CN112767583A - Access control management method and system - Google Patents

Access control management method and system Download PDF

Info

Publication number
CN112767583A
CN112767583A CN202011550005.3A CN202011550005A CN112767583A CN 112767583 A CN112767583 A CN 112767583A CN 202011550005 A CN202011550005 A CN 202011550005A CN 112767583 A CN112767583 A CN 112767583A
Authority
CN
China
Prior art keywords
teacher
information
visiting
visit
visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011550005.3A
Other languages
Chinese (zh)
Inventor
李敬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yuedun Security Service Co ltd
Original Assignee
Guangzhou Yuedun Security Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yuedun Security Service Co ltd filed Critical Guangzhou Yuedun Security Service Co ltd
Priority to CN202011550005.3A priority Critical patent/CN112767583A/en
Publication of CN112767583A publication Critical patent/CN112767583A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to a method and a system for managing access control, wherein the method comprises the steps of obtaining registration information of a visitor, wherein the registration information comprises identity information of a visiting teacher; based on the registration information, generating a visit request and sending the visit request to a teacher terminal associated with the visit teacher so that the teacher confirms the content of the registration information; and acquiring a visit request feedback message sent by the teacher terminal, and determining whether to permit the visitor to enter or not based on the visit request feedback message. The invention can improve the security of entrance guard and improve the convenience of visitor checking.

Description

Access control management method and system
Technical Field
The invention relates to the technical field of access control management, in particular to an access control management method and system.
Background
At present, the security problem of campus access control in primary schools and junior high schools is more and more emphasized, people going in and out of the campus are more and more complicated, people generally going out for sales promotion can also want to enter the campus, a gatekeeper generally adopts a registration mode, most of the existing registration modes are handwritten registration on a paper record book, which is inconvenient and easy to have false information, in addition, external people are required to make a call to a visiting teacher, the teacher agrees to enter after the call is connected, the gatekeeper can open a door to allow external people to enter the campus, but many times, the external people are visiting the school for the first time, when the external people do not have a teacher call or a teacher call is not answered, the external people are often and happily close to the gatekeeper, the gatekeeper can easily enter the campus, and the campus memory is an unsafe factor, therefore, the inventor thinks that the existing campus access control mode has the defect of not enough security, further improvements are needed.
Disclosure of Invention
In order to solve the problem of potential safety hazards of entrance guard management, the application provides an entrance guard management method and system, so that the entrance guard safety is improved, and the convenience of visitor checking is improved.
In a first aspect, the access control management method provided by the application adopts the following technical scheme:
a method of access control, the method comprising:
acquiring registration information of a visitor, wherein the registration information comprises identity information of a visiting teacher;
based on the registration information, generating a visit request and sending the visit request to a teacher terminal associated with the visit teacher so that the teacher confirms the content of the registration information;
and acquiring a visit request feedback message sent by the teacher terminal, and determining whether to permit the visitor to enter or not based on the visit request feedback message.
By adopting the technical scheme, after the registration information of the visitor is acquired, the visit request is sent to the teacher end associated with the visit teacher according to the registration information, so that the check or permission of the visit teacher can be acquired conveniently; and then after the visit request feedback message sent by the teacher end is obtained, whether the visitor is permitted to enter the campus is determined based on the visit request feedback message, so that the safety of the campus access control is improved, and meanwhile, the trouble of manual registration can be saved.
Optionally, acquiring registration information of the visitor, including:
acquiring initial registration information of a visitor, wherein the initial registration information at least comprises identity information of the visitor;
accessing a public security system, inquiring the identity information of the visitor in the public security system, and acquiring an inquiry result, wherein the inquiry result comprises normal personnel and abnormal personnel;
and taking the query result as the tag information of the identity of the visitor, and taking the initial registration information carrying the tag information as the registration information.
By adopting the technical scheme, the identity of the visitor is checked through the public security system, so that the visitor is excluded as a person with potential danger, and the intelligence and the safety of access control management are improved.
Optionally, the registration information further includes visit teacher communication information, and before generating the visit request based on the registration information, the method further includes:
judging whether the visiting teacher is a campus teacher or not based on the visiting teacher communication information or the visiting teacher identity information;
if not, generating visiting error information and displaying the visiting error information on an interactive interface of the entrance guard terminal.
By adopting the technical scheme, whether the teacher to be visited by the visitor is a campus teacher can be automatically judged, so that the possibility of false visits is reduced; and aiming at the condition that the visiting teacher is not the campus teacher, the access control terminal displays and reminds on an interactive interface of the access control terminal, so that a gatekeeper can conveniently make a decision of refusing or forbidding the visiting person to enter the door.
Optionally, based on visit teacher communication information or visit teacher identity information, judge whether visit the teacher is the campus teacher, include:
matching and searching the communication information of the visiting teacher or the identity information of the visiting teacher in a preset teacher information database;
if a teacher with the same communication information or identity information as the visiting teacher is searched, determining that the visiting teacher is a campus teacher;
and if the teacher with the same communication information or identity information as the visiting teacher is not searched, determining that the visiting teacher is not the campus teacher.
By adopting the technical scheme, matching search is carried out in the preset teacher information database according to the communication information or the identity information of the visiting teacher, so that whether the visiting teacher is a campus teacher can be quickly judged.
Optionally, the determining whether to grant the visitor access based on the visit request feedback message includes:
if the visit request feedback message is to allow the visit, allowing the visitor to enter;
if the visit request feedback message is to reject the visit, the visitor is prohibited from entering;
and if the visit request feedback message is delayed visit, generating and displaying a delayed visit on an interactive interface of the access control terminal.
By adopting the technical scheme, whether the visiting teacher can currently receive the visit of the visiting personnel can be known according to the visit request feedback message sent by the teacher end, so that the authorization of the visiting teacher is obtained equivalently, the visiting personnel can or cannot enter the campus, the convenience and the safety of the access control for checking the visiting personnel are improved, in addition, if the follow-up things related to the visiting personnel need to be traced, the visiting teacher can also be traced, and therefore, the access control method has a better archiving effect.
In a second aspect, the access control management system provided by the application adopts the following technical scheme:
an access control management system, the system comprising:
acquiring registration information of a visitor, wherein the registration information comprises identity information of a visiting teacher;
based on the registration information, generating a visit request and sending the visit request to a teacher terminal associated with the visit teacher so that the teacher confirms the content of the registration information;
and acquiring a visit request feedback message sent by the teacher terminal, and determining whether to permit the visitor to enter or not based on the visit request feedback message.
By adopting the technical scheme, after the registration information of the visitor is acquired, the visit request is sent to the teacher end associated with the visit teacher according to the registration information, so that the check or permission of the visit teacher can be acquired conveniently; and then after the visit request feedback message sent by the teacher end is obtained, whether the visitor is permitted to enter the campus is determined based on the visit request feedback message, so that the safety of the campus access control is improved, and meanwhile, the trouble of manual registration can be saved.
Optionally, the information obtaining module includes:
the initial information acquisition submodule is used for acquiring initial registration information of a visitor, and the initial registration information at least comprises identity information of the visitor;
the public security checking sub-module is used for accessing a public security system, inquiring the identity information of the visitor in the public security system and obtaining an inquiry result, wherein the inquiry result comprises normal personnel and abnormal personnel;
and the recording submodule is used for taking the query result as the tag information of the identity of the visitor and taking the initial registration information carrying the tag information as the registration information.
By adopting the technical scheme, the identity of the visitor is checked through the public security system, so that the visitor is excluded as a person with potential danger, and the intelligence and the safety of access control management are improved.
Optionally, the system further comprises:
and the teacher confirmation module is used for judging whether the visiting teacher is a campus teacher or not based on the visiting teacher communication information or the visiting teacher identity information, and if not, generating visiting error information and displaying the visiting error information on an interactive interface of the access control terminal.
By adopting the technical scheme, whether the teacher to be visited by the visitor is a campus teacher can be automatically judged, so that the possibility of false visits is reduced; and aiming at the condition that the visiting teacher is not the campus teacher, the access control terminal displays and reminds on an interactive interface of the access control terminal, so that a gatekeeper can conveniently make a decision of refusing or forbidding the visiting person to enter the door.
Optionally, the teacher confirmation module includes:
the matching search submodule is used for matching and searching the communication information of the visiting teacher or the identity information of the visiting teacher in a preset teacher information database;
the first determining submodule is used for determining that the visiting teacher is a campus teacher if the teacher with the same communication information or identity information as the visiting teacher is searched;
and the second determining submodule is used for determining that the visiting teacher is not the campus teacher if the teacher with the same communication information or identity information as the visiting teacher is not searched.
By adopting the technical scheme, matching search is carried out in the preset teacher information database according to the communication information or the identity information of the visiting teacher, so that whether the visiting teacher is a campus teacher can be quickly judged.
Optionally, the permitting module comprises:
the admission sub-module is used for allowing the visitor to enter if the visit request feedback message is the admission permission;
the forbidding submodule is used for forbidding visitors to enter if the visiting request feedback message is a visiting refusal message;
and the delayed visit sub-module is used for generating delayed visit information and displaying the delayed visit information on an interactive interface of the access control terminal if the visit request feedback message is delayed visit.
By adopting the technical scheme, whether the visiting teacher can currently receive the visit of the visiting personnel can be known according to the visit request feedback message sent by the teacher end, so that the authorization of the visiting teacher is obtained equivalently, the visiting personnel can or cannot enter the campus, the convenience and the safety of the access control for checking the visiting personnel are improved, in addition, if the follow-up things related to the visiting personnel need to be traced, the visiting teacher can also be traced, and therefore, the access control method has a better archiving effect.
In a third aspect, the present application provides a computer device, which adopts the following technical solution:
computer device comprising a memory, a processor and a computer program stored in said memory and executable on said processor, characterized in that said processor implements the steps of said access control method when executing said computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the steps of the access control method.
Drawings
Fig. 1 is a flowchart illustrating an implementation of a method for access control management according to an embodiment of the present application;
fig. 2 is a schematic block diagram of an access control system according to an embodiment of the present application;
FIG. 3 is a functional block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
Example (b):
in this embodiment, as shown in fig. 1, the present application discloses an access control method, including:
101. initial registration information of a visitor is acquired.
The initial registration information refers to original visit information entered by a visitor during visiting.
Specifically, the visitor enters the initial registration information on the access terminal, which, in this embodiment,
the initial registration information comprises visitor information, identity information of a visiting teacher, a communication mode of the visiting teacher and a visiting reason; in this embodiment, the visitor information includes a name of a visitor, a contact information, and identity information of the visitor, and in this embodiment, the identity information of the visitor may be any one of identity document information or face image information; the visit teacher identity information may include a visit teacher name, any education subject, and/or class taken; the communication mode of the visiting teacher can be a mobile phone number or a fixed phone of the visiting teacher; the visit reason at least comprises a representative unit of the visit and a specific transaction of the visit; the entrance guard terminal machine can be a PC computer with an identity input function and can also be a customized computer.
It should be noted that, when a visitor requests the entrance guard to enter the campus, the entrance guard allows the visitor to enter visitor identity information, visitor teacher communication mode and visitor reason into the entrance guard terminal. Can adopt manual input or speech input to visit teacher's identity information, visit teacher's communication mode and visit reason, can adopt external camera to type visitor's identity information, for example access control terminal connects the camera outward, utilize the camera to shoot visitor's ID card and upload to entrance guard management server with the ID card image of shooing, the server utilizes word recognition processor to draw ID card information to the ID card image, or access control terminal connects the camera that has face identification outward, shoot visitor's face and upload to the server with face image information. The word recognition processor and the face recognition camera can be realized by adopting the prior art, and the description is omitted here.
102. And checking the identity of the visitor.
Specifically, the API interface of the public security system is accessed, the identity information of the visitor is queried in the public security system, and a query result is obtained, for example, the identity document information is utilized to perform matching query in the public security system, or the face image is utilized to perform matching query in the public security system, if the visitor is not a suspicious person, the visitor is determined to be a normal person, and if the visitor is a suspicious person, the visitor is determined to be an abnormal person.
Furthermore, the query result is used as the label information of the identity of the visitor, and the identity information of the visitor, the label information, the identity information of the visiting teacher and the visiting reason are used as login information, so that a visiting request can be subsequently made to the visiting teacher.
It should be noted that, when the tag information of the identity of the visitor is an abnormal person, the entrance guard terminal prompts that the visitor has a potential risk, and the entrance guard prohibits the visitor from entering the campus, or prompts that the visitor is a suspicious person, and then performs automatic alarm. And when the tag information of the identity of the visitor is normal personnel, carrying out the next step.
103. And confirming whether the visit teacher is the campus teacher.
Specifically, based on the visit teacher communication information or the visit teacher identity information, the visit teacher communication information or the visit teacher identity information is subjected to matching search in a teacher information database, in the embodiment, a teacher information table is preset in the teacher identity database, all teacher identity names, contact ways, any education subjects and/or classes carried in the table are recorded in the teacher information table, the visit teacher identity information can be any one or combination of the visit teacher names, any education subjects and classes carried in the table, the visit teacher identity information can be a visit teacher mobile phone number and/or a seat phone number, and matching search is performed in the teacher information table in a matrix mapping mode.
Further, if a teacher with the same communication information or identity information as the visiting teacher is not searched, the visiting teacher can be determined not to be the campus teacher, and visiting error information is generated and displayed on an interactive interface of the access control terminal; if the teacher with the same communication information or identity information as the visiting teacher is searched, the visiting teacher can be determined to be the campus teacher, and then the following steps are carried out.
It should be noted that, the names, contact ways, any education subjects and/or classes of visitors are deliberately subjected to matching search in a teacher information table in a matrix mapping manner, if no mapping result is found, it is indicated that the teacher to be visited by the visitor is not a campus teacher and is probably false information, the server generates visiting error information and displays the visiting error information on an interactive interface of the access control terminal, and the visiting error information indicates that the visiting teacher is not a local teacher, so as to determine the visitor or prohibit the visitor from entering the campus.
104. And sending a visit request to a visit teacher who confirms passing.
Specifically, based on the identity information of the visitor and the visiting reason, a visiting request is generated and sent to a teacher end associated with a visiting teacher, so that the teacher confirms the content of the registration information.
It should be noted that after determining that the visiting teacher is the teacher of the school, the server obtains the name, contact way and visiting reason of the visiting person from the registration information according to the registration information of the visiting person, generates a visiting request, and then sends the visiting request to the mobile phone of the visiting teacher through the mobile phone short message, the third party App or the small program, so that the visiting teacher confirms to approve the visiting of the visiting person after seeing the visiting request, and then authorizes the entrance guard to permit the visiting person to enter through the mobile phone short message, the third party App or the small program, or does not approve the visiting person, and then authorizes the entrance guard to prohibit the visiting person to enter through the mobile phone short message, the third party App or the small program, so that the entrance check of the visiting person is safer and more effective, and the check difficulty of the entrance guard is reduced, in addition, the visiting authorization record of the teacher can also be stored in the server database, so that later school leaders can view the visit authorization records if they need to view.
105. And acquiring a visit request feedback message and determining whether a visitor enters.
Specifically, a visit request feedback message sent by a teacher end is obtained, and if the visit request feedback message is permission to visit, visitors are allowed to enter; if the visit request feedback message is to reject the visit, the visitor is prohibited from entering; and if the visit request feedback message is delayed visit, generating delayed visit information and displaying the delayed visit information on an interactive interface of the access control terminal.
It should be noted that the visit teacher may send a visit request feedback message through a mobile phone short message, a third party App or an applet, and the server receives the visit request feedback message. Certainly, there may be a case where the access teacher does not have time to receive the access or does not check and see the access request in time, and if the access request is not confirmed for a long time, the access confirmation result is an extended access, and the extended access information is generated and sent to the access terminal for display.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
The embodiment also provides an access control system, and the access control system corresponds to the access control method in the embodiment one to one. As shown in fig. 2, the access control system includes an information obtaining module, a request determining module, and a granting module. The functional modules are explained in detail as follows:
the information acquisition module is used for acquiring the registration information of the visitor, and the registration information comprises the identity information of the visiting teacher;
the request determining module is used for generating a visit request based on the registration information and sending the visit request to a teacher terminal associated with a visit teacher so that the teacher confirms the content of the registration information;
and the permitting module is used for acquiring the visit request feedback message sent by the teacher terminal and determining whether to permit the visitor to enter or not based on the visit request feedback message.
Optionally, the information obtaining module includes:
the initial information acquisition submodule is used for acquiring initial registration information of the visitor, and the initial registration information at least comprises identity information of the visitor;
the public security checking sub-module is used for accessing a public security system, inquiring the identity information of the visitor in the public security system and acquiring an inquiry result, wherein the inquiry result comprises normal personnel and abnormal personnel;
and the recording submodule is used for taking the query result as the tag information of the identity of the visitor and taking the initial registration information carrying the tag information as the registration information.
Optionally, the system further comprises:
and the teacher confirmation module is used for judging whether the visiting teacher is a campus teacher or not based on the visiting teacher communication information or the visiting teacher identity information, and if not, generating visiting error information and displaying the visiting error information on an interactive interface of the access control terminal.
Optionally, the teacher confirmation module includes:
the matching search submodule is used for matching and searching the communication information of the visiting teacher or the identity information of the visiting teacher in a preset teacher information database;
the first determining submodule is used for determining that the visiting teacher is a campus teacher if the teacher with the same communication information or identity information as the visiting teacher is searched;
and the second determining submodule is used for determining that the visiting teacher is not the campus teacher if the teacher with the same communication information or identity information as the visiting teacher is not searched.
Optionally, the permitting module comprises:
the admission sub-module is used for allowing the visitor to enter if the visit request feedback message is the admission permission;
the forbidding submodule is used for forbidding visitors to enter if the visiting request feedback message is a visiting refusal message;
and the delayed visit sub-module is used for generating delayed visit information and displaying the delayed visit information on an interactive interface of the access control terminal if the visit request feedback message is delayed visit.
For the specific definition of the access control system, reference may be made to the above definition of the access control method, which is not described herein again. All modules in the access control management system can be completely or partially realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
The embodiment also provides a computer device, which may be a server, and the internal structure diagram of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing initial registration information, communication information of the visiting teacher, identity information of the visiting teacher and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of access control, the processor implementing the computer program to perform the steps of:
acquiring registration information of a visitor, wherein the registration information comprises identity information of a visiting teacher;
based on the registration information, generating a visit request and sending the visit request to a teacher terminal associated with a visit teacher so that the teacher confirms the content of the registration information;
and acquiring a visit request feedback message sent by the teacher terminal, and determining whether to permit the visitor to enter or not based on the visit request feedback message.
The present embodiments also provide a computer-readable storage medium having a computer program stored thereon, the computer program, when executed by a processor, implementing the steps of:
acquiring registration information of a visitor, wherein the registration information comprises identity information of a visiting teacher;
based on the registration information, generating a visit request and sending the visit request to a teacher terminal associated with a visit teacher so that the teacher confirms the content of the registration information;
and acquiring a visit request feedback message sent by the teacher terminal, and determining whether to permit the visitor to enter or not based on the visit request feedback message.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for access control, the method comprising:
acquiring registration information of a visitor, wherein the registration information comprises identity information of a visiting teacher;
based on the registration information, generating a visit request and sending the visit request to a teacher terminal associated with the visit teacher so that the teacher confirms the content of the registration information;
and acquiring a visit request feedback message sent by the teacher terminal, and determining whether to permit the visitor to enter or not based on the visit request feedback message.
2. The access control management method according to claim 1, wherein obtaining registration information of a visitor comprises:
acquiring initial registration information of a visitor, wherein the initial registration information at least comprises identity information of the visitor;
accessing a public security system, inquiring the identity information of the visitor in the public security system, and acquiring an inquiry result, wherein the inquiry result comprises normal personnel and abnormal personnel;
and taking the query result as the tag information of the identity of the visitor, and taking the initial registration information carrying the tag information as the registration information.
3. The access control management method according to claim 1, wherein the registration information further includes visit teacher communication information, and before the visit request is generated based on the registration information, the method further includes:
judging whether the visiting teacher is a campus teacher or not based on the visiting teacher communication information or the visiting teacher identity information;
if not, generating visiting error information and displaying the visiting error information on an interactive interface of the entrance guard terminal.
4. The access control management method according to claim 3, wherein determining whether the visiting teacher is a campus teacher based on the visiting teacher communication information or the visiting teacher identity information comprises:
matching and searching the communication information of the visiting teacher or the identity information of the visiting teacher in a preset teacher information database;
if a teacher with the same communication information or identity information as the visiting teacher is searched, determining that the visiting teacher is a campus teacher;
and if the teacher with the same communication information or identity information as the visiting teacher is not searched, determining that the visiting teacher is not the campus teacher.
5. The access control method of claim 1, wherein determining whether to grant access to a visitor based on the visit request feedback message comprises:
if the visit request feedback message is to allow the visit, allowing the visitor to enter;
if the visit request feedback message is to reject the visit, the visitor is prohibited from entering;
and if the visit request feedback message is delayed visit, generating delayed visit information and displaying the delayed visit information on an interactive interface of the access control terminal.
6. An access control management system, comprising:
the information acquisition module is used for acquiring registration information of the visitor, wherein the registration information comprises identity information of a visiting teacher;
the request determining module is used for generating a visit request based on the registration information and sending the visit request to a teacher terminal associated with the visit teacher so that the teacher confirms the content of the registration information;
and the permitting module is used for acquiring the visit request feedback message sent by the teacher terminal and determining whether to permit the visitor to enter or not based on the visit request feedback message.
7. The access control system of claim 6, wherein the information acquisition module comprises:
the initial information acquisition submodule is used for acquiring initial registration information of a visitor, and the initial registration information at least comprises identity information of the visitor;
the public security checking sub-module is used for accessing a public security system, inquiring the identity information of the visitor in the public security system and obtaining an inquiry result, wherein the inquiry result comprises normal personnel and abnormal personnel;
and the recording submodule is used for taking the query result as the tag information of the identity of the visitor and taking the initial registration information carrying the tag information as the registration information.
8. The access control system of claim 6, further comprising:
and the teacher confirmation module is used for judging whether the visiting teacher is a campus teacher or not based on the visiting teacher communication information or the visiting teacher identity information, and if not, generating visiting error information and displaying the visiting error information on an interactive interface of the access control terminal.
9. The access control system of claim 8, wherein the teacher validation module comprises:
the matching search submodule is used for matching and searching the communication information of the visiting teacher or the identity information of the visiting teacher in a preset teacher information database;
the first determining submodule is used for determining that the visiting teacher is a campus teacher if the teacher with the same communication information or identity information as the visiting teacher is searched;
and the second determining submodule is used for determining that the visiting teacher is not the campus teacher if the teacher with the same communication information or identity information as the visiting teacher is not searched.
10. The access control system of claim 6, wherein the grant module comprises:
the admission sub-module is used for allowing the visitor to enter if the visit request feedback message is the admission permission;
the forbidding submodule is used for forbidding visitors to enter if the visiting request feedback message is a visiting refusal message;
and the delayed visit sub-module is used for generating delayed visit information and displaying the delayed visit information on an interactive interface of the access control terminal if the visit request feedback message is delayed visit.
CN202011550005.3A 2020-12-24 2020-12-24 Access control management method and system Pending CN112767583A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011550005.3A CN112767583A (en) 2020-12-24 2020-12-24 Access control management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011550005.3A CN112767583A (en) 2020-12-24 2020-12-24 Access control management method and system

Publications (1)

Publication Number Publication Date
CN112767583A true CN112767583A (en) 2021-05-07

Family

ID=75693977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011550005.3A Pending CN112767583A (en) 2020-12-24 2020-12-24 Access control management method and system

Country Status (1)

Country Link
CN (1) CN112767583A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117333982A (en) * 2023-11-09 2024-01-02 山东傲看自动化科技有限公司 Automatic registration access control and automatic release system for stranger dialing

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105302781A (en) * 2015-11-18 2016-02-03 合肥宝龙达光电技术有限公司 Method for fast BOM comparison
CN105761335A (en) * 2014-12-16 2016-07-13 航天信息股份有限公司 Gate-sentry management method and system
CN106934889A (en) * 2017-03-08 2017-07-07 深圳市至壹科技开发有限公司 A kind of method and system of visitor's intelligent management
CN107274519A (en) * 2017-06-02 2017-10-20 深圳市巨龙科教网络有限公司 A kind of Campus Security intelligent caller management method
CN107766314A (en) * 2017-10-20 2018-03-06 网易(杭州)网络有限公司 The data processing method and device of electrical form
CN107845179A (en) * 2017-12-25 2018-03-27 厦门大学嘉庚学院 A kind of Campus visitor management system and method
CN109658579A (en) * 2019-02-28 2019-04-19 中新智擎科技有限公司 A kind of access control method, system, equipment and storage medium
CN111259803A (en) * 2020-01-16 2020-06-09 广州市十牛信息科技有限公司 Campus visitor management system based on face recognition
CN111859895A (en) * 2020-07-28 2020-10-30 浙江明度智控科技有限公司 Method, system and storage medium for comparing tables in batch documents

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105761335A (en) * 2014-12-16 2016-07-13 航天信息股份有限公司 Gate-sentry management method and system
CN105302781A (en) * 2015-11-18 2016-02-03 合肥宝龙达光电技术有限公司 Method for fast BOM comparison
CN106934889A (en) * 2017-03-08 2017-07-07 深圳市至壹科技开发有限公司 A kind of method and system of visitor's intelligent management
CN107274519A (en) * 2017-06-02 2017-10-20 深圳市巨龙科教网络有限公司 A kind of Campus Security intelligent caller management method
CN107766314A (en) * 2017-10-20 2018-03-06 网易(杭州)网络有限公司 The data processing method and device of electrical form
CN107845179A (en) * 2017-12-25 2018-03-27 厦门大学嘉庚学院 A kind of Campus visitor management system and method
CN109658579A (en) * 2019-02-28 2019-04-19 中新智擎科技有限公司 A kind of access control method, system, equipment and storage medium
CN111259803A (en) * 2020-01-16 2020-06-09 广州市十牛信息科技有限公司 Campus visitor management system based on face recognition
CN111859895A (en) * 2020-07-28 2020-10-30 浙江明度智控科技有限公司 Method, system and storage medium for comparing tables in batch documents

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117333982A (en) * 2023-11-09 2024-01-02 山东傲看自动化科技有限公司 Automatic registration access control and automatic release system for stranger dialing
CN117333982B (en) * 2023-11-09 2024-05-24 山东傲看自动化科技有限公司 Automatic registration access control and automatic release system for stranger dialing

Similar Documents

Publication Publication Date Title
CA3061783C (en) Resource transfer method, fund payment method, and electronic device
KR102391887B1 (en) Identity authentication method and device
KR102098441B1 (en) Identity authentication by using human biological characteristics
US9613257B2 (en) Global identification (ID) and age verification system and method
CN111179484B (en) Visitor management method, device, system and storage medium
US20180285541A1 (en) Methods and Systems for Providing Online Verification and Security
CN107911340B (en) Login verification method, device and equipment of application program and storage medium
US20240154961A1 (en) Using common identifiers related to location to link fraud across mobile devices
CN109461233A (en) Caller management method, system, computer equipment and storage medium
CN109447297A (en) Reserve access method, system, computer equipment and storage medium
CN108737398B (en) Processing method and device of trust system, computer equipment and storage medium
CN111541546A (en) Multi-platform login method, device, equipment and readable medium
CN106534102A (en) Device access method and device and electronic device
CN112767583A (en) Access control management method and system
US20140328473A1 (en) Caller authentication system
CN110020514B (en) Account proxy registration method and device
KR102388919B1 (en) User information processing system and method through interworking with authentication device and cloud server
US10210684B2 (en) System and method for identity verification in a detention environment
CN111400684B (en) Electronic license information acquisition method, system, device, equipment and storage medium
US20150140957A1 (en) Prepaid phone card charging
CN115208616A (en) Internet of things safety monitoring method and system based on double engines
CN112291786A (en) Wireless access point control method, computer device, and storage medium
CN111259354A (en) Identity verification method, identity verification device and storage medium
CN111324879A (en) Login state control method, device and equipment
US11989316B1 (en) Systems and methods for blockchain wallet owner verification and access management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210507

RJ01 Rejection of invention patent application after publication