CN109961541A - A kind of method of access control, computer equipment and readable storage medium storing program for executing - Google Patents
A kind of method of access control, computer equipment and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN109961541A CN109961541A CN201711433530.5A CN201711433530A CN109961541A CN 109961541 A CN109961541 A CN 109961541A CN 201711433530 A CN201711433530 A CN 201711433530A CN 109961541 A CN109961541 A CN 109961541A
- Authority
- CN
- China
- Prior art keywords
- visitor
- information
- gate inhibition
- identification information
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Landscapes
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of method of access control, computer equipment and readable storage medium storing program for executing, wherein this method comprises: receiving the room identification information of visitor's input, generates corresponding identifying code according to room identification information;Obtain the visitor's identity information that visitor generates according to identifying code;Visitor's identity information is verified according to room identification information corresponding authentication information, switch control is carried out to gate inhibition according to verification result;Method, computer equipment and readable storage medium storing program for executing of the invention can obtain the identity information of visitor, i.e. so that visitor needs to input the identity information of visitor itself by two dimensional code to complete authentication, visitor is realized to enter from registration, the problems such as visitor registers deceptive information is avoided whereby, and house-owner can accurately identify visitor and access control at any time.
Description
Technical field
The present invention relates to the communications field more particularly to a kind of methods of access control, computer equipment and readable storage medium
Matter.
Background technique
The daily control entered to visitor is weaker, moreover, mainly being controlled by manpower.Such as: it is required that visitor
The information such as visitor's title and access address are registered, still, the information that property can not but provide visitor is screened and checked.And
And since part visitor worries because of identity information leakage possible trouble, false identities information can be deliberately provided to object
Industry, in this way, just bringing uncertain and hidden danger to the safety of cell.
Summary of the invention
It is a primary object of the present invention to propose a kind of method of access control, computer equipment and readable storage medium storing program for executing,
It aims at visitor to enter from registering, house-owner can accurately identify visitor and access control at any time, to overcome conventional cell door
In taboo the problems such as visitor's deceptive information.
According to an aspect of the invention, there is provided a kind of method of access control, which comprises
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to
Verification result carries out switch control to gate inhibition.
It is optionally, described that switch control is carried out to gate inhibition according to verification result, comprising:
What is be verified according to the corresponding authentication information of the room identification information to the visitor's identity information
In the case of, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through according to the room identification information corresponding authentication information
And in the case where needing to verify visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, it is logical for house-owner
The verifying channel is crossed to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner
System.
Optionally, the visitor's identity information is verified according to the room identification information corresponding authentication information
After not passing through, the method also includes:
The reminder message whether inquiry visitor continues requests verification is sent to gate inhibition or visitor's terminal.
Optionally, the room identification information for receiving visitor's input generates corresponding according to the room identification information
Before identifying code, the method also includes:
Receive permission visitor's authentication information that house-owner is issued by verifying terminal;Permission visitor's authentication letter
Breath has timeliness;
It is described that the visitor's identity information is verified according to the room identification information corresponding authentication information,
Include:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
Optionally, the identifying code includes: the identifying code of the verifying Termination ID of the corresponding house-owner of the room identification information.
Optionally, the authentication information includes at least one of following register: address list, preset permission visitor's register
And preset forbid visitor's register.
According to the second aspect of the invention, it provides a kind of computer equipment, including memory, processor and is stored in
On the memory and the computer program that can run on the processor, the processor realize one when executing described program
The following steps of the method for kind access control:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to
Verification result carries out switch control to gate inhibition.
Optionally, the processor execute it is described according to verification result to gate inhibition carry out switch control when, specifically include:
What is be verified according to the corresponding authentication information of the room identification information to the visitor's identity information
In the case of, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through according to the room identification information corresponding authentication information
And in the case where needing to verify visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, it is logical for house-owner
The verifying channel is crossed to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner
System.
Optionally, the processor is being executed according to the corresponding authentication information of the room identification information to the visit
After objective identity information verifying does not pass through, following steps are also executed: sending whether inquiry visitor continues to gate inhibition or visitor's terminal
The reminder message of requests verification.
Optionally, the processor is executing the room identification information for receiving visitor's input, knows according to the room
Before other information generates corresponding identifying code, following steps are also executed: receiving the permission visitor that house-owner is issued by verifying terminal
Authentication information;Permission visitor's authentication information has timeliness;
The processor is executing the room identification information for receiving visitor's input, raw according to the room identification information
When at corresponding identifying code, specifically include:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
According to the third aspect of the present invention, a kind of computer readable storage medium is provided, is deposited on the storage medium
The step of containing computer program, a kind of method of above-mentioned access control realized when described program is executed by processor.
The present invention has the beneficial effect that: a kind of method and device of access control provided by the embodiment of the present invention, so that
Visitor needs the identity information for inputting visitor itself by two dimensional code to complete authentication, realizes visitor and enters from registration,
The problems such as visitor registers deceptive information is avoided whereby, and house-owner can accurately identify visitor and access control at any time,
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the method for access control of first embodiment of the invention;
Fig. 2 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 1;
Fig. 3 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 2;
Fig. 4 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 3;
Fig. 5 is that a kind of method of access control of second embodiment of the invention is in the flow chart in scene 4;
Fig. 6 is a kind of structural schematic diagram of computer equipment of third embodiment of the invention.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element
Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Embodiment to facilitate the understanding of the present invention carries out implementation process of the invention below by several specific embodiments
Detailed elaboration.
Fig. 1 is the flow diagram of first embodiment of the invention.According to Fig. 1, in the first embodiment of the invention, it provides
A kind of method of access control is based on access control system, which comprises
S1: receiving the room identification information of visitor's input, generates corresponding identifying code according to the room identification information;
S2: the visitor's identity information that visitor generates according to the identifying code is obtained;
S3: verifying the visitor's identity information according to the corresponding authentication information of the room identification information,
Switch control is carried out to gate inhibition according to verification result.
This is realized so that visitor needs the identity information for inputting visitor itself by two dimensional code to complete authentication
Visitor enters from registering, and avoids the problems such as visitor registers deceptive information whereby, and house-owner can accurately identify visit at any time
Visitor and access control, meanwhile, it overcomes in the gate inhibition of conventional cell, people's card is not corresponding, visitor's deceptive information, permission are difficult to recycle,
The problems such as bring environmental disruption and higher improvement cost is transformed in hardware device.Moreover, not divulging out room in verification process
Main information helps to improve the security performance of house-owner.
Fig. 1 is a kind of flow diagram of the method for access control of first embodiment of the invention, according to Fig. 1, the present invention
A kind of method for access control that first embodiment provides is based on access control system, comprising:
S1: receiving the room identification information of visitor's input, generates corresponding identifying code according to the room identification information;
Wherein, in the present embodiment, the form of room identification information is not defined, can is room number,
Or the information in other rooms that can accurately identify house-owner.Moreover, can be unique by the room identification information
Determine corresponding room.
In addition, gate inhibition is connected by access control system and the verifying terminal of house-owner, wherein verifying terminal can be mobile terminal
Or PC terminal.
When visitor reach gate inhibition place when, need first at gate inhibition input the room identification information to be visited, with regard to this, Men Jintong
Access control system is crossed to obtain according to the corresponding identifying code of room identification information generation.And the verifying is shown in the display window of gate inhibition
Code.Specifically, identifying code includes the identifying code of the verifying Termination ID of the corresponding house-owner of the room identification information, the tool of identifying code
Body form is permissible are as follows: two dimensional code or bar code.
S2: the visitor's identity information that visitor generates according to the identifying code is obtained;
Visitor shows visitor in the mobile terminal to send visitor to access control system by the mobile scanning terminal identifying code
The visitor's identity information of identity is realized to access control system and initiates authentication request.That is: the identifying code is scanned by visitor, made
The visitor's identity information for showing visitor's identity can be obtained from the mobile terminal of visitor by obtaining access control system.
S3: verifying the visitor's identity information according to the corresponding authentication information of the room identification information,
Switch control is carried out to gate inhibition according to verification result.
Access control system is carried out according to visitor's identity information of the corresponding authentication information of room identification information to acquisition
Verifying, wherein the corresponding authentication information of each room identification information.
Specifically, access control system is after knowing visitor's identity information, it is first it needs to be determined that whether visitor, which has been arranged, does not receive visit
The mode of visitor.If the mode for not receiving visitor has been arranged, which directly will reply authentication failed to gate inhibition.Such as
The not set mode for not receiving visitor of fruit, then by the corresponding authentication information of room identification information to visitor's identity information
It is verified.
Access control system is according to the switch of verification result access control.
Specifically, authentication information includes at least following one: address list, preset permission visitor register and preset
Forbid visitor's register.
Wherein, address list is the address list stored in mobile terminal, preset to allow to access register.It is preset to forbid visitor
Register.
If visitor's identity information is located in address list or preset permission visitor's register, it is verified, opens whereby
Gate inhibition.If visitor's identity information forbids verifying and not passing through in visitor's register positioned at preset, continue to close gate inhibition whereby.
It is optionally, described that switch control is carried out to gate inhibition according to verification result, comprising:
What is be verified according to the corresponding authentication information of the room identification information to the visitor's identity information
In the case of, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;According to the corresponding authentication information pair of the room identification information
In the case that the visitor's identity information verifying does not pass through and needs to verify visitor, verifying terminal and the institute of house-owner are established
Visitor's identity information is verified by the verifying channel for house-owner in the verifying channel for stating gate inhibition;Pass through institute according to house-owner
It states the result that visitor's identity information is verified in verifying channel and switch control is carried out to gate inhibition.
If be verified by the corresponding authentication information of the room identification information to the visitor's identity information,
Access control system will send gate inhibition's open instructions to the gate inhibition, open gate inhibition by gate inhibition's open instructions.And if passing through institute
It is obstructed to the verifying of the visitor's identity information out-of-date to state the corresponding authentication information of room identification information, it is thus necessary to determine that visitor
Whether continue to verify, determine visitor need continue verifying when (i.e. access control system determine need continue to visitor's identity into
When row verifying), access control system will establish the session authentication channel between visitor and house-owner, pass through the verifying channel for house-owner
Directly visitor's identity information is verified, visitor directly will initiate the foot such as text, picture, voice, video to house-owner as a result,
To show the information or one's purpose in coming of identity, to help verifying of the house-owner to the identity of visitor itself.After the completion of verifying, according to house-owner's
Verification result carries out switch control to gate inhibition.
Optionally, the visitor's identity information is verified according to the room identification information corresponding authentication information
After not passing through, the method also includes: the prompting whether inquiry visitor continues requests verification is sent to gate inhibition or visitor's terminal
Message.
Specifically, testing by the corresponding authentication information of the room identification information the visitor's identity information
It is obstructed out-of-date to demonstrate,prove, and access control system will send the hint instructions for whether carrying out next step verifying, gate inhibition to gate inhibition or visitor's terminal
Or in the case that visitor's terminal receives the hint instructions, can in the display window display reminding page, the page include " YES " and
" NO ", if visitor's determination continues to verify, visitor is just by " YES " is hit, and then, access control system responds the message and establishes testing for house-owner
The session authentication channel of terminal and gate inhibition is demonstrate,proved, such as: video calling can regard between visitor and house-owner by video calling
Frequency chats to show the identity information or one's purpose in coming of visitor.Certainly, if visitor is by " NO " is hit, verification process is so far.Its
In, visitor's terminal can be the hand-held mobile terminals such as mobile phone.
Optionally, the method also includes: it is described receive visitor input room identification information, according to the room identify
Before information generates corresponding identifying code, the method also includes: it receives house-owner and passes through permission visitor's body of verifying terminal sending
Part verification information;
It is described that the visitor's identity information is verified according to the room identification information corresponding authentication information,
It include: to be verified according to the permission visitor authentication information to the visitor's identity information;The case where being verified
Under, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
Specifically, if visitor and house-owner are in the same chatroom, as the open gate inhibition of guest request house-owner, if
House-owner agrees to that then house-owner can directly send to access control system by chat robots or verifying terminal allows visitor's authentication
Information, in visitor after inputting visitor's identity information by identifying code, access control system direct basis allows visitor's authentication to believe
Breath verifies the visitor's identity information, and in the case where being verified, direct gate inhibition's instruction is to open gate inhibition.Wherein, permit
It perhaps include the identity information of the visitor in visitor's identity information, so that access control system is not necessarily to carry out the room identification letter of inquiry house-owner
The corresponding authentication information of breath, can effectively reduce the workflow of access control system and improve verification efficiency.
Optionally, permission visitor's authentication information has timeliness.Within the timeliness phase, visitor can open door
Prohibit, still, if exceeding the failure period, opening gate inhibition instructs failure, and visitor can not just open gate inhibition, whereby, improve
Security performance.
The implementation process of the method in order to better illustrate this embodiment, below with reference to a concrete application example, to this
Scheme the method is illustrated.
Second embodiment of the invention provides a kind of method of access control.Wherein, second embodiment of the invention provides
Access control system, the access control system are based on existing Rich Media's news network, complete gate inhibition by increasing a module newly in a network
Access, the management of system.Wherein, access control system, as a kind of special Rich Media's message terminal access system, for showing room
Between two dimensional code, and receive gate inhibition manage server EGS send to gate inhibition open, refusal, alarm etc. control instructions.
Gate inhibition manage server EGS (Entrance Guard Server), be used for user right identification, gate inhibition control,
Record is responsible for message response, processing, triggering etc. as gangway for transhipment.
Two-dimentional code system code server QRSVR (Quick Response Server), for raw in Rich Media's message system
At the two dimensional code for including house-owner ID, the exposure of house-owner's information is avoided.
Network address book NAB (NetworkAddressBook) is responsible for as the network address book that user uploads to visit
The judgement of social networks between visitor and house-owner.
Instant messages delivery server IMAS (InstantMessagingApplication Server), when visitor needs
When the certification and confirmation of house-owner, the message transmission of the information such as text, picture is carried out.
Second embodiment of the invention provides a kind of method of access control, includes the following:
Visitor inputs the room information to be accessed at gate inhibition, and gate inhibition obtains the two dimensional code exhibition of the room information by EGS
Show on a display screen.Then, visitor is scanned the two-dimensional code using the mobile phone of oneself, initiates authentication request to EGS.
EGS is distinguished after receiving authentication request according to the preset strategy of house-owner.Specifically, if room
Main to be set as anyone entrance of unauthorized, then EGS returns to failed authentication response, and access control system shows failure information.If house-owner
Being set as only address list good friend can enter, then whether EGS matches with arbitrary numbers in house-owner's address list to NAB inquiry visitor,
If so, then returning, the authentication is passed, and gate inhibition opens, and identifies in next step if it is not, then entering.
In addition, if house-owner is set as user is only especially arranged and can enter, then EGS initiates to inquire to own database,
Judge whether visitor is user that house-owner is especially arranged, and the authentication is passed if it is, returning, and gate inhibition opens, if it is not, then into
Enter above-mentioned next step to identify.
Identify for above-mentioned next step as follows:
Whether EGS sets strategy in the case where it fails to match for current strategies, according to house-owner, initiate to visitor straight to house-owner
Connect the message of authentication;
If visitor agrees to certification, EGS establishes session channel to visitor, house-owner respectively by IMAS, by visitor via
EGS, IMAS initiate text, picture, voice, video etc. to house-owner and are enough to show the information of identity or one's purpose in coming;
After house-owner's operation, EGS returns to the information let pass or refused to access control system.
Fig. 2 is in the flow chart in scene 1 for a kind of method that second embodiment of the invention provides access control.According to figure
Shown in 2:
The scene 1 are as follows: visitor is the strange personnel such as take-away, express delivery.
Step 1, the visitors such as take-away, express delivery input the room number to be visited at gate inhibition;
Step 2, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 3, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 4, the visitors such as take-away, express delivery are scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 5, handheld terminal directly initiates access request to EGS, which includes the body of the visitors such as take-away, express delivery
Part information;
Step 6, EGS carries the identity of visitor, access room identification, initiates authentication request to NAB;
Step 7, NAB presetting according to house-owner, such as: whether the identity information by inquiring visitor is in address list
In.Therefore, it is determined that the indirect people allowed access into of visitor;
Step 8, EGS returns to the enquirement whether further authenticated to the handheld terminal of visitor according to instruction is received, when
So, in the present embodiment, the enquirement whether further authenticated can also be returned to as gate inhibition;
Step 9, visitor clicks Yes, EGS transparent transmission instruction to IMAS;
Step 10~11, IMAS initiates communication link request to create to visitor's terminal, house-owner's terminal respectively, passes through the chain
Road, house-owner can directly verify visitor;
Step 12, after link establishment, the visitors such as take-away, express delivery pass through speech explanation one's purpose in coming;
Step 13, house-owner clicks and allows access into, and IMAS is to the instruction of EGS transparent transmission;
Step 14, EGS issues door open command to gate inhibition according to instruction is received.
Fig. 3 is in the flow chart in scene 2 for a kind of method that second embodiment of the invention provides access control.According to figure
Shown in 3:
The scene 2 are as follows: visitor is that the gate inhibition in the case of householder good friend manages process:
Step 1, good friend visitor inputs the room number to be visited at gate inhibition;
Step 2, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 3, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 4, good friend visitor is scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 5, handheld terminal directly initiates access request to EGS, which includes the identity information of good friend visitor;
Step 6, EGS carries the identity of visitor, access room identification, authenticates to NAB;
Step 7, NAB finds good friend visitor in the address list of house-owner, then determines to be that good friend can enter, and puts to EGS return
Logical instruction;
Step 8, EGS issues door open command to gate inhibition according to instruction is received.
Fig. 4 is in the flow chart in scene 3 for a kind of method that second embodiment of the invention provides access control.According to figure
Shown in 4:
The scene 3 are as follows: visitor is because the gate inhibition that the evildoings such as small advertisement are added into blacklist manages process:
Step 1, blacklist visitor inputs the room number to be visited at gate inhibition;
Step 2, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 3, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 4, blacklist visitor is scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 5, handheld terminal directly initiates access request to EGS, which includes the identity letter of blacklist visitor
Breath;
Step 6, EGS manages module according to built-in blacklist, and blacklist visitor is found in blacklist, then is determined
The user is black list user, forbids user to enter into and through access control system and issues audible and visual alarm.
Fig. 5 is in the flow chart in scene 4 for a kind of method that second embodiment of the invention provides access control.According to figure
Shown in 5:
The scene 4 are as follows: visitor controls enabling by chatroom mode.
Step 1, visitor exchanges with house-owner in same chatroom;
Step 2, the open gate inhibition of guest request house-owner;
Step 3, house-owner sends to EGS robot and orders in group chat, for the open interim access permission of visitor, group chat AS
This message is forwarded to EGS;
Step 4, EGS records the License Info, and saves validity period according to preset configuration;
Step 5, visitor inputs the room number to be visited at gate inhibition;
Step 6, QRSvr of the gate inhibition into Rich Media's message system initiates request;
Step 7, QRSvr returns to the two dimensional code containing room PUI by authentication, and to gate inhibition;
Step 8, visitor is scanned the two-dimensional code by handheld terminal (such as: mobile phone);
Step 9, handheld terminal directly initiates access request to EGS, which includes the identity information of visitor;
Step 10~11, EGS issues door open command after matching License Info, to gate inhibition.
Fig. 6 is a kind of computer equipment of third embodiment of the invention.According to Fig.6, third embodiment of the invention provides
A kind of computer equipment, including memory, processor and be stored on the memory and can run on the processor
Computer program, the processor realizes the following steps of a kind of method of access control when executing described program:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to
Verification result carries out switch control to gate inhibition.
Optionally, the processor execute it is described according to verification result to gate inhibition carry out switch control when, specifically include:
In the case where being verified according to the corresponding authentication information of the room identification information to the visitor's identity information, to
The gate inhibition sends gate inhibition's open instructions;According to the corresponding authentication information of the room identification information to visitor's body
In the case that part Information Authentication does not pass through and needs to verify visitor, the verifying terminal of house-owner and testing for the gate inhibition are established
Channel is demonstrate,proved, visitor's identity information is verified by the verifying channel for house-owner;Pass through the verifying channel according to house-owner
The result verified to visitor's identity information carries out switch control to gate inhibition.
Optionally, the processor is being executed according to the corresponding authentication information of the room identification information to the visit
After objective identity information verifying does not pass through, following steps are also executed: sending whether inquiry visitor continues to gate inhibition or visitor's terminal
The reminder message of requests verification.
Optionally, the processor is executing the room identification information for receiving visitor's input, knows according to the room
Before other information generates corresponding identifying code, following steps are also executed: receiving the permission visitor that house-owner is issued by verifying terminal
Authentication information;Permission visitor's authentication information has timeliness;
The processor is executing the room identification information for receiving visitor's input, raw according to the room identification information
It when at corresponding identifying code, specifically includes: the visitor's identity information being carried out according to the permission visitor authentication information
Verifying;In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
Optionally, the identifying code includes: the identifying code of the verifying Termination ID of the corresponding house-owner of the room identification information.
Optionally, the authentication information includes at least one of following register: address list, preset permission visitor's register
And preset forbid visitor's register.
Fourth embodiment of the invention provides a kind of computer readable storage medium, and calculating is stored on the storage medium
Machine program, the step of a kind of method of above-mentioned access control is realized when described program is executed by processor.
Since a kind of method of access control being described in detail in the first embodiment, so in this implementation
The implementation process of this method is not carried out repeating elaboration in example.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of method of access control, which is characterized in that the described method includes:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to verifying
As a result switch control is carried out to gate inhibition.
2. the method according to claim 1, wherein it is described according to verification result to gate inhibition carry out switch control,
Include:
The case where being verified according to the corresponding authentication information of the room identification information to the visitor's identity information
Under, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through and needed according to the room identification information corresponding authentication information
In the case where verifying to visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, passes through institute for house-owner
Verifying channel is stated to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner.
3. according to the method described in claim 2, it is characterized in that, according to the corresponding authentication of the room identification information
After information does not pass through visitor's identity information verifying, the method also includes:
The reminder message whether inquiry visitor continues requests verification is sent to gate inhibition or visitor's terminal.
4. the method according to claim 1, wherein the room identification information for receiving visitor's input, foundation
Before the room identification information generates corresponding identifying code, the method also includes:
Receive permission visitor's authentication information that house-owner is issued by verifying terminal;Permission visitor's authentication information tool
Time-effectiveness;
It is described that the visitor's identity information is verified according to the room identification information corresponding authentication information, packet
It includes:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
5. the method according to claim 1, wherein the identifying code includes: that the room identification information is corresponding
House-owner verifying Termination ID identifying code.
6. the method according to claim 1, wherein the authentication information include at least following register it
One: address list, preset permission visitor register and preset forbidding visitor's register.
7. a kind of computer equipment, which is characterized in that including memory, processor and be stored on the memory and can be in institute
State the computer program run on processor, the processor realized when executing described program a kind of method of access control with
Lower step:
The room identification information for receiving visitor's input generates corresponding identifying code according to the room identification information;
Obtain the visitor's identity information that visitor generates according to the identifying code;
The visitor's identity information is verified according to the room identification information corresponding authentication information, according to verifying
As a result switch control is carried out to gate inhibition.
8. computer equipment according to claim 7, which is characterized in that the processor is described according to verifying knot in execution
When fruit carries out switch control to gate inhibition, specifically include:
The case where being verified according to the corresponding authentication information of the room identification information to the visitor's identity information
Under, Xiang Suoshu gate inhibition sends gate inhibition's open instructions;
Visitor's identity information verifying is not being passed through and needed according to the room identification information corresponding authentication information
In the case where verifying to visitor, the verifying terminal of house-owner and the verifying channel of the gate inhibition are established, passes through institute for house-owner
Verifying channel is stated to verify visitor's identity information;
Switch control is carried out to gate inhibition by the result that visitor's identity information is verified in the verifying channel according to house-owner.
9. computer equipment according to claim 7, which is characterized in that the processor is defeated in the execution reception visitor
The room identification information entered before generating corresponding identifying code according to the room identification information, also executes following steps:
Receive permission visitor's authentication information that house-owner is issued by verifying terminal;Permission visitor's authentication information tool
Time-effectiveness;
The processor is executing the room identification information for receiving visitor's input, according to room identification information generation pair
When the identifying code answered, specifically include:
The visitor's identity information is verified according to the permission visitor authentication information;
In the case where being verified, Xiang Suoshu gate inhibition sends gate inhibition's open instructions.
10. a kind of computer readable storage medium, computer program is stored on the storage medium, which is characterized in that described
The step of a kind of method of access control described in any one of claim 1 to 6 is realized when program is executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711433530.5A CN109961541A (en) | 2017-12-26 | 2017-12-26 | A kind of method of access control, computer equipment and readable storage medium storing program for executing |
PCT/CN2018/119993 WO2019128681A1 (en) | 2017-12-26 | 2018-12-10 | Access control method, computer device, and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711433530.5A CN109961541A (en) | 2017-12-26 | 2017-12-26 | A kind of method of access control, computer equipment and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109961541A true CN109961541A (en) | 2019-07-02 |
Family
ID=67022161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711433530.5A Pending CN109961541A (en) | 2017-12-26 | 2017-12-26 | A kind of method of access control, computer equipment and readable storage medium storing program for executing |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109961541A (en) |
WO (1) | WO2019128681A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110298953A (en) * | 2019-07-25 | 2019-10-01 | 青岛海尔科技有限公司 | The control method and device of door lock in smart home operating system |
CN110443919A (en) * | 2019-07-15 | 2019-11-12 | 广东校园卫士网络科技有限责任公司 | A kind of student's disengaging management and candid photograph analysis method based on recognition of face |
CN111260831A (en) * | 2020-02-25 | 2020-06-09 | 深圳桔子智能科技发展有限公司 | Intelligent door lock control device, method and system |
CN113794741A (en) * | 2021-11-17 | 2021-12-14 | 中国南方电网有限责任公司超高压输电公司广州局 | Visitor information registration method and device, computer equipment and storage medium |
WO2022048181A1 (en) * | 2020-09-02 | 2022-03-10 | 珠海格力电器股份有限公司 | Sweeper and control method therefor, and control method for door control device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE545729C2 (en) * | 2019-10-07 | 2023-12-19 | Amido Ab Publ | A method for forming a network connection between electronic devices in an entry handling system via a server, using identifiers and a plurality of openly displayed machine-readable codes and geo-fencing |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204204067U (en) * | 2014-11-11 | 2015-03-11 | 上海云匠科技有限公司 | A kind of door-locking system using Quick Response Code certification |
CN104966340A (en) * | 2015-06-19 | 2015-10-07 | 深圳市幸福立方科技有限公司 | Access control system, access control method and cloud service platform |
CN105788040A (en) * | 2016-02-22 | 2016-07-20 | 国网湖北省电力公司咸宁供电公司 | Dynamic authorization system for office building visitors and management method |
CN106355709A (en) * | 2016-08-31 | 2017-01-25 | 北京厚文知识产权顾问有限公司 | Access control system and door opening method based on dynamic quick response code |
CN206411753U (en) * | 2016-12-09 | 2017-08-15 | 深圳市金源嘉电子科技有限公司 | A kind of visual door control system based on smart mobile phone |
CN107341884A (en) * | 2017-06-30 | 2017-11-10 | 王韧 | A kind of Quick Response Code intelligent access control system and its implementation |
CN107346570A (en) * | 2017-08-11 | 2017-11-14 | 广东电网有限责任公司信息中心 | The visiting system of one kind visualization |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293455A (en) * | 1999-04-09 | 2000-10-20 | Yoshiro Mizuno | Handy terminal with browser |
CN106251454A (en) * | 2016-08-25 | 2016-12-21 | 张博 | A kind of gate control system based on Internet of Things and access control method |
CN106710043B (en) * | 2016-12-21 | 2019-06-07 | 英业达科技有限公司 | Have the time limit access control system and its method of visitor's authentication |
CN106683252A (en) * | 2017-03-09 | 2017-05-17 | 徐东哲 | Community intelligent passing control system and method based on narrow band Internet of Things |
-
2017
- 2017-12-26 CN CN201711433530.5A patent/CN109961541A/en active Pending
-
2018
- 2018-12-10 WO PCT/CN2018/119993 patent/WO2019128681A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204204067U (en) * | 2014-11-11 | 2015-03-11 | 上海云匠科技有限公司 | A kind of door-locking system using Quick Response Code certification |
CN104966340A (en) * | 2015-06-19 | 2015-10-07 | 深圳市幸福立方科技有限公司 | Access control system, access control method and cloud service platform |
CN105788040A (en) * | 2016-02-22 | 2016-07-20 | 国网湖北省电力公司咸宁供电公司 | Dynamic authorization system for office building visitors and management method |
CN106355709A (en) * | 2016-08-31 | 2017-01-25 | 北京厚文知识产权顾问有限公司 | Access control system and door opening method based on dynamic quick response code |
CN206411753U (en) * | 2016-12-09 | 2017-08-15 | 深圳市金源嘉电子科技有限公司 | A kind of visual door control system based on smart mobile phone |
CN107341884A (en) * | 2017-06-30 | 2017-11-10 | 王韧 | A kind of Quick Response Code intelligent access control system and its implementation |
CN107346570A (en) * | 2017-08-11 | 2017-11-14 | 广东电网有限责任公司信息中心 | The visiting system of one kind visualization |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110443919A (en) * | 2019-07-15 | 2019-11-12 | 广东校园卫士网络科技有限责任公司 | A kind of student's disengaging management and candid photograph analysis method based on recognition of face |
CN110298953A (en) * | 2019-07-25 | 2019-10-01 | 青岛海尔科技有限公司 | The control method and device of door lock in smart home operating system |
CN111260831A (en) * | 2020-02-25 | 2020-06-09 | 深圳桔子智能科技发展有限公司 | Intelligent door lock control device, method and system |
WO2022048181A1 (en) * | 2020-09-02 | 2022-03-10 | 珠海格力电器股份有限公司 | Sweeper and control method therefor, and control method for door control device |
CN113794741A (en) * | 2021-11-17 | 2021-12-14 | 中国南方电网有限责任公司超高压输电公司广州局 | Visitor information registration method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2019128681A1 (en) | 2019-07-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109961541A (en) | A kind of method of access control, computer equipment and readable storage medium storing program for executing | |
EP2826004B1 (en) | Mobile phone takeover protection system and method | |
KR101281882B1 (en) | Caller certification method and system for phishing prevention | |
CN106056707A (en) | Residential quarter network access control scheme | |
CN104639624B (en) | A kind of method and apparatus for realizing mobile terminal remote access control | |
CN103607372B (en) | The authentication method of network insertion and device | |
CN103516514B (en) | The establishing method of account access rights and control device | |
US20130139239A1 (en) | Dual code authentication system | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
CN105933353A (en) | Method and system for realizing secure login | |
CN103037368A (en) | Method, device and system for identity authentication | |
CN107277812A (en) | A kind of wireless network authentication method and system based on Quick Response Code | |
JP2013005205A (en) | Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system | |
CN107454064A (en) | A kind of visitor's authentication method and system based on public number | |
CN108011873B (en) | Illegal connection judgment method based on set coverage | |
CN108353283A (en) | Prevent the attack from pseudo-base station | |
CN107241362B (en) | Method and device for identifying identity of verification code input user | |
KR102495115B1 (en) | System and method of identity verification for visitor identification | |
CN103428698A (en) | Identity strong authentication method of mobile interconnection participants | |
CN109495894A (en) | A kind of prevention method and system of pseudo-base station | |
CN104685856A (en) | System and method for processing lost password using password long-term memory of user | |
CN106097500A (en) | A kind of method and system responding user's entrance | |
KR101133167B1 (en) | Method and apparatus for user verifing process with enhanced security | |
CN109150931A (en) | A kind of missing information-pushing method and device | |
CN106254226A (en) | A kind of information synchronization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190702 |