CN111049811A - Visitor information management method, access control card management method and visitor system - Google Patents

Visitor information management method, access control card management method and visitor system Download PDF

Info

Publication number
CN111049811A
CN111049811A CN201911202752.5A CN201911202752A CN111049811A CN 111049811 A CN111049811 A CN 111049811A CN 201911202752 A CN201911202752 A CN 201911202752A CN 111049811 A CN111049811 A CN 111049811A
Authority
CN
China
Prior art keywords
visitor
time range
access
information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911202752.5A
Other languages
Chinese (zh)
Inventor
张洁
高阳岗
董浩
张飞
刘国良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LCFC Hefei Electronics Technology Co Ltd
Original Assignee
LCFC Hefei Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LCFC Hefei Electronics Technology Co Ltd filed Critical LCFC Hefei Electronics Technology Co Ltd
Priority to CN201911202752.5A priority Critical patent/CN111049811A/en
Publication of CN111049811A publication Critical patent/CN111049811A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention provides a visitor information management method and a visitor system, which comprise the following steps: obtaining reservation information of a visitor, wherein the reservation information comprises a reservation access time range; verifying the reservation information of the visitor; and when the verification is passed, acquiring the identity identification information corresponding to the visitor, giving the visitor permission, and determining a permission valid time range. The invention prompts the visitor to feed back the access information in time after finishing the access, thereby effectively controlling the visitor permission and improving the safety of the access place.

Description

Visitor information management method, access control card management method and visitor system
Technical Field
The invention relates to the technical field of communication, in particular to a visitor information management method, an access control card management method and a visitor system.
Background
Currently, corporate visitors do not have a official card and need to register for entry through a visitor system. For convenience, the guest system supports, for example, guests to make appointments for up to 7 days at a time, thus saving the guests the trouble of making appointments each day because appointments may involve multiple levels of check-in procedures.
However, the management of temporary visitors in the prior art often has many problems, for example, after the visitor obtains the visitor rights, because the valid period of the visitor rights and the time period of the reservation are consistent, so that if the visitor terminates the access for some reason during the access, the visitor rights are not fed back on schedule. The visitor management system executes the operation of forbidding the visitor, so that when the visitor performs the access again, the visitor needs to request the visitor management system to release the request of forbidding the access first to perform the access again, thereby increasing the flow of visitor management and influencing the process of the visitor accessing for many times. How to effectively control guest permissions is a problem faced in the prior art.
In the prior art, temporary visitors are managed, for example, a visitor system continuously inspects whether the authorized visitor permission exceeds the end time, so that the burden of system operation and maintenance is increased; when the visitor system finds that the time is out, the visitor system needs to be connected with the access control system again to inform the visitor system of canceling the authority; the restriction of the visitor system on the entrance guard aims at the restriction of one time point of 'reservation ending time', if the reservation is carried out for several days, the visitor authority is not fed back in time, and the visitor still needs to request for prohibition to carry out the revising when visiting again.
Disclosure of Invention
The embodiment of the invention provides a visitor information management method, an access control card management method and a visitor system, which are used for solving the technical problem of how to effectively control visitor permission in the prior art.
In order to solve the above problem, the embodiment of the present invention provides the following technical solutions:
the visitor information management method comprises the following steps:
obtaining reservation information of a visitor, wherein the reservation information comprises a reservation access time range;
verifying the reservation information of the visitor;
when the verification is passed, generating access identification information corresponding to the visitor;
giving the visitor the authority, and determining an authority valid time range;
wherein the permission validity time range falls within the reserved access time range, the permission validity time range not exceeding the reserved access time range.
Preferably, the subscription information further includes identification information, and the verifying the subscription information of the visitor includes:
and judging whether the identity identification information of the visitor is matched with a preset blacklist, and if so, refusing to pass the verification of the reservation information of the visitor.
Preferably, the subscription information further includes identification information, and the verifying the subscription information of the visitor includes:
collecting the on-site identity information of the visitor;
and judging whether the site identity information is the same as the identity identification information of the visitor, and if not, refusing to pass the verification of the reservation information of the visitor.
Preferably, the verifying the visitor's reservation information further comprises:
if the field identity information is the same as the identity identification information of the visitor, then
Judging whether the visitor is verified within the first time before or after the starting point of the reserved time range;
passing the verification of the visitor's reservation information when it is determined that the visitor verifies within a first time before or after the start of the reservation time range;
denying the verification of the visitor's reservation information when it is determined that the visitor is not verified within a first time before the start of the reservation time range or is not verified after the start.
Preferably, the method further comprises:
judging whether the visitor feeds back the access identification information within the permission effective time range or not;
when the visitor is determined to feed back the access identification information in the permission effective time range, the permission effective time range is adjusted, so that the time starting point of the adjusted effective time range is larger than or equal to the time range of the visitor for feeding back the access identification information.
Preferably, the method further comprises:
judging whether the visitor feeds back the access identification information within the permission effective time range or not;
denying verification of the visitor's subscription information when it is determined that the visitor does not feed back the access identification information within the permission validity time range.
Preferably, the method further comprises:
judging whether the visitor feeds back the access identification information within the permission effective time range or not;
and after the visitor feeds back the access identification information, allowing the reservation information of the visitor to pass the verification again so that the visitor obtains the permission again.
Preferably, the visitor is allowed to obtain the right a plurality of times within the scope of the reserved access time.
Preferably, the method further comprises:
judging whether the reservation time range of the visitor is larger than one day or not;
when the reserved time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reserved access time range;
when the reserved time range of the visitor is determined to be larger than one day, the permission valid time range is smaller than the reserved access time range.
Preferably, the time range for which the authority is valid is an integer number of hours.
Preferably, the method further comprises:
judging whether the visitor authenticates again;
when the visitor is determined to be verified again, judging whether the current verification time point falls within the authority valid time range;
when the current verification time point is determined to be within the authority valid time range, allowing the visitor to pass the verification again;
refusing the visitor to pass the authentication again when it is determined that the current authentication time point does not fall within the authority validity time range.
Preferably, the permission includes an entrance permission for the visitor, and the access identification information includes entrance information for the visitor.
The embodiment of the invention also provides a management method of the access control card, which comprises the following steps:
verifying the reservation information of the visitor;
when the verification is passed, acquiring the identity identification information of the visitor and the reserved access time range, and generating access identification information corresponding to the identity identification information based on the identity identification information;
releasing the access identification information to an access control card, and determining an authority valid time range not exceeding a preset time range;
wherein the permission valid time range falls within the preset time range, and the permission valid time range does not exceed the reserved access time range.
Preferably, the verifying the visitor's subscription information includes:
judging whether the reservation information of the visitor is verified within the first time before the starting point of the reservation time range;
passing the verification of the visitor's reservation information when it is determined that the visitor's reservation information is verified within a first time before the start of the reservation time range;
denying verification of the visitor's subscription information when it is determined that the visitor's subscription information is not verified within a first time before the start of the subscription time range.
Preferably, the method further comprises:
allowing the subscriber's subscription information to be verified according to the type of the subscriber;
refusing to verify the visitor's subscription information when it is determined that the visitor's subscription information is verified within a first time before the start of the subscription time range.
Preferably, the method further comprises:
judging whether the visitor returns the access control card within the permission effective time range;
and when the visitor is determined to return the access control card within the permission effective time range, adjusting the permission effective time range.
Preferably, the method further comprises:
judging whether the visitor returns the access control card within the permission effective time range;
and when the visitor is determined not to return the access card within the permission valid time range, refusing the verification of the reservation information of the visitor.
Preferably, the method further comprises: and limiting to release the access identification information to the access control card.
Preferably, the method further comprises:
judging whether the visitor returns the access control card within the permission effective time range;
and after the visitor returns the access card, allowing the reservation information of the visitor to pass the verification again so as to release the access identification information to the access card again.
Preferably, the method further comprises:
and allowing the access identification information to be released to the access card for multiple times within the reserved access time range.
Preferably, the method further comprises:
judging whether the reservation time range of the visitor is larger than one day or not;
when the reserved time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reserved access time range;
when the reserved time range of the visitor is determined to be larger than one day, the permission valid time range is smaller than the reserved access time range.
Preferably, the method further comprises:
judging whether the visitor authenticates again;
when the visitor is determined to be verified again, judging whether the current verification time point falls within the authority valid time range;
when the current verification time point is determined to be within the authority valid time range, allowing the visitor to pass the verification again;
refusing the visitor to pass the authentication again when it is determined that the current authentication time point does not fall within the authority validity time range.
An embodiment of the present invention further provides a visitor system, including:
a verification unit which verifies reservation information of the visitor;
the access control unit is used for acquiring the identity identification information and the access time range of the visitor so as to generate access identification information corresponding to the identity identification information;
and the authorization unit gives the visitor the authority and determines an authority valid time range not exceeding the preset time.
Compared with the prior art, the embodiment of the invention has the beneficial effects that:
1. the visitor information management method provided by the embodiment of the invention enables the visitor to feed back the visitor permission in time after finishing the visit, effectively manages the visit process of the visitor, enables the visitor to simply and efficiently complete the visit process under the condition of multiple visits, and reduces the flow of visitor management.
2. According to the visitor information management method provided by the embodiment of the invention, when the reservation information of the visitor passes verification, the access control system is connected, the authority is opened and the time range is limited, and no other system is needed to detect whether the access is overtime.
3. The visitor information management method provided by the embodiment of the invention allows a visitor who makes a reservation to pass in and out for multiple times of verification, and the valid period of the access card is only in the day of access, so that the visitor can pass in and out again for verification, and the access card is not taken out and lost.
4. The visitor information management method provided by the embodiment of the invention has higher safety for the access place.
Drawings
FIG. 1 is a flowchart illustrating a method for managing visitor information in an embodiment of the invention;
FIG. 2 is a flow chart illustrating verification of a visitor's subscription information in an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for managing guest information according to an embodiment of the present invention to determine the type of a guest;
FIG. 4 is a flowchart illustrating a feedback information confirmation method for managing visitor information according to an embodiment of the present invention;
FIG. 5 is a schematic diagram illustrating another flow of feedback information confirmation in the visitor information management method according to an embodiment of the present invention;
FIG. 6 is a schematic diagram illustrating another flow of feedback information confirmation in the visitor information management method according to an embodiment of the present invention;
FIG. 7 is a diagram of a guest system in an embodiment of the invention.
Detailed Description
The following detailed description of specific embodiments of the present invention will be given with reference to the accompanying drawings, but the present invention is not limited thereto.
The embodiment of the invention provides a visitor information management method and a visitor system, which are used for solving the technical problem of how to effectively control visitor permission in the prior art.
In order to solve the technical problems, the general idea of the embodiment of the application is as follows:
according to the technical scheme in the embodiment of the application, the reservation information of the visitor is acquired, wherein the reservation information comprises a reservation access time range; verifying the reservation information of the visitor; when the verification is passed, generating access identification information corresponding to the visitor; giving the visitor the authority, and determining an authority valid time range; wherein the permission validity time range falls within the reserved access time range, the permission validity time range not exceeding the reserved access time range. Therefore, according to the technical scheme in the embodiment of the application, the visitor can be prompted to feed back the access information after the visitor finishes the access by verifying the reservation information of the visitor and limiting the authority valid time range which does not exceed the preset time.
The technical solutions of the present application are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present application are detailed descriptions of the technical solutions of the present application, and are not limitations of the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
Referring to fig. 1, a flowchart of a visitor information management method provided in an embodiment of the present invention is schematically illustrated, where the flowchart includes the following steps:
step 101: obtaining reservation information of a visitor, wherein the reservation information comprises a reservation access time range;
in this embodiment, the guest may send reservation information to the guest system through a device such as an electronic terminal before accessing, where the reservation information includes an access time range. The guest system receives and stores the reservation information, i.e. the access time range reserved by the guest, which may be one day, multiple days, or other time periods selected as required.
Step 102: verifying the reservation information of the visitor;
when the visitor visits, the visitor system judges whether the reserved visit time range of the visitor is stored or not, and when the reserved visit time range of the visitor is determined to be stored, the visitor system verifies the reserved visit time range of the visitor. That is, the guest system verifies that the current guest has reserved a time frame of access, such as a day, days, or other time period selected as desired. If the visitor's subscription information matches the access time range of the subscription, the verification is passed.
Step 103: when the verification is passed, obtaining the access identification information corresponding to the visitor,
in the embodiment, when the reservation information of the visitor is verified, the visitor system acquires the access identification information of the visitor, the access identification information of the visitor is stored in the visitor system so that the visitor system controls the access of the visitor through the access identification information of the visitor, the access time range of the visitor is contained in the reservation information of the visitor, and the access time range can be one day, multiple days or other time periods selected as required; the visitor system may store the visitor's access identification information in the access control system so that the visitor system may manage the visitor's access by communicating with the access control system.
Step 104: and giving the visitor the authority to determine an authority valid time range.
In the embodiment, after the reservation information of the visitor is verified, the visitor system gives the visitor permission, and the visitor can freely act in the access area through the permission. For example, a guest system may give a guest permission by providing an access card to the guest. The visitor system stores the access identification information of the visitor in an access card, and provides the access card containing the access identification information of the visitor to the visitor through the terminal equipment; meanwhile, the visitor system sends the access identification information to the access points containing the access card information, the access points can be multiple, and visitors can freely enter and exit in the access area through using the access cards. The visitor system gives the visitor authority and determines an authority valid time range. When the visitor sends the reservation information to the visitor system, the visitor system sends the reservation access time range to the visitor system, and when the visitor obtains the permission, the visitor system determines a permission effective time range.
In the present embodiment, the authority valid time range falls within the reserved access time range, and the authority valid time range does not exceed the reserved access time range. For example, when the reserved access time of the visitor is one day, the valid time range of the authority does not exceed one day. When the visitor finishes the access with the reserved access time of one day, the visitor permission is invalid.
Referring to fig. 2, a schematic flowchart of verifying the subscription information of the visitor according to an embodiment of the present invention is shown, where the flowchart further includes the following steps:
the reservation information also includes identification information to verify the reservation information of the visitor. Specifically, the method comprises the following steps of: and judging whether the identity identification information of the visitor is matched with a preset blacklist, and if so, refusing the verification of the reservation information of the visitor.
In this embodiment, the visitor system verifies the identity information of the visitor according to the fact that when the visitor is verified, the identity information of the visitor is also verified, that is, whether the identity information of the visitor is matched with a preset blacklist is judged, specifically, the visitor system only allows the visitor which is not matched with the preset blacklist to make a reservation, and if the identity information of the visitor is matched with the preset blacklist, the visitor system refuses the verification of the visitor's subscription information. The preset blacklist includes: the visitor violation blacklist, the security blacklist, the human resource blacklist, the public security blacklist and the like, and when the visitor system refuses the reservation information of the visitor with the blacklist identity to be verified, the reason why the preset blacklist refuses the verification is prompted.
Referring to fig. 2, a schematic flowchart of verifying the subscription information of the visitor according to an embodiment of the present invention is shown, where the flowchart further includes the following steps:
step 202: collecting the on-site identity information of the visitor;
and judging whether the site identity information is the same as the identity identification information of the visitor, and if not, refusing to pass the verification of the reservation information of the visitor.
In this embodiment, the visitor system collects the site identity information of the visitor according to the reservation information of the visitor after the visitor arrives at the access place, and determines whether the collected site identity information is the same as the identity information of the visitor, if the collected site identity information is the same as the identity information of the visitor, the visitor passes the verification of the reservation information of the visitor, and if the collected site identity information is not the same as the identity information of the visitor, the visitor rejects the verification of the reservation information of the visitor.
Referring to fig. 3, a schematic flowchart of verifying the subscription information of the visitor according to an embodiment of the present invention is shown, where the flowchart further includes the following steps:
the verifying the visitor's subscription information further comprises:
if the field identity information is the same as the visitor's identity information,
step 301: judging whether the visitor is verified within the first time before or after the starting point of the reserved time range;
step 302: passing the verification of the visitor's reservation information when it is determined that the visitor verifies within a first time before or after the start of the reservation time range;
step 303: denying the verification of the visitor's reservation information when it is determined that the visitor is not verified within a first time before the start of the reservation time range or is not verified after the start.
In this embodiment, the visitor system determines whether the visitor is verified within the first time before or after the start of the reservation time range when it is determined that the field identification information of the visitor is the same as the identification information of the visitor. Specifically, when the visitor is making a reservation access, the visitor system may determine whether the visitor is verified within a first time before or after the start of the reservation time frame, specifically, the first time is a time frame in which the reservation is allowed, for example, the first time may be predetermined to be thirty minutes. When the visitor arrives at the visit site earlier than the reserved time frame, the verification may be performed within a first time before the start of the reserved time frame. When the visitor arrives at the visiting place after the reservation time range, that is, when the reservation is made after the start of the reservation time range, the verification can be passed as long as the visitor is still within the reservation time range. When the guest system determines that the guest is not authenticated within a first time before the start of the reservation time range or after the start, authentication of the guest's reservation information is denied.
Referring to fig. 4, a schematic flowchart of feedback information confirmation for a visitor information management method according to an embodiment of the present invention is shown, where the flowchart further includes the following steps:
step 401: judging whether the visitor feeds back the access identification information within the permission effective time range or not;
step 402: when the visitor is determined to feed back the access identification information in the permission effective time range, the permission effective time range is adjusted, so that the time starting point of the adjusted effective time range is larger than or equal to the time range of the visitor for feeding back the access identification information.
In this embodiment, the visitor system determines whether the visitor feeds back the access identification information within the valid time range of the authority, and the access identification information includes the reservation information of the visitor, and specifically, the visitor system may release the access identification information including the reservation information of the visitor to the access card, or authorize the access identification information to the visitor, for example, to allow the visitor to freely enter and exit the access place during the access by means of fingerprint swiping, face swiping, or the like. When determining that the visitor feeds back the access identification information in the permission effective time range, the visitor system adjusts the permission effective time range to enable the time starting point of the adjusted effective time range to be larger than or equal to the time range of the visitor feeding back the access identification information. For example, when the visitor makes an access of one day, if the visitor makes an access again in the same day after finishing the access, when the visitor feeds back the access identification information in the permission effective time range, the visitor system will adjust the permission effective time range, and the visitor can obtain a longer permission effective time range. When the visitor makes an access with the time length more than one day, the visitor makes another access after finishing the access, and when the visitor feeds back the access identification information in the authority valid time range, the visitor system can adjust the authority valid time range, and the visitor can obtain a longer authority valid time range.
Referring to fig. 5, another schematic flow chart of feedback information confirmation for a visitor information management method according to an embodiment of the present invention is shown, where the flow further includes the following steps:
step 501: judging whether the visitor feeds back the access identification information within the permission effective time range or not;
step 502: denying verification of the visitor's subscription information when it is determined that the visitor does not feed back the access identification information within the permission validity time range.
In the embodiment, the visitor system judges whether the visitor feeds back the access identification information within the permission effective time range or not, the visitor can feed back the access identification information to the visitor system, and after the visitor system determines that the visitor feeds back the access identification information within the permission effective time range, the visitor system records the information so that the visitor can pass the verification and obtain the access permission again when visiting again within the reserved access time range. And when the visitor system determines that the visitor does not feed back the access identification information within the permission valid time range, refusing the verification of the reservation information of the visitor. When the visitor finishes the visit on the same day, the visitor does not feed back the visit identification information within the authority valid time range, for example, the visitor does not feed back the visit identification information within the authority valid time range, the visitor system can record the information, when the visitor makes the visit reservation again, the visitor system can refuse to verify the verification of the reservation information of the visitor, at the moment, the visitor can feed back the visit identification information in time, namely, the visit identification information is fed back, after the visitor system receives the visit identification information fed back by the visitor, the reservation information of the visitor can pass the verification, and the visitor can obtain the visit authority again.
Referring to fig. 6, another schematic flow chart of feedback information confirmation for a visitor information management method according to an embodiment of the present invention is shown, where the flow further includes the following steps:
step 601: judging whether the visitor feeds back the access identification information within the permission effective time range or not;
step 602: and after the visitor feeds back the access identification information, allowing the reservation information of the visitor to pass the verification again so that the visitor obtains the permission again.
In the embodiment, the visitor system judges whether the visitor feeds back the access identification information within the permission effective time range or not, the visitor can feed back the access identification information to the visitor system, and after the visitor system determines that the visitor feeds back the access identification information within the permission effective time, the visitor system records the information and allows the reservation information of the visitor to pass through the verification again so that the visitor obtains the permission again. The visitor feeds back the access identification information in time by controlling the way that the visitor feeds back the access identification information within the permission effective time.
The method for managing the visitor information provided by the embodiment of the invention further comprises the following steps:
allowing the visitor to obtain permission multiple times within the reserved access time.
In this embodiment, the guest system allows the guest to obtain the right multiple times within the reserved access time. The visitor may be accessing for one or more days. When the visitor makes a one-day visit, the visitor feeds back the visit identification information to the visitor system after finishing the visit, and the day reservation information of the visitor is still valid after leaving. If the visitor needs to visit again on the day of visiting, the visitor system can obtain the permission again according to the reservation information. When the visitor visits for more than one day, the visitor can initiate reservation information once through the visitor system, and in the multi-day visiting period, the visitor still has effective reservation information as long as the visitor feeds back the visiting identification information to the visitor system after the visiting every day is finished. The visitor can make a second visit based on this reservation information.
The visitor information management method provided by the embodiment of the invention further comprises the following steps:
judging whether the reservation time range of the visitor is larger than one day or not;
when the reserved time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reserved access time range;
when the reserved time range of the visitor is determined to be larger than one day, the permission valid time range is smaller than the reserved access time range.
In the embodiment, when a visitor accesses the system, when the reservation time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reservation access time range; specifically, since the reservation time range of the visitor is not more than one day, that is, when the reservation time range of the visitor is at most one day, the permission valid time range is less than or equal to the reservation access time range; when the reservation time range of the visitor is one day, the authority valid time range can be set to be one day or less than one day according to the access condition of the visitor. When the visitor visits for one day, the visitor feeds back the visit identification information to the visitor system after finishing visiting, and after leaving, the current reservation information of the visitor is still effective. If the visitor needs to visit again on the day of visiting, the visitor system can obtain the permission again according to the reservation information. When the reservation time range of the visitor is determined to be more than one day, namely the reservation time range of the visitor is multiple days, the authority valid time range of the visitor is less than the reservation access time range because the visitor feeds back the access identification information to the visitor system after the visit of each day is finished and obtains the access authority again when visiting on another day. When the visitor visits for more than one day, the visitor can initiate reservation information once through the visitor system, and in the multi-day visiting period, the visitor still has effective reservation information as long as the visitor feeds back the visiting identification information to the visitor system after the visiting every day is finished. The visitor can make a second visit based on this reservation information.
In the method for managing visitor information provided by the embodiment of the present invention, the valid time range of the permission is an integer number of hours.
In this embodiment, the valid time range of the authority is an integer number of hours. For example, 3 hours, 6 hours, 12 hours, 1 day, etc.
The visitor information management method provided by the embodiment of the invention further comprises the following steps:
judging whether the visitor authenticates again;
when the visitor is determined to be verified again, judging whether the current verification time point falls within the authority valid time range;
when the current verification time point is determined to be within the authority valid time range, allowing the visitor to pass the verification again;
refusing the visitor to pass the authentication again when it is determined that the current authentication time point does not fall within the authority validity time range.
In the embodiment, when the visitor accesses, whether the visitor verifies again in the access time range is judged, and when the visitor verifies again in the access time range is determined, whether the current verification time point falls in the authority valid time range is judged. For example, when the visiting time range of the visitor is 6 hours, the visitor returns to the visiting place again after leaving the visiting place in the visiting process, at this time, the visitor needs to perform re-authentication, and if the current authentication time point of the visiting time of the visitor is still within 6 hours of the authority valid time range, the visitor is allowed to pass the authentication again and visit again. If the current authentication time point of the time when the visitor revisits is not within 6 hours of the authority valid time range, the authentication of the visitor is denied. When the visitor's access time range is more than one day, for example, from 8/10/day to 8/15/day, the visitor needs to be authenticated again before the access of each day, and at this time, if the visitor's access current authentication time point does not fall within the authority valid time range, for example, the visitor accesses again on 8/16/day, the visitor system refuses the visitor to be authenticated again because the current authentication time point does not fall within 8/10/day to 8/15/day within the authority valid time range.
The visitor information management method provided by the embodiment of the invention further comprises the following steps:
the permission comprises an access permission for the access of the visitor, and the access identification information comprises access information for the access of the visitor.
In this embodiment, visitor system gives the visitor's permission including the entrance guard's permission to visitor's admission, and the access identification information includes the entrance guard's information to visitor's admission. For example, the visitor system sends the access identification information to the access control system, the access control system provides the access card containing the access identification information for the visitor through the terminal device, meanwhile, the plurality of access points of the access place contain the access information for the visitor, and the visitor can freely access the access points of the access place through the access card.
Based on the same inventive concept as the visitor information management method, the embodiment of the invention also provides a management method of the access control card, which comprises the following steps:
verifying the reservation information of the visitor;
in the embodiment, when the visitor visits, the visitor system judges whether the reserved visit time range of the visitor is stored or not, and when the reserved visit time range of the visitor is determined to be stored, the visitor system verifies the reserved visit time range of the visitor. That is, the guest system verifies that the current guest has reserved a time frame of access, such as a day, days, or other time period selected as desired. If the visitor's subscription information matches the access time range of the subscription, the verification is passed.
When the verification is passed, acquiring the identity identification information of the visitor and the reserved access time range, and generating access identification information corresponding to the identity identification information based on the identity identification information;
in the embodiment, when the reservation information of the visitor is verified, the visitor system acquires the access identification information of the visitor, the access identification information of the visitor is stored in the visitor system so that the visitor system controls the access of the visitor through the access identification information of the visitor, the access time range of the visitor is contained in the reservation information of the visitor, and the access time range can be one day, multiple days or other time periods selected as required; the visitor system may store the visitor's access identification information in the access control system so that the visitor system may manage the visitor's access by communicating with the access control system.
Releasing the access identification information to an access control card, and determining an authority valid time range not exceeding a preset time range;
in the embodiment, after the reservation information of the visitor is verified, the visitor system gives the visitor permission, and the visitor can freely act in the access area through the permission. For example, a guest system may give a guest permission by providing an access card to the guest. The visitor system stores the access identification information of the visitor in an access card, and provides the access card containing the access identification information of the visitor to the visitor through the terminal equipment; meanwhile, the visitor system sends the access identification information to the access points containing the access card information, the access points can be multiple, and visitors can freely enter and exit in the access area through using the access cards. The visitor system gives the visitor authority and determines an authority valid time range. When the visitor sends the reservation information to the visitor system, the visitor system sends the reservation access time range to the visitor system, and when the visitor obtains the permission, the visitor system determines a permission effective time range.
Wherein the permission valid time range falls within the preset time range, and the permission valid time range does not exceed the reserved access time range.
For example, when the reserved access time of the visitor is one day, the valid time range of the authority of the access control card does not exceed one day. When the visitor finishes the access with the reserved access time range of one day, the authority of the access control card is invalid. In this embodiment, the valid time range of the authority can be the valid use time range of the access control card, that is, the valid use time range of the access control card does not exceed the access time of the visitor on the same day, and when the visitor finishes the access, the use authority of the access control card is invalid after returning the access control card.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps: the method for verifying the reservation information of the visitor specifically comprises the following steps:
judging whether the reservation information of the visitor is verified within the first time before the starting point of the reservation time range;
passing the verification of the visitor's reservation information when it is determined that the visitor's reservation information is verified within a first time before the start of the reservation time range;
denying verification of the visitor's subscription information when it is determined that the visitor's subscription information is not verified within a first time before the start of the subscription time range.
In this embodiment, the visitor system determines whether the visitor is verified within the first time before or after the start of the reservation time range when it is determined that the field identification information of the visitor is the same as the identification information of the visitor. Specifically, when the visitor is making a reservation access, the visitor system may determine whether the visitor is verified within a first time before or after the start of the reservation time frame, specifically, the first time is a time frame in which the reservation is allowed, for example, the first time may be predetermined to be thirty minutes. When the visitor arrives at the visit site earlier than the reserved time frame, the verification may be performed within a first time before the start of the reserved time frame. When the visitor arrives at the visiting place after the reservation time range, that is, when the reservation is made after the start of the reservation time range, the verification can be passed as long as the visitor is still within the reservation time range. When the guest system determines that the guest is not authenticated within a first time before the start of the reservation time range or after the start, authentication of the guest's reservation information is denied.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps:
allowing the subscriber's subscription information to be verified according to the type of the subscriber;
refusing to verify the visitor's subscription information when it is determined that the visitor's subscription information is not verified within a first time before the start of the subscription time range.
In the embodiment, the visitor system allows the verification of the reservation information of the visitor according to the type of the visitor; refusing to verify the visitor's reservation information when it is determined that the visitor's reservation information is within the time range in which reservation is allowed. Specifically, the guest system only allows a non-blacklisted visitor to make a reservation, and if the type of the visitor is a blacklisted identity, the guest system does not allow verification of the reservation information of the visitor. The blacklist identities include: the visitor violation blacklist, the security blacklist, the human resource blacklist, the public security blacklist and the like, and when the visitor system refuses the reservation information of the visitor with the blacklist identity to be verified, the reason that the corresponding blacklist refuses the verification is prompted. When it is determined that the visitor's subscription information is not verified within a first time, e.g., 30 minutes, before the start of the subscription time range, the visitor's subscription information is denied verification when the visitor is not verified within 30 minutes before the start of the subscription time range.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps:
judging whether the visitor returns the access control card within the permission effective time range;
and when the visitor is determined to return the access control card within the permission effective time range, adjusting the permission effective time range.
In this embodiment, the visitor system determines whether the visitor returns the access card within the valid time range of the authority, and when it is determined that the visitor returns the access card within the valid time range of the authority, the visitor system adjusts the valid time range of the authority so that the time starting point of the adjusted valid time range is greater than or equal to the time range in which the visitor returns the access card. For example, when a visitor makes an access for one day, if the visitor makes an access again in the same day after finishing the access, the visitor system will adjust the valid time range of the authority when the visitor returns the access card, and the visitor can obtain a longer valid time range of the authority. When the visitor makes an access with the time length more than one day, the visitor makes another access after finishing the access, and when the visitor returns the access card within the authority valid time range, the visitor system can adjust the authority valid time range, and the visitor can obtain a longer authority valid time range.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps:
judging whether the visitor returns the access control card within the permission effective time range;
and when the visitor is determined not to return the access card within the permission valid time range, refusing the verification of the reservation information of the visitor.
In the embodiment, the visitor system judges whether the visitor returns the access card within the valid time range of the authority, and records the information after the visitor system determines that the visitor returns the access card within the valid time range of the authority, so that the visitor can pass the verification and obtain the access authority again when visiting again within the reserved access time range. And when the visitor system determines that the visitor does not return the access card within the valid permission time range, refusing the verification of the reservation information of the visitor. When the visitor finishes the access on the same day, the visitor does not return the access card within the valid time range of the authority, the visitor system records the information, when the visitor makes the access reservation again, the visitor system refuses to verify the verification of the reservation information of the visitor, at the moment, the visitor can return the access card in time, and after the visitor system receives the return of the visitor, the reservation information of the visitor can be verified, and the visitor can obtain the access authority again.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps: and limiting to release the access identification information to the access control card.
In the embodiment, the visitor system judges whether the visitor returns the access card within the permission effective time range, and refuses the verification of the reservation information of the visitor when the visitor system determines that the visitor does not return the access card within the permission effective time range, and restricts the release of the access identification information to the access card. When the visitor finishes the access on the same day and does not return the access card within the valid time range of the authority, the visitor system records the information, and when the visitor makes the access reservation again, the visitor system refuses to verify the verification of the reservation information of the visitor and restricts the release of the access identification information to the access card. Therefore, the visitor who does not return the access card in time cannot obtain the access authority until the visitor returns the access card, the visitor system receives the information of the returned access card, the reservation information of the visitor can pass the verification again, and the visitor system can release the access identification information to the access card again.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps:
judging whether the visitor returns the access control card within the permission effective time range;
and after the visitor returns the access card, allowing the reservation information of the visitor to pass the verification again so as to release the access identification information to the access card again.
In this embodiment, visitor system judges whether the visitor returns the access card within the time range of authority validity, and when visitor system confirms that the visitor returns the access card within the time range of authority validity, visitor system records this information, allows visitor's reservation information to pass through the verification once more to make the visitor obtain the access card once more. The visitor returns the access card in time through the mode of managing and controlling the visitor to return the access card within the authority effective time range.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps: and allowing the access identification information to be released to the access card for multiple times within the reserved access time range.
In this embodiment, the visitor system allows the access identification information to be released to the access card multiple times within the reserved access time range. The visitor may be accessing for one or more days. When the visitor accesses for one day, the visitor ends the access, returns the access card, and after leaving, the current reservation information of the visitor is still valid. If the visitor needs to visit again on the visiting day, the access control card can be obtained again through the visitor system according to the reservation information. When the visitor visits for more than one day, the visitor can initiate one-time reservation information through the visitor system, and in the multi-day visiting period, the visitor still has effective reservation information as long as the visitor returns the access card in time after the visiting every day is finished. The visitor can make a second visit based on this reservation information.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps:
judging whether the reservation time range of the visitor is larger than one day or not;
when the reserved time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reserved access time range;
when the reserved time range of the visitor is determined to be larger than one day, the permission valid time range is smaller than the reserved access time range.
In the embodiment, when a visitor accesses the system, when the reservation time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reservation access time range; specifically, since the reservation time range of the visitor is not more than one day, that is, when the reservation time range of the visitor is at most one day, the permission valid time range is less than or equal to the reservation access time range; when the reservation time range of the visitor is one day, the authority valid time range can be set to be one day or less than one day according to the access condition of the visitor. When the visitor accesses for one day, the visitor ends the access, returns the access card, and after leaving, the current reservation information of the visitor is still valid. If the visitor needs to visit again on the visiting day, the access control card can be obtained again through the visitor system according to the reservation information. When the reservation time range of the visitor is determined to be more than one day, namely the reservation time range of the visitor is multiple days, the authority valid time range of the visitor is less than the reservation access time range because the visitor returns the access control card after the access of each day is finished and acquires the access authority again when the access of another day is finished. When the visitor visits for more than one day, the visitor can initiate one-time reservation information through the visitor system, and in the multi-day visiting period, the visitor still has valid reservation information as long as the visitor returns the access card after the visiting every day is finished. The visitor can make a second visit based on this reservation information.
The method for managing the access control card provided by the embodiment of the invention further comprises the following steps:
judging whether the visitor authenticates again;
when the visitor is determined to be verified again, judging whether the current verification time point falls within the authority valid time range;
when the current verification time point is determined to be within the authority valid time range, allowing the visitor to pass the verification again;
refusing the visitor to pass the authentication again when it is determined that the current authentication time point does not fall within the authority validity time range.
In the embodiment, when the visitor accesses, whether the visitor verifies again in the access time range is judged, and when the visitor verifies again in the access time range is determined, whether the current verification time point falls in the authority valid time range is judged. For example, when the visiting time range of the visitor is 6 hours, the visitor returns to the visiting place again after leaving the visiting place in the visiting process, at this time, the visitor needs to perform re-authentication, and if the current authentication time point of the visiting time of the visitor is still within 6 hours of the authority valid time range, the visitor is allowed to pass the authentication again and visit again. If the current authentication time point of the time when the visitor revisits is not within 6 hours of the authority valid time range, the authentication of the visitor is denied. When the visitor's access time range is more than one day, for example, from 8/10/day to 8/15/day, the visitor needs to be authenticated again before the access of each day, and at this time, if the visitor's access current authentication time point does not fall within the authority valid time range, for example, the visitor accesses again on 8/16/day, the visitor system refuses the visitor to be authenticated again because the current authentication time point does not fall within 8/10/day to 8/15/day within the authority valid time range.
Referring to fig. 7, a schematic diagram of a guest system according to an embodiment of the present invention is shown, where the guest system includes:
a verification unit which verifies reservation information of the visitor;
the access control unit is used for acquiring the identity identification information and the access time range of the visitor so as to generate access identification information corresponding to the identity identification information;
and the authorization unit gives the visitor the authority and determines an authority valid time range not exceeding the preset time.
Various changes and specific examples in the guest information management method in the foregoing embodiments of fig. 1 to 6 are also applicable to the guest system of the present embodiment, and a person skilled in the art can clearly know the implementation method of the guest system in the present embodiment through the foregoing detailed description of the guest information management method, so that the detailed description is omitted here for the brevity of the description.
Specifically, all or part of the steps in the methods of the embodiments may be implemented by a program to instruct associated hardware, and the program may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Therefore, according to the technical scheme in the embodiment of the application, the identity identification information and the access time of the visitor can be acquired by verifying the reservation information of the visitor, and the access identification information corresponding to the identity identification information is generated based on the identity identification information; endowing the visitor with authority, determining an authority effective time range not exceeding the preset time, effectively controlling the visitor authority, prompting the visitor to feed back access information after finishing the access, returning the access card in time, and simultaneously improving the safety of the access place.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (23)

1. The visitor information management method comprises the following steps:
obtaining reservation information of a visitor, wherein the reservation information comprises a reservation access time range;
verifying the reservation information of the visitor;
when the verification is passed, generating access identification information corresponding to the visitor;
giving the visitor the authority, and determining an authority valid time range;
wherein the permission validity time range falls within the reserved access time range, the permission validity time range not exceeding the reserved access time range.
2. The method of claim 1, wherein the subscription information further comprises identification information, and wherein verifying the subscription information of the guest comprises:
and judging whether the identity identification information of the visitor is matched with a preset blacklist, and if so, refusing to pass the verification of the reservation information of the visitor.
3. The method of claim 1 or 2, wherein the subscription information further comprises identification information, and wherein verifying the subscription information of the guest comprises:
collecting the on-site identity information of the visitor;
and judging whether the site identity information is the same as the identity identification information of the visitor, and if not, refusing to pass the verification of the reservation information of the visitor.
4. The method of claim 3, wherein the verifying the guest's subscription information further comprises:
if the field identity information is the same as the identity identification information of the visitor, then
Judging whether the visitor is verified within the first time before or after the starting point of the reserved time range;
passing the verification of the visitor's reservation information when it is determined that the visitor verifies within a first time before or after the start of the reservation time range;
denying the verification of the visitor's reservation information when it is determined that the visitor is not verified within a first time before the start of the reservation time range or is not verified after the start.
5. The method of claim 1, wherein the method further comprises:
judging whether the visitor feeds back the access identification information within the permission effective time range or not;
when the visitor is determined to feed back the access identification information in the permission effective time range, the permission effective time range is adjusted, so that the time starting point of the adjusted effective time range is larger than or equal to the time range of the visitor for feeding back the access identification information.
6. The method of claim 1, wherein the method further comprises:
judging whether the visitor feeds back the access identification information within the permission effective time range or not;
denying verification of the visitor's subscription information when it is determined that the visitor does not feed back the access identification information within the permission validity time range.
7. The method of claim 1, wherein the method further comprises:
judging whether the visitor feeds back the access identification information within the permission effective time range or not;
and after the visitor feeds back the access identification information, allowing the reservation information of the visitor to pass the verification again so that the visitor obtains the permission again.
8. The method of claim 1, wherein the visitor is allowed to obtain permission multiple times within a reserved access time.
9. The method of claim 1, further comprising:
judging whether the reservation time range of the visitor is larger than one day or not;
when the reserved time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reserved access time range;
when the reserved time range of the visitor is determined to be larger than one day, the permission valid time range is smaller than the reserved access time range.
10. The method of claim 9, wherein the privilege validity time range is an integer number of hours.
11. The method of claim 1, further comprising:
judging whether the visitor authenticates again;
when the visitor is determined to be verified again, judging whether the current verification time point falls within the authority valid time range;
when the current verification time point is determined to be within the authority valid time range, allowing the visitor to pass the verification again;
refusing the visitor to pass the authentication again when it is determined that the current authentication time point does not fall within the authority validity time range.
12. The method of any one of claims 1 to 11, wherein the permissions include access permissions for access to the visitor, and the access identification information includes access information for access to the visitor.
13. A management method of an access card comprises the following steps:
verifying the reservation information of the visitor;
when the verification is passed, acquiring the identity identification information of the visitor and the reserved access time range, and generating access identification information corresponding to the identity identification information based on the identity identification information;
releasing the access identification information to an access control card, and determining an authority valid time range not exceeding a preset time range;
wherein the permission valid time range falls within the preset time range, and the permission valid time range does not exceed the reserved access time range.
14. The method of claim 13, wherein the verifying the guest's subscription information comprises:
judging whether the reservation information of the visitor is verified within the first time before the starting point of the reservation time range;
passing the verification of the visitor's reservation information when it is determined that the visitor's reservation information is verified within a first time before the start of the reservation time range;
denying verification of the visitor's subscription information when it is determined that the visitor's subscription information is not verified within a first time before the start of the subscription time range.
15. The method of claim 14, wherein the method further comprises:
allowing the subscriber's subscription information to be verified according to the type of the subscriber;
refusing to verify the visitor's subscription information when it is determined that the visitor's subscription information is verified within a first time before the start of the subscription time range.
16. The method of claim 13, wherein the method further comprises:
judging whether the visitor returns the access control card within the permission effective time range;
and when the visitor is determined to return the access control card within the permission effective time range, adjusting the permission effective time range.
17. The method of claim 13, wherein the method further comprises:
judging whether the visitor returns the access control card within the permission effective time range;
and when the visitor is determined not to return the access card within the permission valid time range, refusing the verification of the reservation information of the visitor.
18. The method of claim 15, further comprising: and limiting to release the access identification information to the access control card.
19. The method of claim 13, wherein the method further comprises:
judging whether the visitor returns the access control card within the permission effective time range;
and after the visitor returns the access card, allowing the reservation information of the visitor to pass the verification again so as to release the access identification information to the access card again.
20. The method of claim 13, wherein the access identification information is allowed to be released to the access card a plurality of times within a reserved access time range.
21. The method of claim 13, further comprising:
judging whether the reservation time range of the visitor is larger than one day or not;
when the reserved time range of the visitor is determined not to be larger than one day, the permission valid time range is smaller than or equal to the reserved access time range;
when the reserved time range of the visitor is determined to be larger than one day, the permission valid time range is smaller than the reserved access time range.
22. The method of claim 13, further comprising:
judging whether the visitor authenticates again;
when the visitor is determined to be verified again, judging whether the current verification time point falls within the authority valid time range;
when the current verification time point is determined to be within the authority valid time range, allowing the visitor to pass the verification again;
refusing the visitor to pass the authentication again when it is determined that the current authentication time point does not fall within the authority validity time range.
23. A guest system, comprising:
a verification unit which verifies reservation information of the visitor;
the access control unit is used for acquiring the identity identification information and the access time range of the visitor so as to generate access identification information corresponding to the identity identification information;
and the authorization unit gives the visitor the authority and determines an authority valid time range not exceeding the preset time.
CN201911202752.5A 2019-11-29 2019-11-29 Visitor information management method, access control card management method and visitor system Pending CN111049811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911202752.5A CN111049811A (en) 2019-11-29 2019-11-29 Visitor information management method, access control card management method and visitor system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911202752.5A CN111049811A (en) 2019-11-29 2019-11-29 Visitor information management method, access control card management method and visitor system

Publications (1)

Publication Number Publication Date
CN111049811A true CN111049811A (en) 2020-04-21

Family

ID=70234185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911202752.5A Pending CN111049811A (en) 2019-11-29 2019-11-29 Visitor information management method, access control card management method and visitor system

Country Status (1)

Country Link
CN (1) CN111049811A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113129488A (en) * 2021-04-21 2021-07-16 重庆电子工程职业学院 Artificial intelligence access control system
CN113160459A (en) * 2021-04-01 2021-07-23 深圳市欧瑞博科技股份有限公司 Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274526A (en) * 2017-06-22 2017-10-20 合肥佳洋电子科技有限公司 A kind of control method of intelligent smartgate system and gate control system
CN108806026A (en) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 The self-service method and system for realizing visiting authentication of visitor
CN109272607A (en) * 2018-07-19 2019-01-25 国政通科技有限公司 A kind of reservation visitor recognition methods and system
CN109377611A (en) * 2018-10-24 2019-02-22 平安科技(深圳)有限公司 Caller management method, system, computer equipment and storage medium based on bio-identification
CN109409552A (en) * 2018-10-24 2019-03-01 平安科技(深圳)有限公司 Reserve access method, system, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108806026A (en) * 2017-05-03 2018-11-13 腾讯科技(深圳)有限公司 The self-service method and system for realizing visiting authentication of visitor
CN107274526A (en) * 2017-06-22 2017-10-20 合肥佳洋电子科技有限公司 A kind of control method of intelligent smartgate system and gate control system
CN109272607A (en) * 2018-07-19 2019-01-25 国政通科技有限公司 A kind of reservation visitor recognition methods and system
CN109377611A (en) * 2018-10-24 2019-02-22 平安科技(深圳)有限公司 Caller management method, system, computer equipment and storage medium based on bio-identification
CN109409552A (en) * 2018-10-24 2019-03-01 平安科技(深圳)有限公司 Reserve access method, system, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113160459A (en) * 2021-04-01 2021-07-23 深圳市欧瑞博科技股份有限公司 Intelligent false alarm processing method for door lock, door lock equipment and computer readable storage medium
CN113129488A (en) * 2021-04-21 2021-07-16 重庆电子工程职业学院 Artificial intelligence access control system

Similar Documents

Publication Publication Date Title
US10434988B2 (en) System and method for controlling access
US8050448B2 (en) Mehtod and system for achieving access to an object or a service
CN112330855B (en) Electronic lock safety management method, equipment and system
US20160078699A1 (en) Method and apparatus for network controlled access to physical spaces
US20040006697A1 (en) Authentication method and authentication system
CN108650212A (en) A kind of Internet of Things certification and access control method and Internet of Things security gateway system
US10083326B2 (en) Method of accessing a physically secured rack and computer network infrastructure
CN110379058A (en) A kind of access control management method, device, equipment and storage medium
JP6158771B2 (en) Entrance / exit management system and authentication control method
EP3327679A1 (en) Method for access control of a group of persons using multiple readers and multiple tokens
CN109816829A (en) A kind of visitor's vehicle pass-through system
CN111049811A (en) Visitor information management method, access control card management method and visitor system
KR101637516B1 (en) Method and apparatus for controlling entrance and exit
JP2002041469A (en) System and method for managing electronic equipment
KR20180125729A (en) Vehicle access control system and method through code display
CN116012991A (en) Method, device and related equipment for site access management
US20230269249A1 (en) Method and system for performing user authentication
US10730482B1 (en) Vehicular biometric system with automatically renewed sunset periods for data retention
CN109859348A (en) A kind of authorization method of remote door access, apparatus and system
US20230072114A1 (en) Access control system and a method therein for handling access to an access-restricted physical resource
JP5094440B2 (en) System management device and security system
CN101394394A (en) Centralized authentication access mode for cipher server
CN111369711B (en) Unlocking method, unlocking device, electronic equipment and computer readable storage medium
CN107230264A (en) A kind of Door-access control method and device
AU2018250530B2 (en) Method for controlling the access to a secure area of an equipment, associated computer program, computer medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200421