CN110706388A - Access control management method and related product - Google Patents

Access control management method and related product Download PDF

Info

Publication number
CN110706388A
CN110706388A CN201910941186.3A CN201910941186A CN110706388A CN 110706388 A CN110706388 A CN 110706388A CN 201910941186 A CN201910941186 A CN 201910941186A CN 110706388 A CN110706388 A CN 110706388A
Authority
CN
China
Prior art keywords
access control
client
entrance guard
information
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910941186.3A
Other languages
Chinese (zh)
Inventor
刘新
黄庆财
王玉平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinsi Blockchain Technology Co Ltd
Original Assignee
Shenzhen Xinsi Blockchain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xinsi Blockchain Technology Co Ltd filed Critical Shenzhen Xinsi Blockchain Technology Co Ltd
Priority to CN201910941186.3A priority Critical patent/CN110706388A/en
Publication of CN110706388A publication Critical patent/CN110706388A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The application discloses an access control management method and a related product. The method comprises the following steps: receiving an access control opening request sent by a first client, wherein the access control opening request comprises information of a first access control requesting access and visitor information; inquiring whether the information of the target access control matched with the information of the first access control exists in a database; if the target access control request exists, determining a second client bound with the target access control according to the binding relation between the access control and the client, and sending the access control opening request to the second client; receiving authorization information sent by the second client under the condition that the visitor information is verified by the second client; and sending the authorization information to the target access control, wherein the authorization information is used for opening the target access control. A corresponding apparatus is also disclosed. The efficiency of user management entrance guard can be improved.

Description

Access control management method and related product
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method for managing an access control and a related product.
Background
The development of the internet of things technology brings great convenience to the life of people, wherein the access control management system based on the intelligent lock is visible everywhere in real life. However, as the number of access control smart locks owned by a user increases, the amount of time and effort required by the user to manage numerous access control smart locks also increases. For example, the same user has an intelligent lock for a house entrance guard, an intelligent lock for an office entrance guard, and an intelligent lock for a car entrance guard (which means an intelligent lock for opening or closing a car door), and when a visitor accesses these entrance guard intelligent locks, the user needs to watch on the site of the corresponding entrance guard intelligent lock to timely receive the visitor request, which causes inconvenient operation and low management efficiency when managing numerous entrance guard intelligent locks.
Disclosure of Invention
The application provides an access control method and a related product, so that the efficiency of user access control management is improved.
In a first aspect, a method for access control management is provided, which is applied to an access control management device, and includes: receiving an access control opening request sent by a first client, wherein the access control opening request comprises information of a first access control requesting access and visitor information; inquiring whether the information of the target access control matched with the information of the first access control exists in a database; if the target access control request exists, determining a second client bound with the target access control according to the binding relation between the access control and the client, and sending the access control opening request to the second client; receiving authorization information sent by the second client under the condition that the visitor information is verified by the second client; and sending the authorization information to the target access control, wherein the authorization information is used for opening the target access control.
In a possible implementation manner, the information of the first entrance guard includes a category of the first entrance guard and an identifier of the first entrance guard; whether the information of the target entrance guard matched with the information of the first entrance guard exists in the query database or not comprises the following steps: determining a target category access control set in a database according to the category of the first access control, wherein the category of any access control in the target category access control set is the same as that of the first access control; and inquiring whether a target entrance guard identification matched with the identification of the first entrance guard exists in the target category entrance guard set or not.
In another possible implementation manner, the visitor information includes identity information of the visitor and access intention information of the visitor.
In another possible implementation manner, before receiving the access control opening request sent by the first client, the method further includes: acquiring a binding request sent by a client, wherein the binding request comprises a to-be-bound entrance guard type, a to-be-bound entrance guard identifier and an account number of the client; storing the entrance guard identification to be bound in a category entrance guard set corresponding to the entrance guard category to be bound in a database; and establishing a binding relationship between the entrance guard identification to be bound and the account of the client, and storing the binding relationship in a database.
In a second aspect, a method for managing access control is provided, which is applied to a client, and includes: receiving an access control opening request sent by access control management equipment; and sending authorization information to the access control management equipment under the condition that the received access control opening request passes the verified instruction, wherein the authorization information is used for indicating the access control management equipment to open the access control.
In one possible implementation, the method further includes: and acquiring an entrance guard opening request input by a user, and sending the entrance guard opening request to the entrance guard management equipment.
In a third aspect, an access control device is provided, including: the system comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving an access control opening request sent by a first client, and the access control opening request comprises first access control information and visitor information which are requested to be accessed; the query unit is used for querying whether the information of the target access control matched with the information of the first access control exists in a database; the first sending unit is used for determining a second client bound with the target entrance guard according to the binding relationship between the entrance guard and the client under the condition that the information of the target entrance guard matched with the information of the first entrance guard exists in the database inquired by the inquiring unit, and sending the entrance guard opening request to the second client; a second receiving unit, configured to receive authorization information sent by the second client if the guest information is verified by the second client; and the second sending unit is used for sending the authorization information to the target access control, and the authorization information is used for opening the target access control.
In a possible implementation manner, the information of the first entrance guard includes a category of the first entrance guard and an identifier of the first entrance guard; the query unit is specifically used for determining a target category access control set in a database according to the category of the first access control, wherein the category of any access control in the target category access control set is the same as that of the first access control; and inquiring whether a target entrance guard identification matched with the identification of the first entrance guard exists in the target category entrance guard set or not.
In another possible implementation manner, the visitor information includes identity information of the visitor and access intention information of the visitor.
In another possible implementation manner, before the receiving the access control opening request sent by the first client, the access control management device further includes: the system comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring a binding request sent by a client, and the binding request comprises a to-be-bound entrance guard category, a to-be-bound entrance guard identifier and an account number of the client; the storage unit is used for storing the entrance guard identification to be bound in a category entrance guard set corresponding to the category of the entrance guard to be bound in a database; and the binding unit is used for establishing a binding relationship between the entrance guard identification to be bound and the account of the client, and storing the binding relationship in a database.
In a fourth aspect, a client is provided, including: the receiving unit is used for receiving an access control opening request sent by the access control management equipment; and the sending unit is used for sending authorization information to the access control management equipment under the condition that the received access control opening request passes the verified instruction, wherein the authorization information is used for indicating the access control management equipment to open the access control.
In one possible implementation manner, the client further includes: and the acquisition unit is used for acquiring the access control opening request input by the user and sending the access control opening request to the access control management equipment.
In a fifth aspect, there is provided an access control device, including: a processor, a memory; the processor is configured to support the access control device to perform corresponding functions in the method of the first aspect and any possible implementation manner thereof. The memory is used for coupling with the processor and storing programs (instructions) and data necessary for the access control device. Optionally, the access control device may further include an input/output interface, which is used to support communication between the access control device and other devices.
A sixth aspect provides a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the method of the first aspect and any of its possible implementations.
In a seventh aspect, a client is provided, including: a processor, a memory; the processor is configured to support the client to perform corresponding functions in the method of the second aspect and any possible implementation manner thereof. The memory is used for coupling with the processor and holds the programs (instructions) and data necessary for the client. Optionally, the client may further include an input/output interface for supporting communication between the client and other devices.
In an eighth aspect, there is provided a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the method of the second aspect and any possible implementation thereof.
In a ninth aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect, the second aspect and any possible implementation thereof described above.
According to the method and the system, a plurality of entrance guards of a user are managed in a unified mode through entrance guard management equipment, and when the entrance guard management equipment receives an entrance guard opening request sent by a first client, whether target entrance guard information matched with first entrance guard information which is requested to be accessed in the entrance guard opening request exists in a database or not is firstly inquired; if the target access control information exists, the access control management equipment determines a second client bound with the target access control according to the binding relationship between the access control and the client, and sends an access control opening request to the second client; then, the access control management equipment receives authorization information sent by the second client under the condition that the visitor information in the access control opening request is verified by the second client; and finally, the access control management equipment sends the authorization information to the target access control, and the target access control can be opened. By adopting the scheme provided by the application, the time and the energy for managing the plurality of entrance guards by the user can be reduced, the user can movably manage the plurality of entrance guards at the same time, and the entrance guard management efficiency of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present application, the drawings required to be used in the embodiments or the background art of the present application will be described below.
Fig. 1 is a schematic architecture diagram of an access control management system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an access control management method according to an embodiment of the present application;
fig. 3 is a schematic flow chart of an access control method applied to an access control device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an access control management device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a client according to an embodiment of the present application;
fig. 6 is a schematic hardware structure diagram of an access control management device according to an embodiment of the present application;
fig. 7 is a schematic diagram of a hardware structure of a client according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present application, the drawings required to be used in the embodiments or the background art of the present application will be described below.
The embodiments of the present application will be described below with reference to the drawings.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an architecture of an access control management system according to an embodiment of the present disclosure.
As shown in fig. 1, the access control system includes an access control device 10, a first client 20, a second client 30, a housing access control 40, and a door access control 50. The access control management device 10 may perform data transmission and interactive communication with the first client 20 and the second client 30, respectively, and the access control management device 10 may also send data and instructions to the house access control 40 and the door access control 50, respectively.
The access control device 10 may be a server, or may be another device having functions of storing data, processing data, transmitting data, receiving data, and the like; the first client 20 and the second client 30 may be mobile terminals (e.g., mobile phones, tablet computers, notebook computers, smart wearable devices, etc.) used by users; the housing entrance guard 40 specifically refers to an intelligent lock on a door of the house, and the door entrance guard 50 specifically refers to an intelligent lock on a door of an automobile (for opening/closing the door), it should be noted that the entrance guard managed by the entrance guard management system in the embodiment of the present application is not limited to the above two kinds of entrance guards, and may further include an entrance guard of a public facility (such as an entrance guard of a community gate, an entrance guard of a public library, an entrance guard of a company, etc.), and various entrance guards based on an intelligent lock, and the embodiment of the present application does not limit the kinds of the above entrance guards.
Note that the first client 20 and the second client 30 have the same functions: the request input by the user may be received and sent to the access control device 10, or the request pushed by the access control device 10 may be received. For example, the first client 20 receives a request input by a user and sends the request to the access control device 10; the access control management device 10 determines a second client 30 matched with the information according to the information in the request, and then sends the request to the second client 30; the second client 30 receives a request pushed by the access control management device 10, and when the information in the request passes the verification of the second client 30, the second client 30 sends authorization information to the access control management device 10; the access control device 10 receives the authorization information and sends the authorization information to the corresponding access control device, so that the access control device can open the access control device. In the above scenario, the first client 20 performs a guest function and the second client 30 performs an administrator function, and it should be noted that all functions owned by the two clients are the same, but in different application scenarios, the functions may be performed differently.
According to the method and the system, a plurality of entrance guards of a user are managed in a unified mode through entrance guard management equipment, and when the entrance guard management equipment receives an entrance guard opening request sent by a first client, whether target entrance guard information matched with first entrance guard information which is requested to be accessed in the entrance guard opening request exists in a database or not is firstly inquired; if the target access control information exists, the access control management equipment determines a second client bound with the target access control according to the binding relationship between the access control and the client, and sends an access control opening request to the second client; then, the access control management equipment receives authorization information sent by the second client under the condition that the visitor information in the access control opening request is verified by the second client; and finally, the access control management equipment sends the authorization information to the target access control, and the target access control can be opened. By adopting the scheme provided by the application, the time and the energy for managing the plurality of entrance guards by the user can be reduced, the user can movably manage the plurality of entrance guards at the same time, and the entrance guard management efficiency of the user is improved.
The following embodiments will specifically describe the process of interacting among devices in the access control system and implementing access control management.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating an access control management method according to an embodiment of the present disclosure.
201. The first client side obtains an entrance guard opening request input by a user.
In this embodiment of the application, the user may input the access control opening request in a plurality of manners, for example, in the form of text, voice, video, or any combination thereof, and as described above, the first client may be a mobile terminal (e.g., a mobile phone, a tablet computer, a laptop, a smart wearable device, or the like) used by the user. In a possible implementation manner, the first client is a mobile phone, and the user inputs the access control opening request to the mobile phone in a manner of combining text and video. For example, a user inputs a text "name of three, cell phone number 12345678900, door access control request for opening liqi" to a three-way mobile phone, and the three-way mobile phone inputs a video, and the specific content of the video may be identity information such as a face of three, and may also be information related to an access control opening request initiated by three. In addition, when the user inputs the access control opening request in the form of a video, the first client may limit the entry duration of the video, for example, the first client may only receive the video that is entered by the user and has a duration greater than 30 seconds and less than 1 minute.
202. The first client sends the access control opening request to the access control management equipment.
In this embodiment of the application, the access control management device may be a server or a convergence platform formed by combining some devices similar to the server, and the first client and the access control management device may communicate with each other through a wireless network.
203. The access control method comprises the steps that an access control management device receives an access control opening request sent by a first client, wherein the access control opening request comprises first access control information and visitor information which are required to be accessed.
In this application embodiment, the entrance guard opening request includes the information, visitor's information of the first entrance guard of request access, and wherein, the information of first entrance guard includes the only differentiation nature identification of first entrance guard, if: the distinguishing two-dimensional code, the bar code, the serial number and the like are marked when a manufacturer carries out factory setting on the first entrance guard; the visitor information may include identity information of the visitor, such as a name, a phone number, face information, and the like.
Optionally, when receiving an access control opening request sent by the first client, the access control management device first performs preliminary verification on visitor information in the access control opening request, for example, compares a phone number of a visitor with a telecommunication fraud number issued by a public security bureau, and compares face information of the visitor with face information of a criminal escaping from the public security bureau; and if the door control management equipment finds that the telephone number or the face information of the visitor is abnormal after comparison, pushing a message for refusing to process the door control opening request to the first client.
204. And the access control management equipment inquires whether the information of the target access control matched with the information of the first access control exists in the database.
In this embodiment of the application, as described in 203, the information of the first access control includes a unique distinctive identification of the first access control, and the database stores the unique distinctive identification of the registered access control in advance, and the access control management device queries whether a target access control exists in the registered access control of the database, where the serial number of the target access control is the same as the serial number of the first access control, taking the identification information as a serial number as an example. For example, if the serial number of the first access control is "0011001", and the database stores the access control information shown in table 1, and the serial number of the access control 2 is also "0011001", as shown in table 1, the information of the access control 2 is matched with the information of the first access control.
TABLE 1
Name of gate inhibition Entrance guard serial number
Entrance guard
1 0011000
Gate inhibition 2 0011001
Entrance guard 3 1011001
205. And if the client side exists, the entrance guard management equipment determines a second client side bound with the target entrance guard according to the binding relation between the entrance guard and the client side.
In this embodiment of the application, if the information of the target access control matched with the information of the first access control exists in the access control management device query database, as in 204, the information of the access control 2 in the table 1 is matched with the information of the first access control, then the access control 2 is the target access control, and the access control management device determines the client bound with the access control 2 according to the pre-stored binding relationship between the access control and the client, that is, the client is the second client. The binding relationship between the access control and the client specifically refers to a binding relationship between unique discriminative identification information of the access control and a client account, or takes the identification information as a serial number, as shown in table 2, the client account takes a user-defined name as an example, and when the access control 2 is the target access control, and the client account corresponding to the access control 2 is "liqi 360", the client corresponding to the liqi corresponding to the account is the second client.
It should be noted that each access control device may be bound to only one client, or may be bound to multiple clients. When the target access control is only bound with one client, the access control management equipment directly confirms the client as the second client; when the target access control device binds a plurality of clients, the access control management device may confirm all the clients as the second client, and may also confirm one of the clients as the second client.
Optionally, the access control management device may set priorities for a plurality of clients bound to each access control, and may set the client with the highest priority as an administrator client corresponding to the access control. When the target access control is bound with a plurality of clients, the access control management device can confirm the administrator client in the clients bound by the target access control as the second client. For example, the access control 1 is a target access control, the account numbers of the client corresponding to the access control 1 include "zhang di 123" and "zhang san abc", and the two account numbers respectively correspond to the client of zhang di and the client of zhang san. In a possible implementation manner, the entrance guard management device sets priorities according to the sequence of account registration of the client of zhang di and the client of zhang san, and sets the client which registers the account first as the administrator client, when the client of zhang di registers the account first, the client of zhang di has the highest priority and is the administrator client, and at this time, the entrance guard management device confirms the zhang di client bound with the entrance guard 1 as the second client. In addition, optionally, when the client of the third generation system is set as the administrator client by the third generation system, the door lock management device pushes the request to the client of the second generation system, and if the request passes the agreement of the client of the second generation system, the door lock management device sets the client of the third generation system as the administrator client with the highest priority again, and at this time, the entrance guard management device confirms the client of the third generation system bound to the entrance guard 1 as the second client.
TABLE 2
Name of gate inhibition Entrance guard serial number Client account
Entrance guard
1 0011000 Zhang Di 123, Zhang Sanabc
Gate inhibition 2 0011001 Li four 360
Entrance guard 3 1011001 Wangwan _123_ abc
206. And the access control management equipment sends the access control opening request to the second client.
In the embodiment of the present application, as described in 201, the user may input the access control request in various manners, for example, in the form of text, voice, video, or any combination thereof. In a possible implementation manner, the access control management device directly sends the received access control opening request in the form of text, voice, video, or any combination of several forms thereof to the second client, for example, the user inputs a text message and inputs a 30-second video, and the combination of the text message and the video serves as the access control opening request, and the access control management device directly sends the text message and the video to the second client. In another possible implementation manner, the access control management device performs formal conversion on the received access control opening request and then sends the access control opening request to the second client, for example, the user inputs a segment of text message, the segment of text message is used as the access control opening request, the access control management device converts the segment of text message into a voice form, and then sends the converted voice message to the second client. In another possible implementation manner, the access control opening request does not have specific voice or video content, but includes a voice or video call request initiated by a user, and the access control management device sends the voice or video call request to the second client.
207. And the second client receives the access control opening request sent by the access control management equipment.
In this embodiment of the application, as described in 206, the access control opening request sent by the access control management device and received by the second client may be a text message and a video input by the user, a voice message obtained by performing voice conversion on the text message input by the user by the access control management device, or a voice or video call request initiated by the user. The details are not described herein.
208. And the second client sends authorization information to the access control management equipment under the condition of receiving the instruction that the access control opening request passes the verification.
In this embodiment of the application, after the second client receives the access control opening request, a second user corresponding to the second client may verify specific contents in the access control opening request, and if the second user passes the verification, the second client may receive an instruction that the access control opening request passes the second user verification, and at this time, the second client sends authorization information for opening the target access control to the access control management device. The authorization information may be a password, a fingerprint, a face, and other media for triggering the opening of the intelligent access lock, and it should be noted that in this embodiment of the application, the user has previously registered authorization information in the target access control, where the authorization information is similar to a "key" that can open the target access control. For example, the target access control device is a combination lock, a user sets a password on the combination lock in advance, and the combination lock can be opened when the user inputs the preset password again.
In a possible implementation manner, the second client sends authorization information to the access control management device in a dynamic form, that is, when the second user verifies and passes the specific content in the access control opening request, the second client immediately inputs the authorization information to the second client, and the second client sends the authorization information input by the second user to the access control management device; in another possible implementation manner, the second user stores the authorization information in a local file in advance, and when the second client receives an instruction that the access control opening request passes the verification of the second user, the second client obtains the authorization information from the local file and sends the authorization information to the access control management device.
209. And the access control management equipment receives the authorization information sent by the second client, sends the authorization information to the target access control, and then opens the target access control.
In this embodiment of the application, as described in 208, the access control management device sends the received authorization information to the target access control, and similarly, sends a "key" to the target access control, and the "key" can trigger to open the target access control.
According to the method and the system, a plurality of entrance guards of a user are managed in a unified mode through entrance guard management equipment, and when the entrance guard management equipment receives an entrance guard opening request sent by a first client, whether target entrance guard information matched with first entrance guard information which is requested to be accessed in the entrance guard opening request exists in a database or not is firstly inquired; if the target access control information exists, the access control management equipment determines a second client bound with the target access control according to the binding relationship between the access control and the client, and sends an access control opening request to the second client; then, the access control management equipment receives authorization information sent by the second client under the condition that the visitor information in the access control opening request is verified by the second client; and finally, the access control management equipment sends the authorization information to the target access control, and the target access control can be opened. By adopting the scheme provided by the application, on one hand, the user can manage a plurality of entrance guards movably at the same time, the entrance guard management efficiency of the user is improved, on the other hand, the entrance guard management equipment can open the entrance guard only by obtaining the authorization information input by the user to the client, and the safety in entrance guard management is improved.
Referring to fig. 3, fig. 3 is a schematic flow chart of an access control method applied to an access control device according to an embodiment of the present application.
301. The method comprises the steps of obtaining a binding request sent by a client, wherein the binding request comprises a to-be-bound entrance guard type, a to-be-bound entrance guard identifier and an account number of the client.
In this embodiment of the application, the client is any client that has registered an account number on the access control management device, and the access control category refers to category division of an access control according to an application of the access control in different scenes, for example, the access control category may be divided into a house access control, a car door access control, a company access control, a community gate access control, a library access control, and the like. When a user of the client initiates a binding request, the client can provide a predefined uniform entrance guard category name, and the user can input a corresponding category of an entrance guard to be bound according to an actual scene, or can directly determine the category of the entrance guard to be bound on the client. The entrance guard identification to be bound refers to the unique distinguishing identification of the entrance guard, such as: the distinguishing two-dimensional code, the bar code, the serial number and the like are marked when the manufacturer carries out factory setting on the entrance guard.
302. Storing the entrance guard identification to be bound in a category entrance guard set corresponding to the category of the entrance guard to be bound in a database; and establishing a binding relationship between the entrance guard identification to be bound and the account of the client, and storing the binding relationship in a database.
In the embodiment of the present application, as described in 301, the entrance guard to be bound has a category, and therefore, when storing the identification information of the entrance guard, the entrance guard management device may store the identification information of the entrance guard according to the category, that is, the identification of the entrance guard to be bound is stored in a category entrance guard set corresponding to the category of the entrance guard to be bound in the database; and the access control management equipment also needs to establish a binding relationship between the access control identification to be bound and the account of the client according to the binding request, and store the binding relationship in a database. For example, the entrance guard categories are divided into house entrance guard, door entrance guard and company entrance guard, the entrance guard identifiers are serial numbers, and the entrance guard identifiers stored by the entrance guard management equipment according to the categories and the binding relationship between the entrance guard identifiers and the client account numbers are shown in table 3. As can be seen from table 3, the entrance guard management device stores entrance guard serial numbers with the same category together, that is, all of entrance guard 1, entrance guard 2, and entrance guard 3 belong to the category of the residential entrance guard, so that the 3 entrance guard serial numbers are stored together in sequence; as can be seen from table 3, each access control identifier has a bound client account number, for example, the client account number bound to the access control 2 with the serial number "0011001" is "li four 360", and the client account number bound to the access control 5 with the serial number "1111000" is also "li four 360", which indicates that the li four client corresponding to the account number is bound to two access controls at the same time.
TABLE 3
Figure BDA0002222947720000091
Figure BDA0002222947720000101
303. And receiving an access control opening request sent by a first client, wherein the access control opening request comprises information of a first access control requesting access and visitor information.
The specific meaning of this embodiment can be seen in 203, which will not be described herein.
304. The first entrance guard information comprises a first entrance guard category and a first entrance guard identifier; and determining a target category access control set in the database according to the category of the first access control, and inquiring whether a target access control identifier matched with the identifier of the first access control exists in the target category access control set.
In this embodiment of the present application, as described in 302, the access control management device stores an access control identifier by category and stores a binding relationship between the access control identifier and a client account. The information of the first access control includes a category of the first access control and an identifier of the first access control, wherein the category of the first access control and the identifier of the first access control are the same as those in 302, and are not described herein again. Therefore, when the access control management device receives the first access control information, the type of the first access control may be used to determine a target type access control set in the database, for example, when the type of the first access control is "house access control", as shown in table 3, the access control management device determines that the corresponding "house access control type set" includes access control 1, access control 2, and access control 3; further, entrance guard management equipment inquires whether a target entrance guard identification matched with the identification of the first entrance guard exists in the 'house entrance guard category set', when the identification of the first entrance guard is '0011001', entrance guard management equipment inquires that the identification of entrance guard 2 is '0011001', namely the identification of entrance guard 2 is matched with the identification of the first entrance guard, and correspondingly, entrance guard 2 is the target entrance guard.
305. And if so, determining a second client bound with the target access control according to the binding relationship between the access control and the client, and sending the access control opening request to the second client.
The specific meaning of this embodiment can be seen in 205 and 206, which will not be described herein.
306. The visitor information comprises identity information of the visitor and access intention information of the visitor; and receiving authorization information sent by the second client under the condition that the visitor information is verified by the second client.
In this application embodiment, above-mentioned visitor information includes visitor's identity information, visitor's access intention information, wherein, visitor's identity information can be name, telephone number, face information etc. visitor's access intention information is different according to the purpose that different users visited the entrance guard, can include very many intention information, for example, "the three access intentions of visitor are borrowing the car, the request is opened car entrance guard", "the three access intentions of visitor are got into library and learn, the request is opened library entrance guard", "the three access intentions of visitor are visiting friends, the request is opened district gate entrance guard" and so on. And receiving authorization information sent by the second client under the condition that the visitor information is verified by the second client, wherein the authorization information refers to that a second user corresponding to the second client verifies the identity information of the visitor and the access intention information of the visitor, and if the verification is passed, the access control management equipment can receive the authorization information sent by the second client. For example, the identity information of the visitor is "zhang san, 12345674789", the access intention information of the visitor is "borrow a car to request to open the car door lock", the second user makes a call to zhang san to confirm that the identity information of the visitor is real, and the access intention is considered reasonable, so that the second user sends a message that the visitor information passes the verification to the second client, the second client sends the authorization information to the door control management device when receiving the message, and through the steps, the door control management device can finally receive the authorization information sent by the second client.
307. And sending the authorization information to the target access control, wherein the authorization information is used for opening the target access control.
The specific meaning of this embodiment can be seen in 209, which will not be described herein.
According to the method and the device, a plurality of entrance guards of a user are managed in a unified mode through entrance guard management equipment, when the entrance guard management equipment receives an entrance guard opening request sent by a first client, a target category entrance guard set corresponding to a category of a first entrance guard which is requested to be accessed in the entrance guard opening request in a database is determined, and then whether a target entrance guard identifier matched with an identifier of the first entrance guard exists or not is inquired from the set; if the target access control identification exists in the inquiry, the access control management equipment determines a second client bound with the target access control according to the binding relationship between the access control identification and the client account, and sends an access control opening request to the second client; then, the access control management equipment receives authorization information sent by a second client under the condition that visitor information in the access control opening request, namely identity information of a visitor and access intention information of the visitor, passes the verification of the second user corresponding to the second client; and finally, the access control management equipment sends the authorization information to the target access control, and the target access control can be opened. By adopting the scheme provided by the application, the access control management equipment queries whether the target access control identification exists in the database according to the category, and can determine the target access control more quickly, so that the client bound by the target access control can be determined more quickly, the time consumed by pushing the access control opening request to the corresponding client by the access control management equipment is reduced, and the access control management efficiency is improved.
The method of the embodiments of the present application is set forth above in detail and the apparatus of the embodiments of the present application is provided below.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an access control device according to an embodiment of the present application, where the access control device 1 includes: a first receiving unit 11, an inquiring unit 12, a first sending unit 13, a second receiving unit 14, a second sending unit 15, an obtaining unit 16, a storing unit 17 and a binding unit 18. Wherein:
the system comprises a first receiving unit 11, a second receiving unit, a first access control unit and a second access control unit, wherein the first receiving unit is used for receiving an access control opening request sent by a first client, and the access control opening request comprises information of a first access control which requires access and visitor information;
the query unit 12 is configured to query whether information of a target access control matched with the information of the first access control exists in a database;
the first sending unit 13 is configured to determine a second client bound to the target access control according to a binding relationship between the access control and the client when the query unit queries that the database contains information of the target access control matching the information of the first access control, and send the access control opening request to the second client;
a second receiving unit 14, configured to receive authorization information sent by the second client if the guest information is verified by the second client;
and the second sending unit 15 is configured to send the authorization information to the target access control, where the authorization information is used to open the target access control.
Further, the information of the first entrance guard comprises a category of the first entrance guard and an identifier of the first entrance guard; the query unit 12 is specifically configured to determine a target category access control set in a database according to the category of the first access control, where the category of any access control in the target category access control set is the same as the category of the first access control; and inquiring whether a target entrance guard identification matched with the identification of the first entrance guard exists in the target category entrance guard set or not.
Further, the visitor information includes identity information of the visitor, and access intention information of the visitor.
Further, before receiving the access control opening request sent by the first client, the access control management device further includes: the acquiring unit 16 is configured to acquire a binding request sent by a client, where the binding request includes a type of an access control to be bound, an identifier of the access control to be bound, and an account of the client; the storage unit 17 is configured to store the to-be-bound access control identifier in a category access control set corresponding to the category of the to-be-bound access control in a database; and the binding unit 18 is used for establishing a binding relationship between the entrance guard identification to be bound and the account of the client, and storing the binding relationship in a database.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a client according to an embodiment of the present disclosure, where the client 2 includes: a receiving unit 21, a transmitting unit 22, and an acquiring unit 23. Wherein:
a receiving unit 21, configured to receive an access control opening request sent by an access control management device;
and the sending unit 22 is configured to send authorization information to the access control management device when receiving the instruction that the access control opening request passes the verification, where the authorization information is used to instruct the access control management device to open an access control.
Further, the client further comprises: the obtaining unit 23 is configured to obtain an access control opening request input by a user, and send the access control opening request to the access control management device.
Fig. 6 is a schematic hardware structure diagram of an access control management device according to an embodiment of the present application. The access control apparatus 3 includes a processor 31, and may further include an input device 32, an output device 33, and a memory 34. The input device 32, the output device 33, the memory 34, and the processor 31 are connected to each other via a bus.
The memory includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), or a portable read-only memory (CD-ROM), which is used for storing instructions and data.
The input means are for inputting data and/or signals and the output means are for outputting data and/or signals. The output means and the input means may be separate devices or may be an integral device.
The processor may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case of one CPU, the CPU may be a single-core CPU or a multi-core CPU.
The memory is used to store program codes and data of the network device.
The processor is used for calling the program codes and data in the memory and executing the following steps: receiving an access control opening request sent by a first client, wherein the access control opening request comprises information of a first access control requesting access and visitor information; inquiring whether the information of the target access control matched with the information of the first access control exists in a database; if the target access control request exists, determining a second client bound with the target access control according to the binding relation between the access control and the client, and sending the access control opening request to the second client; receiving authorization information sent by the second client under the condition that the visitor information is verified by the second client; and sending the authorization information to the target access control, wherein the authorization information is used for opening the target access control.
In a possible implementation manner, the information of the first entrance guard includes a category of the first entrance guard and an identifier of the first entrance guard; whether the information of the target entrance guard matched with the information of the first entrance guard exists in the query database or not comprises the following steps: determining a target category access control set in a database according to the category of the first access control, wherein the category of any access control in the target category access control set is the same as that of the first access control; and inquiring whether a target entrance guard identification matched with the identification of the first entrance guard exists in the target category entrance guard set or not.
In another possible implementation manner, the visitor information includes identity information of the visitor and access intention information of the visitor.
In another possible implementation manner, before receiving the access control opening request sent by the first client, the method further includes: acquiring a binding request sent by a client, wherein the binding request comprises a to-be-bound entrance guard type, a to-be-bound entrance guard identifier and an account number of the client; storing the entrance guard identification to be bound in a category entrance guard set corresponding to the entrance guard category to be bound in a database; and establishing a binding relationship between the entrance guard identification to be bound and the account of the client, and storing the binding relationship in a database.
It will be appreciated that figure 6 only shows a simplified design of an access control device. In practical applications, the access control device may further include other necessary elements, including but not limited to any number of input/output devices, processors, controllers, memories, etc., and all access control devices that can implement the embodiments of the present application are within the scope of the present application.
Fig. 7 is a schematic diagram of a hardware structure of a client according to an embodiment of the present application. The client 4 comprises a processor 41 and may further comprise an input device 42, an output device 43 and a memory 44. The input device 42, the output device 43, the memory 44, and the processor 41 are connected to each other via a bus.
The memory includes, but is not limited to, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM), or a portable read-only memory (CD-ROM), which is used for storing instructions and data.
The input means are for inputting data and/or signals and the output means are for outputting data and/or signals. The output means and the input means may be separate devices or may be an integral device.
The processor may include one or more processors, for example, one or more Central Processing Units (CPUs), and in the case of one CPU, the CPU may be a single-core CPU or a multi-core CPU.
The memory is used to store program codes and data of the network device.
The processor is used for calling the program codes and data in the memory and executing the following steps: receiving an access control opening request sent by access control management equipment; and sending authorization information to the access control management equipment under the condition that the received access control opening request passes the verified instruction, wherein the authorization information is used for indicating the access control management equipment to open the access control.
In one possible implementation, the steps further include: and acquiring an entrance guard opening request input by a user, and sending the entrance guard opening request to the entrance guard management equipment.
It will be appreciated that figure 7 only shows a simplified design of a client. In practical applications, the clients may also respectively include other necessary elements, including but not limited to any number of input/output devices, processors, controllers, memories, etc., and all clients that can implement the embodiments of the present application are within the protection scope of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in or transmitted over a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
One of ordinary skill in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by hardware related to instructions of a computer program, which may be stored in a computer-readable storage medium, and when executed, may include the processes of the above method embodiments. And the aforementioned storage medium includes: various media that can store program codes, such as a read-only memory (ROM) or a Random Access Memory (RAM), a magnetic disk, or an optical disk.

Claims (10)

1. The access control management method is applied to access control management equipment and comprises the following steps:
receiving an access control opening request sent by a first client, wherein the access control opening request comprises information of a first access control requesting access and visitor information;
inquiring whether the information of the target access control matched with the information of the first access control exists in a database;
if the target access control request exists, determining a second client bound with the target access control according to the binding relation between the access control and the client, and sending the access control opening request to the second client;
receiving authorization information sent by the second client under the condition that the visitor information is verified by the second client;
and sending the authorization information to the target access control, wherein the authorization information is used for opening the target access control.
2. The method of claim 1, wherein the information of the first entrance guard comprises a category of the first entrance guard, an identification of the first entrance guard;
whether the information of the target entrance guard matched with the information of the first entrance guard exists in the query database or not comprises the following steps:
determining a target category access control set in a database according to the category of the first access control, wherein the category of any access control in the target category access control set is the same as that of the first access control;
and inquiring whether a target entrance guard identification matched with the identification of the first entrance guard exists in the target category entrance guard set or not.
3. The method of claim 1, wherein the guest information comprises identity information of the guest, access intention information of the guest.
4. The method of claim 1, wherein before receiving the access control opening request sent by the first client, the method further comprises:
acquiring a binding request sent by a client, wherein the binding request comprises a to-be-bound entrance guard type, a to-be-bound entrance guard identifier and an account number of the client;
storing the entrance guard identification to be bound in a category entrance guard set corresponding to the entrance guard category to be bound in a database;
and establishing a binding relationship between the entrance guard identification to be bound and the account of the client, and storing the binding relationship in a database.
5. The access control management method is applied to a client and comprises the following steps:
receiving an access control opening request sent by access control management equipment;
and sending authorization information to the access control management equipment under the condition that the received access control opening request passes the verified instruction, wherein the authorization information is used for indicating the access control management equipment to open the access control.
6. The method of claim 5, further comprising:
and acquiring an entrance guard opening request input by a user, and sending the entrance guard opening request to the entrance guard management equipment.
7. The utility model provides an entrance guard management equipment which characterized in that, entrance guard management equipment includes:
the system comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving an access control opening request sent by a first client, and the access control opening request comprises first access control information and visitor information which are requested to be accessed;
a query unit; the first entrance guard information acquisition module is used for acquiring first entrance guard information of a first entrance guard;
the first sending unit is used for determining a second client bound with the target entrance guard according to the binding relationship between the entrance guard and the client under the condition that the information of the target entrance guard matched with the information of the first entrance guard exists in the database inquired by the inquiring unit, and sending the entrance guard opening request to the second client;
a second receiving unit, configured to receive authorization information sent by the second client if the guest information is verified by the second client;
and the second sending unit is used for sending the authorization information to the target access control, and the authorization information is used for opening the target access control.
8. A client, the client comprising:
the receiving unit is used for receiving an access control opening request sent by the access control management equipment;
and the sending unit is used for sending authorization information to the access control management equipment under the condition that the received access control opening request passes the verified instruction, wherein the authorization information is used for indicating the access control management equipment to open the access control.
9. An access control device, comprising: a processor and a memory, the processor and the memory coupled; wherein the memory stores program instructions that, when executed by the processor, cause the processor to perform the method of any of claims 1 to 4.
10. A computer-readable storage medium having stored therein instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 4.
CN201910941186.3A 2019-09-30 2019-09-30 Access control management method and related product Pending CN110706388A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910941186.3A CN110706388A (en) 2019-09-30 2019-09-30 Access control management method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910941186.3A CN110706388A (en) 2019-09-30 2019-09-30 Access control management method and related product

Publications (1)

Publication Number Publication Date
CN110706388A true CN110706388A (en) 2020-01-17

Family

ID=69196958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910941186.3A Pending CN110706388A (en) 2019-09-30 2019-09-30 Access control management method and related product

Country Status (1)

Country Link
CN (1) CN110706388A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113781695A (en) * 2021-08-27 2021-12-10 创视未来科技(深圳)有限公司 Access control management method, system, device and computer readable storage medium
CN115512473A (en) * 2022-11-08 2022-12-23 深圳市亲邻科技有限公司 Door opening method and device based on intelligent sound box permission, medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103150800A (en) * 2013-03-22 2013-06-12 李凯 Device for adding permissions in entrance guard system
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN106204853A (en) * 2016-07-28 2016-12-07 乐视控股(北京)有限公司 Server, access control equipment administrative center, mobile terminal, the method and system of access control
WO2017215180A1 (en) * 2016-06-14 2017-12-21 杭州海康威视数字技术股份有限公司 Anti-passback method, apparatus and system
CN107945315A (en) * 2016-10-13 2018-04-20 深圳市康悦合科技开发有限公司 Entrance guard controlling method and system
CN108022335A (en) * 2016-10-31 2018-05-11 杭州海康威视数字技术股份有限公司 A kind of access control method, device and access control system
CN110021092A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A kind of lessee's access permission control method based on openid
CN110060388A (en) * 2019-03-11 2019-07-26 西安艾润物联网技术服务有限责任公司 A kind of Door-access control method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103150800A (en) * 2013-03-22 2013-06-12 李凯 Device for adding permissions in entrance guard system
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
WO2017215180A1 (en) * 2016-06-14 2017-12-21 杭州海康威视数字技术股份有限公司 Anti-passback method, apparatus and system
CN106204853A (en) * 2016-07-28 2016-12-07 乐视控股(北京)有限公司 Server, access control equipment administrative center, mobile terminal, the method and system of access control
CN107945315A (en) * 2016-10-13 2018-04-20 深圳市康悦合科技开发有限公司 Entrance guard controlling method and system
CN108022335A (en) * 2016-10-31 2018-05-11 杭州海康威视数字技术股份有限公司 A kind of access control method, device and access control system
CN110021092A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 A kind of lessee's access permission control method based on openid
CN110060388A (en) * 2019-03-11 2019-07-26 西安艾润物联网技术服务有限责任公司 A kind of Door-access control method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113781695A (en) * 2021-08-27 2021-12-10 创视未来科技(深圳)有限公司 Access control management method, system, device and computer readable storage medium
CN115512473A (en) * 2022-11-08 2022-12-23 深圳市亲邻科技有限公司 Door opening method and device based on intelligent sound box permission, medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN102067555B (en) Improved biometric authentication and identification
CN105551120A (en) Building intercommunication method, near field communication (NFC) unlocking device and building intercommunication system
CN104517338A (en) Remote door access control system based on wireless network and realization method of remote door access control system
KR100736164B1 (en) Biometrical Information and Biometrical System and Method Using Cable-Wireless Device Having Multiple
CN106686754B (en) Data interaction method and data interaction system
US20220255929A1 (en) Systems and methods for preventing unauthorized network access
CN114070583B (en) Information access control method, device, computer equipment and medium
CN111797418B (en) Online service control method and device, service terminal, server and storage medium
CN111833507B (en) Visitor authentication method, device, equipment and computer readable storage medium
CN104580260A (en) Safety method applicable to intelligent terminal of internet of things
CN106447849A (en) Authenticating method of door access system based on WeChat services
CN110838195A (en) Method for authorizing others to unlock
CN106713315B (en) Login method and device of plug-in application program
CN110706388A (en) Access control management method and related product
CN112927408A (en) Visitor visiting processing method and device
CN104469736A (en) Data processing method, server and terminal
CN113037736B (en) Authentication method, device, system and computer storage medium
CN113114629B (en) Contract management method, device, equipment and storage medium based on block chain
CN106296945A (en) A kind of gate control system based on GPS location and door opening method
CN103138935A (en) Identity authentication system based on telecom operators
CN104640112A (en) Authentication method, device and system
CN112272169A (en) User identity determination method and device
CN110021084B (en) Code scanning door opening system and method of distributed authorization architecture
KR102077662B1 (en) Method and Apparatus for Providing Authentication in Home Network
CN104331649A (en) Identity recognition system and method based on network connection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200117