CN113658356A - Access control management method - Google Patents

Access control management method Download PDF

Info

Publication number
CN113658356A
CN113658356A CN202110910983.2A CN202110910983A CN113658356A CN 113658356 A CN113658356 A CN 113658356A CN 202110910983 A CN202110910983 A CN 202110910983A CN 113658356 A CN113658356 A CN 113658356A
Authority
CN
China
Prior art keywords
request
identity information
mechanical equipment
responding
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110910983.2A
Other languages
Chinese (zh)
Inventor
韩亮
张云
邵忠兴
刘倬艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shougang Automation Information Technology Co Ltd
Original Assignee
Beijing Shougang Automation Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shougang Automation Information Technology Co Ltd filed Critical Beijing Shougang Automation Information Technology Co Ltd
Priority to CN202110910983.2A priority Critical patent/CN113658356A/en
Publication of CN113658356A publication Critical patent/CN113658356A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an access control method, wherein an access control is installed in a closed working area of mechanical equipment, and the management method is applied to a control terminal for controlling the action of the access control; the method comprises the following steps: receiving an entry request sent by an input terminal; responding to the entering request, and inquiring the operation mode of mechanical equipment in the closed working area; when the operation mode of the mechanical equipment is a preset mode, generating an identity verification request; responding to the identity authentication request, and receiving first identity information to be authenticated; judging whether the first identity information to be verified is legal or not; and if the first identity information to be verified is legal, controlling the entrance guard to unlock. According to the method and the device, the operating personnel are allowed to enter the moving space of the mechanical equipment on the premise of ensuring the safety of the operating personnel, and on the other hand, illegal operation of illegal personnel can be prevented from entering a closed working area, so that potential safety hazards are avoided.

Description

Access control management method
Technical Field
The invention relates to the technical field of safety prevention and control, in particular to an access control management method.
Background
With the continuous development of society, automated production is more and more, and the automatic mechanical equipment that involves is also more and more. The automatic mechanical equipment needs a large number of mechanical arms to operate, the mechanical arms need to move in a certain space, and safety accidents are easy to happen if workers enter the moving space of the mechanical arms unintentionally.
In order to ensure the safety of the workers, the automated machines are usually arranged in a uniformly planned closed working area. However, automated machinery also requires maintenance by an operator. In the related art, when an operator needs to enter a closed working area of a mechanical device, the operator can only avoid injury in the working area depending on a management system or experience and consciousness of the operator, however, the mode cannot ensure the safety of the operator.
Disclosure of Invention
The embodiment of the application provides an access control management method, so that the technical problem that an operator cannot be effectively ensured to safely enter the activity space of the mechanical equipment in the prior art is solved, and the technical effect that the operator is allowed to enter the activity space of the mechanical equipment on the premise of ensuring the safety of the operator is achieved.
In a first aspect, the application provides an access control method, wherein an access control is installed in a closed working area of mechanical equipment, and the management method is applied to a control terminal for controlling access control actions; the method comprises the following steps:
receiving an entry request sent by an input terminal;
responding to the entering request, and inquiring the operation mode of mechanical equipment in the closed working area;
when the operation mode of the mechanical equipment is a preset mode, generating an identity verification request;
responding to the identity authentication request, and receiving first identity information to be authenticated;
judging whether the first identity information to be verified is legal or not;
and if the first identity information to be verified is legal, controlling the entrance guard to unlock.
Further, the method further comprises:
and when the operation mode of the mechanical equipment is not the preset mode, unlocking is forbidden.
Further, the method further comprises:
when detecting that the user of the first identity information to be verified leaves the closed working area, receiving a locking request sent by an input terminal;
and responding to the locking request, and controlling the entrance guard to be locked.
Further, after responding to the lock request, the method further comprises:
and controlling the mechanical equipment to be switched from the preset mode to the non-preset mode.
Further, the method further comprises:
when the mode of the mechanical equipment is a non-preset mode, receiving an entrance guard forced unlocking signal;
and responding to the door lock forced unlocking signal, and controlling the mechanical equipment to be switched from the non-preset mode to the preset mode.
Further, the method further comprises:
and if the first identity information to be verified is illegal, unlocking is forbidden.
Further, if the first identity information to be verified is illegal, the method further comprises:
regenerating the identity authentication request;
responding to the regenerated identity authentication request, and receiving second identity information to be authenticated;
judging whether the second identity information to be verified is legal or not;
and if the second identity information to be verified is legal, controlling the entrance guard to unlock.
Further, when the first identity information to be verified is illegal, the method further comprises the following steps:
and accumulating the execution times of the regenerated identity authentication request, and forbidding unlocking when the execution times exceed the preset times.
Further, when the operation mode of the mechanical device is the preset mode, the method further comprises:
generating a reason registration request for requesting to enter a closed working area;
and responding to the reason registration request, receiving the registration information, and saving the registration information.
In a second aspect, the present application provides a method for managing an access control, where the access control is installed in a closed work area of a mechanical device, and the method is applied to an input terminal, and includes:
receiving an unlocking trigger signal;
the access control method comprises the steps of responding to an unlocking trigger signal, generating an entering request, sending the entering request to a control terminal, receiving the entering request, responding to the entering request, inquiring the operation mode of mechanical equipment in a closed working area, generating an identity verification request when the operation mode of the mechanical equipment is a preset mode, responding to the identity verification request, receiving first identity information to be verified, judging whether the first identity information to be verified is legal, and controlling the access control to be unlocked if the first identity information to be verified is legal.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
this application is after control terminal received the entering request, confirm earlier whether the operational mode of mechanical equipment in the closed work area is the preset mode, when the operational mode is the preset mode, just mean that the closed work area possesses the operational environment who allows operating personnel to get into, under this prerequisite, further verify identity information again, when first identity information of waiting to verify is legal, just control entrance guard unblock, and then guarantee that operating personnel gets into the closed work area under the prerequisite of safety. Therefore, the safety of the operator entering the closed working area is ensured by setting double guarantees, the first guarantee is to inquire the operation mode of mechanical equipment in the closed working area, and the possibility of allowing the operator to enter the closed working area is only provided when the operation mode is a preset mode; the second guarantee is to verify the identity, and ensure that the operator enters the closed working area under the condition of monitoring by the manager at the control terminal side. On the one hand, this application is in the prerequisite of guaranteeing operating personnel's security allows operating personnel to get into mechanical equipment's activity space in, and on the other hand also can avoid illegal personnel's illegal operation to get into and seal the workspace, avoids having the potential safety hazard.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an access control system provided in the present application;
fig. 2 is a schematic flowchart of an access control management method provided in the present application;
fig. 3 is a schematic flow chart of another access control management method provided in the present application.
Detailed Description
The embodiment of the application provides an access control management method, and solves the technical problem that in the prior art, an operator cannot be effectively ensured to safely enter the moving space of mechanical equipment.
In order to solve the technical problems, the general idea of the embodiment of the application is as follows:
an entrance guard management method, the entrance guard is installed in the closed work area of the mechanical equipment, the management method is applied to the control terminal which controls the entrance guard movement; the method comprises the following steps: receiving an entry request sent by an input terminal; responding to the entering request, and inquiring the operation mode of mechanical equipment in the closed working area; when the operation mode of the mechanical equipment is a preset mode, generating an identity verification request; responding to the identity authentication request, and receiving first identity information to be authenticated; judging whether the first identity information to be verified is legal or not; and if the first identity information to be verified is legal, controlling the entrance guard to unlock.
This embodiment receives at control terminal and gets into after the request, confirms earlier whether the operational mode of mechanical equipment is the preset mode in the closed work area, when the operational mode is the preset mode, just means that the closed work area possesses the operational environment who allows operating personnel to get into, under this prerequisite, further verifies identity information again, and when first identity information of waiting to verify is legal, just control entrance guard's unblock, and then guarantee that operating personnel gets into the closed work area under the prerequisite of safety. Therefore, the safety of the operator entering the closed working area is ensured by setting double guarantees, the first guarantee is to inquire the operation mode of mechanical equipment in the closed working area, and the possibility of allowing the operator to enter the closed working area is only provided when the operation mode is a preset mode; the second guarantee is to verify the identity, and ensure that the operator enters the closed working area under the condition of monitoring by the manager at the control terminal side. On the one hand, this application is in the prerequisite of guaranteeing operating personnel's security allows operating personnel to get into mechanical equipment's activity space in, and on the other hand also can avoid illegal personnel's illegal operation to get into and seal the workspace, avoids having the potential safety hazard.
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
First, it is stated that the term "and/or" appearing herein is merely one type of associative relationship that describes an associated object, meaning that three types of relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The access control system comprises an input terminal and a control terminal electrically connected with the input terminal. The input terminal is used for generating an entry request and a locking request according to specific operation of an operator (for example, when the input terminal is a button, the operator generates the entry request or the locking request by pressing the button), the entry request refers to a request sent when the operator needs to enter a closed working area of the mechanical equipment, and the locking request refers to a request generated when the operator leaves the closed working area. In practical applications, the input terminal may be an entity button, or may be other devices that can generate an entry request or a lock request, which is not limited herein.
After the input terminal generates an entry request or a locking request, the entry request or the locking request is sent to a control terminal, and the control terminal is used for receiving the entry request or the locking request. After receiving the access request, the control terminal responds to the access request and determines whether the access control is required to be controlled to be opened or not; and after receiving the locking request, the control terminal controls the entrance guard to be locked. The control terminal can be a system platform or an upper computer, and is not limited here.
The procedure for responding to the entry request and the lock request by the control terminal is described below with reference to fig. 2.
The embodiment provides an access control management method as shown in fig. 2, wherein an access control is installed in a closed working area of mechanical equipment, and the management method is applied to a control terminal for controlling access control actions; the method comprises the following steps:
step S21, receiving an entering request sent by an input terminal;
step S22, responding to the entering request, and inquiring the operation mode of the mechanical equipment in the closed working area;
step S23, when the operation mode of the mechanical equipment is a preset mode, generating an identity authentication request;
step S24, responding to the identity authentication request, receiving first identity information to be authenticated;
step S25, judging whether the first identity information to be verified is legal;
and step S26, if the first identity information to be verified is legal, controlling the entrance guard to unlock.
When an operator needs to enter the closed working area, the input terminal is triggered to generate an entry request, and the entry terminal sends the entry request to the control terminal. The control terminal receives an entering request sent by the input terminal, responds to the entering request, inquires the running mode of mechanical equipment in the closed working area at the moment, and determines whether the closed working area at the moment has the environmental condition allowing an operator to enter or not according to the running mode. When the operation mode of the mechanical equipment is a preset mode, determining that the closed working area at the moment has a soul crystal condition allowing an operator to enter, generating an identity verification request, and determining whether to control the unlocking of the access control according to the result of the identity verification request.
In this embodiment, the authentication request is for a manager on the control terminal side. When the operation mode of the mechanical equipment is the preset mode, an identity authentication request is generated, and the manager inputs the first identity information to be authenticated into the control terminal to determine whether the first identity information to be authenticated is legal. And under the legal condition, the entrance guard is controlled to be unlocked, and an operator at the input terminal side can enter the closed working area.
In this embodiment, the operation mode includes an automatic operation mode and a manual stop mode, and when the operation mode is the automatic operation mode, it is determined that the current operation environment of the closed work area does not allow the operator to enter, and the access control unlocking rejection signal can be directly generated to reject the access request of the operator without further performing the identity authentication. When the operation mode is the manual stop mode, the current operation environment of the closed working area is considered to allow an operator to enter, and further the identity of a manager can be verified. That is to say, the preset mode in this embodiment is a manual stop mode, and when the operation mode of the mechanical device is the manual stop mode, an authentication request is generated to perform authentication of a manager, and it is determined whether an operator can enter the manual stop mode. When the operation mode of the mechanical equipment is not the preset mode, namely when the operation mode of the mechanical equipment is not the manual stop mode, the condition that an operator does not enter the closed working area safely is determined, unlocking is forbidden, and the access control unlocking is refused to be controlled.
And verifying whether the first identity information to be verified is legal or not, inquiring prestored identity information of a manager prestored in a database, and when the first identity information to be verified is matched with the prestored identity information, considering that the first identity information to be verified is legal and controlling the unlocking of the access control. When the first identity information to be verified is not matched with the pre-stored identity information, the first identity information to be verified is considered to be illegal, the door control can refuse to unlock the signal, and the door control is refused to be unlocked. However, the first to-be-verified identity information is illegal, which may be caused by a mistake of a manager, so that the first to-be-verified identity information is input incorrectly. The identity information to be verified may be a user name and a password, or may be other agreed verification information, which is not limited herein.
Specifically, if the first identity information to be verified is illegal, the following operations may be performed:
step S31, regenerating the identity authentication request;
step S32, responding to the regenerated identity authentication request, and receiving second identity information to be authenticated;
step S33, judging whether the second identity information to be verified is legal;
and step S34, if the second identity information to be verified is legal, controlling the door control to unlock.
By regenerating the identity authentication request, the administrator inputs the second identity information to be authenticated, and the situation that the identity information authentication fails due to the manual error of the administrator can be effectively avoided. Further, in order to avoid that an illegal person inputs identity information for verification in a mode of multiple attempts, the execution times of regenerating the identity verification request can be accumulated, and when the execution times exceed the preset times, unlocking is forbidden.
In general, an operator needs to record when entering a closed working area so as to facilitate maintenance and management of mechanical equipment, so that when an operation mode of the mechanical equipment is a preset mode, namely when an authentication request is generated, a reason registration request requesting to enter the closed working area can be generated; and responding to the reason registration request, receiving registration information, and storing the registration information to facilitate subsequent inquiry of maintenance records of the mechanical equipment.
When the operator leaves the closed working area, the mechanical equipment in the closed working area can start to operate. In this case, it is necessary to ensure that the mechanical equipment can be operated again only after the operator leaves the closed work area, and therefore, the time when the operator leaves the closed work area and the time when the mechanical equipment in the closed work area starts to operate must be matched to ensure the safety of the operator. Thus, the present embodiment provides the following way to determine the moment when the operator leaves the enclosed work area.
Step S41, when detecting that the user of the first identity information to be verified leaves the closed working area, receiving a locking request sent by an input terminal;
and step S42, responding to the locking request, and controlling the entrance guard to be locked.
And step S43, responding to the locking request, and controlling the mechanical equipment to be switched from the preset mode to the non-preset mode.
That is to say, when the operator completes the maintenance work of the closed working area and leaves the closed working area, the input terminal can generate a locking request, the control terminal receives the locking request, the control terminal can determine that the operator leaves the closed working area, and then the door access can be controlled to be locked, and meanwhile, the mechanical equipment can be controlled to be switched from the preset mode to the non-preset mode, namely, the manual stop mode is switched to the automatic working mode, so that the safety of the operator is ensured, the time for the mechanical equipment to restart to operate is shortened, and the production efficiency is improved.
In summary, in this embodiment, after the control terminal receives the entry request, it is determined whether the operation mode of the mechanical device in the closed working area is the preset mode, and when the operation mode is the preset mode, it means that the closed working area has a working environment allowing the operator to enter, and on this premise, the identity information is further verified, and when the identity information to be verified is legal, the access control unlocking is controlled, so that the operator is ensured to enter the closed working area on the premise of safety. Therefore, the embodiment is provided with double guarantees to ensure the safety of the operator entering the closed working area, the first double guarantee is to inquire the operation mode of mechanical equipment in the closed working area, and the possibility of allowing the operator to enter the closed working area is only provided when the operation mode is the preset mode; the second guarantee is that the identity is verified, and the operator is ensured to enter the closed working area under the condition of monitoring by a manager at the control terminal side. On the one hand, this embodiment is in the prerequisite of guaranteeing operating personnel's security allows operating personnel to get into mechanical equipment's activity space in, and on the other hand also can avoid illegal personnel's illegal operation to get into and seal the workspace, avoids having the potential safety hazard.
In order to avoid safety accidents when an illegal person forcibly breaks into a closed working area, when the mode of the mechanical equipment is a non-preset mode, the method further comprises the following steps:
step S51, receiving a forced unlocking signal of the entrance guard;
and step S52, responding to the door lock forced unlocking signal, and controlling the mechanical equipment to be switched from the non-preset mode to the preset mode.
The forced entrance guard unlocking signal can be generated in the following mode, under the condition that an entrance request is not generated, the entrance guard is in an unlocking state, so that the situation that a closed working area is forced to enter can be considered, and the forced entrance guard unlocking signal can be generated; the vibration sensor can be installed at the entrance guard, when the vibration of the vibration sensor exceeds a preset value, the entrance guard is in an unlocking state, the entrance guard can be considered to enter a closed working area forcibly, and then an entrance guard forced unlocking signal can be generated.
This embodiment can be when closed workspace is gone into by force through setting up entrance guard's unblock signal by force, and in time control mechanical equipment is by the non-mode switching of predetermineeing to predetermineeing the mode, switches into manual mode of stopping by automatic work mode promptly, avoids getting into the personnel emergence incident of closed workspace.
In summary, the above-mentioned scheme provided in this embodiment may be as shown in fig. 3, where the entry request sent by the input interrupt is received, and the operation mode of the mechanical device in the closed working area is queried in response to the entry request.
When the operation mode of the mechanical equipment is a preset mode, an identity authentication request is generated, first identity information to be authenticated is received, and whether the first identity information to be authenticated is legal or not is judged. And if the second identity information is legal, unlocking the access control, and if the second identity information is illegal, forbidding unlocking, or regenerating the identity verification request and re-verifying the second identity information to be verified. When the operation mode of the mechanical equipment is the preset mode, a reason registration request for requesting to enter a closed working area can be generated, and the registration information is stored.
And when the operation mode of the mechanical equipment is not the preset mode, the unlocking is forbidden.
Based on the same inventive concept, the application provides another access control management method, wherein the access control is installed in a closed working area of mechanical equipment, the management method is applied to an input terminal, and the method comprises the following steps:
step S61, receiving an unlocking trigger signal;
step S62, responding to the unlocking trigger signal, generating an entry request, sending the entry request to the control terminal, wherein the control terminal is used for receiving the entry request, responding to the entry request, inquiring the operation mode of the mechanical equipment in the closed working area, generating an authentication request when the operation mode of the mechanical equipment is a preset mode, responding to the authentication request, receiving first identity information to be authenticated, judging whether the first identity information to be authenticated is legal, and controlling the door access to be unlocked if the first identity information to be authenticated is legal.
Step S63, receiving a locking trigger signal;
and step S64, responding to the locking trigger signal, generating a locking request, and sending the locking request to the control terminal, wherein the control terminal is used for receiving the locking request sent by the input terminal, responding to the locking request, and controlling the door access locking.
The input terminal is arranged at the entrance guard, the input terminal, the control terminal and the entrance guard are electrically connected in sequence, the entrance request and the locking request are generated through the unlocking trigger signal and the locking trigger signal of the input terminal, the control terminal controls the unlocking and locking of the entrance guard, and the safety of an operator entering and exiting a closed working area is guaranteed.
Since the electronic device described in this embodiment is an electronic device used for implementing the method for processing signals in this embodiment, a specific implementation manner of the electronic device of this embodiment and various modifications thereof can be understood by those skilled in the art based on the method for processing signals described in this embodiment, and therefore, how to implement the method in this embodiment of this application by the electronic device is not described in detail herein. Electronic devices used by those skilled in the art to implement the method for signal processing in the embodiments of the present application are all within the scope of the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. The access control management method is characterized in that the access control is installed in a closed working area of mechanical equipment, and the management method is applied to a control terminal for controlling the access control action; the method comprises the following steps:
receiving an entry request sent by an input terminal;
responding to the entry request, and inquiring the operation mode of mechanical equipment in the closed working area;
when the operation mode of the mechanical equipment is a preset mode, generating an identity verification request;
responding the identity authentication request, and receiving first identity information to be authenticated;
judging whether the first identity information to be verified is legal or not;
and if the first identity information to be verified is legal, controlling the entrance guard to unlock.
2. The method of claim 1, wherein the method further comprises:
and when the operation mode of the mechanical equipment is not the preset mode, forbidding unlocking.
3. The method of claim 1, wherein after controlling the access door to unlock, the method further comprises:
when detecting that the user of the first identity information to be verified leaves the closed working area, receiving a locking request sent by the input terminal;
and responding to the locking request, and controlling the entrance guard to be locked.
4. The method of claim 3, wherein after responding to the lock request, the method further comprises:
and controlling the mechanical equipment to be switched from the preset mode to a non-preset mode.
5. The method of claim 1, wherein the method further comprises:
when the mode of the mechanical equipment is a non-preset mode, receiving an entrance guard forced unlocking signal;
responding to the door control forced unlocking signal, and controlling the mechanical equipment to be switched from a non-preset mode to the preset mode.
6. The method of claim 1, wherein the method further comprises:
and if the first identity information to be verified is illegal, unlocking is forbidden.
7. The method of claim 1, wherein if the first identity information to be verified is illegal, the method further comprises:
regenerating the authentication request;
responding to the regenerated identity authentication request, and receiving second identity information to be authenticated;
judging whether the second identity information to be verified is legal or not;
and if the second identity information to be verified is legal, controlling the entrance guard to unlock.
8. The method of claim 7, wherein when the first to-be-verified identity information is illegal, the method further comprises:
and accumulating the execution times of the regenerated authentication request, and forbidding unlocking when the execution times exceed the preset times.
9. The method of claim 1, wherein when the mode of operation of the mechanical device is a preset mode, the method further comprises:
generating a reason registration request for requesting to enter the closed working area;
and responding to the reason registration request, receiving registration information, and storing the registration information.
10. An access control management method is characterized in that an access control is installed in a closed working area of mechanical equipment, the management method is applied to an input terminal, and the method comprises the following steps:
receiving an unlocking trigger signal;
responding the unlocking trigger signal, generating an entering request, sending the entering request to a control terminal, receiving the entering request by the control terminal, responding the entering request, inquiring the operation mode of mechanical equipment in the closed working area, generating an authentication request when the operation mode of the mechanical equipment is a preset mode, responding the authentication request, receiving first to-be-authenticated identity information, judging whether the first to-be-authenticated identity information is legal, and controlling the entrance guard to unlock if the first to-be-authenticated identity information is legal.
CN202110910983.2A 2021-08-10 2021-08-10 Access control management method Pending CN113658356A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110910983.2A CN113658356A (en) 2021-08-10 2021-08-10 Access control management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110910983.2A CN113658356A (en) 2021-08-10 2021-08-10 Access control management method

Publications (1)

Publication Number Publication Date
CN113658356A true CN113658356A (en) 2021-11-16

Family

ID=78490594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110910983.2A Pending CN113658356A (en) 2021-08-10 2021-08-10 Access control management method

Country Status (1)

Country Link
CN (1) CN113658356A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1644479A (en) * 2005-01-07 2005-07-27 陈金林 Controller and controlling method for preventing elevator from harming event
CN101833808A (en) * 2010-05-20 2010-09-15 上海洪剑智能科技有限公司 Face identification access control system capable of realizing multipath control and identification method thereof
CN202134050U (en) * 2011-06-29 2012-02-01 宁波易简电子科技有限公司 Visitor machine
CN103208147A (en) * 2013-04-07 2013-07-17 四川长虹电器股份有限公司 Method and system for intelligent alarm access control monitor
CN104268963A (en) * 2014-08-06 2015-01-07 成都百威讯科技有限责任公司 Intelligent door lock system, intelligent door lock and intelligent alarm door
CN104574584A (en) * 2014-12-01 2015-04-29 沈阳赛普顿科技有限公司 Management and control system and management and control method of bank vault door
CN104665736A (en) * 2015-03-02 2015-06-03 佛山市顺德区美的洗涤电器制造有限公司 Dish washing machine and machine door opening protection method and device thereof
KR101545953B1 (en) * 2015-01-30 2015-08-21 (주)엘트정보기술 The method for admission control and location recognition and recoding medium recoding the method for admission control and location recognition
JP2016157288A (en) * 2015-02-25 2016-09-01 三菱電機株式会社 Entry/exit management system
CN206568429U (en) * 2017-03-22 2017-10-20 青岛思锐自动化工程有限公司 A kind of rubber forming machine safety control system
CN108411591A (en) * 2018-06-12 2018-08-17 上海海尔众智坊创客空间管理有限公司 Dryer
CN108510630A (en) * 2018-04-02 2018-09-07 深圳春沐源控股有限公司 Property management method
CN110058675A (en) * 2017-11-27 2019-07-26 安士能有限及两合公司 Security system
CN213659528U (en) * 2020-12-30 2021-07-09 安方高科电磁安全技术(北京)有限公司 Multi-feature finger vein biological data recognition device and system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1644479A (en) * 2005-01-07 2005-07-27 陈金林 Controller and controlling method for preventing elevator from harming event
CN101833808A (en) * 2010-05-20 2010-09-15 上海洪剑智能科技有限公司 Face identification access control system capable of realizing multipath control and identification method thereof
CN202134050U (en) * 2011-06-29 2012-02-01 宁波易简电子科技有限公司 Visitor machine
CN103208147A (en) * 2013-04-07 2013-07-17 四川长虹电器股份有限公司 Method and system for intelligent alarm access control monitor
CN104268963A (en) * 2014-08-06 2015-01-07 成都百威讯科技有限责任公司 Intelligent door lock system, intelligent door lock and intelligent alarm door
CN104574584A (en) * 2014-12-01 2015-04-29 沈阳赛普顿科技有限公司 Management and control system and management and control method of bank vault door
KR101545953B1 (en) * 2015-01-30 2015-08-21 (주)엘트정보기술 The method for admission control and location recognition and recoding medium recoding the method for admission control and location recognition
JP2016157288A (en) * 2015-02-25 2016-09-01 三菱電機株式会社 Entry/exit management system
CN104665736A (en) * 2015-03-02 2015-06-03 佛山市顺德区美的洗涤电器制造有限公司 Dish washing machine and machine door opening protection method and device thereof
CN206568429U (en) * 2017-03-22 2017-10-20 青岛思锐自动化工程有限公司 A kind of rubber forming machine safety control system
CN110058675A (en) * 2017-11-27 2019-07-26 安士能有限及两合公司 Security system
CN108510630A (en) * 2018-04-02 2018-09-07 深圳春沐源控股有限公司 Property management method
CN108411591A (en) * 2018-06-12 2018-08-17 上海海尔众智坊创客空间管理有限公司 Dryer
CN213659528U (en) * 2020-12-30 2021-07-09 安方高科电磁安全技术(北京)有限公司 Multi-feature finger vein biological data recognition device and system

Similar Documents

Publication Publication Date Title
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
EP3407536A1 (en) Systems and methods for providing a secured password and authentication mechanism for programming and updating software or firmware
US8890652B2 (en) Method for the access control to an automation unit
CN101551837B (en) Method for switching user accounts and computer
KR101661313B1 (en) Method for controlling danger facility and computer program for executing the method
CN113658356A (en) Access control management method
JPH0612347A (en) Remote operation command execution control system on decentralized computer system
CN110750779B (en) Terminal maintenance management method, device, equipment and storage medium
Braband What's Security Level got to do with Safety Integrity Level?
CN114237144B (en) System and method for PLC security and credibility based on embedded type
KR101580200B1 (en) Access control apparatus for automatic security restoration and method thereof
CN112669490B (en) Emergency unlocking method, terminal equipment, server and system
CN106789929A (en) A kind of industrial robot information security management method of facing cloud control platform
KR20140045002A (en) Human machine interface system with remote control function
CN108171847A (en) The unlocking method and device of a kind of access control equipment
KR101576242B1 (en) Security management system and method for server accessible by temporarily authorized worker
KR102156919B1 (en) Safe operation control system of plc-based target device and method thereof
CN108009423B (en) Virtual machine password processing method and system and password generation tool
CN114338166B (en) Edge equipment risk processing method, device, equipment and cloud server
US20230306536A1 (en) System for Determining Change to Work Content and Function Content
CN116991778A (en) DCS controller serial port safety access method, system, equipment and storage medium
WO2024033650A1 (en) Train depot safety
CN107766704B (en) Application program operation method and device and terminal
JP6602712B2 (en) Failure response support system and failure response support method
CN117284893A (en) User searching method for lifter, storage medium and controller

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211116