CN112184184A - Self-service certificate exchange method and device and electronic equipment - Google Patents

Self-service certificate exchange method and device and electronic equipment Download PDF

Info

Publication number
CN112184184A
CN112184184A CN202011159524.7A CN202011159524A CN112184184A CN 112184184 A CN112184184 A CN 112184184A CN 202011159524 A CN202011159524 A CN 202011159524A CN 112184184 A CN112184184 A CN 112184184A
Authority
CN
China
Prior art keywords
information
visitor
target area
identity information
self
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011159524.7A
Other languages
Chinese (zh)
Inventor
谢云昭
王剑华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Caituo Cloud Computing Shanghai Co ltd
Original Assignee
Caituo Cloud Computing Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Caituo Cloud Computing Shanghai Co ltd filed Critical Caituo Cloud Computing Shanghai Co ltd
Priority to CN202011159524.7A priority Critical patent/CN112184184A/en
Publication of CN112184184A publication Critical patent/CN112184184A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a self-service certificate changing method, a self-service certificate changing device and electronic equipment, wherein the self-service certificate changing method can comprise the following steps: acquiring visitor request information; determining target area information accessed by the visitor based on the visitor request information; and after the identity information of the visitor is successfully verified, authorization information corresponding to the determined target area information can be generated, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor, and the pass authorized by the authorization information cannot open the unauthorized target area. Accurate authorization of a particular visitor to enter the corresponding target area may be achieved. The manual certificate exchange can be avoided, and the safety of the target region for the lessee can be completely ensured.

Description

Self-service certificate exchange method and device and electronic equipment
Technical Field
The invention relates to the technical field of information interaction, in particular to a self-service certificate changing method, a self-service certificate changing device and electronic equipment.
Background
With the rapid development of social economy, the mobility of various external people is increasingly frequent, and potential safety hazards are increased, so that visitor entrance and exit management becomes increasingly important. At present, each place requiring access control management greatly adopts manual operation, visitors register and get evidences and other modes, but the mode has obvious defects, on one hand, 24-hour all-day guard cannot be realized, labor cost can be increased through shift change, on the other hand, on-duty personnel cannot judge authenticity of the certificates and personnel identities, and potential safety hazards can be caused to a certain degree.
For example, in a server farm hosting site, that is, a data center, since different client devices are stored in different rooms, target areas or modules of the data center, and the client devices are generally processing devices of data of which the clients are extremely important, the prior art manual evidence-changing method is adopted to ensure the security of the devices and data of each client, which undoubtedly causes a great safety hazard and has extremely high labor cost.
Therefore, how to realize unmanned self-help evidence exchange becomes an urgent problem to be solved.
Disclosure of Invention
The problem to be solved is to solve how to realize unmanned self-help evidence exchange in the prior art.
The invention provides a self-service certificate exchange method, which comprises the following steps: acquiring visitor request information; determining target area information accessed by the visitor based on the visitor request information; and verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
Optionally, the obtaining guest request information includes: acquiring visitor registration information; extracting first identity information of a visitor, target area information accessed by the visitor and first biological characteristic information of the visitor based on the registration information; and associating the first identity information of the visitor, the target area information accessed by the visitor and the first biological characteristic information of the visitor to obtain the request information.
Optionally, the verifying the incoming identity information includes: acquiring visitor certificate information and second biological characteristic information of a visitor; and confirming second identity information of the visitor when the certificate information corresponds to the second biological characteristic information.
Optionally, the verifying the identity information of the visitor further includes: comparing the first identity information with the first identity information; and when the second identity information is the same as the first identity information, confirming that the identity information of the visitor is successfully verified.
Optionally, the verifying the identity information of the visitor further includes: when the second identity information is the same as the first identity information, acquiring first biological characteristic information corresponding to the first identity information; comparing the first biological characteristic information with the second biological characteristic information, and when the first biological characteristic information is the same as the second biological characteristic information, successfully verifying the identity information of the visitor.
Optionally, after the generating authorization information corresponding to the target area information based on the verification result, the method further includes: writing the authorization information into the pass; and outputting a command of issuing the pass so as to issue the pass to the corresponding visitor.
Optionally, after the generating authorization information corresponding to the target area information based on the verification result, the method further includes: reading the authorization information in the pass; acquiring third identity information of a visitor, wherein the third identity information comprises certificate information and/or third biological characteristic information; verifying whether the third identity information and the authorization information are matched; and if so, outputting an access instruction for indicating the visitor corresponding to the unlocking authorization information to access the target area.
According to a second aspect, an embodiment of the present application provides a self-service certificate exchange device, including: the acquisition module is used for acquiring visitor request information; a determining module for determining target area information accessed by the visitor based on the visitor request information; and the verification module is used for verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
According to a third aspect, an embodiment of the present invention provides a computer-readable storage medium, where computer instructions are stored, and the computer instructions are configured to cause the computer to execute a self-help certificate-changing method according to any one of the first aspect.
According to a fourth aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the self-help certificate-changing method according to any one of the first aspects.
The self-service certificate exchange method provided by the embodiment of the application acquires visitor request information; determining target area information accessed by the visitor based on the visitor request information; and after the identity information of the visitor is successfully verified, authorization information corresponding to the determined target area information can be generated, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor, and the pass authorized by the authorization information cannot open the unauthorized target area. Accurate authorization of a particular visitor to enter the corresponding target area may be achieved. The manual certificate exchange can be avoided, and the safety of the target region for the lessee can be completely ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of a flow of a self-service certificate exchange method provided in an embodiment of the present application;
FIG. 2 is a schematic view of a self-service credential change device according to another embodiment of the present application;
fig. 3 is a schematic view of an electronic device according to another embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings. In order to ensure the security of data, each module has only a corresponding client access right, and therefore, in order to ensure that a client can accurately and accurately enter a target area, an embodiment of the present invention provides a self-service certificate exchange method, as shown in fig. 1, the method may include the following steps:
and S10, acquiring visitor request information. As an exemplary embodiment, the visitor request information may be based on a visitor application filled by a visitor, the application may be an electronic application, and may be a paper application, specifically, the visitor request information may be extracted based on the application information filled by the visitor, and for example, the visitor first identity information, the visitor target area, and the like in the visitor request information may be extracted based on the electronic application. When the guest request information is acquired, the first biological characteristics of the guest corresponding to the first identity information in the guest request information, for example, the biological characteristics of the unique identification individual identity information, such as the collected face image, the collected iris characteristic, the collected gait characteristic, the collected fingerprint characteristic, and the like, can also be acquired together. In this embodiment, the first biometric characteristic may be bound to the first identity information and the target access target area. As an optional embodiment, taking a data center as an example for description, the client leases at least one target area storage server or data in the data, and the guest request information may further include tenant information. The tenant information may include tenant identity information, target area information rented by the tenant. The tenant information may further include person information or the like that is specified by the tenant and that can access the tenant target area.
S20, determining target area information accessed by the visitor based on the visitor request information.
And S30, verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
After the identity information of the visitor is successfully verified, authorization information corresponding to the determined target area information can be generated, the authorization information is used for authorizing the pass to unlock the visitor to access the target area, and the pass authorized by the authorization information cannot open the unauthorized target area. Accurate authorization of a particular visitor to enter the corresponding target area may be achieved. The manual certificate exchange can be avoided, and the safety of the target region for the lessee can be completely ensured.
As an exemplary embodiment, the visitor request information may be based on a visitor application filled by a visitor, the application may be an electronic application, and may be a paper application, specifically, the visitor request information may be extracted based on the application information filled by the visitor, and for example, the visitor first identity information, the visitor target area, and the like in the visitor request information may be extracted based on the electronic application. When the guest request information is acquired, the first biological characteristics of the guest corresponding to the first identity information in the guest request information, for example, the biological characteristics of the unique identification individual identity information, such as the collected face image, the collected iris characteristic, the collected gait characteristic, the collected fingerprint characteristic, and the like, can also be acquired together. In this embodiment, the first biometric characteristic may be bound to the first identity information and the target access target area. As an optional embodiment, taking a data center as an example for description, the client leases at least one target area storage server or data in the data, and the guest request information may further include tenant information. The tenant information may include tenant identity information, target area information rented by the tenant. The tenant information may further include person information or the like that is specified by the tenant and that can access the tenant target area.
As an exemplary embodiment, the visitor visit target area may be determined based on the client request information, and specifically, in this embodiment, the request information of the user may be analyzed to obtain first identity information, first biometric information, visitor visit target area information, and the like of the user. Specifically, after the first identity information of the user and the first acoustic feature information, the information of the target area visited by the other users may be associated. And further determining the information of the target area to be visited by the current visitor. As an exemplary embodiment, the client request information may include tenant information, and in this embodiment, a target area that a current guest can visit may be further determined according to the tenant information, and for example, the current client tenant target area includes A, B, C, D four target areas, so that the finally determined guest visits any one or more of the A, B, C, D four target areas. Therefore, before determining the visitor target area, the visitor target area information in the visitor request information needs to be compared with the tenant target area information in the tenant information, and when the visitor target area belongs to the tenant target area, the visitor target area information of the visitor can be confirmed. As an alternative embodiment, the lessee may set some access rights to specify a specific person to enter the target area of the lessee, so that before the visitor is determined to access the target area, the first identity information and/or the first biological characteristic may be verified with the access rights of the lessee, and when the verification is passed, the visitor access target area information is confirmed.
As an exemplary embodiment, after confirming that the visitor accesses the target area information, the user may perform a self-service pass exchange, where the identity information of the visitor needs to be verified, and for example, the user's certificate information may be collected, and the certificate information may include information on a certificate such as an identity card, a passport, and the like, and may be read by using a certificate reading device. And acquiring second biological characteristic information of the user, for example, acquiring a face image, and acquiring biological characteristics such as iris characteristics, gait characteristics and fingerprint characteristics, which uniquely identify the personal identity information. First, whether the certificate information is consistent with the second biological characteristic information or not can be verified, if so, the second identity information of the visitor can be confirmed, and the information verified when the user changes the pass is carried out during the second identity information, so that the unified verification of the personal identification can be realized.
As an exemplary embodiment, after obtaining the unified identification of the witness, it is further required to compare whether the current passer-by is consistent with the person who submits the request, so it is required to compare whether the first identity information is consistent with the second identity information, and when the first identity information is consistent with the second identity information, it can be confirmed that the person who applies for entry is the same as the person who currently exchanges the passer, so it can be confirmed that the identity information of the visitor is successfully verified. As an alternative embodiment, preventing another person from falsely using the certificate, as an exemplary embodiment, when the first identity information and the second identity information are consistent, the first biometric information corresponding to the first identity information may be acquired; comparing the first biological characteristic information with the second biological characteristic information, and when the first biological characteristic information is the same as the second biological characteristic information, successfully verifying the identity information of the visitor. Therefore, through double verification of the certificate information and the biological information, the identity information of the visitor can be verified more accurately.
After the identity information of the visitor is successfully verified, authorization information corresponding to the determined target area information can be generated, the authorization information is used for authorizing the pass to unlock the visitor to access the target area, and the pass authorized by the authorization information cannot open the unauthorized target area. Accurate authorization of a particular visitor to enter the corresponding target area may be achieved. The manual certificate exchange can be avoided, and the safety of the target region for the lessee can be completely ensured.
As an exemplary embodiment, after obtaining the authorization information corresponding to the visitor accessing the target area, the authorization information may be written into the pass, and an instruction for issuing the pass may be output, where the instruction may control the issuing device to issue the pass to the corresponding visitor.
After the visitor gets the pass, the visitor can enter the target area based on the pass, and when the target area is unlocked, the authorization information in the pass can be read; when the authorization information passes verification, third identity information of the visitor is required to be acquired, wherein the third identity information comprises certificate information and/or third biological characteristic information; the third identity information can be used for acquiring certificate information and/or acquiring biological characteristic information of the visitor, not only authentication of authorization information is required before entering the target area, but also matching authentication can be performed by acquiring the identity information of the visitor and the identity information corresponding to the authorization information in real time after the authorization authentication, for example, first identity information in request information and/or second identity information acquired during card changing, and if the first identity information and the second identity information are matched, an access instruction for indicating the visitor corresponding to the unlocking authorization information to access the target area is output. In the unlocking target area, a double verification mechanism can be adopted to verify whether the current unlocking personnel is the visitor registration personnel, so that the safety of the lessee can be further ensured.
An embodiment of the present application further provides a self-service certificate exchange device, as shown in fig. 2, the device may include:
an obtaining module 10, configured to obtain visitor request information; a determining module 20, configured to determine target area information accessed by the guest based on the guest request information; and the verification module 30 is used for verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
An embodiment of the present invention provides an electronic device, as shown in fig. 3, which includes one or more processors 31 and a memory 32, and one processor 33 is taken as an example in fig. 3.
The controller may further include: an input device 33 and an output device 34.
The processor 31, the memory 32, the input device 33 and the output device 34 may be connected by a bus or other means, and fig. 3 illustrates the connection by a bus as an example.
The processor 31 may be a Central Processing Unit (CPU). The processor 31 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 32, which is a non-transitory computer readable storage medium, can be used for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present application. The processor 31 executes various functional applications and data processing of the server by running non-transitory software programs, instructions and modules stored in the memory 32, that is, implements the self-help certificate-changing method of the above-described method embodiment.
The memory 32 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, the memory 32 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 32 may optionally include memory located remotely from the processor 31, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 33 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. The output device 34 may include a display device such as a display screen.
One or more modules are stored in the memory 32, which when executed by the one or more processors 31 perform the method as shown in fig. 1.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the motor control methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Finally, the principle and the implementation of the present invention are explained by applying the specific embodiments in the present invention, and the above description of the embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A self-service certificate-returning method is characterized by comprising the following steps:
acquiring visitor request information;
determining target area information accessed by the visitor based on the visitor request information;
and verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
2. The self-service certificate exchange method of claim 1, wherein the obtaining of the visitor request information comprises:
acquiring visitor registration information;
extracting first identity information of a visitor, target area information accessed by the visitor and first biological characteristic information of the visitor based on the registration information;
and associating the first identity information of the visitor, the target area information accessed by the visitor and the first biological characteristic information of the visitor to obtain the request information.
3. The self-service card-changing method of claim 2, wherein the verifying the incoming customer identity information comprises:
acquiring visitor certificate information and second biological characteristic information of a visitor;
and confirming second identity information of the visitor when the certificate information corresponds to the second biological characteristic information.
4. The self-service card-changing method of claim 3, wherein the verifying the identity information of the visitor further comprises:
comparing the first identity information with the first identity information;
and when the second identity information is consistent with the first identity information, the verification of the incoming identity information is confirmed to be successful.
5. The self-service card-changing method of claim 3, wherein the verifying the identity information of the visitor further comprises:
when the second identity information and the first identity information are the same,
acquiring first biological characteristic information corresponding to the first identity information;
comparing the first biological characteristic information with the second biological characteristic information, and when the first biological characteristic information is the same as the second biological characteristic information, successfully verifying the identity information of the visitor.
6. The self-service visa changing method of claim 1, further comprising, after the generating authorization information corresponding to the target area information based on the verification result:
writing the authorization information into the pass;
and outputting a command of issuing the pass so as to issue the pass to the corresponding visitor.
7. The self-service visa changing method of claim 1, further comprising, after the generating authorization information corresponding to the target area information based on the verification result:
reading the authorization information in the pass;
acquiring third identity information of a visitor, wherein the third identity information comprises certificate information and/or third biological characteristic information;
verifying whether the third identity information and the authorization information are matched;
and if so, outputting an access instruction for indicating the visitor corresponding to the unlocking authorization information to access the target area.
8. The utility model provides a trade card device by oneself which characterized in that includes:
the acquisition module is used for acquiring visitor request information;
a determining module for determining target area information accessed by the visitor based on the visitor request information;
and the verification module is used for verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
9. A computer-readable storage medium having stored thereon computer instructions for causing a computer to execute the self-help visa changing method of any one of claims 1-7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, implements a self-service credential-changing method as claimed in any one of claims 1 to 7.
CN202011159524.7A 2020-10-26 2020-10-26 Self-service certificate exchange method and device and electronic equipment Pending CN112184184A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011159524.7A CN112184184A (en) 2020-10-26 2020-10-26 Self-service certificate exchange method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011159524.7A CN112184184A (en) 2020-10-26 2020-10-26 Self-service certificate exchange method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN112184184A true CN112184184A (en) 2021-01-05

Family

ID=73923456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011159524.7A Pending CN112184184A (en) 2020-10-26 2020-10-26 Self-service certificate exchange method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112184184A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160165000A1 (en) * 2010-10-22 2016-06-09 Litl Llc Method and apparatus for public computing
CN106161468A (en) * 2016-08-31 2016-11-23 广州云系信息科技有限公司 Visitor information identification system and method
CN109461233A (en) * 2018-10-24 2019-03-12 平安科技(深圳)有限公司 Caller management method, system, computer equipment and storage medium
CN111179484A (en) * 2019-10-30 2020-05-19 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160165000A1 (en) * 2010-10-22 2016-06-09 Litl Llc Method and apparatus for public computing
CN106161468A (en) * 2016-08-31 2016-11-23 广州云系信息科技有限公司 Visitor information identification system and method
CN109461233A (en) * 2018-10-24 2019-03-12 平安科技(深圳)有限公司 Caller management method, system, computer equipment and storage medium
CN111179484A (en) * 2019-10-30 2020-05-19 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium

Similar Documents

Publication Publication Date Title
JP6887028B2 (en) Door access control method, door access control device, system and storage medium
CN105913527B (en) Visitor's two dimensional code intelligent verification system and verification method based on cell cloud
CN104240342B (en) Access control method and device based on identity authentication
CN103383785B (en) The system and method registered for automatic visitor and access card distribution
EP4007968A1 (en) Systems and methods of identification verification using hybrid near-field communication and optical authentication
CN112005231A (en) Biometric authentication method, system and computer program
KR20100114110A (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
CN109461233A (en) Caller management method, system, computer equipment and storage medium
CN112200948A (en) Smart and safe campus visitor reservation platform
US20190268158A1 (en) Systems and methods for providing mobile identification of individuals
US11461567B2 (en) Systems and methods of identification verification using hybrid near-field communication and optical authentication
CN109558918A (en) A kind of certificate chain real estate electronics license system and its application method
CA2936986A1 (en) Methods and apparatus for voter registration and voting using mobile communication devices
CN206557867U (en) Gate control system based on dynamic two-dimension code
Yadav et al. A biometric traits based authentication system for indian voting system
US20200334430A1 (en) Self-sovereign identity systems and methods for identification documents
CN103996035A (en) Passenger security check identity certification product
CN109285260A (en) A kind of gate control method and device
Umar et al. Development of a fingerprint biometric authentication system for secure electronic voting machines
CN112184184A (en) Self-service certificate exchange method and device and electronic equipment
CN110121174A (en) A kind of implicit identity identifying method of mobile intelligent terminal
CN112184183A (en) Self-service certificate returning method and device and electronic equipment
CN112182521A (en) Real estate right dynamic information query method, integrated platform and storage medium
JP6897891B1 (en) Admission management system, admission management device, admission management method, and computer program
Saheed et al. Fingerprint based approach for examination clearance in higher institutions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105

RJ01 Rejection of invention patent application after publication