that can accurately identify house-owner.Moreover, can be unique by the room identification information Determine corresponding room.
In addition, gate inhibition is connected by access control system and the verifying terminal of house-owner, wherein verifying terminal can be mobile terminal Or PC terminal.
When visitor reach gate inhibition place when, need first at gate inhibition input the room identification information to be visited, with regard to this, Men Jintong Access control system is crossed to obtain according to the corresponding identifying code of room identification information generation.And the verifying is shown in the display window of gate inhibition Code.Specifically, identifying code includes the identifying code of the verifying Termination ID of the corresponding house-owner of the room identification information, the tool of identifying code Body form is permissible are as follows: two dimensional code or bar code.
S2: the visitor's identity information that visitor generates according to the identifying code is obtained;
Visitor shows visitor in the mobile terminal to send visitor to access control system by the mobile scanning terminal identifying code The visitor's identity information of identity is realized to access control system and initiates authentication request.That is: the identifying code is scanned by visitor, made The visitor's identity information for showing visitor's identity can be obtained from the mobile terminal of visitor by obtaining access control system.
S3: verifying the visitor's identity information according to the corresponding authentication information of the room identification information, Switch control is carried out to gate inhibition according to verification result.
Access control system is carried out according to visitor's identity information of the corresponding authentication information of room identification information to acquisition Verifying, wherein the corresponding authentication information of each room identification information.
Specifically, access control system is after knowing visitor's identity information, it is first it needs to be determined that whether visitor, which has been arranged, does not receive visit The mode of visitor.If the mode for not receiving visitor has been arranged, which directly will reply authentication failed to gate inhibition.Such as The not set mode for not receiving visitor of fruit, then by the corresponding authentication information of room identification information to visitor's identity information It is verified.
Access control system is according to the switch of verification result access control.
Specifically, authentication information includes at least following one: address list, preset permission visitor register and preset Forbid visitor's register.
Wherein, address list is the address list stored in mobile terminal, preset to allow to access register.It is preset to forbid visitor Register.
If visitor's identity information is located in address list or preset permission visitor's register, it is verified, opens whereby Gate inhibition.If visitor's identity information forbids verifying and not passing through in visitor's register positioned at preset, continue to close gate inhibition whereby.
It is optionally, described that switch control is carried out to gate inhibition according to verification result, comprising:
What is be verified according to the corresponding authentication information of the room identification information to the visitor's identity information In the case of, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;According to the corresponding authentication information pair of the room identification information In the case that the visitor's identity information verifying does not pass through and needs to verify visitor, verifying terminal and the institute of house-owner are established Visitor's identity information is verified by the verifying channel for house-owner in the verifying channel for stating gate inhibition;Pass through institute according to house-owner It states the result that visitor's identity information is verified in verifying channel and switch control is carried out to gate inhibition.
If be verified by the corresponding authentication information of the room identification information to the visitor's identity information, Access control system will send gate inhibition's open instructions to the gate inhibition, open gate inhibition by gate inhibition's open instructions.And if passing through institute It is obstructed to the verifying of the visitor's identity information out-of-date to state the corresponding authentication information of room identification information, it is thus necessary to determine that visitor Whether continue to verify, determine visitor need continue verifying when (i.e. access control system determine need continue to visitor's identity into When row verifying), access control system will establish the session authentication channel between visitor and house-owner, pass through the verifying channel for house-owner Directly visitor's identity information is verified, visitor directly will initiate the foot such as text, picture, voice, video to house-owner as a result, To show the information or one's purpose in coming of identity, to help verifying of the house-owner to the identity of visitor itself.After the completion of verifying, according to house-owner's Verification result carries out switch control to gate inhibition.
Optionally, the visitor's identity information is verified according to the room identification information corresponding authentication information After not passing through, the method also includes: the prompting whether inquiry visitor continues requests verification is sent to gate inhibition or visitor's terminal Message.
Specifically, testing by the corresponding authentication information of the room identification information the visitor's identity information It is obstructed out-of-date to demonstrate,prove, and access control system will send the hint instructions for whether carrying out next step verifying, gate inhibition to gate inhibition or visitor's terminal Or in the case that visitor's terminal receives the hint instructions, can in the display window display reminding page, the page include " YES " and " NO ", if visitor's determination continues to verify, visitor is just by " YES " is hit, and then, access control system responds the message and establishes testing for house-owner The session authentication channel of terminal and gate inhibition is demonstrate,proved, such as: video calling can regard between visitor and house-owner by video calling Frequency chats to show the identity information or one's purpose in coming of visitor.Certainly, if visitor is by " NO " is hit, verification process is so far.Its In, visitor's terminal can be the hand-held mobile terminals such as mobile phone.
Optionally, the method also includes: it is described receive visitor input room identification information, according to the room identify Before information generates corresponding identifying code, the method also includes: it receives house-owner and passes through permission visitor's body of verifying terminal sending Part verification information;
It is described that the visitor's identity information is verified according to the room identification information corresponding authentication information, It include: to be verified according to the permission visitor authentication information to the visitor's identity information;The case where being verified Under, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
Specifically, if visitor and house-owner are in the same chatroom, as the open gate inhibition of guest request house-owner, if House-owner agrees to that then house-owner can directly send to access control system by chat robots or verifying terminal allows visitor's authentication Information, in visitor after inputting visitor's identity information by identifying code, access control system direct basis allows visitor's authentication to believe Breath verifies the visitor's identity information, and in the case where being verified, direct gate inhibition's instruction is to open gate inhibition.Wherein, permit It perhaps include the identity information of the visitor in visitor's identity information, so that access control system is not necessarily to carry out the room identification letter of inquiry house-owner The corresponding authentication information of breath, can effectively reduce the workflow of access control system and improve verification efficiency.
Optionally, permission visitor's authentication information has timeliness.Within the timeliness phase, visitor can open door Prohibit, still, if exceeding the failure period, opening gate inhibition instructs failure, and visitor can not just open gate inhibition, whereby, improve Security performance.
The implementation process of the method in order to better illustrate this embodiment, below with reference to a concrete application example, to this Scheme the method is illustrated.
Second embodiment of the invention provides a kind of method of access control.Wherein, second embodiment of the invention provides Access control system, the access control system are based on existing Rich Media's news network, complete gate inhibition by increasing a module newly in a network Access, the management of system.Wherein, access control system, as a kind of special Rich Media's message terminal access system, for showing room Between two dimensional code, and receive gate inhibition manage server EGS send to gate inhibition open, refusal, alarm etc. control instructions.
Gate inhibition manage server EGS (Entrance Guard Server), be used for user right identification, gate inhibition control, Record is responsible for message response, processing, triggering etc. as gangway for transhipment.
Two-dimentional code system code server QRSVR (Quick Response Server), for raw in Rich Media's message system At the two dimensional code for including house-owner ID, the exposure of house-owner's information is avoided.
Network address book NAB (NetworkAddressBook) is responsible for as the network address book that user uploads to visit The judgement of social networks between visitor and house-owner.
Instant messages delivery server IMAS (InstantMessagingApplication Server), when visitor needs When the certification and confirmation of house-owner, the message transmission of the information such as text, picture is carried out.
Second embodiment of the invention provides a kind of method of access control, includes the following:
Visitor inputs the room information to be accessed at gate inhibition, and gate inhibition obtains the two dimensional code exhibition of the room information by EGS Show on a display screen.Then, visitor is scanned the two-dimensional code using the mobile phone of oneself, initiates authentication request to EGS.
EGS is distinguished after receiving authentication request according to the preset strategy of house-owner.Specifically, if room Main to be set as anyone entrance of unauthorized, then EGS returns to failed authentication response, and access control system shows failure information.If house-owner Being set as only address list good friend can enter, then whether EGS matches with arbitrary numbers in house-owner's address list to NAB inquiry visitor, If so, then returning, the authentication is passed, and gate inhibition opens, and identifies in next step if it is not, then entering.
In addition, if house-owner is set as user is only especially arranged and can enter, then EGS initiates to inquire to own database, Judge whether visitor is user that house-owner is especially arranged, and the authentication is passed if it is, returning, and gate inhibition opens, if it is not, then into Enter above-mentioned next step to identify.
Identify for above-mentioned next step as follows:
Whether EGS sets strategy in the case where it fails to match for current strategies, according to house-owner, initiate to visitor straight to house-owner Connect the message of authentication;
If visitor agrees to certification, EGS establishes session channel to visitor, house-owner respectively by IMAS, by visitor via EGS, IMAS initiate text, picture, voice, video etc. to house-owner and are enough to show the information of identity or one's purpose in coming;
After house-owner's operation, EGS returns to the information let pass or refused to access control system.
Fig. 2 is in the flow chart in scene 1 for a kind of method that second embodiment of the invention provides access control.According to figure Shown in 2:
The scene 1 are as follows: visitor is the strange personnel such as take-away, express delivery.
Step 1, the visitors such as take-away, express delivery input the room number to be visited at gate inhibition;
Step 2, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 3, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 4, the visitors such as take-away, express delivery are scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 5, handheld terminal directly initiates access request to EGS, which includes the body of the visitors such as take-away, express delivery Part information;
Step 6, EGS carries the identity of visitor, access room identification, initiates authentication request to NAB;
Step 7, NAB presetting according to house-owner, such as: whether the identity information by inquiring visitor is in address list In.Therefore, it is determined that the indirect people allowed access into of visitor;
Step 8, EGS returns to the enquirement whether further authenticated to the handheld terminal of visitor according to instruction is received, when So, in the present embodiment, the enquirement whether further authenticated can also be returned to as gate inhibition;
Step 9, visitor clicks Yes, EGS transparent transmission instruction to IMAS;
Step 10~11, IMAS initiates communication link request to create to visitor's terminal, house-owner's terminal respectively, passes through the chain Road, house-owner can directly verify visitor;
Step 12, after link establishment, the visitors such as take-away, express delivery pass through speech explanation one's purpose in coming;
Step 13, house-owner clicks and allows access into, and IMAS is to the instruction of EGS transparent transmission;
Step 14, EGS issues door open command to gate inhibition according to instruction is received.
Fig. 3 is in the flow chart in scene 2 for a kind of method that second embodiment of the invention provides access control.According to figure Shown in 3:
The scene 2 are as follows: visitor is that the gate inhibition in the case of householder good friend manages process:
Step 1, good friend visitor inputs the room number to be visited at gate inhibition;
Step 2, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 3, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 4, good friend visitor is scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 5, handheld terminal directly initiates access request to EGS, which includes the identity information of good friend visitor;
Step 6, EGS carries the identity of visitor, access room identification, authenticates to NAB;
Step 7, NAB finds good friend visitor in the address list of house-owner, then determines to be that good friend can enter, and puts to EGS return Logical instruction;
Step 8, EGS issues door open command to gate inhibition according to instruction is received.
Fig. 4 is in the flow chart in scene 3 for a kind of method that second embodiment of the invention provides access control.According to figure Shown in 4:
The scene 3 are as follows: visitor is because the gate inhibition that the evildoings such as small advertisement are added into blacklist manages process:
Step 1, blacklist visitor inputs the room number to be visited at gate inhibition;
Step 2, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 3, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 4, blacklist visitor is scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 5, handheld terminal directly initiates access request to EGS, which includes the identity letter of blacklist visitor Breath;
Step 6, EGS manages module according to built-in blacklist, and blacklist visitor is found in blacklist, then is determined The user is black list user, forbids user to enter into and through access control system and issues audible and visual alarm.
Fig. 5 is in the flow chart in scene 4 for a kind of method that second embodiment of the invention provides access control.According to figure Shown in 5:
The scene 4 are as follows: visitor controls enabling by chatroom mode.
Step 1, visitor exchanges with house-owner in same chatroom;
Step 2, the open gate inhibition of guest request house-owner;
Step 3, house-owner sends to EGS robot and orders in group chat, for the open interim access permission of visitor, group chat AS This message is forwarded to EGS;
Step 4, EGS records the License Info, and saves validity period according to preset configuration;
Step 5, visitor inputs the room number to be visited at gate inhibition;
Step 6, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 7, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 8, visitor is scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 9, handheld terminal directly initiates access request to EGS, which includes the identity information of visitor;
Step 10~11, EGS issues door open command after matching License Info, to gate inhibition.
Fig. 6 is a kind of computer equipment of third embodiment of the invention.According to Fig.6, third embodiment of the invention provides A kind of computer equipment, including memory, processor and be stored on the memory and can run on the processor Computer program, the processor realizes the following steps of a kind of method of access control when executing described program:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to Verification result carries out switch control to gate inhibition.
Optionally, the processor execute it is described according to verification result to gate inhibition carry out switch control when, specifically include: In the case where being verified according to the corresponding authentication information of the room identification information to the visitor's identity information, to The gate inhibition sends gate inhibition's open instructions;According to the corresponding authentication information of the room identification information to visitor's body In the case that part Information Authentication does not pass through and needs to verify visitor, the verifying terminal of house-owner and testing for the gate inhibition are established Channel is demonstrate,proved, visitor's identity information is verified by the verifying channel for house-owner;Pass through the verifying channel according to house-owner The result verified to visitor's identity information carries out switch control to gate inhibition.
Optionally, the processor is being executed according to the corresponding authentication information of the room identification information to the visit After objective identity information verifying does not pass through, following steps are also executed: sending whether inquiry visitor continues to gate inhibition or visitor's terminal The reminder message of requests verification.
Optionally, the processor is executing the room identification information for receiving visitor's input, knows according to the room Before other information generates corresponding identifying code, following steps are also executed: receiving the permission visitor that house-owner is issued by verifying terminal Authentication information;Permission visitor's authentication information has timeliness;
The processor is executing the room identification information for receiving visitor's input, raw according to the room identification information It when at corresponding identifying code, specifically includes: the visitor's identity information being carried out according to the permission visitor authentication information Verifying;In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
Optionally, the identifying code includes: the identifying code of the verifying Termination ID of the corresponding house-owner of the room identification information.
Optionally, the authentication information includes at least one of following register: address list, preset permission visitor's register And preset forbid visitor's register.
Fourth embodiment of the invention provides a kind of computer readable storage medium, and calculating is stored on the storage medium Machine program, the step of a kind of method of above-mentioned access control is realized when described program is executed by processor.
Since a kind of method of access control being described in detail in the first embodiment, so in this implementation The implementation process of this method is not carried out repeating elaboration in example.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of method of access control, which is characterized in that the described method includes:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to verifying As a result switch control is carried out to gate inhibition.
2. the method according to claim 1, wherein it is described according to verification result to gate inhibition carry out switch control, Include:
The case where being verified according to the corresponding authentication information of the room identification information to the visitor's identity information Under, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through and needed according to the room identification information corresponding authentication information In the case where verifying to visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, passes through institute for house-owner Verifying channel is stated to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner.
3. according to the method described in claim 2, it is characterized in that, according to the corresponding authentication of the room identification information After information does not pass through visitor's identity information verifying, the method also includes:
The reminder message whether inquiry visitor continues requests verification is sent to gate inhibition or visitor's terminal.
4. the method according to claim 1, wherein the room identification information for receiving visitor's input, foundation Before the room identification information generates corresponding identifying code, the method also includes:
Receive permission visitor's authentication information that house-owner is issued by verifying terminal;Permission visitor's authentication information tool Time-effectiveness;
It is described that the visitor's identity information is verified according to the room identification information corresponding authentication information, packet It includes:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
5. the method according to claim 1, wherein the identifying code includes: that the room identification information is corresponding House-owner verifying Termination ID identifying code.
6. the method according to claim 1, wherein the authentication information include at least following register it One: address list, preset permission visitor register and preset forbidding visitor's register.
7. a kind of computer equipment, which is characterized in that including memory, processor and be stored on the memory and can be in institute State the computer program run on processor, the processor realized when executing described program a kind of method of access control with Lower step:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to verifying As a result switch control is carried out to gate inhibition.
8. computer equipment according to claim 7, which is characterized in that the processor is described according to verifying knot in execution When fruit carries out switch control to gate inhibition, specifically include:
The case where being verified according to the corresponding authentication information of the room identification information to the visitor's identity information Under, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through and needed according to the room identification information corresponding authentication information In the case where verifying to visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, passes through institute for house-owner Verifying channel is stated to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner.
9. computer equipment according to claim 7, which is characterized in that the processor is defeated in the execution reception visitor The room identification information entered before generating corresponding identifying code according to the room identification information, also executes following steps:
Receive permission visitor's authentication information that house-owner is issued by verifying terminal;Permission visitor's authentication information tool Time-effectiveness;
The processor is executing the room identification information for receiving visitor's input, according to room identification information generation pair When the identifying code answered, specifically include:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
10. a kind of computer readable storage medium, computer program is stored on the storage medium, which is characterized in that described The step of a kind of method of access control described in any one of claim 1 to 6 is realized when program is executed by processor.
CN201711433530.5A 2017-12-26 2017-12-26 A kind of method of access control, computer equipment and readable storage medium storing program for executing Pending CN109961541A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711433530.5A CN109961541A (en) 2017-12-26 2017-12-26 A kind of method of access control, computer equipment and readable storage medium storing program for executing
PCT/CN2018/119993 WO2019128681A1 (en) 2017-12-26 2018-12-10 Access control method, computer device, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711433530.5A CN109961541A (en) 2017-12-26 2017-12-26 A kind of method of access control, computer equipment and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN109961541A true CN109961541A (en) 2019-07-02

Family

ID=67022161

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711433530.5A Pending CN109961541A (en) 2017-12-26 2017-12-26 A kind of method of access control, computer equipment and readable storage medium storing program for executing

Country Status (2)

Country Link
CN (1) CN109961541A (en)
WO (1) WO2019128681A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110298953A (en) * 2019-07-25 2019-10-01 青岛海尔科技有限公司 The control method and device of door lock in smart home operating system
CN110443919A (en) * 2019-07-15 2019-11-12 广东校园卫士网络科技有限责任公司 A kind of student's disengaging management and candid photograph analysis method based on recognition of face
CN111260831A (en) * 2020-02-25 2020-06-09 深圳桔子智能科技发展有限公司 Intelligent door lock control device, method and system
CN113794741A (en) * 2021-11-17 2021-12-14 中国南方电网有限责任公司超高压输电公司广州局 Visitor information registration method and device, computer equipment and storage medium
WO2022048181A1 (en) * 2020-09-02 2022-03-10 珠海格力电器股份有限公司 Sweeper and control method therefor, and control method for door control device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE545729C2 (en) * 2019-10-07 2023-12-19 Amido Ab Publ A method for forming a network connection between electronic devices in an entry handling system via a server, using identifiers and a plurality of openly displayed machine-readable codes and geo-fencing

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204204067U (en) * 2014-11-11 2015-03-11 上海云匠科技有限公司 A kind of door-locking system using Quick Response Code certification
CN104966340A (en) * 2015-06-19 2015-10-07 深圳市幸福立方科技有限公司 Access control system, access control method and cloud service platform
CN105788040A (en) * 2016-02-22 2016-07-20 国网湖北省电力公司咸宁供电公司 Dynamic authorization system for office building visitors and management method
CN106355709A (en) * 2016-08-31 2017-01-25 北京厚文知识产权顾问有限公司 Access control system and door opening method based on dynamic quick response code
CN206411753U (en) * 2016-12-09 2017-08-15 深圳市金源嘉电子科技有限公司 A kind of visual door control system based on smart mobile phone
CN107341884A (en) * 2017-06-30 2017-11-10 王韧 A kind of Quick Response Code intelligent access control system and its implementation
CN107346570A (en) * 2017-08-11 2017-11-14 广东电网有限责任公司信息中心 The visiting system of one kind visualization

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000293455A (en) * 1999-04-09 2000-10-20 Yoshiro Mizuno Handy terminal with browser
CN106251454A (en) * 2016-08-25 2016-12-21 张博 A kind of gate control system based on Internet of Things and access control method
CN106710043B (en) * 2016-12-21 2019-06-07 英业达科技有限公司 Have the time limit access control system and its method of visitor's authentication
CN106683252A (en) * 2017-03-09 2017-05-17 徐东哲 Community intelligent passing control system and method based on narrow band Internet of Things

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204204067U (en) * 2014-11-11 2015-03-11 上海云匠科技有限公司 A kind of door-locking system using Quick Response Code certification
CN104966340A (en) * 2015-06-19 2015-10-07 深圳市幸福立方科技有限公司 Access control system, access control method and cloud service platform
CN105788040A (en) * 2016-02-22 2016-07-20 国网湖北省电力公司咸宁供电公司 Dynamic authorization system for office building visitors and management method
CN106355709A (en) * 2016-08-31 2017-01-25 北京厚文知识产权顾问有限公司 Access control system and door opening method based on dynamic quick response code
CN206411753U (en) * 2016-12-09 2017-08-15 深圳市金源嘉电子科技有限公司 A kind of visual door control system based on smart mobile phone
CN107341884A (en) * 2017-06-30 2017-11-10 王韧 A kind of Quick Response Code intelligent access control system and its implementation
CN107346570A (en) * 2017-08-11 2017-11-14 广东电网有限责任公司信息中心 The visiting system of one kind visualization

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443919A (en) * 2019-07-15 2019-11-12 广东校园卫士网络科技有限责任公司 A kind of student's disengaging management and candid photograph analysis method based on recognition of face
CN110298953A (en) * 2019-07-25 2019-10-01 青岛海尔科技有限公司 The control method and device of door lock in smart home operating system
CN111260831A (en) * 2020-02-25 2020-06-09 深圳桔子智能科技发展有限公司 Intelligent door lock control device, method and system
WO2022048181A1 (en) * 2020-09-02 2022-03-10 珠海格力电器股份有限公司 Sweeper and control method therefor, and control method for door control device
CN113794741A (en) * 2021-11-17 2021-12-14 中国南方电网有限责任公司超高压输电公司广州局 Visitor information registration method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
WO2019128681A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
CN109961541A (en) A kind of method of access control, computer equipment and readable storage medium storing program for executing
EP2826004B1 (en) Mobile phone takeover protection system and method
KR101281882B1 (en) Caller certification method and system for phishing prevention
CN106056707A (en) Residential quarter network access control scheme
CN104639624B (en) A kind of method and apparatus for realizing mobile terminal remote access control
CN103607372B (en) The authentication method of network insertion and device
CN103516514B (en) The establishing method of account access rights and control device
US20130139239A1 (en) Dual code authentication system
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
CN105933353A (en) Method and system for realizing secure login
CN103037368A (en) Method, device and system for identity authentication
CN107277812A (en) A kind of wireless network authentication method and system based on Quick Response Code
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
CN107454064A (en) A kind of visitor's authentication method and system based on public number
CN108011873B (en) Illegal connection judgment method based on set coverage
CN108353283A (en) Prevent the attack from pseudo-base station
CN107241362B (en) Method and device for identifying identity of verification code input user
KR102495115B1 (en) System and method of identity verification for visitor identification
CN103428698A (en) Identity strong authentication method of mobile interconnection participants
CN109495894A (en) A kind of prevention method and system of pseudo-base station
CN104685856A (en) System and method for processing lost password using password long-term memory of user
CN106097500A (en) A kind of method and system responding user's entrance
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN109150931A (en) A kind of missing information-pushing method and device
CN106254226A (en) A kind of information synchronization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702