CN110766850B - Visitor information management method, access control system, server and storage medium - Google Patents

Visitor information management method, access control system, server and storage medium Download PDF

Info

Publication number
CN110766850B
CN110766850B CN201911034460.5A CN201911034460A CN110766850B CN 110766850 B CN110766850 B CN 110766850B CN 201911034460 A CN201911034460 A CN 201911034460A CN 110766850 B CN110766850 B CN 110766850B
Authority
CN
China
Prior art keywords
visitor
information
authority
permission
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911034460.5A
Other languages
Chinese (zh)
Other versions
CN110766850A (en
Inventor
张永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cloudminds Robotics Co Ltd
Original Assignee
Cloudminds Shanghai Robotics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Shanghai Robotics Co Ltd filed Critical Cloudminds Shanghai Robotics Co Ltd
Priority to CN201911034460.5A priority Critical patent/CN110766850B/en
Publication of CN110766850A publication Critical patent/CN110766850A/en
Application granted granted Critical
Publication of CN110766850B publication Critical patent/CN110766850B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)
  • Alarm Systems (AREA)

Abstract

The embodiment of the invention relates to the technical field of access control systems, and discloses a visitor information management method, an access control system, a server and a storage medium. When the visitor is judged to accord with the passing condition, the visitor information of the visitor is recorded and stored in the database; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor; when a management request for visitor information in a database is received, determining a permission group to which a sending node of the management request belongs; determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; the management authority corresponding to each authority group is in a hierarchical relationship; and feeding back the visitor information in the database to the sending node according to the management authority of the sending node. Therefore, the visitor information is automatically recorded, the accuracy and the safety of the visitor information can be ensured, and malicious stealing or tampering of data is prevented.

Description

Visitor information management method, access control system, server and storage medium
Technical Field
The embodiment of the invention relates to the technical field of access control systems, in particular to a visitor information management method, an access control system, a server and a storage medium.
Background
The entrance guard means the forbidden authority of the door and is the guard and guard against the door. The "door" herein, in a broad sense, includes various passages that can pass, including a door through which people pass, a door through which vehicles pass, and the like. Under the rapid development of digital technology network technology, the entrance guard technology has obtained rapid development nowadays, on the basis that traditional lock was opened through the key, can also discern through password or magnetic card, can also carry out the record to visitor's information through the manpower to guarantee to set up the safety in entrance guard's the place, avoid the dangerous molecule to get into.
The inventors found that at least the following problems exist in the related art: visitor information is recorded through manpower, a large amount of manpower is wasted, and the correctness of the recorded visitor information cannot be guaranteed. In addition, the visitor information can be checked and deleted at will after being recorded, and the confidentiality and the safety of the visitor information cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention aims to provide a visitor information management method, an access control system, a server and a storage medium, so that the visitor information is automatically recorded, the accuracy and the safety of the visitor information can be ensured, and malicious stealing or data tampering is prevented.
In order to solve the above technical problem, an embodiment of the present invention provides a visitor information management method, including: when the visitor is judged to accord with the passing condition, recording visitor information of the visitor and storing the visitor information in a database; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor; when a management request for visitor information in a database is received, determining a permission group to which a sending node of the management request belongs; determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; the management authority corresponding to each authority group is in a hierarchical relationship; and feeding back the visitor information in the database to the sending node according to the management authority of the sending node.
An embodiment of the present invention further provides an access control system, including: a panel machine and a server; the panel machine is used for carrying out iris or face recognition on the visitor to obtain iris or face information; the server is used for judging whether the visitor accords with the passing condition or not based on the iris or face information, and recording the visitor information of the visitor and storing the visitor information into the database when the visitor accords with the passing condition; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor; the server is also used for determining the authority group to which the sending node of the management request belongs when receiving the management request of the visitor information in the database; determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; the management authority corresponding to each authority group is in a hierarchical relationship; and feeding back the visitor information in the database to the sending node according to the management authority of the sending node.
An embodiment of the present invention further provides a server, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the guest information management method.
The embodiment of the invention also provides a storage medium which stores a computer program, and the computer program realizes the visitor information management method when being executed by a processor.
Compared with the prior art, the method and the system for managing the visitor information record have the advantages that when the visitor meets the passing condition of the access control system, the identity card information of the visitor, the passing time of the visitor and the like are recorded, and the visitor information is uploaded to the database. When the administrator needs to check or delete or modify the visitor information, the administrator logs in an account of the administrator, the permission chain can determine the authority group to which the account belongs and the management authority corresponding to the authority group according to the account information, determine the visitor information which can be checked and modified by the account according to the determined management authority corresponding to the account, and feed the visitor information in the management authority back to the administrator. Therefore, the visitor information which can be checked or deleted by the user of each account is the information within the authority range of the user, the information outside the authority range cannot be checked or deleted, the confidentiality of the visitor information is enhanced, and the information is prevented from being maliciously stolen or tampered.
In addition, record visitor's visitor information and save to the database, specifically include: encrypting visitor information of the visitor and generating index information corresponding to the visitor information; recording index information and uploading the encrypted visitor information to a database for storage; wherein the index information is used to retrieve encrypted guest information from the database upon reading. The index information of the visitor information is stored in the license chain, so that the storage pressure of the license chain can be reduced, and the operation and maintenance cost is reduced. In addition, encrypting the guest information may further protect the privacy of the guest information.
In addition, the passing condition of the visitor at least includes: judging whether the visitor meets the passing condition or not based on the iris or face information of the visitor; and/or judging whether the visitor meets the passing condition or not based on the information in the certificate of the visitor. Through iris or face recognition, visitors can pass through without feeling, and user experience is improved. In addition, the iris contains unique and lifelong unchangeable textural features representing an individual, so that the accuracy of identity identification is ensured, and identity information is prevented from being faked.
In addition, when judging whether the visitor accords with the traffic condition based on the iris or the face information of the visitor and the information in the certificate of the visitor, still include: if the iris or face information of the visitor and the information in the certificate of the visitor do not accord with the passing condition, remotely calling the visitor or security personnel; wherein, the remote calling mode at least comprises: a cell phone call, a fixed phone call, a video call, or an application APP call. Therefore, the visitor can directly communicate with the interviewee, and the interviewee judges whether to open the door for the visitor or not, so that the waiting time of the visitor is reduced.
In addition, when judging whether the visitor accords with the traffic condition based on the iris or the face information of the visitor and the information in the certificate of the visitor, still include: if the iris or face information of the visitor does not accord with the passing condition and the certificate of the visitor is not detected within the preset time, remotely calling the visitor or security personnel; wherein, the remote calling mode at least comprises: a cell phone call, a fixed phone call, a video call, or an application APP call. By the method, when the visitor inconveniently provides the certificate, the visitor or the security personnel can directly communicate with the visitor or the security personnel, and the identity of the visitor is confirmed by the visitor or the security personnel, so that the visiting experience of the visitor is improved.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of a guest information management method in a first embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a blockchain technology integrated distributed storage network according to a first embodiment of the present invention;
FIG. 3 is a diagram illustrating a tree hierarchy of privilege groups according to a first embodiment of the present invention;
fig. 4 is a flowchart of a guest information management method in a second embodiment of the present invention;
FIG. 5 is a schematic illustration of a remote call flow in a second embodiment of the present invention;
fig. 6 is a schematic structural diagram of an access control system according to a third embodiment of the present invention;
fig. 7 is a schematic configuration diagram of a server according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present invention, and the embodiments may be mutually incorporated and referred to without contradiction.
The first embodiment of the invention relates to a visitor information management method, which is applied to high-security-requirement scenes such as finance, government, public security, military, advanced laboratories and the like. When the visitor is judged to accord with the passing condition, recording visitor information of the visitor and storing the visitor information into a database; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor; when a management request for visitor information in a database is received, determining a permission group to which a sending node of the management request belongs; the management authority corresponding to each authority group is in a hierarchical relationship; determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; and feeding back the visitor information in the database to the sending node according to the management authority of the sending node. Therefore, the visitor information can be automatically recorded, the accuracy and the safety of the visitor information can be ensured, and malicious stealing or tampering of data can be prevented. The details of implementation of the visitor information management method of this embodiment are described in detail below, and the following description is only provided for facilitating understanding of the details of implementation and is not necessary for implementing this embodiment. The specific flow is shown in figure 1.
And 101, recording visitor information of the visitor and storing the visitor information into a database when the visitor is judged to meet the passing condition. Specifically, when a visitor requests access, whether the visitor meets the passing condition is judged, if the visitor meets the passing condition, the door is opened, and visitor information is recorded, wherein the visitor information can be identity information of the visitor, such as iris information, face information or identity information in an identity card of the visitor. The visitor information also includes the visitor's access time, transit time, or room number visited by the visitor, etc.
When storing the visitor information into the database, in order to prevent the data from being tampered, a blockchain technology may be used, a distributed storage network is integrated, and the visitor information is stored, and the structure of the blockchain technology integrated distributed storage network is specifically shown in fig. 2, when receiving the visitor information, a front end 21, that is, an access control system accessed by the visitor encrypts the visitor information through data processing software, and generates index information of the visitor information, the generated index information of the visitor information is recorded in a contract of a permission chain 22, the permission chain 22 includes a plurality of different private sub-chains, and the index information of different visitor information may be stored in different private sub-chains, thereby further protecting privacy. And on the other hand, upload the encrypted guest information to the distributed storage network 23. The user may read the index information of the guest from the contract of the license chain 22, and then obtain the encrypted guest information from the distributed storage network 23 and decrypt it. Only the index information of the visitor information is recorded in the permit chain 22, so that the storage pressure can be reduced, and the construction and operation and maintenance costs can be reduced. In addition, the integrated distributed storage system can ensure that the real access information does not deviate from the tamper-proof protection of the license chain.
Step 102, when receiving a management request for visitor information in a database, determining a permission group to which a sending node of the management request belongs. Specifically, each node in the license chain 22 may be an account or a contract identity, the management authority of the node may be stored in a customized usb disk, and if the license chain node is an entity physical server, the license chain node may be activated and run by directly inserting the customized usb disk; if the permission chain node is a virtual machine, inserting the customized USB flash disk into the physical server, associating the virtual machine with the customized USB flash disk right in place, and activating and operating the permission chain node; therefore, the storage and management platform for the access information based on the permission chain technology can be conveniently deployed no matter whether the permission chain node is an entity node or a cloud node.
Different permissions are set for different permission chain nodes according to different identities of administrators of accounts, and the operation of the nodes in the permission chain can be limited through the permissions. Each permission chain node can belong to one permission group or a plurality of permission groups, one permission group comprises a plurality of permission chain accounts, and the accounts have the permission items of the belonging permission group by default. The authority groups are in a tree-like hierarchical structure, the structure of the authority groups is specifically shown in fig. 3, and a set of authority items owned by a lower authority group cannot exceed an authority group at an upper layer, that is, a set of authority items of a subgroup in fig. 3 cannot exceed a set of authority items of a service group 1. In addition, the set of rights items between the peer-side parallel rights groups does not have any constraint, such as the constraint between service group 1 and service group 2 in fig. 3. The account numbers in each permission group have all the permissions of the group by default, and in addition, permission items which are not in the permission group can be configured for the account numbers individually. The account with only administrator identity in each authority group can modify the authority items of other accounts in the same group and modify the authority items of the accounts in the lower authority group, for example, the administrator account in the business group 1 can delete the authority items of other non-administrator accounts in the business group 1, and can also modify or delete the authority items of all accounts in the subgroup 1 or the subgroup 2, but the administrator account in the business group 1 cannot modify the authority items of the accounts in the business group 2, and cannot modify the authority items of the accounts in the root group.
When creating an authority group, it may be specified whether the group is allowed to be managed by the superparent group, i.e. the administrator account numbers in the superparent group may modify the group and the internal account authority. For example, in fig. 3, when creating the sub group 2, if it is set that superparent group management is not permitted, modification of the authority item of the account of the sub group 2 by the administrator account of the root group is not permitted. The setting can conveniently isolate the authority, achieves the effect of authority autonomy, and effectively avoids the condition that account authority management is concentrated on certain accounts.
And 103, determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority.
And step 104, feeding back the visitor information in the database to the sending node according to the management authority of the sending node.
Specifically, each account/node of the permission chain has a clear definition of permissions to describe what the account can do on the blockchain. The account/node permissions are divided into network connection, account transfer, intelligent contract deployment/call, block generation (mining), account/node management and the like, the required permissions are configured for the accounts/nodes according to the roles of different accounts/nodes in the system, and the permissions on the permission chain can be dynamically adjusted for the accounts/nodes according to the change of the roles of the accounts/nodes. By limiting the operations that legal accounts/nodes can perform on the block chain, the possibility that an internal account/node attacks the block chain is reduced. For example, if an account configured by a node does not have the authority of network connection, the node cannot establish P2P network connection with other nodes in the license chain, and cannot join the license chain network, so that an account/node of an unlicensed chain cannot be connected to the block chain network and obtain block data, and various attacks initiated by an illegal account/node on the system are avoided.
Compared with the prior art, the method and the system have the advantages that when the visitor meets the passing condition of the access control system, the identity card information of the visitor, the passing time of the visitor and the like are recorded, and the visitor information is uploaded to the database, so that the visitor information is automatically recorded, and the labor consumption is reduced. When the administrator needs to check or delete or modify the visitor information, the administrator logs in an account of the administrator, the permission chain can determine the authority group to which the account belongs and the management authority corresponding to the authority group according to the account information, the visitor information which can be checked and modified by the account is determined according to the determined management authority corresponding to the account, and the visitor information in the management authority is fed back to the administrator. By the method, the visitor information which can be checked or deleted by the user of each account is ensured to be the information within the authority range, but the information outside the authority range cannot be checked or deleted, so that the confidentiality of the visitor information is enhanced, and the information is prevented from being stolen or tampered maliciously.
A second embodiment of the present invention relates to a visitor information management method. In the second embodiment of the present invention, the condition of visitor passage is specifically described, including: judging whether the visitor meets the passing condition or not based on the iris or face information of the visitor; and/or judging whether the visitor meets the passing condition or not based on the information in the certificate of the visitor. The following is a detailed description of determining whether the visitor meets the passing conditions based on the iris information of the visitor and the information in the certificate of the visitor, as shown in fig. 4.
Step 401, when a request of a visitor is received, whether a passing condition is met is judged based on the iris of the visitor. If yes, go to step 404; if the determination result is negative, the process proceeds to step 402. Specifically speaking, the camera of the iris panel machine among the access control system acquires the current portrait in front of the door and iris video, then carries out the cutout processing with the portrait and the iris video that acquire, flows the cutout photo and sends to the high in the clouds and carry out iris discernment, and the server compares the cutout photo with the iris photo in the iris storehouse. An iris film is established in the iris library and used for storing all clear iris photos, each iris photo not only corresponds to natural attributes such as names and sexes, but also is related to social attributes such as regions, community projects, buildings, units and rooms, and the attributes can assist iris recognition to obtain recognition results, so that the passing authority is determined through the irises. For example, if a user is given a right to pass a certain channel in a certain cell, the iris picture of the user in the iris library can be given the right to pass the channel in the cell, and if the panel machine recognizes the iris of the user, the gate of the channel in the cell is correspondingly opened, so that the user can smoothly enter the cell. The setting of the passing authority of each iris in the iris library can be set according to the requirements of users, for example, the iris of a user living in a certain unit sets the passing authority of an entrance of the unit, and the iris of a user living in a certain building sets the passing authority of the building. If several buildings have a common entrance guard, the irises of the users living in the buildings are all set to the passing authority of the common entrance guard.
In the iris identification process, the identity of the visitor can be judged through the iris, whether the visitor is a person in a blacklist or not is judged, the person in the blacklist can be a known criminal and malicious person, the iris of the criminal and the malicious person is placed into a blacklist iris feature vector library to generate the blacklist, the person in the blacklist can be automatically pushed by an iris identification management platform and also can be pushed regularly or pushed in a triggering mode, the door control system defaults to pushing in a triggering mode, and the pushing in the triggering mode can be triggered when events such as blacklist updating or panel machine registration or online re-entering are carried out. The blacklist may disable or delete the iris information of the persons in the blacklist depending on the actual situation.
In addition, a white list can be set, wherein the white list is generated by pushing the iris of a cell owner or company personnel known by the security protection to a white list feature vector library by a security application program APP background after the iris of the cell owner or company personnel is registered by the security protection. The iris in the white list feature vector library is defaulted to be free of time limit, and the access control system can be used for multiple times; in addition, the iris information in the white list feature vector library can be forbidden or deleted according to the actual situation.
In practical application, the iris recognition can be realized to judge the user identity, the judgment can also be carried out through face recognition, and the iris database in the server in the same way is correspondingly adjusted into a face database. In addition, the door can be opened in a mode of an IC card, a password, a two-dimensional code, a WeChat applet or a user application program APP and the like, and a user can flexibly select the door opening mode according to actual conditions, so that the intelligent door opener is suitable for various scenes.
Step 402, judging whether the party can meet the passing condition based on the information in the certificate of the visitor. If yes, go to step 404; if the determination result is negative, the process proceeds to step 403. Specifically speaking, when the iris information of visitor was not saved in the iris storehouse, access control system's panel machine passed through pronunciation, characters or icon suggestion visitor and whether carried the ID card, if the visitor carried the ID card, then the suggestion visitor placed the ID card in the specified area to discern the information in the ID card, and compare ID card portrait and visitor, confirm that provides is the ID card of oneself, avoid ID card information false, the people's card is not qualified for the next round of competitions. After the identity of the visitor is determined, the identity information of the visitor is recorded, and a background center can be informed to ensure whether the visitor is allowed to pass or not.
And step 403, remotely calling the addressee or security personnel. Specifically, if the visitor does not carry the identity card with him or fails to provide the identity card, or the identity authentication fails, the panel machine may prompt the visitor to call the owner's room number or security management, the visitor may input the room number or click the security button, and the iris panel machine may automatically call the owner or security based on the cloud intercom system.
If the visitor remotely calls the owner (the visited person), the owner can respond through the security user APP and the security wechat applet. If the owner does not install the 'security user APP' and the 'security WeChat applet' or the calling is overtime, the owner and the security center telephone number corresponding to the room number are automatically tried to be called. The owner selects the 'x' key to open the door or selects the '#' key to transfer to the security center or directly hangs up the phone according to the actual situation. The security selects' or directly hangs up the phone according to the actual situation.
In practical applications, the visitor's remote call flow diagram is shown in figure 5. Step 1, the iris panel machine initiates a call: the visitor initiates a call request from the iris panel machine according to the number of the owner room or the number of the security center; and 2, service skipping of the iris identification management system: the iris recognition management system forwards the call information to an APP background (for example, a security APP background) to trigger the call preferentially; step 3, security APP background business processing: the security APP background checks whether the room number or the security center number is correct, if so, the security APP background calls the corresponding APP user, otherwise, the security APP background feeds back an input error to the iris identification management system, and the iris identification management system displays the input error through an iris panel machine, so that a visitor can reinitiate a calling request; step 4, the APP user responds to the call: if the called APP user is connected with the video telephone, the APP user triggers a door opening or non-door opening instruction to perform the step 5; if the called "APP user" is not connected or does not respond, step 8 is entered; step 5, the security APP background forwards response: the security APP background feeds back door opening or non-door opening information to the access control subsystem; step 6, the access control subsystem processes the request: the access control subsystem performs door opening operation or prompts prompt information such as 'unauthorized users cannot open the doors and please contact a security center to process' and the like after verifying according to owner information and the requested access control equipment ID, and the access control subsystem feeds back the result to the 'iris identification management system' according to the access control equipment ID; and 7, forwarding the result by the iris identification management system: the iris recognition management system feeds back the result to the corresponding iris panel machine according to the ID of the access control equipment, and the iris panel machine performs door opening operation or prompts prompt information such as 'an unauthorized user please contact a security center for processing'; step 8, the security APP background feeds back calling overtime: when the security APP background cannot receive the response of the APP user and waits for 60 seconds (the response waiting time can be set) without response, the security APP background feeds back no-response information, the corresponding personnel WeChat ID and the telephone number to an iris identification management system; the safety APP background system is characterized in that a cell, a building number, a unit number, a room number, a personnel WeChat ID, a telephone number, member information, iris pictures corresponding to all members and the like are stored in the safety APP background system, and the stored identity information of an addressee, such as the cell, the building number, the unit number, the room number, the personnel WeChat ID, the telephone number, the member information and the like, and the room information where the addressee is located and the like are used for searching a corresponding calling user when a calling request is received by a safety APP background, and determining an entrance guard which correspondingly opens a door according to the room information of an owner when the door opening information which responds is received. The stored iris picture is used for providing corresponding verification information during iris recognition; and 9, service skipping of the iris identification management system: after receiving the non-response and corresponding personnel contact information feedback, the iris identification management system transfers the contact information to the cloud intercom subsystem, wherein the personnel contact information received by the iris identification management system can be information used for determining the identity of an addressee or contacting the addressee, such as WeChat ID, telephone number, room number and the like of the addressee; step 10, cloud intercom subsystem service processing: the cloud talkback subsystem preferably initiates a WeChat video telephone call according to the WeChat ID in the call information; step 11, weChat telephone API switching processing: initiating a WeChat video telephone call by the WeChat telephone API according to the WeChat ID; the WeChat telephone API can be a customized video telephone service interface provided according to requirements, is used for assisting a iris diaphragm panel machine to establish connection with user WeChat, is added with an access authorization confirming button and an unauthorized button compared with a common WeChat telephone, is similar to a function key of 'x' and '#' of a traditional telephone, wherein the 'x' key represents door opening, and the '#' key represents that the door opening is not agreed; in addition, the API interface supports user name and password and certificate authentication, only the request of a legal user can be processed, otherwise, the request is directly discarded; step 12, weChat response: after the communication WeChat video telephone is confirmed, door opening authorization (similar to a key or a number #) or door opening information (similar to a key or a number #) can be fed back to the cloud talkback subsystem; step 13, the cloud intercom subsystem processes the response: the cloud intercom subsystem forwards the contact information and the corresponding door opening authorization or door opening non-authorization information to the entrance guard subsystem, and then step 6 is carried out; step 14, the cloud intercom subsystem initiates a call: and when the WeChat telephone does not respond within 60 seconds (the response waiting time can be set), the cloud talkback subsystem calls according to the telephone number of the person. If a plurality of numbers exist, calling one by one until the calling is successful; if all numbers are not answered or powered off, the step 18 is carried out; step 15, the operator core network API processes the request: after the legal request is verified based on the specified user name and password, the operator core network API initiates a call according to the corresponding telephone number; the operator core network API is a customized telephone service interface provided by an operator according to requirements, is used for assisting a iris diaphragm panel machine to establish connection with a mobile phone or a fixed telephone of a user, and provides a function key of 'x' and '#, wherein the' x 'key represents opening the door, and the' # key represents not agreeing to opening the door; in addition, the API interface supports user name and password and certificate authentication, only the request of a legal user can be processed, otherwise, the request is directly discarded; step 16, the mobile phone or the fixed telephone responds: after the phone confirms, the mobile phone or the fixed phone feeds back the result that the 'star' key opens the door or the '#' key does not open the door to the 'cloud talkback subsystem'; step 17, the cloud intercom subsystem forwards the response: the cloud intercom subsystem forwards the result of opening or not opening the door to the entrance guard subsystem and then enters step 6; step 18, the cloud intercom subsystem feeds back the calling overtime: the cloud intercom subsystem performs step 7 after forwarding the WeChat and telephone timeout or no-answer condition to the iris recognition management system.
And step 404, recording visitor information of the visitor and storing the visitor information in a database.
Step 405, when receiving a management request for guest information in a database, determining a permission group to which a sending node of the management request belongs.
And step 406, determining the management authority of the sending node according to the corresponding relationship between the pre-stored authority groups and the management authority, wherein the relationship of the management authority corresponding to each authority group is a hierarchical relationship. The specific corresponding hierarchical relationships have been described in detail above, and are not described herein again for the sake of brevity.
Step 407, the visitor information in the database is fed back to the sending node according to the management authority of the sending node.
Steps 404 to 407 correspond to steps 101 to 104 in the first embodiment one to one, and are not described herein again.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A third embodiment of the present invention relates to an access control system, as shown in fig. 6, including: a panel machine 61, a server 62; the panel machine 61 is used for carrying out iris or face recognition on the visitor to obtain iris or face information; the server 62 is used for judging whether the visitor meets the passing condition or not based on the iris or face information, and recording visitor information of the visitor and storing the visitor information into the database when the visitor meets the passing condition; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor; the server 62 is further configured to, upon receiving a management request for guest information in the database, determine a permission group to which a sending node of the management request belongs; determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; the management authority corresponding to each authority group is in a hierarchical relationship; and feeding back the visitor information in the database to the sending node according to the management authority of the sending node.
In addition, when recording and storing the visitor information of the visitor to the database, the server 62 is specifically configured to encrypt the visitor information of the visitor and generate index information corresponding to the visitor information; recording index information and uploading the encrypted visitor information to a database for storage; wherein the index information is used to retrieve encrypted guest information from the database upon reading.
In addition, the panel machine is also used for reading the information in the certificate of the visitor; the server is also used for judging whether the visitor accords with the passing condition according to the information in the visitor certificate.
In addition, the panel machine is also used for initiating a remote call to the interviewee or the security personnel when the iris or face information of the visitor does not accord with the passing condition, so that the voice or video call with the interviewee or the security personnel is realized; the server is also used for executing the door opening instruction when receiving the door opening instruction of the interviewee or the security personnel.
In practical application, the iris mask machine is adopted by the panel machine, and the functions of the iris mask machine are as follows: the iris surface plate machine can detect the iris and intercept the detected iris from the video in the form of a picture; the card reader can also be used as an IC card reader, so that IC card swiping and ID card information reading are supported; the keyboard on the panel machine can be activated according to voice, text or icon prompts so that a visitor can input a password; cloud talkback can also be realized, and a specific room number or a security background is called; the two-dimensional code generated by the visitor based on the APP of the authorized user can be scanned; the iris surface plate machine can be provided with a plurality of groups of cameras, such as a camera special for iris recognition, a video monitoring camera, a two-dimensional code lens and the like.
In the embodiment, the identity of the user is identified through the panel machine, so that the non-inductive passing is realized, and the user experience is improved. The server opens the door and automatically records the visitor information when identifying the user identity, so that the manpower for recording the visitor information is saved. The server ensures the confidentiality and the safety of the visitor information through the determination of the authority of the node, and prevents the information from being maliciously stolen or tampered.
A fourth embodiment of the present invention relates to a terminal/electronic device/server, as shown in fig. 7, including at least one processor 701; and, a memory 702 communicatively coupled to the at least one processor 701; the memory 702 stores instructions executable by the at least one processor 701, and the instructions are executed by the at least one processor 701 to enable the at least one processor 701 to perform the guest information management method.
The memory 702 and the processor 701 are coupled by a bus, which may comprise any number of interconnecting buses and bridges that couple one or more of the various circuits of the processor 701 and the memory 702. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium via an antenna, which further receives the data and delivers it to the processor 701.
The processor 701 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory 702 may be used for storing data used by the processor 701 in performing operations.
A fifth embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (9)

1. A visitor information management method, comprising:
when the visitor is judged to meet the passing condition, recording visitor information of the visitor and storing the visitor information into a database; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor;
when a management request for visitor information in the database is received, determining a permission group to which a sending node of the management request belongs;
determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; the management authority corresponding to each authority group is in a hierarchical relationship;
feeding back the visitor information in the database to the sending node according to the management authority of the sending node;
recording visitor information of the visitor and storing the visitor information to a database, and specifically comprising:
encrypting visitor information of the visitor, generating index information corresponding to the visitor information, and recording the index information in a contract of a permission chain; the permission chain comprises a plurality of different private sub-chains, and index information of different visitor information is stored in the different private sub-chains;
uploading the encrypted visitor information to a distributed storage network; wherein the distributed storage network is integrated with the license chain, and the index information is used for obtaining the encrypted visitor information from the distributed storage network when reading;
when receiving a management request for guest information in the database, determining an authority group to which a sending node of the management request belongs specifically includes:
each permission chain node is an account, different permissions are set for different permission chain nodes according to different identities of administrators of the accounts, and the operation of the nodes in the permission chain can be limited through the permissions; each permission chain node belongs to one permission group or a plurality of permission groups, one permission group comprises a plurality of permission chain accounts, and the accounts have the permission items of the belonging permission group by default; the authority groups are in a tree-like hierarchical structure.
2. The guest information management method of claim 1, wherein the passing condition of the guest comprises at least:
judging whether the visitor meets the passing condition or not based on the iris or face information of the visitor;
and/or judging whether the visitor meets the passing condition or not based on the information in the certificate of the visitor.
3. The visitor information management method according to claim 2, when determining whether the visitor meets a passing condition based on the information of the iris or the face of the visitor and information in a certificate of the visitor, further comprising:
if the iris or face information of the visitor and the information in the certificate of the visitor do not accord with the passing condition, remotely calling the interviewee or security personnel; wherein, the remote calling mode at least comprises: a cell phone call, a fixed phone call, a video call, or an application APP call.
4. The visitor information management method according to claim 2, when determining whether the visitor meets a passing condition based on the information of the iris or the face of the visitor and information in a certificate of the visitor, further comprising:
if the iris or face information of the visitor does not accord with the passing condition and the certificate of the visitor is not detected within the preset time, remotely calling the visitor or security personnel; wherein, the remote calling mode at least comprises: a cell phone call, a fixed phone call, a video call, or an application APP call.
5. An access control system, comprising: a panel machine and a server;
the panel machine is used for carrying out iris or face recognition on the visitor to obtain iris or face information;
the server is used for judging whether the visitor accords with the passing condition or not based on the iris or face information, and recording visitor information of the visitor and storing the visitor information into a database when the visitor accords with the passing condition; wherein the visitor information includes at least: identity information of the visitor and pass information of the visitor;
the server is also used for determining a permission group to which a sending node of the management request belongs when receiving the management request of the visitor information in the database; determining the management authority of the sending node according to the corresponding relation between the pre-stored authority group and the management authority; the management authority corresponding to each authority group is in a hierarchical relationship; feeding back the visitor information in the database to the sending node according to the management authority of the sending node;
the server is specifically used for encrypting the visitor information of the visitor when recording the visitor information of the visitor and storing the visitor information in a database, generating index information corresponding to the visitor information and recording the index information in a contract of a permission chain; the permission chain comprises a plurality of different private sub-chains, and index information of different visitor information is stored in the different private sub-chains; uploading the encrypted visitor information to a distributed storage network; wherein the distributed storage network is integrated with the license chain, and the index information is used for obtaining the encrypted visitor information from the distributed storage network when reading;
when receiving a management request for visitor information in the database, the server determines an authority group to which a sending node of the management request belongs, specifically: each permission chain node is an account, different permissions are set for different permission chain nodes according to different identities of administrators of the accounts, and the operation of the nodes in the permission chain can be limited through the permissions; each permission chain node belongs to one permission group or a plurality of permission groups, one permission group comprises a plurality of permission chain accounts, and the accounts have the permission items of the belonging permission group by default; the authority groups are in a tree-like hierarchical structure.
6. The door access system of claim 5,
the panel machine is also used for reading information in the certificate of the visitor;
the server is also used for judging whether the visitor accords with the passing condition according to the information in the visitor certificate.
7. The door access system of claim 5,
the panel machine is also used for initiating a remote call to an interviewee or a security personnel when the iris or face information of the visitor does not accord with the passing condition, so that the voice or video call with the interviewee or the security personnel is realized;
the server is also used for executing the door opening instruction when receiving the door opening instruction of the interviewee or the security personnel.
8. A server, comprising:
at least one processor; and (c) a second step of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the guest information management method of any one of claims 1 to 4.
9. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the guest information management method of any one of claims 1 to 4.
CN201911034460.5A 2019-10-29 2019-10-29 Visitor information management method, access control system, server and storage medium Active CN110766850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911034460.5A CN110766850B (en) 2019-10-29 2019-10-29 Visitor information management method, access control system, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911034460.5A CN110766850B (en) 2019-10-29 2019-10-29 Visitor information management method, access control system, server and storage medium

Publications (2)

Publication Number Publication Date
CN110766850A CN110766850A (en) 2020-02-07
CN110766850B true CN110766850B (en) 2022-12-06

Family

ID=69333997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911034460.5A Active CN110766850B (en) 2019-10-29 2019-10-29 Visitor information management method, access control system, server and storage medium

Country Status (1)

Country Link
CN (1) CN110766850B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111383378B (en) * 2020-03-11 2021-07-30 合肥鼎方信息科技有限公司 Access control identification system information node interconnection method based on block chain architecture
CN113536261A (en) * 2020-04-14 2021-10-22 三赢科技(深圳)有限公司 Authority management method, device, computer device and storage medium
CN113223220B (en) * 2021-01-27 2023-04-07 中国工商银行股份有限公司 Visitor request processing method and device
CN116456127B (en) * 2023-06-19 2023-08-11 中信建投证券股份有限公司 Video processing system, method, device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN109190349A (en) * 2018-09-03 2019-01-11 安云印(天津)大数据科技有限公司 A method of the people place management system based on block chain is realized
CN110349311A (en) * 2019-07-08 2019-10-18 江苏橙贝科技有限公司 A kind of fingerprint lock control system and method based on block chain technology

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202523131U (en) * 2012-05-11 2012-11-07 尤敦朋 Intelligent visitor management system based on Android operating platform
CN108122313A (en) * 2017-12-12 2018-06-05 北京无线电计量测试研究所 A kind of double member's certification access control systems based on iris recognition
CN108629337A (en) * 2018-06-11 2018-10-09 深圳市益鑫智能科技有限公司 A kind of face recognition door control system based on block chain
CN109461233A (en) * 2018-10-24 2019-03-12 平安科技(深圳)有限公司 Caller management method, system, computer equipment and storage medium
CN109617900A (en) * 2018-12-28 2019-04-12 有份儿智慧科技股份有限公司 The method of information data encryption based on Internet of Things in conjunction with block chain technology
CN109767534B (en) * 2019-01-17 2022-03-04 平安科技(深圳)有限公司 Access control access method, system, management terminal and access control terminal based on block chain
CN109977758A (en) * 2019-01-29 2019-07-05 杭州鸿福科技有限公司 A kind of face identification system and method based on cloud platform management
KR102030047B1 (en) * 2019-04-30 2019-10-08 (주)그린아이티코리아 Access control system and method supporting lightweight security
CN110211278A (en) * 2019-07-31 2019-09-06 一石数字技术成都有限公司 The access control system and passing method for remotely confirming visitor's identity based on face snap

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN108647230A (en) * 2018-03-29 2018-10-12 深圳市网心科技有限公司 Distributed storage method, electronic device and storage medium
CN109190349A (en) * 2018-09-03 2019-01-11 安云印(天津)大数据科技有限公司 A method of the people place management system based on block chain is realized
CN110349311A (en) * 2019-07-08 2019-10-18 江苏橙贝科技有限公司 A kind of fingerprint lock control system and method based on block chain technology

Also Published As

Publication number Publication date
CN110766850A (en) 2020-02-07

Similar Documents

Publication Publication Date Title
CN110766850B (en) Visitor information management method, access control system, server and storage medium
US12001857B2 (en) Device locator disable authentication
US7205882B2 (en) Actuating a security system using a wireless device
CN106537403B (en) System for accessing data from multiple devices
KR101296863B1 (en) Entry authentication system using nfc door lock
CN109767534B (en) Access control access method, system, management terminal and access control terminal based on block chain
CN107103245B (en) File authority management method and device
WO2017140240A1 (en) Guest authentication method and system
US20180359635A1 (en) Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices
US10659451B2 (en) System and method for injecting a tag into a computing resource
MX2013011116A (en) Distribution of premises access information.
US20050048951A1 (en) Method and system for alternative access using mobile electronic devices
WO2007043659A1 (en) Mobile terminal, access control management device, and access control management method
CN110533807A (en) A kind of decentralization door-locking system based on block chain
CN111247521B (en) Remote locking of multi-user devices to user sets
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
JP2007034974A (en) Security system
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
KR101133210B1 (en) Mobile Authentication System and Central Control System
TWI676115B (en) System and method for managing certification for cloud service system
CN100429957C (en) Indentifying method for telecommunication smart card and terminal
CN110349301A (en) Gate inhibition's open method and device
KR100944246B1 (en) Apparatus and Method for Managing Security Mobile Communication Terminal with Universal Subscriber Identity Module
US20210366216A1 (en) Video Doorbell Visitor Filtration Apparatuses and Date-Time System Methods of Operation
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220211

Address after: 200245 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant after: Dalu Robot Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: CLOUDMINDS (SHENZHEN) HOLDINGS Co.,Ltd.

TA01 Transfer of patent application right
CB02 Change of applicant information

Address after: 200245 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant after: Dayu robot Co.,Ltd.

Address before: 200245 Building 8, No. 207, Zhongqing Road, Minhang District, Shanghai

Applicant before: Dalu Robot Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant