CN113112654B - Access control service host switching method and device - Google Patents

Access control service host switching method and device Download PDF

Info

Publication number
CN113112654B
CN113112654B CN202110343396.XA CN202110343396A CN113112654B CN 113112654 B CN113112654 B CN 113112654B CN 202110343396 A CN202110343396 A CN 202110343396A CN 113112654 B CN113112654 B CN 113112654B
Authority
CN
China
Prior art keywords
host
access control
access
switching
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110343396.XA
Other languages
Chinese (zh)
Other versions
CN113112654A (en
Inventor
聂奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202110343396.XA priority Critical patent/CN113112654B/en
Publication of CN113112654A publication Critical patent/CN113112654A/en
Application granted granted Critical
Publication of CN113112654B publication Critical patent/CN113112654B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/02Access control comprising means for the enrolment of users

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The application provides an access control service host switching method and device, relates to the field of security and protection, and can reduce verification delay of a multi-access control host anti-sneak-back system. The method comprises the following steps: acquiring a switching parameter; under the condition that the switching parameters meet the switching conditions, switching the access control service host of the multi-access-control-host anti-submergence system into the access control host corresponding to the switching parameters in the multi-access-control-host anti-submergence system; the switching condition is used for indicating that the people flow of the access control host corresponding to the switching parameter is larger than a people flow threshold; the access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information of all the access hosts in the multi-access host anti-submergence system and then returning a verification result.

Description

Access control service host switching method and device
Technical Field
The invention relates to the field of security and protection, in particular to a method and a device for switching access control service hosts.
Background
In the existing multi-access control host anti-sneak-back system, one access control host is designated as a service host, and anti-sneak-back information of all people (all anti-sneak-back rules corresponding to the legally verified people) is stored in the service host; and other access control hosts need to transmit the card swiping information to the service host for verification and obtain corresponding verification results, and then determine whether to open the door according to the verification results. However, in a scene with a large change in the flow of people (for example, a tidal stream scene), the multi-entrance-guard-host anti-dive-back system may have a situation that some entrance guard hosts need to verify more card swiping information and need to sequentially send the card swiping information to the service host to verify the card swiping information, which may result in a high delay in the verification process and poor user experience.
Disclosure of Invention
Embodiments of the present application provide a method and an apparatus for switching access control service hosts, which can reduce verification delay of a multi-access control host anti-sneak-back system.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, a method for switching access control service hosts is provided, including: acquiring a switching parameter; under the condition that the switching parameters meet the switching conditions, switching the access control service host of the multi-access-control-host anti-submergence system into the access control host corresponding to the switching parameters in the multi-access-control-host anti-submergence system; the switching condition is used for indicating that the flow of people of the access control host corresponding to the switching parameter is greater than a flow threshold; the access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information of all the access hosts in the multi-access host anti-submergence system and then returning a verification result.
Based on the scheme, the device capable of implementing the switching device of the access control service host can be used for switching the access control service host of the multi-access control host anti-sneak-back system into the access control host of the corresponding switching parameter in the multi-access control host anti-sneak-back system under the condition that the switching parameter accords with the switching condition after the switching parameter related to the actual people flow environment is obtained. Because the switching parameter is related to the actual people flow environment, and the switching condition is used for indicating that the people flow of the access control host corresponding to the switching parameter is larger than the people flow threshold value, the technical scheme provided by the application combines the actual people flow environment to consider the attribution of the access control service host, and the scheme can enable the multi-access-control-host anti-sneak-back system to switch the access control service host into the access control host corresponding to the switching parameter in time in a scene with large people flow change, namely the access control host with large people flow, so that the influence of verification delay caused by the fixation of the access control service host on a user can be reduced.
Optionally, the obtaining of the handover parameter includes: acquiring the current moment; under the condition that the switching parameters accord with the switching conditions, the access control service host of the multi-access control host anti-sneak back system is switched into the access control host corresponding to the switching parameters, and the method comprises the following steps: under the condition that a first access control host corresponding to the fixed time period at the current time in the preset corresponding relation is not an access control service host currently used by the multi-access control host anti-sneak-back system, switching the access control service host of the multi-access control host anti-sneak-back system into the first access control host; the preset corresponding relation is used for indicating the corresponding relation between the access control host and a fixed time period in the multi-access control host anti-submergence system.
Optionally, the obtaining of the handover parameter further includes: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within a preset time length every other preset time length; all switchable access control hosts are at least one of the access control hosts of the multi-access control host anti-submergence system; under the condition that the switching parameter accords with the switching condition, the access control service host of the multi-access control host anti-sneak back system is switched into the access control host of the corresponding switching parameter, and the method comprises the following steps: under the condition that the current time is not within the preset backward range of the ending time of the first preset time length and the first access control host is not the access control service host currently used by the multi-access control host reverse-diving system, switching the access control service host of the multi-access control host reverse-diving system into the first access control host; the preset backward range of the ending time of the first preset duration comprises the ending time of the first preset duration; executing the first step under the condition that the current time is within a preset backward range of the ending time of the first preset duration;
the first step comprises: calculating the pedestrian volume of each switchable entrance guard host in the multi-entrance guard host anti-sneak back system within a first preset time length, and subtracting a first difference value of the pedestrian volume of an entrance guard service host currently used by the multi-entrance guard host anti-sneak back system within the first preset time length; under the condition that a second access control host exists in the multi-access control host anti-sneak-back system, switching an access control service host of the multi-access control host anti-sneak-back system into the second access control host within the next preset time; the second access control host is a switchable access control host which has the largest pedestrian flow within a first preset time length and a first difference value larger than or equal to a preset threshold value in the multi-access control host anti-submergence system; and the access service host of the multi-access-host anti-sneak-back system is switched into the first access control host under the condition that the second access control host does not exist in the multi-access-host anti-sneak-back system and the first access control host is not the currently used access service host of the multi-access-host anti-sneak-back system.
Optionally, after the first step is performed, the method further includes: under the condition that an access control service host of the multi-access-control-host anti-sneak-back system is switched to a second access control host, updating a first preset time length to be a next preset time length of the first preset time length in a preset backward range of the ending time of the next preset time length of the first preset time length, and then executing a first step; the preset backward range of the ending time of the next preset time length comprises the ending time of the next preset time length; or after the access control service host of the multi-access control host anti-sneak back system is switched to the first access control host, updating the first preset time length to the next preset time length of the first preset time length.
Optionally, the first step further comprises: if the second access control host does not exist in the multi-access control host reverse-diving system, the third access control host exists in the multi-access control host reverse-diving system and is not the currently used access control service host of the multi-access control host reverse-diving system, the access control service host of the multi-access control host reverse-diving system is switched to the third access control host within the next preset time; the third access control host is the access control host with the largest pedestrian flow within the first preset time length in the multi-access control host anti-submergence system, and the second difference value of the pedestrian flow of the first access control host within the first preset time length is subtracted from the pedestrian flow of the third access control host within the first preset time length and is larger than or equal to the preset threshold value;
there is not the second entrance guard's host computer in many entrance guard's host computer anti-dive system, and first entrance guard's host computer is not for many entrance guard's host computers anti-dive system under the condition of the entrance guard service host computer of current use, switches into first entrance guard's host computer with the entrance guard service host computer of many entrance guard's host computer anti-dive system, includes: and the second access control host and the third access control host do not exist in the multi-access control host anti-submergence system, and the first access control host is not the access control service host currently used by the multi-access control host anti-submergence system, and the access control service host of the multi-access control host anti-submergence system is switched into the first access control host.
Further optionally, after performing the first step, the method further comprises: under the condition that an access service host of the multi-access-host anti-sneak-back system is switched to a fifth access host, updating the first preset time length to be the next preset time length of the first preset time length in a preset backward range of the ending time of the next preset time length of the first preset time length, and then executing the first step; the fifth access control host is a second access control host or a third access control host; or under the condition that the access control service host of the multi-access control host anti-sneak-back system is switched to the first access control host, updating the first preset time length to the next preset time length of the first preset time length.
Optionally, the obtaining of the handover parameter includes: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within a preset time length every other preset time length; the switchable access control host is at least one of the access control hosts of the multi-access control host anti-submergence system; under the condition that the switching parameter accords with the switching condition, the access control service host of the multi-access control host anti-sneak back system is switched into the access control host of the corresponding switching parameter in the multi-access control host anti-sneak back system, and the access control host comprises: calculating the pedestrian volume of each switchable access control host in the multi-access control host anti-sneak system within the target preset time length within a preset backward range of the ending time of each preset time length, and subtracting a third difference value of the pedestrian volume of the currently used access control service host of the multi-access control host anti-sneak system within the target preset time length; the preset backward range of the ending time of the preset duration comprises the ending time of the preset duration;
under the condition that a fourth access control host exists in the multi-access control host anti-sneak-back system, switching the access control service host of the multi-access control host anti-sneak-back system into the fourth access control host within the next preset time; the fourth access control host is the access control host which has the largest pedestrian flow within the target preset time length and the third difference value of which is greater than or equal to the preset threshold value in the multi-access control host anti-submergence system; the target preset duration is a previous preset duration of a next preset duration.
Optionally, the entrance guard service host computer of system is gone into to multi-gate inhibition host computer anti-dive system and is switched into the entrance guard host computer that corresponds the switching parameter in the system, includes: sending all person anti-dive information corresponding to the multi-access-control-host anti-dive system to the access control host corresponding to the switching parameter; the personnel anti-dive-back information is used for verifying all identity verification information received by the multi-access-control host anti-dive-back system; and sending the characteristic information of the access control host corresponding to the switching parameters to the access control hosts except the access control host corresponding to the switching parameters in the multi-access control host anti-sneak back system.
Optionally, before obtaining the current time, the method further includes: acquiring historical pedestrian volume data of a multi-access-control-host anti-dive system; the historical people flow data comprises people flow data of each access control host in the multi-access control host anti-submergence system in a preset time period before the current time; and determining a preset corresponding relation according to the historical pedestrian flow data.
Further optionally, determining the preset corresponding relationship according to the historical people flow data includes: determining an entrance guard host with the largest pedestrian flow in at least one fixed time period in a plurality of fixed time periods according to historical pedestrian flow data; and establishing a corresponding relation between the entrance guard host with the largest people flow in a fixed time period and the fixed time period to obtain a preset corresponding relation.
In a second aspect, an access control service host switching apparatus is provided and includes an obtaining module and a processing module. The device comprises an acquisition module, a switching module and a switching module, wherein the acquisition module is used for acquiring switching parameters; the processing module is used for switching the access service host of the multi-access-host anti-sneak system into the access host of the corresponding switching parameter in the multi-access-host anti-sneak system under the condition that the switching parameter acquired by the acquisition module meets the switching condition; the switching condition is used for indicating that the people flow of the access control host corresponding to the switching parameter is larger than a people flow threshold; the access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information of all the access hosts in the multi-access host anti-submergence system and then returning a verification result.
In a third aspect, an access service host switching apparatus is provided that includes a processor and a memory for storing processor-executable instructions. The processor is configured to execute the instruction, so as to implement the access control service host switching method provided by the first aspect.
In a fourth aspect, a multi-access-host anti-dive-back system is provided, which includes the access service host switching device provided in the third aspect.
In a fifth aspect, a computer-readable storage medium is provided, where the computer-readable storage medium includes computer-executable instructions, and when the computer-executable instructions are executed on a computer, the computer is caused to execute the access service host switching method according to the first aspect.
In a sixth aspect, a computer program product is provided, which contains instructions that, when run on a computer, cause the computer to execute the access service host switching method as provided in the first aspect.
It can be understood that the solutions of the second aspect to the sixth aspect are all used to execute the method for switching the access control service host provided by the first aspect, and therefore, the beneficial effects that can be achieved by the method for switching the access control service host provided by the first aspect may refer to the beneficial effects in the method for switching the access control service host provided by the first aspect, and are not described herein again.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a multi-gate-inhibition host anti-sneak system according to an embodiment of the present disclosure;
fig. 2 is a first flowchart illustrating a method for switching access service hosts according to an embodiment of the present application;
fig. 3 is a second flowchart illustrating a method for switching access service hosts according to an embodiment of the present application;
fig. 4 is a third schematic flowchart of a method for switching access service hosts according to an embodiment of the present application;
fig. 5 is a fourth flowchart illustrating a method for switching access service hosts according to an embodiment of the present application;
fig. 5A is a schematic flowchart of a method for switching access service hosts according to an embodiment of the present application;
fig. 5B is a sixth flowchart of a method for switching access service hosts according to an embodiment of the present application;
fig. 6 is a first supplementary flowchart of a method for switching access service hosts according to an embodiment of the present application;
fig. 7 is a schematic supplementary flowchart of a method for switching access service hosts according to an embodiment of the present application;
fig. 8 is a third schematic supplementary flowchart of a method for switching access service hosts according to an embodiment of the present application;
fig. 9 is a schematic view of the flow rate of people at each fixed time interval according to the embodiment of the present application;
fig. 10 is a schematic switching diagram of an access service host according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of an access service host switching device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of another access control service host switching device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
It should be noted that in the embodiments of the present application, "of", "corresponding" and "corresponding" may be sometimes used in combination, and it should be noted that the intended meaning is consistent when the difference is not emphasized.
For the convenience of clearly describing the technical solutions of the embodiments of the present application, in the embodiments of the present application, the terms "first", "second", and the like are used for distinguishing the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the terms "first", "second", and the like are not limited in number or execution order.
For ease of understanding, the words in the examples of this application are introduced:
anti-submerge back: the anti-trailing function of the access control system is provided. In some specific entrance guard occasions, the security system requires personnel to enter from some fixed doors after legal verification and then go out after verification from some fixed doors, and the verification records have strict sequence so as to achieve the purpose of preventing tailgating.
Entrance guard's host computer: the entrance guard host computer in this application mainly comprises access control ware, identification device and tool to lock, and in many entrance guard's host computers anti-dive system of returning, all entrance guard's host computers can communicate as the entrance guard's host computer of entrance guard's server host computer with the mode of wired communication or wireless communication and many entrance guard's host computers anti-dive system of returning. After the identity recognition device reads the identity verification information of the user (for example, the identity recognition device can be a card reader, and the card reader reads the access control card information of the user, namely the card swiping information), the identity recognition device sends the identity verification information to the access control controller, the access control controller sends the identity verification information to the access control service host for authentication, and the subsequent access control controller controls the lockset to open the door after receiving the authentication passing information sent by the access control service host.
The entrance guard service host computer in present many entrance guard's host computer anti-dive system is fixed, if the flow of people changes greatly, then can lead to some entrance guard host computers to send the information of punching the card that needs the verification for entrance guard service host computer constantly, and verify itself and exist certain delay, so, can lead to this entrance guard host computer to verify that delay is higher, user experience is not good.
In view of the above problems, an embodiment of the present application provides a method for switching access control service hosts, which can switch access control service hosts according to actual switching parameters, and when the flow rates corresponding to different access control hosts change, the switching parameters also change to some extent, so that the technical scheme provided by the embodiment of the present application can reduce the overall verification delay of a multi-access control anti-sneak system, and improve user experience.
The access service host switching method provided by the embodiment of the application can be applied to a multi-access host anti-dive system. Referring to fig. 1, the system includes: at least one access control host 01 (01-1, 01-2, 01-3 and 01-4) and an access control service host switching device 02. In this embodiment, the switching device of the access control service host may be a device separately set as in fig. 1, or may be a device set in any one of the access control hosts or the access control host itself. When the access control service host switching device 02 is a separately configured device, it may be a server, and the server may be one server, a server cluster formed by a plurality of servers, or a cloud computing service center. When the access service host switching device 02 is a server, it can be connected to a plurality of multi-access host anti-dive systems at the same time to be responsible for switching the access service hosts in the multi-access host anti-dive systems.
Based on the above related expressions of fig. 1, referring to fig. 2, an embodiment of the present application provides a method for switching access service hosts, which is applied to an apparatus for switching access service hosts shown in fig. 1, where the method specifically includes 201 and 202:
201. and acquiring a switching parameter.
For example, in this embodiment of the present application, according to different specific switching requirements for switching of the access service hosts, the switching parameter may be a current time or a pedestrian volume of each access host in the multi-access host anti-sneak back system within a preset time period, where the pedestrian volume is obtained at every preset time period. In the embodiment of the application, the switching parameters need to reflect the people flow conditions corresponding to the anti-dive system with multiple access control hosts at the current moment, so that the switching of the access control service hosts can be determined according to the preset switching rules. Specifically, taking a day as an example, the flow of people corresponding to each access control host in three time periods of morning, noon and afternoon in each day of a working day is mostly the same, so that the current time can be used as a switching parameter to reflect the flow of people corresponding to the multi-access control host anti-dive system at the current time. In addition, because some emergency situations (for example, celebration in holidays and the like) may exist in practice, the flow rate of each access control host in the multi-access control host anti-sneak system will change within a certain period of time, and therefore the flow rate of each access control host in the multi-access control host anti-sneak system within each preset time period can be used as a switching parameter to reflect the flow rate situation corresponding to the multi-access control host anti-sneak system.
Based on the above description, in an implementation manner, referring to fig. 3, the step 201 may specifically be 201A:
201A, obtaining the current time.
The current time may be obtained in real time.
In another implementation manner, referring to fig. 4, the step 201 may specifically be 201B:
and 201B, acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within the preset time length every other preset time length.
And all switchable access control hosts are at least one of the access control hosts of the multi-access control host anti-submergence system. Because there may be that the flow of people of some entrance guard hosts is always not large in practice, and the influence on the verification delay of the whole multi-entrance guard host anti-dive-back system is little, the entrance guard hosts may not be used as the alternative of the entrance guard service host in the technical scheme provided by the application. The specific determination of such an access control host can be derived from human detection. Except for the access control host, the access control host can participate in the switching of the access control service host in the application and is called as a switchable access control host. All switchable hosts may also be all access hosts in a multi-access host anti-dive-back system.
In this application, the flow of people of certain entrance guard's host computer in predetermineeing time length specifically can be for this entrance guard's host computer in this person's quantity that long time was punched the card and is passed through in predetermineeing. Of course, other statistical methods, such as camera statistics, may also be used in practice. For example, the preset time period may be 30min.
For example, taking the multi-access-control-host anti-sneak back system as including four access control hosts A, B, C, D, where the preset duration is T, in practice, the people flow rate of all the access control hosts in the multi-access-control-host anti-sneak back system within the preset duration may be obtained every preset duration as shown in table 1 below.
TABLE 1
Figure BDA0002999933010000091
In still another implementation, referring to fig. 5, the step 201 may specifically be 201C:
and 201C, acquiring the current time, and acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-sneak system within a preset time period every other preset time period.
202. And under the condition that the switching parameters meet the switching conditions, switching the access control service host of the multi-access-control-host anti-submergence system into the access control host corresponding to the switching parameters in the multi-access-control-host anti-submergence system.
The switching condition is used for indicating that the flow of people of the access control host corresponding to the switching parameter is greater than a flow threshold value; the flow rate of people here may be a flow rate of people in a unit time or a flow rate of people in a certain time period (for example, a subsequent fixed time period or a preset time period), which may be determined specifically according to the practice, and the present application is not limited specifically. The pedestrian flow threshold value may be determined according to the actual situation, and the present application is not particularly limited. The access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information (such as card swiping information, face information, pupil information, fingerprint information, palm print information and the like) of all access hosts in the multi-access host anti-sneak-back system and then returning a verification result. The flow rate of the access control host corresponding to the aforementioned switching parameter may be specifically obtained by the switching parameter (at this time, the switching parameter may be the flow rate of the access control host obtained within each preset time period), or may be represented by the flow rates of the access control host at different time periods in the historical flow rate data before the current time of the system (at this time, the switching parameter may be the current time, each time corresponds to one time period in the historical flow rate data, and the access control host corresponding to the switching parameter in each time period may correspondingly have one historical flow rate capable of representing the current flow rate of the access control host corresponding to the switching parameter). Of course, other possible contents are also possible, and the present application is not limited thereto.
Specifically, optionally, after the access control host needing to be switched is determined, the access control service host switching device (for example, the current access control service host, any access control host, or an independent device) may send feature information (for example, a number, a name, an ip address, and the like) of the access control host corresponding to the switching parameter to the access control hosts except the access control host corresponding to the switching parameter in the multi-access control host reverse-drive system, and send all person reverse-drive information corresponding to the multi-access control host reverse-drive system to the access control host corresponding to the switching parameter, thereby completing the switching process; the personnel anti-sneak-back information is used for verifying all the identity verification information received by the multi-access-control host anti-sneak-back system.
In an implementation manner, if the switching device of the access control service host is the current access control service host, the switching device specifically sends the feature information of the access control host corresponding to the switching parameter to the access control hosts except the access control host corresponding to the switching parameter in the multi-access control host reverse-submerging system, and sends the stored anti-submerging information of all the personnel corresponding to the multi-access control host reverse-submerging system to the access control host corresponding to the switching parameter, thereby completing the switching process.
In another implementation manner, in the case that the switching device of the access control service host is any access control host, the switching device of the access control service host specifically sends the feature information of the access control host corresponding to the switching parameter to the access control hosts except the access control host corresponding to the switching parameter in the multi-access control host reverse-submersion system, and then sends an instruction to the currently used access control service host, so that the access control service host sends the stored reverse-submersion information of all the people corresponding to the multi-access control host reverse-submersion system to the access control host corresponding to the switching parameter to be switched, thereby completing the whole switching process.
In another implementation manner, when the switching device of the access control service host is an independent device, the switching device of the access control service host sends the feature information of the access control host corresponding to the switching parameter to the access control hosts except for the access control host corresponding to the switching parameter in the multi-access-host anti-sneak system, and then sends an instruction to the currently used access control service host, so that the access control service host sends the anti-sneak information of all the people corresponding to the multi-access-host anti-sneak system stored in the access control service host to the access control host corresponding to the switching parameter to be switched, thereby completing the whole switching process.
Based on the technical scheme provided by the embodiment, the device capable of implementing the switching device of the access control service host can be used for switching the access control service host of the multi-access control host anti-sneak system into the access control host corresponding to the switching parameter in the multi-access control host anti-sneak system under the condition that the switching parameter meets the switching condition after the switching parameter related to the actual people flow environment is obtained. Because the switching parameter is related to the actual people flow environment, and the switching condition is used for indicating that the people flow of the access control host corresponding to the switching parameter is larger than the people flow threshold value, the technical scheme provided by the application combines the actual people flow environment to consider the attribution of the access control service host, and the scheme can enable the multi-access-control-host anti-sneak-back system to switch the access control service host into the access control host corresponding to the switching parameter in time in a scene with large people flow change, namely the access control host with large people flow, so that the influence of verification delay caused by the fixation of the access control service host on a user can be reduced.
Optionally, as shown in fig. 3, when the step 201 is 201A, the step 202 may specifically be 202A:
202A, under the condition that a first access control host corresponding to a fixed time period at the current time in the preset corresponding relation is not an access control service host currently used by the multi-access control host reverse-diving system, switching the access control service host of the multi-access control host reverse-diving system into the first access control host; the preset corresponding relation is used for indicating the corresponding relation between the access control host and a fixed time period in the multi-access control host anti-sneak system.
The entrance guard host corresponding to the fixed time interval in the preset corresponding relation indicates that the flow of people of the entrance guard host in the fixed time interval is larger than the flow threshold value.
At this moment, the switching condition is that the flow of people of the first access control host in the fixed time period at the current moment is greater than the flow threshold value in the fixed time period. The access control host corresponding to a certain fixed time period in the preset corresponding relationship may be one of the access control hosts with the pedestrian flow greater than the pedestrian flow threshold value in the fixed time period in the historical pedestrian flow data, for example, the largest access control host among the access control hosts with the pedestrian flow greater than the pedestrian flow threshold value in the fixed time period in the historical pedestrian flow data.
For example, the fixed period may include: 6.
In this way, in most of the time, the traffic of people corresponding to each access control host in each fixed time interval is in accordance with a certain rule (for example, the traffic of people of a certain access control host in 6.
Further optionally, in order to smoothly obtain the preset corresponding relationship, as shown in fig. 6, before implementation, the embodiment of the present application may further include S1 and S2:
s1, acquiring historical pedestrian flow data of a multi-access-control-host anti-sneak system; the historical people flow data comprises people flow data of each access control host in the multi-access control host anti-submergence system in a preset time period before the current time.
For example, the preset time period may be the traffic data of each access control host in the multi-access control host anti-dive system within a certain month.
And S2, determining a preset corresponding relation according to historical people flow data.
Specifically, S2 may include: determining the entrance guard host with the maximum pedestrian flow in at least one fixed time period in a plurality of fixed time periods according to the historical pedestrian flow data; and establishing a corresponding relation between the entrance guard host with the largest people flow in a fixed time period and the fixed time period so as to obtain a preset corresponding relation.
Therefore, the preset corresponding relation can be obtained before the technical scheme provided by the embodiment of the application is implemented, and the access control service host of the multi-access-control-host anti-sneak-back system can be conveniently adjusted according to the preset corresponding relation.
In an implementation manner, referring to fig. 7 in conjunction with fig. 6, S2 may specifically include S21A and S22A:
S21A, determining the entrance guard host with the largest people flow in each fixed time period in a plurality of fixed time periods according to historical people flow data.
Specifically, the pedestrian volume within a certain fixed time period may be an average value of all the pedestrian volumes within the fixed time period counted in the historical pedestrian volume data. Of course, other specific implementations are also possible in practice, and the present application is not limited to this.
S22A, establishing a corresponding relation between the entrance guard host with the largest people flow in a fixed time period and the fixed time period to obtain a preset corresponding relation.
Therefore, when the access control service host of the multi-access-control-host anti-sneak-back system is switched according to the current time and the preset corresponding relation, the switched access control service host can face the most people flow under the normal condition, and the anti-sneak-back information of each person is stored in the access control service host, so that verification information does not need to be sent to other equipment and a verification result does not need to wait, the verification delay of the access control service host can be greatly reduced, the verification delay of the multi-access-control-host anti-sneak-back system is integrally reduced, and the user experience is improved.
In another implementation manner, because it may be actually obtained from analysis of historical people flow data, the people flow rates of all the access control hosts in a certain fixed time period are not consistent but are small, and at this time, no matter which access control host is set as the access control host corresponding to the fixed time period, so as to reduce the number of times of switching the access control service hosts and reduce signaling overhead, as shown in fig. 8 in combination with fig. 6, S2 may specifically include S21B and S22B:
and S21B, determining the target access control host with the pedestrian volume greater than the set threshold value in each fixed time period in a plurality of fixed time periods according to the historical pedestrian volume data.
And S22B, if the target access control host exists in the first fixed time period, establishing a corresponding relation between the access control host with the largest people flow in the target access control hosts corresponding to the first fixed time period and the first fixed time period.
Specifically, if there are two entrance guard hosts with the largest people flow in the target entrance guard hosts, one of the two entrance guard hosts is selected.
For example, with fixed time periods as morning (6-00.
Therefore, because some fixed time periods do not have corresponding access control hosts, the access control service hosts do not need to be switched once near the end time for the fixed time periods, and the overhead of communication signaling is reduced.
Further optionally, in addition to the method for determining the preset corresponding relationship provided in the technical solution corresponding to S21-S22, in practice, referring to fig. 8, the method may further include S23B:
S23B, if the target access control host does not exist in the first fixed time period, establishing a corresponding relation between the access control host corresponding to the second fixed time period and the first fixed time period; the second fixed time interval is a fixed time interval in which the target access control host exists, and the second fixed time interval is a fixed time interval with the minimum time difference with the first fixed time interval in all the fixed time intervals in which the target access control host exists.
Specifically, assuming that there are two second fixed periods (one before and one after the first fixed period), either one is selected.
For example, taking fixed time intervals as morning (6-00.
It should be noted that, if the preset corresponding relationship is obtained by the technical scheme corresponding to S21B-S23B, one access control host in the preset corresponding relationship may correspond to multiple fixed time periods, and it may also be considered that the access control host corresponds to a large fixed time period, which may be the largest one of the access control hosts whose pedestrian flow is greater than the pedestrian flow threshold in the large fixed time period. Therefore, the access control service host does not need to be switched once at the end time of each fixed time interval, and therefore the overhead of communication signaling is reduced.
Optionally, as shown in fig. 4, when step 201 is 201B, step 202 may specifically include steps 2021B to 2022B:
2021B, calculating a pedestrian volume of each switchable access control host in the multi-access control host anti-sneak back system within the target preset time length within a preset backward range of the ending time of each preset time length, and subtracting a third difference value of the pedestrian volume of the currently used access control service host of the multi-access control host anti-sneak back system within the target preset time length.
The preset backward range of the end time of the preset time length comprises the end time of the preset time length. For example, the preset backward range may only include the end time of the preset time duration, or may further include some times after the end time of the preset time duration, which is not specifically limited in the present application. Certainly, in order to ensure that the finally selected door access host to be switched is more accurate, the preset backward range needs to be smaller than the preset time, for example, when the preset time is 10min, the preset backward range of the ending time of the preset time may be 10s including the ending time of the preset time. The target preset time length is a preset time length with the time of execution of 2021B as the end time.
Optionally, in practice, since there may exist a case where the flow of the currently used access control service host of the multi-access-host anti-sneak-back system within the target preset time period is the largest among all the access control hosts, and at this time, switching of the access control service hosts is not required, before the third difference is calculated in the step 2021B, it is further determined whether the flow of the currently used access control service host within the target preset time period is the largest among all the access control hosts, if not, the step 2021B is normally executed, and if so, the access control service host of the multi-access-host anti-sneak-back system is not switched.
2022B, under the condition that the fourth access control host exists in the multi-access control host anti-sneak back system, switching the access control service host of the multi-access control host anti-sneak back system to the fourth access control host within the next preset time.
The fourth access control host is the access control host which has the largest pedestrian flow within the target preset time length in the multi-access control host anti-submergence system and the third difference value of which is greater than or equal to the preset threshold value; the target preset duration is a previous preset duration of a next preset duration. In the embodiment of the present application, the significance of the preset threshold is that if only whether the flow rate of the access host is the maximum within the target preset duration is considered, although the flow rate of the access host is the maximum, there is a certain access host that is not large enough (for example, the flow rates of four access hosts A, B, C and D, A, B and C are all 40, b is the currently used access service host, and D is 41), and it is not necessary to switch. Only when the pedestrian volume of a certain entrance guard host is the largest and is larger than that of the currently used entrance guard service host (the difference value is larger than a preset threshold), certain significance is achieved in switching. The preset threshold in the subsequent embodiments is the same.
In an implementation manner, the preset threshold may be a percentage of the flow of people in the target preset duration of the currently used access control service host of the multi-access-control-host anti-dive system. The percentage may be 100% or any other feasible value.
In another implementation manner, the preset threshold may also be a specific value, for example, the people flow rate of the currently used access control service host within the target preset time period, a specific third difference value is compared with the preset threshold, the third difference value may be divided by the preset threshold, and if the obtained value is greater than 100%, the third difference value is considered to be greater than or equal to the preset threshold, otherwise, the third difference value is considered to be smaller than the preset threshold. Of course, the preset threshold may be any other value in practice, and the present application is not limited to this specifically.
It should be noted that, when the technical solutions corresponding to 2021B-2022B are executed at the beginning, one access control host may be randomly selected as the access control service host. In addition, in this scheme, the switching condition may be that the human flow of the fourth access control host corresponding to the switching parameter within the target preset time period is greater than the human flow threshold.
For example, a schematic diagram that a multi-access-control-host anti-sneak system includes four access control hosts A, B, C and D, where a is currently used as an access control service host, and when the flow of people of D increases after a preset time, the access control service host needs to be switched to D may be shown in fig. 10.
Therefore, the entrance guard service host can be switched timely according to the change situation of the flow of people corresponding to different entrance guard hosts in the actual multi-entrance guard host anti-sneak-back system, the flow of people corresponding to the entrance guard service host is not the least (preferably the most), the purpose of reducing the verification delay of the multi-entrance guard host anti-sneak-back system is achieved, and the user experience is improved.
Optionally, as shown in fig. 5, when the step 201 is 201C, the step 202 may specifically include steps 2021C and 2022C:
2021C, under the condition that the current time is not within the preset backward range of the end time of the first preset duration and the first access control host is not the access control service host currently used by the multi-access control host anti-sneak back system, switching the access control service host of the multi-access control host anti-sneak back system to the first access control host.
The preset backward range of the ending time of the first preset time length comprises the ending time of the first preset time length; for example, the preset backward range of the end time of the first preset duration may include only the end time of the first preset duration, or may further include some time after the end time of the first preset duration. The preset backward range of the ending time of the first preset duration is similar to the related expression of the preset backward range of the ending time of the preset duration, and details are not repeated here.
2022C, in the case where the current time is within the preset backward range of the end time of the first preset duration, the first step is executed.
Wherein the first step specifically comprises X1-X3:
x1, calculating the pedestrian volume of each switchable entrance guard host in the multi-entrance guard host anti-sneak back system within a first preset time length, and subtracting a first difference value of the pedestrian volume of the currently used entrance guard service host of the multi-entrance guard host anti-sneak back system within the first preset time length.
Optionally, in practice, the people flow of the currently used access control service host of the multi-access control host anti-sneak back system within the first preset time period may be the largest among all the access control hosts, and at this time, it is not necessary to switch the access control service hosts according to the people flow within the first preset time period, so before calculating the first difference in the step X1, it is further determined whether the people flow of the currently used access control service host within the first preset time period is the largest among all the access control hosts, if not, the step X1 is normally executed, and if yes, the access control service host of the multi-access control host anti-sneak back system is switched to the host in the preset corresponding relationship, which corresponds to the current fixed time period.
X2, under the condition that a second access control host exists in the multi-access control host anti-submergence-rollback system, switching an access control service host of the multi-access control host anti-submergence-rollback system into the second access control host within the next preset time length; the second access control host is the access control host with the largest pedestrian flow in the multi-access control host anti-submergence system within the first preset time length and the first difference value larger than or equal to the preset threshold value.
For the related expression of the preset threshold, reference may be made to the foregoing description, and details are not repeated here.
And X3, under the condition that the second access control host does not exist in the multi-access control host reverse-submerging system and the first access control host is not the currently used access control service host of the multi-access control host reverse-submerging system, the access control service host of the multi-access control host reverse-submerging system is switched into the first access control host.
Therefore, the access control service host of the current multi-access-control-host anti-submergence system can be determined according to different moments, the access control service host of the current multi-access-control-host anti-submergence system can be determined according to the change of the flow of people corresponding to different access control hosts, namely, the switching mode of the access control service host in an emergency is ensured while the switching mode of the normal access control service host is ensured (switching according to moments), and because a plurality of factors are considered, the scheme further ensures the reduction of the verification delay of the multi-access-control-host anti-submergence system, and further improves the user experience.
Further optionally, in the case that the first step includes X1-X3, as shown in fig. 5A, in order to cycle the switching process of the entire access control service host, after the first step, that is, after the step 2022C, is performed, the method further includes 2023C or 2024C:
2023C, under the condition that the access control service host of the multi-access control host anti-sneak back system is switched to the second access control host, within the preset backward range of the ending time of the next preset time of the first preset time, updating the first preset time to the next preset time of the first preset time, and then executing the first step.
The preset backward range of the ending time of the next preset time length comprises the ending time of the next preset time length; for example, the preset backward range of the end time of the next preset duration may include only the end time of the next preset duration, or may further include some times after the end time of the next preset duration.
Based on the step 2023C, after the access control service host is switched to the second access control host, it may be determined whether there is a new second access control host corresponding to the next preset time length as the first preset time length within a preset backward range of the end time of the next preset time length, if there is, it is necessary to determine whether to switch to the new second access control host again, and if not, it is necessary to determine whether to switch back to the new first access control host corresponding to the end time of the next preset time length, thereby completing one cycle.
It should be noted that, in the case that the access control service host switching device is the current access control service host, the specific flow of the access control service host switching method is as follows: after the current access control service host executes the first step, under the condition that the access control service host of the multi-access control host reverse-submergence system is switched to a second access control host, the second access control host (namely the switched access control service host) executes the first step within a preset backward range of the ending time of the next preset time of the first preset time, and at the moment, the first preset time in the first step is updated to the next preset time of the first preset time.
2024C, after the access control service host of the multi-access control host anti-sneak back system is switched to the first access control host, updating the first preset time length to a next preset time length of the first preset time length.
Based on the step 2024C, after the access control service host is switched to the first access control host, because the first access control host is determined according to the current time, the next preset time is directly used as a new first preset time, and then the whole switching process is executed from the beginning, so that the cycle can be completed.
Therefore, the whole switching process of the access service host can normally run in the whole life cycle of the multi-access host anti-dive return system.
In the above technical solution corresponding to 2021C-2024C, the switching condition may be that a passenger flow rate of the second gate inhibition host corresponding to the switching parameter within a first preset time period is greater than a passenger flow threshold; or the people flow of the first access control host corresponding to the switching parameter in the fixed time period at the current moment is greater than the people flow threshold.
Further optionally, X3 in the first step specifically includes X5, and the first step further includes X4 parallel to the X5 step:
and X4, a second access control host does not exist in the multi-access control host reverse-diving system, a third access control host exists in the multi-access control host reverse-diving system, and the third access control host does not serve as the access control service host of the multi-access control host reverse-diving system used currently, and the access control service host of the multi-access control host reverse-diving system is switched into the third access control host within the next preset time.
The third entrance guard host is the entrance guard host with the largest flow of people in the multi-entrance guard host anti-submergence system within the first preset time length, and the second difference value of the flow of people of the first entrance guard host within the first preset time length subtracted by the flow of people of the third entrance guard host within the first preset time length is larger than or equal to the preset threshold value.
For example, taking four access control hosts A, B, C and D in the multi-access control anti-sneak system, taking a as an access control service host and B as an access control host corresponding to a fixed time period at the end time of a first preset time length at present as an example, if the first person flow of C is maximum and a second difference value between the first person flow of C and the first person flow of B is greater than or equal to a preset threshold value, then taking C as a third access control host; and if the first person flow of the A is maximum and the second difference value between the first person flow of the A and the first person flow of the B is greater than or equal to the preset threshold value, the A is still used as a third access control host at the moment.
And X5, under the condition that the second access control host and the third access control host do not exist in the multi-access-control-host anti-sneak-back system and the first access control host is not the currently used access control service host of the multi-access-control-host anti-sneak-back system, the access control service host of the multi-access-control-host anti-sneak-back system is switched into the first access control host. Therefore, compared with the 2021C and the technical schemes corresponding to 2022C and 2023C including X1-X3, the 2021C and the technical schemes corresponding to 2022C and 2023C including X1, X2, X4 and X5 can reduce the switching times of the access service hosts, and because the latter technical scheme determines that the second access host does not exist, it is directly determined whether the third access host is available to be switched to the access service host, rather than directly returning to the mode of determining the access service host all the time, the influence of the change of the human flow within a preset time on the multi-access host reverse-submergence system can be avoided, the currently required access service host is determined more accurately, the verification delay of the multi-access host reverse-submergence system can be further reduced, and the user experience degree can be further improved.
Further optionally, in a case where the first step includes X1, X2, X4, and X5, referring to fig. 5B, in order to cycle the switching process of the entire access control service host, after the first step, i.e., the step 2022C, is performed, the method further includes 2025C or 2024C:
2025C, under the condition that the access service host of the multi-access-host anti-sneak-back system is switched to a fifth access host, within a preset backward range of the ending time of the next preset duration of the first preset duration, updating the first preset duration to the next preset duration of the first preset duration, and then executing the first step; the fifth access control host is a second access control host or a third access control host.
Based on the step 2025C, after the access service host is switched to the second access host or the third access host, it may be determined whether there is a new second access host or a new third access host corresponding to the next preset time length as the first preset time length within a preset backward range of the end time of the next preset time length, if so, it is determined whether to switch to the new second access host or the new third access host again, and if not, it is determined whether to switch back to the new first access host corresponding to the end time of the next preset time length, thereby completing one cycle. In the case that the access service host switching device is the current access service host, the specific implementation subject of the steps of the access service host switching method may refer to the description in 2023C, which is not described herein again.
2024C, under the condition that the access service host of the multi-access-host anti-sneak-back system is switched to the first access host, updating the first preset duration to a next preset duration of the first preset duration.
Based on the step 2024C, after the access control service host is switched to the first access control host, because the first access control host is determined according to the current time, the next preset time is directly used as a new first preset time, and then the whole switching process is executed from the beginning, so that the cycle can be completed.
Therefore, the whole switching process of the access service host can normally run in the whole life cycle of the multi-access host anti-dive return system.
In the above technical scheme corresponding to 2021C-2022C-2024C or 2025C, the switching condition may be that a pedestrian volume of the second access control host corresponding to the switching parameter in a first preset time period is greater than a pedestrian volume threshold, or a pedestrian volume of the third access control host corresponding to the switching parameter in the first preset time period is greater than the pedestrian volume threshold, or a pedestrian volume of the first access control host corresponding to the switching parameter in a fixed time period at the current time is greater than the pedestrian volume threshold.
It should be noted that the technical solution corresponding to 2021C-2022C-2023C or 2024C and the technical solution corresponding to 2021C-2022C-2024C or 2025C may be further expansion of the technical solution corresponding to 202A, or may be further expansion of the technical solutions corresponding to 2021B and 2022B, where similar terms have the same concept in the same scenario, and the similar terms are distinguished in this application (for example, a third difference value and a first difference value, a second gate inhibition host and a fourth gate inhibition host, etc.).
In addition, it should be noted that, in the technical solution provided in the present application, except for the case where the access service host needs to be switched, the access service host is not switched.
In order to realize the functions corresponding to the method in the scheme, the access control service host switching device comprises hardware structures and/or software modules corresponding to the execution of the functions, and the hardware structures and/or software modules corresponding to the execution of the functions can form a server. Those of skill in the art will readily appreciate that the present disclosure can be implemented in hardware or a combination of hardware and computer software for the various exemplary method steps described in connection with the embodiments disclosed herein. Whether a function is performed in hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
According to the embodiment of the method, the entrance guard service host switching device can be divided into the functional modules according to the method example, and two or more functions can be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation. Fig. 11 shows a schematic structure diagram of a possible application of the access control service host switching device 02 shown in fig. 1 in the case of dividing each function module according to each function, where the access control service host switching device 02 includes: an acquisition module 31 and a processing module 32.
Specifically, the obtaining module 31 is configured to obtain a handover parameter; the processing module 32 is configured to switch the access service host of the multi-access-host anti-sneak system to an access host of a corresponding switching parameter in the multi-access-host anti-sneak system when the switching parameter acquired by the acquiring module 31 meets a switching condition; the switching condition is used for indicating that the flow of people of the access control host corresponding to the switching parameter is greater than a flow threshold; the access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information of all the access hosts in the multi-access host anti-submergence system and then returning a verification result.
Optionally, the obtaining module 31 is specifically configured to obtain the current time;
the processing module 32 is specifically configured to: under the condition that the first access control host corresponding to the fixed time period at the current time and acquired by the acquisition module 31 in the preset corresponding relationship is not the access control service host currently used by the multi-access control host reverse-diving system, switching the access control service host of the multi-access control host reverse-diving system into the first access control host; the preset corresponding relation is used for indicating the corresponding relation between the access control host and a fixed time period in the multi-access control host anti-submergence system.
Optionally, the obtaining module 31 is further configured to: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within a preset time length every other preset time length; all switchable access control hosts are at least one of the access control hosts of the multi-access control host anti-sneak-back system;
the processing module 32 is specifically configured to: under the condition that the current time acquired by the acquisition module 31 is not within the preset backward range of the end time of the first preset duration and the first access control host is not the access control service host currently used by the multi-access control host anti-sneak-back system, switching the access control service host of the multi-access control host anti-sneak-back system to the first access control host; the preset backward range of the ending time of the first preset duration comprises the ending time of the first preset duration; executing the first step under the condition that the current time acquired by the acquisition module 31 is within the preset backward range of the ending time of the first preset duration;
the first step comprises: calculating the pedestrian volume of each switchable entrance guard host in the multi-entrance guard host reverse-diving system obtained by the obtaining module 31 within a first preset time length, and subtracting a first difference value of the pedestrian volume of the currently used entrance guard service host of the multi-entrance guard host reverse-diving system obtained by the obtaining module 31 within the first preset time length; under the condition that a second access control host exists in the multi-access control host anti-sneak-back system, switching an access control service host of the multi-access control host anti-sneak-back system into the second access control host within the next preset time; the second access control host is a switchable access control host which has the largest pedestrian flow within a first preset time length and a first difference value larger than or equal to a preset threshold value in the multi-access control host anti-sneak-back system; and the access service host of the multi-access-host anti-sneak-back system is switched into the first access control host under the condition that the second access control host does not exist in the multi-access-host anti-sneak-back system and the first access control host is not the currently used access service host of the multi-access-host anti-sneak-back system.
Optionally, the processing module 32 is further configured to, after the first step is executed, execute the first step after the first preset time length is updated to the next preset time length of the first preset time length within a preset backward range of the ending time of the next preset time length of the first preset time length when the access control service host of the multi-access-control-host anti-sneak-back system is switched to the second access control host; the preset backward range of the ending time of the next preset time length comprises the ending time of the next preset time length; or after the access control service host of the multi-access control host anti-sneak back system is switched to the first access control host, updating the first preset time length to the next preset time length of the first preset time length.
Optionally, the first step further comprises: if the second access control host does not exist in the multi-access control host anti-sneak-back system, the third access control host exists in the multi-access control host anti-sneak-back system, and the third access control host is not the currently used access control service host of the multi-access control host anti-sneak-back system, the access control service host of the multi-access control host anti-sneak-back system is switched to the third access control host within the next preset time period; the third access control host is the access control host with the largest pedestrian flow within the first preset time length in the multi-access control host anti-submergence system, and the second difference value of the pedestrian flow of the first access control host within the first preset time length is subtracted from the pedestrian flow of the third access control host within the first preset time length and is larger than or equal to the preset threshold value; there is not the second entrance guard's host computer in many entrance guard's host computer anti-dive system, and first entrance guard's host computer is not for many entrance guard's host computers anti-dive system under the condition of the entrance guard service host computer of current use, switches into first entrance guard's host computer with the entrance guard service host computer of many entrance guard's host computer anti-dive system, includes: and under the condition that the second access control host and the third access control host do not exist in the multi-access-control-host anti-sneak-back system and the first access control host is not the currently used access control service host of the multi-access-control-host anti-sneak-back system, the access control service host of the multi-access-control-host anti-sneak-back system is switched into the first access control host.
Optionally, the processing module 32 is further configured to, after the first step is executed, execute the first step after updating the first preset time duration to the next preset time duration of the first preset time duration within a preset backward range of the ending time of the next preset time duration of the first preset time duration under the condition that the access control service host of the multi-access control host anti-sneak back system is switched to the fifth access control host; the fifth access control host is a second access control host or a third access control host; or under the condition that the access control service host of the multi-access control host anti-sneak-back system is switched to the first access control host, updating the first preset time length to the next preset time length of the first preset time length;
optionally, the obtaining module 31 is specifically configured to: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within a preset time length every other preset time length;
under the condition that the obtaining module 31 is specifically configured to obtain the pedestrian volume of all the access control hosts in the multi-access control host anti-sneak back system within the preset time length every other preset time length, the processing module 32 is specifically configured to: calculating the pedestrian volume of each switchable access control host in the multi-access-control-host anti-sneak back system within the target preset time length within a preset backward range of the ending time of each preset time length, and subtracting a third difference value of the pedestrian volume of the currently used access control service host of the multi-access-control-host anti-sneak back system within the target preset time length; the preset backward range of the end time of the preset time length comprises the end time of the preset time length; under the condition that a fourth access control host exists in the multi-access control host anti-sneak-back system, switching the access control service host of the multi-access control host anti-sneak-back system into the fourth access control host within the next preset time; the fourth access control host is the access control host which has the largest pedestrian volume within the target preset time length and has a third difference value larger than or equal to a preset threshold value in the multi-access control host anti-sneak system; the target preset duration is a previous preset duration of a next preset duration.
Optionally, the processing module 32 is specifically configured to, when switching the access service host of the multi-access-host anti-sneak system to an access host corresponding to the switching parameter in the multi-access-host anti-sneak system: sending all person anti-sneak information corresponding to the multi-access control host anti-sneak system to the access control host corresponding to the switching parameter; the personnel anti-dive-back information is used for verifying all identity verification information received by the multi-access-control host anti-dive-back system; and sending the characteristic information of the access control host corresponding to the switching parameters to the access control hosts except the access control host corresponding to the switching parameters in the multi-access control host anti-sneak back system.
Optionally, the obtaining module 31 is further configured to, before obtaining the current time: acquiring historical pedestrian flow data of the anti-sneak system of the multiple access control hosts; the historical people flow data comprises people flow data of each access control host in the multi-access control host anti-submergence system in a preset time period before the current time; and determining a preset corresponding relation according to the historical pedestrian flow data.
Optionally, the obtaining module 31 is specifically configured to, when determining the preset corresponding relationship according to the historical people flow data: determining an entrance guard host with the largest pedestrian flow in at least one fixed time period in a plurality of fixed time periods according to historical pedestrian flow data; and establishing a corresponding relation between the entrance guard host with the largest people flow in a fixed time period and the fixed time period so as to obtain a preset corresponding relation.
With regard to the access service host switching device in the above embodiment, the specific manner and the advantageous effects of the operations performed by the modules have been described in detail in the foregoing embodiment of the access service host switching method, and will not be described in detail herein. In addition, the access control service host switching device shown in fig. 10 is only an example, and may include the above-mentioned modules, or may include more or less modules, as long as there are modules capable of implementing the functions of the above-mentioned modules, and the present application does not specifically limit this.
Under the condition of adopting integrated module, entrance guard's service host computer auto-change over device includes: storage unit, processing unit. The processing unit is used for controlling and managing, for example, the processing unit is used for supporting the access control service host switching device to execute the steps executed by the acquiring module 31 and the processing module 32 in the foregoing embodiments; and a storage unit for storing the program code and data of the decoding module.
The processing unit is used as a processor, and the storage unit is used as a memory. Referring to fig. 12, an embodiment of the present application further provides another access control service host switching device, which includes a memory 41, a processor 42, a bus 43, and a communication interface 44; the memory 41 is used for storing computer execution instructions, and the processor 42 is connected with the memory 41 through a bus 43; when the access service host switching device is running, the processor 42 executes the computer execution instructions stored in the memory 41, so that the access service host switching device executes the access service host switching method provided in the above embodiment.
In particular implementations, processor 42 (42-1 and 42-2) may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 12, as one embodiment. And as an example, the flow alerting device may include a plurality of processors 42, such as processor 42-1 and processor 42-2 shown in fig. 12. Each of the processors 42 may be a Single-core processor (Single-CPU) or a Multi-core processor (Multi-CPU). Processor 42 may refer herein to one or more devices, circuits, and/or processing cores that process data (e.g., computer program instructions).
The Memory 41 may be a Read-Only Memory 41 (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable Read-Only Memory (EEPROM), a compact disc Read-Only Memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), a magnetic disc storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 41 may be self-contained and coupled to the processor 42 via a bus 43. The memory 41 may also be integrated with the processor 42.
In a specific implementation, the memory 41 is used for storing data in the present application and computer-executable instructions corresponding to software programs for executing the present application. The processor 42 may operate or execute software programs stored in the memory 41 and invoke data stored in the memory 41 to perform various functions of the flow alerting device.
The communication interface 44 is any device, such as a transceiver, for communicating with other devices or communication networks, such as a control system, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), and the like. The communication interface 44 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
The bus 43 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an extended ISA (enhanced industry standard architecture) bus, or the like. The bus 43 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 12, but this is not intended to represent only one bus or type of bus.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium includes a computer execution instruction, and when the computer execution instruction runs on a computer, the computer is enabled to execute the access control service host switching method provided in the foregoing embodiment.
The embodiment of the present application further provides a computer program product including instructions, which when run on a computer, causes the computer to execute the method for switching an access service host, which is provided by the foregoing embodiment and applied to the apparatus for switching an access service host.
Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in this invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer-readable storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, a module or a unit may be divided into only one logic function, and another division may be implemented in practice. For example, various elements or components may be combined or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit. The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are also within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (11)

1. A method for switching access service hosts is characterized by comprising the following steps:
acquiring a switching parameter;
under the condition that the switching parameters meet the switching conditions, switching the access control service host of the multi-access control host anti-sneak system into the access control host corresponding to the switching parameters in the multi-access control host anti-sneak system; the switching condition is used for indicating that the flow of people of the access control host corresponding to the switching parameter is greater than a flow threshold value; the access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information of all the access hosts in the multi-access host anti-submergence system and then returning a verification result.
2. The access control service host switching method according to claim 1, wherein the obtaining of the switching parameter comprises: acquiring the current moment;
the switching of the access control service host of the multi-access control host anti-sneak back system to the access control host corresponding to the switching parameter under the condition that the switching parameter meets the switching condition comprises the following steps:
under the condition that a first access control host corresponding to the fixed time period of the current time in the preset corresponding relation is not an access control service host currently used by the multi-access control host anti-submergence system, switching the access control service host of the multi-access control host anti-submergence system into the first access control host; the preset corresponding relation is used for indicating the corresponding relation between the access control host and a fixed time period in the multi-access control host anti-sneak system.
3. The access control service host switching method according to claim 2,
the acquiring of the handover parameter further comprises: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-sneak system within a preset time length every other preset time length; the switchable access control host is at least one of the access control hosts of the multi-access control host anti-submergence system;
the switching of the access control service host of the multi-access control host anti-sneak back system to the access control host corresponding to the switching parameter under the condition that the switching parameter meets the switching condition comprises the following steps:
switching the access control service host of the multi-access-control-host anti-dive-back system to the first access control host under the condition that the current time is not within a preset backward range of the ending time of a first preset time length and the first access control host is not the access control service host currently used by the multi-access-control-host anti-dive-back system; the preset backward range of the ending time of the first preset time length comprises the ending time of the first preset time length;
executing the first step under the condition that the current time is within a preset backward range of the ending time of a first preset duration;
the first step comprises:
calculating the pedestrian volume of each switchable access control host in the multi-access-control-host anti-sneak-back system within the first preset time length, and subtracting a first difference value of the pedestrian volume of the currently used access control service host of the multi-access-control-host anti-sneak-back system within the first preset time length;
under the condition that a second access control host exists in the multi-access control host anti-submergence-reflexion system, switching an access control service host of the multi-access control host anti-submergence-reflexion system into the second access control host within the next preset time length; the second access control host is a switchable access control host which has the largest pedestrian flow within the first preset time length and a first difference value larger than or equal to a preset threshold value in the multi-access control host anti-submergence system;
the multi-entrance guard host computer anti-dive system does not have a second entrance guard host computer, just first entrance guard host computer does not do the multi-entrance guard host computer anti-dive system will under the condition of the entrance guard service host computer of current use the entrance guard service host computer of multi-entrance guard host computer anti-dive system switches into first entrance guard host computer.
4. The method for switching the access control service hosts according to claim 3, further comprising the following steps after the first step is executed:
under the condition that an access service host of the multi-access-host anti-sneak-back system is switched to the second access host, updating the first preset time length to be the next preset time length of the first preset time length within a preset backward range of the ending time of the next preset time length of the first preset time length, and then executing the first step; the preset backward range of the ending time of the next preset time length comprises the ending time of the next preset time length; alternatively, the first and second electrodes may be,
and after the access control service host of the multi-access control host anti-sneak back system is switched to the first access control host, updating the first preset time length to the next preset time length of the first preset time length.
5. The access control service host switching method according to claim 3, wherein the first step further comprises:
if a second access control host does not exist in the multi-access control host reverse-drive system, a third access control host exists in the multi-access control host reverse-drive system, and the third access control host is not an access control service host currently used by the multi-access control host reverse-drive system, switching the access control service host of the multi-access control host reverse-drive system to the third access control host within the next preset time; the third entrance guard host is the entrance guard host with the largest pedestrian flow within the first preset time length in the multi-entrance guard host anti-sneak system, and a second difference value of the pedestrian flow of the first entrance guard host within the first preset time length subtracted by the pedestrian flow of the third entrance guard host within the first preset time length is larger than or equal to the preset threshold;
the multi-entrance-guard-host anti-submergence system does not have a second entrance guard host, and the first entrance guard host does not do the multi-entrance-guard-host anti-submergence system will be switched to the entrance guard service host of the multi-entrance-guard-host anti-submergence system under the condition of the currently used entrance guard service host, and the system comprises the following components:
the multi-entrance-guard-host anti-sneak-back system is not provided with a second entrance guard host and a third entrance guard host, and the first entrance guard host does not serve as the entrance guard service host of the multi-entrance-guard-host anti-sneak-back system used currently, and the entrance guard service host of the multi-entrance-guard-host anti-sneak-back system is switched to the first entrance guard host.
6. The access control service host switching method according to claim 1, wherein the obtaining of the switching parameter comprises: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within a preset time length every other preset time length; the switchable access control host is at least one of the access control hosts of the multi-access control host anti-submergence system;
under the condition that the switching parameter accords with the switching condition, the access control service host of the multi-access-control-host anti-submergence system is switched into the access control host corresponding to the switching parameter in the multi-access-control-host anti-submergence system comprises the following steps:
calculating the pedestrian volume of each switchable access control host in the multi-access control host anti-sneak system within the target preset time length within a preset backward range of the ending time of each preset time length, and subtracting a third difference value of the pedestrian volume of the currently used access control service host of the multi-access control host anti-sneak system within the target preset time length; the preset backward range of the ending time of the preset duration comprises the ending time of the preset duration;
under the condition that a fourth entrance guard host exists in the multi-entrance guard host anti-submergence return system, switching an entrance guard service host of the multi-entrance guard host anti-submergence return system into the fourth entrance guard host within the next preset time length; the fourth access control host is the access control host which has the largest pedestrian flow within the target preset time length in the multi-access control host anti-submergence system and a third difference value which is larger than or equal to a preset threshold value; the target preset time length is a previous preset time length of the next preset time length.
7. The method for switching the access control service hosts according to claim 1, wherein switching the access control service hosts of the multi-access control host anti-submergence system to the access control hosts corresponding to the switching parameters in the multi-access control host anti-submergence system comprises:
sending all person anti-dive information corresponding to the multi-access-control-host anti-dive system to the access control host corresponding to the switching parameter; the personnel anti-dive-back information is used for verifying all identity verification information received by the multi-access-control-host anti-dive-back system;
and sending the characteristic information of the access control host corresponding to the switching parameters to the access control hosts in the multi-access control host anti-sneak-back system except the access control host corresponding to the switching parameters.
8. The method for switching the access control service host according to any one of claims 2 to 5, wherein before the obtaining the current time, the method further comprises:
acquiring historical pedestrian volume data of a multi-access-control-host anti-dive system; the historical people flow data comprises people flow data of each access control host in the multi-access control host anti-submergence system in a preset time period before the current time;
determining the entrance guard host with the maximum pedestrian flow in at least one fixed time period in a plurality of fixed time periods according to the historical pedestrian flow data;
and establishing a corresponding relation between the entrance guard host with the largest people flow in the fixed time interval and the fixed time interval so as to obtain a preset corresponding relation.
9. An access service host switching device, comprising:
an obtaining module, configured to obtain a handover parameter;
the processing module is used for switching the access service host of the multi-access-host anti-submergence system into the access host corresponding to the switching parameter in the multi-access-host anti-submergence system under the condition that the switching parameter acquired by the acquisition module meets the switching condition; the switching condition is used for indicating that the flow of people of the access control host corresponding to the switching parameter is greater than a flow threshold value; the access service host is one of all access hosts in the multi-access host anti-submergence system; the access service host is used for verifying the identity verification information of all the access hosts in the multi-access host anti-submergence system and then returning a verification result.
10. The access control service host switching device of claim 9,
the acquisition module is specifically used for acquiring the current moment;
the processing module is specifically configured to: under the condition that a first access control host corresponding to the fixed time period of the current time acquired by the acquisition module in a preset corresponding relation is not an access control service host currently used by the multi-access control host anti-submergence system, switching the access control service host of the multi-access control host anti-submergence system into the first access control host; the preset corresponding relation is used for indicating the corresponding relation between the access control host and a fixed time period in the multi-access control host anti-submergence system;
the acquisition module is further configured to: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-submergence system within a preset time length every other preset time length; the switchable access control host is at least one of the access control hosts of the multi-access control host anti-submergence system;
the processing module is specifically configured to: switching the access service host of the multi-access-host anti-sneak system to the first access host under the condition that the current time acquired by the acquisition module is not within a preset backward range of the ending time of a first preset duration and the first access host is not the access service host currently used by the multi-access-host anti-sneak system; the preset backward range of the ending time of the first preset time length comprises the ending time of the first preset time length; executing the first step under the condition that the current time acquired by the acquisition module is within a preset backward range of the ending time of the first preset duration;
the first step comprises: calculating the pedestrian volume of each switchable access control host in the multi-access control host anti-sneak back system within the first preset time length, which is acquired by the acquisition module, and subtracting a first difference value of the pedestrian volume of the access control service host currently used by the multi-access control host anti-sneak back system within the first preset time length, which is acquired by the acquisition module; under the condition that a second access control host exists in the multi-access control host anti-submergence-reflexion system, switching an access control service host of the multi-access control host anti-submergence-reflexion system into the second access control host within the next preset time length; the second access control host is a switchable access control host which has the largest pedestrian flow within the first preset time length and a first difference value larger than or equal to a preset threshold value in the multi-access control host anti-sneak system; under the condition that a second access control host does not exist in the multi-access control host anti-submergence return system and the first access control host is not an access control service host currently used by the multi-access control host anti-submergence return system, switching the access control service host of the multi-access control host anti-submergence return system into the first access control host;
the processing module is further configured to, after the first step is executed, execute the first step after updating the first preset duration to a next preset duration of the first preset duration within a preset backward range of an ending time of the next preset duration of the first preset duration under a condition that the access control service host of the multi-access-control-host anti-sneak-back system is switched to the second access control host; the preset backward range of the ending time of the next preset time length comprises the ending time of the next preset time length; or after the access control service host of the multi-access control host anti-sneak back system is switched to the first access control host, updating the first preset time length to a next preset time length of the first preset time length;
the first step further comprises: if a second access control host does not exist in the multi-access control host reverse-drive system, a third access control host exists in the multi-access control host reverse-drive system, and the third access control host is not an access control service host currently used by the multi-access control host reverse-drive system, switching the access control service host of the multi-access control host reverse-drive system to the third access control host within the next preset time; the third entrance guard host is an entrance guard host with the largest pedestrian flow within the first preset time length in the multi-entrance guard host anti-submergence system, and a second difference value of the pedestrian flow of the first entrance guard host within the first preset time length subtracted by the pedestrian flow of the third entrance guard host within the first preset time length is larger than or equal to the preset threshold; the multi-entrance-guard-host anti-submergence system does not have a second entrance guard host, and the first entrance guard host does not do the multi-entrance-guard-host anti-submergence system will be switched to the entrance guard service host of the multi-entrance-guard-host anti-submergence system under the condition of the currently used entrance guard service host, and the system comprises the following components: the method comprises the steps that a second access control host and a third access control host do not exist in the multi-access control host anti-submergence system, and the access control service host of the multi-access control host anti-submergence system is switched to the first access control host under the condition that the first access control host is not the currently used access control service host of the multi-access control host anti-submergence system;
the processing module is further configured to, after the first step is executed, execute the first step after updating the first preset duration to a next preset duration of the first preset duration within a preset backward range of an ending time of the next preset duration of the first preset duration under a condition that the access service host of the multi-access-host anti-sneak system is switched to a fifth access host; the fifth access control host is the second access control host or the third access control host;
the obtaining module is further configured to, before obtaining the current time: acquiring historical pedestrian volume data of a multi-access-control-host anti-dive system; the historical people flow data comprises people flow data of each access control host in the multi-access control host anti-submergence system in a preset time period before the current time; determining the preset corresponding relation according to the historical people flow data; the obtaining module is specifically configured to, when determining the preset correspondence according to the historical pedestrian volume data: determining the entrance guard host with the maximum pedestrian flow in at least one fixed time period in a plurality of fixed time periods according to the historical pedestrian flow data; establishing a corresponding relation between the entrance guard host with the largest people flow in the fixed time period and the fixed time period to obtain the preset corresponding relation;
alternatively, the first and second electrodes may be,
the acquisition module is specifically configured to: acquiring the pedestrian volume of all switchable access control hosts in the multi-access control host anti-sneak system within a preset time length every other preset time length;
under the condition that the obtaining module is specifically used for obtaining the pedestrian flow of all the access control hosts in the multi-access control host anti-submergence system within the preset time length at intervals of the preset time length, the processing module is specifically used for: calculating the pedestrian volume of each switchable access control host in the multi-access control host anti-sneak system within a target preset time length within a preset backward range of the ending time of each preset time length, and subtracting a third difference value of the pedestrian volume of an access control service host currently used by the multi-access control host anti-sneak system within the target preset time length; the preset backward range of the ending time of the preset duration comprises the ending time of the preset duration; under the condition that a fourth entrance guard host exists in the multi-entrance guard host anti-submergence return system, switching an entrance guard service host of the multi-entrance guard host anti-submergence return system into the fourth entrance guard host within the next preset time length; the fourth access control host is the access control host which has the largest pedestrian flow within the target preset time length in the multi-access control host anti-submergence system and a third difference value which is larger than or equal to a preset threshold value; the target preset time length is a previous preset time length of the next preset time length;
alternatively, the first and second electrodes may be,
the processing module is used for specifically switching the access service host of the multi-access-host anti-sneak-back system into the access host corresponding to the switching parameters in the multi-access-host anti-sneak-back system: sending all person anti-dive information corresponding to the multi-access-control-host anti-dive system to the access control host corresponding to the switching parameter; the personnel anti-dive-back information is used for verifying all identity verification information received by the multi-access-control-host anti-dive-back system; and sending characteristic information of the access control host corresponding to the switching parameter to the access control hosts except the access control host corresponding to the switching parameter in the multi-access control host anti-sneak back system.
11. An access service host switching device, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the access service host switching method of any one of claims 1-8.
CN202110343396.XA 2021-03-30 2021-03-30 Access control service host switching method and device Active CN113112654B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110343396.XA CN113112654B (en) 2021-03-30 2021-03-30 Access control service host switching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110343396.XA CN113112654B (en) 2021-03-30 2021-03-30 Access control service host switching method and device

Publications (2)

Publication Number Publication Date
CN113112654A CN113112654A (en) 2021-07-13
CN113112654B true CN113112654B (en) 2022-10-25

Family

ID=76712825

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110343396.XA Active CN113112654B (en) 2021-03-30 2021-03-30 Access control service host switching method and device

Country Status (1)

Country Link
CN (1) CN113112654B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114140925B (en) * 2021-11-30 2024-01-30 重庆紫光华山智安科技有限公司 Intelligent access control system and method based on multiple authentication modes
CN115019427A (en) * 2022-06-30 2022-09-06 杭州海康威视数字技术股份有限公司 Anti-dive-back processing method, device and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000020759A (en) * 1998-07-07 2000-01-21 Toshiba Corp Ticket issuing machine and automatic ticket examining machine and traffic control system
CN205184784U (en) * 2015-11-27 2016-04-27 深圳市神州云海智能科技有限公司 Machine people goes on patrol
CN206348863U (en) * 2016-12-29 2017-07-21 广州番禺职业技术学院 Entrance guard device for scenic spot
CN109272629A (en) * 2018-11-02 2019-01-25 广州新科佳都科技有限公司 Lockage detects activation system and method
KR102039066B1 (en) * 2019-04-11 2019-10-31 김동관 Access and management system using bio-signal and drinking measurement signal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1878172A (en) * 2006-07-04 2006-12-13 胡德勇 USB unidirectional physical insulation network gap
CN111104907A (en) * 2019-12-20 2020-05-05 金桓毅 Automatic gardens road bootstrap system who opens according to flow of people
CN112393186B (en) * 2020-11-18 2022-05-20 横店集团得邦照明股份有限公司 Intelligent LED street lamp with people flow density monitoring and alarming functions

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000020759A (en) * 1998-07-07 2000-01-21 Toshiba Corp Ticket issuing machine and automatic ticket examining machine and traffic control system
CN205184784U (en) * 2015-11-27 2016-04-27 深圳市神州云海智能科技有限公司 Machine people goes on patrol
CN206348863U (en) * 2016-12-29 2017-07-21 广州番禺职业技术学院 Entrance guard device for scenic spot
CN109272629A (en) * 2018-11-02 2019-01-25 广州新科佳都科技有限公司 Lockage detects activation system and method
KR102039066B1 (en) * 2019-04-11 2019-10-31 김동관 Access and management system using bio-signal and drinking measurement signal

Also Published As

Publication number Publication date
CN113112654A (en) 2021-07-13

Similar Documents

Publication Publication Date Title
CN113112654B (en) Access control service host switching method and device
CN105046303A (en) Distributed data interaction based biological identification method and system
WO2020155761A1 (en) Method for logging into multiple service clusters, apparatus, computer device and storage medium
CN113076376B (en) Multi-party asynchronous sampling consensus method, system and device based on block chain and medium
CN103295296B (en) Method for controlling access control system by utilizing embedded motherboard and embedded motherboard
CN109726533B (en) User account judgment method and device
CN111986794A (en) Anti-counterfeiting registration method and device based on face recognition, computer equipment and medium
CN104392723A (en) Sharing instrument platform management method based on voiceprint recognition technology
CN104639546A (en) Multi-biometric feature comprehensive authentication method, device and system
CN114973436B (en) Attendance checking method and device, intelligent attendance checking terminal and storage medium
CN101031926A (en) Chipset activation
CN109905407B (en) Management method, system, equipment and medium for accessing intranet based on VPN server
CN113904821A (en) Identity authentication method and device and readable storage medium
CN110569178B (en) Interface early warning method and system based on big data platform
WO2024001687A1 (en) Anti-passback processing method, apparatus and device
CN112969172A (en) Communication flow control method based on cloud mobile phone
CN110535962A (en) Method of data synchronization, device, equipment and storage medium based on authenticating device
CN112560721B (en) Non-perception model switching method and device, electronic equipment and storage medium
CN113094597B (en) Thousand-person and thousand-face portal processing method and device based on machine learning and related equipment
CN115311703A (en) Access control system control method and device based on face recognition and terminal equipment
CN113850945B (en) Access control method and multi-access-control-host anti-submergence system
CN115810228A (en) Face recognition access control management method and device, electronic equipment and storage medium
CN111767500A (en) Data storage sharing method and device, computer equipment and storage medium
CN112825204B (en) Access control method and device based on 2G network, readable medium and equipment
CN112636980B (en) Resource quantity determining method and device, electronic equipment and related products

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant