CN109658579A - A kind of access control method, system, equipment and storage medium - Google Patents
A kind of access control method, system, equipment and storage medium Download PDFInfo
- Publication number
- CN109658579A CN109658579A CN201910152930.1A CN201910152930A CN109658579A CN 109658579 A CN109658579 A CN 109658579A CN 201910152930 A CN201910152930 A CN 201910152930A CN 109658579 A CN109658579 A CN 109658579A
- Authority
- CN
- China
- Prior art keywords
- information
- visitor
- door control
- estate management
- control terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of access control method, system, equipment and storage medium, this method includes the identity information of estate management terminal acquisition visitor and stores to visiting registered database;Door control terminal acquires the identity information of visitor and compares with visiting registered database according to default collection rule, compares successfully then opening gate, compares failure and visitor is then prompted to fill in interviewed people's information;Door control terminal compares interviewed people's information with information database is rented, and compares to after corresponding owner or tenant, the identity information of the collected visitor of previous step is sent to intelligent and portable end equipment and is audited by owner or tenant, the opening gate passed through is audited.A kind of access control method, system, equipment and storage medium provided by the invention, it solves the problems, such as the managing caller under complex application context, not only increases the estate management intelligence and service quality of enterprise or cell, and also enhance the safety of gate inhibition, using effect is good, convenient for promoting the use of.
Description
Technical field
The present embodiments relate to entrance guard management technical field more particularly to a kind of access control method, system, equipment and
Storage medium.
Background technique
Traditional access control method function is relatively simple, can not achieve estate management and effective control.Such as only
It is authenticated by fingerprint, human face image information, cannot effectively be applied under many scenes, need a kind of combination complex application context
Access control method.
Summary of the invention
The present invention provides a kind of access control method, system, equipment and storage medium, so as to solve the deficiencies in the prior art.
To achieve the above object, the present invention provides technical solution below:
In a first aspect, the present invention provides a kind of access control method, it is applied to access control system, the access control system
System includes estate management terminal and the door control terminal communicated by cloud with the estate management terminal, the method packet
It includes:
At estate management, the identity information of the estate management terminal acquisition visitor, and store to visiting registration data
Library;
At gate sentry, the door control terminal acquires the identity information of visitor according to default collection rule, and by cloud with
Visiting registered database in the estate management terminal is compared, and compares successfully then opening gate, compares failure and then prompts
The visitor fills in interviewed people's information;
The door control terminal will be stored with owner in interviewed people's information and the door control terminal and/or tenant rents letter
The information database of renting of breath is compared, and compares to after corresponding owner or tenant, the door control terminal acquires previous step
To the identity information of the visitor be sent to the intelligent and portable end equipment of corresponding owner or tenant and audit, owner or rent
Family sends door open command to the door control terminal, the door control terminal opening gate after the approval.
Further, in the access control method, the identity information includes face information and voiceprint;
Interviewed people's information includes one of name, phone, address of interviewed people or a variety of.
Further, described at estate management in the access control method, the estate management terminal acquires visitor
Identity information, and store to the step of visiting registered database and include:
At estate management, after the estate management terminal receives visiting request, the face information harmony of visitor is acquired
Line information;
The estate management terminal receives effective access time that property management personnel fills in;
The face information, voiceprint and effective access time are associated by the estate management terminal,
And it stores to visiting registered database.
Further, described at gate sentry in the access control method, the door control terminal is according to default acquisition rule
Then, the identity information of visitor is acquired, and is compared by cloud with the visiting registered database in the estate management terminal,
Successfully then opening gate is compared, comparing the step of failure then prompts the visitor to fill in interviewed people's information includes:
At gate sentry, the face information of the door control terminal acquisition visitor;
The door control terminal passes through the visiting registrating number in cloud and the estate management terminal according to the face information
It is compared according to library, when comparing successfully, continues the acoustic information for acquiring visitor;
The door control terminal extracts voiceprint from the acoustic information, and by the voiceprint and previous step
It compares voiceprint associated by successful face information to be compared, when comparing successfully, whether detection current time is in
In effective access time, if so, opening gate, compares failure and the visitor is then prompted to fill in interviewed people's information.
Further, in the access control method, it is described acquisition visitor acoustic information the step of before, also wrap
It includes:
The door control terminal shows the setting text of one section of acoustic information for acquiring visitor on a display screen, and prompts
Visitor reads aloud.
Further, in the access control method, the setting text include one of Chinese character, number, letter or
Multiple combinations.
Second aspect, the present invention provide a kind of access control system, including estate management terminal and by cloud with it is described
The door control terminal that estate management terminal is communicated;
At estate management, the estate management terminal is used to acquire the identity information of visitor, and stores to visiting registration
Database;
At gate sentry, the door control terminal is used to acquire the identity information of visitor, and pass through cloud according to collection rule is preset
End is compared with the visiting registered database in the estate management terminal, compares successfully then opening gate, compares failure then
The visitor is prompted to fill in interviewed people's information;
The door control terminal is also used to that owner and/or tenant will be stored in interviewed people's information and the door control terminal
The information database of renting for renting information is compared, and compares to after corresponding owner or tenant, and the door control terminal is by previous step
The identity information of the rapid collected visitor is sent to corresponding owner or the intelligent and portable end equipment of tenant is audited, industry
Main or tenant sends door open command to the door control terminal, the door control terminal opening gate after the approval.
The third aspect, the present invention provide a kind of equipment, and the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes such as access control method provided by any embodiment of the invention.
Fourth aspect, the present invention provides a kind of storage mediums comprising computer executable instructions, and the computer can
It executes instruction when being executed by computer processor for executing such as access control method provided by any embodiment of the invention.
A kind of access control method, system, equipment and storage medium provided by the invention, solve under complex application context
Managing caller problem, not only increase the estate management intelligence and service quality of enterprise or cell, and also enhance gate inhibition
Safety, using effect is good, convenient for promote the use of.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of flow diagram for access control method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow diagram of access control method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of flow diagram for access control method that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for access control system that the embodiment of the present invention four provides;
Fig. 5 is a kind of structural schematic diagram for computer equipment that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just
Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is the flow diagram of a kind of access control method that the embodiment of the present invention one provides, and this method is suitable for pair
The visiting scene being managed of visitor, this method are executed by access control system, and the access control system includes property pipe
Reason terminal and the door control terminal communicated by cloud with the estate management terminal.Referring to Fig. 1, this method specifically include as
Lower step:
S101, at estate management, the identity information of estate management terminal acquisition visitor, and storing to visiting registration
Database.
Wherein, the identity information includes face information and voiceprint.
It should be noted that face information and voiceprint are the intrinsic physiological characteristic and behavioural characteristic of human body respectively.
Physiological characteristic is mostly geneogenous, does not change with external condition and subjective desire, additionally included fingerprint, iris,
DNA;Behavioural characteristic is then that people live the behavioural habits formed for a long time, is difficult to change, has additionally included person's handwriting, gait, hit
Key habit.Physiological characteristic and behavioural characteristic are due to uniqueness, stability, carrying, not easy to lose and falsely use and prevent
Many advantages, such as pseudo- performance is good becomes a medium new, with broad prospect of application of authentication.
For different physiological characteristic and behavioural characteristic, the mode of acquisition is different, general acquisition mode have scanning,
Typing and video capture, but require to realize by corresponding acquisition equipment.
When the physiological characteristic of acquisition and behavioural characteristic are two or more, the mode of acquisition can follow certain rule
Then.On the one hand, two or more physiological characteristics and behavioural characteristic can carry out simultaneously in acquisition, generally from each other not
It will receive and interfere with or disturb each other.After the completion of physiological characteristic and behavioural characteristic acquisition, it is necessary to be whole physiological characteristics and behavioural characteristic collected
It all compares in successful situation, just can determine that the identity information (can certainly only compare successfully any one of therein) of visitor.
On the other hand, two or more physiological characteristics and behavioural characteristic can also carry out step by step in acquisition, in a physiological characteristic and
After behavioural characteristic acquisition is completed and compared successfully, the acquisition and comparison of next physiological characteristic and behavioural characteristic just will do it, it is raw
It manages between feature and behavioural characteristic, during acquisition and comparison, there is specific sequencing, but need to illustrate
It is that the sequencing does not imply that the difference between raw physiological characteristic and behavioural characteristic there are priority, and refers to by artificially pacifying
Row a kind of logical order, specifically can according to the actual situation depending on.
S102, at gate sentry, the door control terminal acquires the identity information of visitor according to default collection rule, and passes through
Cloud is compared with the visiting registered database in the estate management terminal, compares successfully then opening gate, compares failure
The visitor is then prompted to fill in interviewed people's information.
Wherein, interviewed people's information includes one of name, phone, address of interviewed people or a variety of.
S103, the door control terminal will be stored with owner and/or tenant in interviewed people's information and the door control terminal
The information database of renting for renting information is compared, and compares to after corresponding owner or tenant, and the door control terminal is by previous step
The identity information of the rapid collected visitor is sent to corresponding owner or the intelligent and portable end equipment of tenant is audited, industry
Main or tenant sends door open command to the door control terminal, the door control terminal opening gate after the approval.
A kind of access control method provided in an embodiment of the present invention, the managing caller solved under complex application context are asked
Topic, not only increases the estate management intelligence and service quality of enterprise or cell, and also enhances the safety of gate inhibition, uses
Effect is good, convenient for promoting the use of.
Embodiment two
As shown in Fig. 2, a kind of access control method provided by Embodiment 2 of the present invention, is the technology provided in embodiment one
On the basis of scheme, to step S101, " at estate management, the estate management terminal acquires the identity information of visitor, and deposits
Store up to visiting registered database " advanced optimize.The explanation of term identical or corresponding with the various embodiments described above is herein no longer
It repeats.That is:
At estate management, after the estate management terminal receives visiting request, the face information harmony of visitor is acquired
Line information;
The estate management terminal receives effective access time that property management personnel fills in;
The face information, voiceprint and effective access time are associated by the estate management terminal,
And it stores to visiting registered database.
Based on above-mentioned optimization, as shown in Fig. 2, a kind of access control method provided in this embodiment, may include walking as follows
It is rapid:
S201, at estate management, after the estate management terminal receives visiting request, acquire the face information of visitor
And voiceprint.
S202, the estate management terminal receive effective access time that property management personnel fills in.
S203, the estate management terminal carry out the face information, voiceprint and effective access time
Association, and store to visiting registered database.
S204, at gate sentry, the door control terminal acquires the identity information of visitor according to default collection rule, and passes through
Cloud is compared with the visiting registered database in the estate management terminal, compares successfully then opening gate, compares failure
The visitor is then prompted to fill in interviewed people's information.
Wherein, interviewed people's information includes one of name, phone, address of interviewed people or a variety of.
S205, the door control terminal will be stored with owner and/or tenant in interviewed people's information and the door control terminal
The information database of renting for renting information is compared, and compares to after corresponding owner or tenant, and the door control terminal is by previous step
The identity information of the rapid collected visitor is sent to corresponding owner or the intelligent and portable end equipment of tenant is audited, industry
Main or tenant sends door open command to the door control terminal, the door control terminal opening gate after the approval.
A kind of access control method provided in an embodiment of the present invention, the managing caller solved under complex application context are asked
Topic, not only increases the estate management intelligence and service quality of enterprise or cell, and also enhances the safety of gate inhibition, uses
Effect is good, convenient for promoting the use of.
Embodiment three
As shown in figure 3, a kind of access control method that the embodiment of the present invention three provides, is the technology provided in embodiment two
On the basis of scheme, to step S204, " at gate sentry, the door control terminal acquires the identity of visitor according to default collection rule
Information, and be compared by cloud with the visiting registered database in the estate management terminal, it compares and successfully then opens door
Prohibit, compare failure then prompts the visitor to fill in interviewed people's information " advanced optimize.It is identical or corresponding as the various embodiments described above
The explanation of term details are not described herein.That is:
At gate sentry, the face information of the door control terminal acquisition visitor;
The door control terminal passes through the visiting registrating number in cloud and the estate management terminal according to the face information
It is compared according to library, when comparing successfully, continues the acoustic information for acquiring visitor;
The door control terminal extracts voiceprint from the acoustic information, and by the voiceprint and previous step
It compares voiceprint associated by successful face information to be compared, when comparing successfully, whether detection current time is in
In effective access time, if so, opening gate, compares failure and the visitor is then prompted to fill in interviewed people's information.
Based on above-mentioned optimization, as shown in figure 3, a kind of access control method provided in this embodiment, may include walking as follows
It is rapid:
S301, at estate management, after the estate management terminal receives visiting request, acquire the face information of visitor
And voiceprint.
S302, the estate management terminal receive effective access time that property management personnel fills in.
S303, the estate management terminal carry out the face information, voiceprint and effective access time
Association, and store to visiting registered database.
S304, at gate sentry, the face information of door control terminal acquisition visitor.
S305, the door control terminal are according to the face information, by visiting in cloud and the estate management terminal
Registered database is compared, and when comparing successfully, continues the acoustic information for acquiring visitor;
Preferably, before the step of acquiring the acoustic information of visitor, further includes:
The door control terminal shows the setting text of one section of acoustic information for acquiring visitor on a display screen, and prompts
Visitor reads aloud.
Wherein, the setting text includes one of Chinese character, number, letter or multiple combinations.
It should be noted that the acquisition of acoustic information, which is divided into, has text unrelated with text two kinds relevant.With text
This related acoustic information acquisition requires visitor to pronounce according to the content of regulation, everyone sound-groove model is accurately built one by one
It must also pronounce by defined content when standing, and identifying, therefore can achieve preferable recognition effect, but this needs visitor to match
It closes, if the pronunciation of visitor is not met with defined content, can not correctly identify the visitor.And the voice letter unrelated with text
Breath acquisition does not provide the pronunciation content of visitor, model foundation relative difficulty then, but visitor is easy to use, can application range it is wider.
According to specific task and application, two kinds are to have different application ranges.
S306, the door control terminal extract voiceprint from the acoustic information, and by the voiceprint and upper one
Step compares voiceprint associated by successful face information and is compared, and when comparing successfully, whether detection current time
Within effective access time, if so, opening gate, compares failure and the visitor is then prompted to fill in interviewed people's information.
S307, the door control terminal will be stored with owner and/or tenant in interviewed people's information and the door control terminal
The information database of renting for renting information is compared, and compares to after corresponding owner or tenant, and the door control terminal is by previous step
The identity information of the rapid collected visitor is sent to corresponding owner or the intelligent and portable end equipment of tenant is audited, industry
Main or tenant sends door open command to the door control terminal, the door control terminal opening gate after the approval.
A kind of access control method provided in an embodiment of the present invention, the managing caller solved under complex application context are asked
Topic, not only increases the estate management intelligence and service quality of enterprise or cell, and also enhances the safety of gate inhibition, uses
Effect is good, convenient for promoting the use of.
Example IV
Attached drawing 4 is please referred to, for a kind of structural schematic diagram for access control system that the embodiment of the present invention four provides, the system
It is adapted for carrying out access control method provided in an embodiment of the present invention.The system is specifically used for:
At estate management, the estate management terminal 51 is used to acquire the identity information of visitor, and stores to visiting and step on
Remember database;
At gate sentry, the door control terminal 52 is used to acquire the identity information of visitor, and pass through according to collection rule is preset
Cloud 53 is compared with the visiting registered database in the estate management terminal 51, compares successfully then opening gate, compares
Failure then prompts the visitor to fill in interviewed people's information;
The door control terminal 52 be also used to be stored in interviewed people's information and the door control terminal 52 owner and/or
The information database of renting that tenant rents information is compared, and compares to after corresponding owner or tenant, the door control terminal 52 will
The identity information of the collected visitor of previous step is sent to corresponding owner or the intelligent and portable end equipment of tenant carries out
Audit, owner or tenant send door open command to the door control terminal 52,52 opening gate of door control terminal after the approval.
A kind of access control system provided in an embodiment of the present invention, the managing caller solved under complex application context are asked
Topic, not only increases the estate management intelligence and service quality of enterprise or cell, and also enhances the safety of gate inhibition, uses
Effect is good, convenient for promoting the use of.
Embodiment five
Fig. 5 is a kind of structural schematic diagram for equipment that the embodiment of the present invention five provides.Fig. 5, which is shown, to be suitable for being used to realizing this
The block diagram of the example devices 412 of invention embodiment.The equipment 412 that Fig. 5 is shown is only an example, should not be to the present invention
The function and use scope of embodiment bring any restrictions.
As shown in figure 5, equipment 412 is showed in the form of universal computing device.The component of equipment 412 may include but unlimited
In one or more processor or processing unit 416, system storage 428, different system components (including system is connected
Memory 428 and processing unit 416) bus 418.
Bus 418 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Equipment 412 typically comprises a variety of computer system readable media.These media can be it is any can be by equipment
The usable medium of 412 access, including volatile and non-volatile media, moveable and immovable medium.
System storage 428 may include the computer system readable media of form of volatile memory, such as deposit at random
Access to memory (RAM) 430 and/or cache memory 432.Equipment 412 may further include other removable/not removable
Dynamic, volatile/non-volatile computer system storage medium.Only as an example, storage system 434 can be used for read and write can not
Mobile, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although being not shown in Fig. 5, Ke Yiti
For the disc driver for being read and write to removable non-volatile magnetic disk (such as " floppy disk "), and to moving non-volatile light
The CD drive of disk (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver
It can be connected by one or more data media interfaces with bus 418.Memory 428 may include that at least one program produces
Product, the program product have one group of (for example, at least one) program module, these program modules are configured to perform of the invention each
The function of embodiment.
Program/utility 440 with one group of (at least one) program module 442, can store in such as memory
In 428, such program module 442 includes but is not limited to operating system, one or more application program, other program modules
And program data, it may include the realization of network environment in each of these examples or certain combination.Program module 442
Usually execute the function and/or method in embodiment described in the invention.
Equipment 412 can also be logical with one or more external equipments 414 (such as keyboard, sensing equipment, display 424 etc.)
Letter, can also be enabled a user to one or more equipment interact with the equipment 412 communicate, and/or with make the equipment 412
Any equipment (such as network interface card, modem etc.) that can be communicated with one or more of the other calculating equipment communicates.This
Kind communication can be carried out by input/output (I/O) interface 422.Also, equipment 412 can also by network adapter 420 with
One or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.Such as
Shown in figure, network adapter 420 is communicated by bus 418 with other modules of equipment 412.It should be understood that although not showing in figure
Out, other hardware and/or software module can be used with bonding apparatus 412, including but not limited to: microcode, device driver, superfluous
Remaining processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 416 by the program that is stored in system storage 428 of operation, thereby executing various function application with
And data processing, such as realize access control method provided by the embodiment of the present invention.It is intelligent terminal that the equipment, which is typically,
Such as robot.
Embodiment six
The embodiment of the present invention six additionally provides a kind of storage medium comprising computer executable instructions, and the computer can
It executes instruction when being executed by computer processor for executing the access control method as described in any in the embodiment of the present invention.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool
There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or
Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service
It is connected for quotient by internet).
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although referring to before
Stating embodiment, invention is explained in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (9)
1. a kind of access control method, be applied to access control system, the access control system include estate management terminal and
The door control terminal communicated by cloud with the estate management terminal, which is characterized in that the described method includes:
At estate management, the identity information of the estate management terminal acquisition visitor, and store to visiting registered database;
At gate sentry, the door control terminal acquires the identity information of visitor according to default collection rule, and by cloud with it is described
Visiting registered database in estate management terminal is compared, and compares successfully then opening gate, compares and fails described in then prompt
Visitor fills in interviewed people's information;
The door control terminal will be stored with owner in interviewed people's information and the door control terminal and/or tenant rents information
It rents information database to be compared, compare to after corresponding owner or tenant, the door control terminal is collected by previous step
The identity information of the visitor is sent to corresponding owner or the intelligent and portable end equipment of tenant is audited, and owner or tenant examine
Core sends door open command to the door control terminal, the door control terminal opening gate after passing through.
2. access control method according to claim 1, which is characterized in that the identity information includes face information harmony
Line information;
Interviewed people's information includes one of name, phone, address of interviewed people or a variety of.
3. access control method according to claim 2, which is characterized in that described at estate management, the property pipe
The identity information of terminal acquisition visitor is managed, and stores to the step of visiting registered database and includes:
At estate management, after the estate management terminal receives visiting request, the face information and vocal print letter of visitor are acquired
Breath;
The estate management terminal receives effective access time that property management personnel fills in;
The face information, voiceprint and effective access time are associated by the estate management terminal, and deposit
It stores up to visiting registered database.
4. access control method according to claim 3, which is characterized in that described at gate sentry, the door control terminal root
According to default collection rule, the identity information of visitor is acquired, and passes through the visiting registrating number in cloud and the estate management terminal
It is compared according to library, compares successfully then opening gate, compare the step of failure then prompts the visitor to fill in interviewed people's information packet
It includes:
At gate sentry, the face information of the door control terminal acquisition visitor;
The door control terminal passes through the visiting registered database in cloud and the estate management terminal according to the face information
It is compared, when comparing successfully, continues the acoustic information for acquiring visitor;
The door control terminal extracts voiceprint from the acoustic information, and the voiceprint is compared with previous step
Voiceprint associated by successful face information is compared, and when comparing successfully, whether detection current time is in effective
In access time, if so, opening gate, compares failure and the visitor is then prompted to fill in interviewed people's information.
5. access control method according to claim 4, which is characterized in that in the step of the acoustic information of the acquisition visitor
Before rapid, further includes:
The door control terminal shows the setting text of one section of acoustic information for acquiring visitor on a display screen, and prompts visitor
It reads aloud.
6. access control method according to claim 5, it is characterised in that: the setting text includes Chinese character, number, word
One of mother or multiple combinations.
7. a kind of access control system is communicated including estate management terminal and by cloud with the estate management terminal
Door control terminal, it is characterised in that:
At estate management, the estate management terminal is used to acquire the identity information of visitor, and stores to visiting registration data
Library;
At gate sentry, the door control terminal is used to acquire the identity information of visitor according to collection rule is preset, and by cloud with
Visiting registered database in the estate management terminal is compared, and compares successfully then opening gate, compares failure and then prompts
The visitor fills in interviewed people's information;
The door control terminal is also used to that owner will be stored in interviewed people's information and the door control terminal and/or tenant rents
The information database of renting of information is compared, and compares to after corresponding owner or tenant, the door control terminal adopts previous step
The identity information of the visitor collected is sent to corresponding owner or the intelligent and portable end equipment of tenant is audited, Ye Zhuhuo
Tenant sends door open command to the door control terminal, the door control terminal opening gate after the approval.
8. a kind of computer equipment characterized by comprising
One or more controllers;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
Now such as access control method of any of claims 1-6.
9. a kind of storage medium comprising computer executable instructions, the computer executable instructions are by computer processor
For executing such as access control method of any of claims 1-6 when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152930.1A CN109658579A (en) | 2019-02-28 | 2019-02-28 | A kind of access control method, system, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910152930.1A CN109658579A (en) | 2019-02-28 | 2019-02-28 | A kind of access control method, system, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109658579A true CN109658579A (en) | 2019-04-19 |
Family
ID=66123311
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910152930.1A Pending CN109658579A (en) | 2019-02-28 | 2019-02-28 | A kind of access control method, system, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109658579A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110189446A (en) * | 2019-05-31 | 2019-08-30 | 广东赛翼智能科技有限公司 | A kind of access control system based on sound groove recognition technology in e |
CN110647797A (en) * | 2019-08-05 | 2020-01-03 | 深圳市大拿科技有限公司 | Visitor detection method and device |
CN111047761A (en) * | 2019-12-25 | 2020-04-21 | 深圳招商建筑科技有限公司 | Voice interactive visitor identity recognition method and system based on intelligent terminal |
CN111899399A (en) * | 2020-06-18 | 2020-11-06 | 北京国基伟业物业管理有限公司 | Property integrated safety management system |
CN112040418A (en) * | 2020-09-01 | 2020-12-04 | 日立楼宇技术(广州)有限公司 | Visitor positioning method, visitor positioning device, visitor positioning server, visitor positioning storage medium and visitor positioning system |
CN112581671A (en) * | 2019-09-29 | 2021-03-30 | 杭州海康威视数字技术股份有限公司 | Access control method and device and access control system |
CN112767583A (en) * | 2020-12-24 | 2021-05-07 | 广州粤盾保安服务有限公司 | Access control management method and system |
CN112863032A (en) * | 2019-11-28 | 2021-05-28 | 比亚迪汽车工业有限公司 | Gate control method and device, storage medium and electronic equipment |
CN113240846A (en) * | 2021-04-26 | 2021-08-10 | 联仁健康医疗大数据科技股份有限公司 | Visitor service management method and device, electronic equipment and storage medium |
CN113362511A (en) * | 2021-01-18 | 2021-09-07 | 安徽中屏科技有限公司 | Unattended campus access control system |
CN113538759A (en) * | 2021-07-08 | 2021-10-22 | 深圳创维-Rgb电子有限公司 | Access control management method, device, equipment and storage medium based on display equipment |
CN113794741A (en) * | 2021-11-17 | 2021-12-14 | 中国南方电网有限责任公司超高压输电公司广州局 | Visitor information registration method and device, computer equipment and storage medium |
CN113903111A (en) * | 2021-02-08 | 2022-01-07 | 苏州亿尔奇信息科技有限公司 | Method, device and system for controlling and reading card of village entrance and exit personnel |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201142096Y (en) * | 2007-03-26 | 2008-10-29 | 乐志明 | Access registration controller |
US20140232522A1 (en) * | 2011-12-30 | 2014-08-21 | Merrick Schmidt-Lackner | Automated entry |
CN104834849A (en) * | 2015-04-14 | 2015-08-12 | 时代亿宝(北京)科技有限公司 | Dual-factor identity authentication method and system based on voiceprint recognition and face recognition |
CN205880945U (en) * | 2016-06-03 | 2017-01-11 | 赵树龙 | Intelligence acoustic control vocal print people face authentication access control system |
CN106504390A (en) * | 2016-11-09 | 2017-03-15 | 北京小米移动软件有限公司 | Control method for door lock, apparatus and system |
CN106790054A (en) * | 2016-12-20 | 2017-05-31 | 四川长虹电器股份有限公司 | Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition |
CN108550213A (en) * | 2018-04-19 | 2018-09-18 | 成都信息工程大学 | A kind of intelligent entrance guard control method and system based on mobile terminal |
CN108932773A (en) * | 2018-06-15 | 2018-12-04 | 王若清 | A kind of intelligent unlocking system and method |
CN109377611A (en) * | 2018-10-24 | 2019-02-22 | 平安科技(深圳)有限公司 | Caller management method, system, computer equipment and storage medium based on bio-identification |
-
2019
- 2019-02-28 CN CN201910152930.1A patent/CN109658579A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201142096Y (en) * | 2007-03-26 | 2008-10-29 | 乐志明 | Access registration controller |
US20140232522A1 (en) * | 2011-12-30 | 2014-08-21 | Merrick Schmidt-Lackner | Automated entry |
CN104834849A (en) * | 2015-04-14 | 2015-08-12 | 时代亿宝(北京)科技有限公司 | Dual-factor identity authentication method and system based on voiceprint recognition and face recognition |
CN205880945U (en) * | 2016-06-03 | 2017-01-11 | 赵树龙 | Intelligence acoustic control vocal print people face authentication access control system |
CN106504390A (en) * | 2016-11-09 | 2017-03-15 | 北京小米移动软件有限公司 | Control method for door lock, apparatus and system |
CN106790054A (en) * | 2016-12-20 | 2017-05-31 | 四川长虹电器股份有限公司 | Interactive authentication system and method based on recognition of face and Application on Voiceprint Recognition |
CN108550213A (en) * | 2018-04-19 | 2018-09-18 | 成都信息工程大学 | A kind of intelligent entrance guard control method and system based on mobile terminal |
CN108932773A (en) * | 2018-06-15 | 2018-12-04 | 王若清 | A kind of intelligent unlocking system and method |
CN109377611A (en) * | 2018-10-24 | 2019-02-22 | 平安科技(深圳)有限公司 | Caller management method, system, computer equipment and storage medium based on bio-identification |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110189446A (en) * | 2019-05-31 | 2019-08-30 | 广东赛翼智能科技有限公司 | A kind of access control system based on sound groove recognition technology in e |
CN110647797A (en) * | 2019-08-05 | 2020-01-03 | 深圳市大拿科技有限公司 | Visitor detection method and device |
CN112581671A (en) * | 2019-09-29 | 2021-03-30 | 杭州海康威视数字技术股份有限公司 | Access control method and device and access control system |
CN112863032A (en) * | 2019-11-28 | 2021-05-28 | 比亚迪汽车工业有限公司 | Gate control method and device, storage medium and electronic equipment |
CN111047761A (en) * | 2019-12-25 | 2020-04-21 | 深圳招商建筑科技有限公司 | Voice interactive visitor identity recognition method and system based on intelligent terminal |
CN111899399A (en) * | 2020-06-18 | 2020-11-06 | 北京国基伟业物业管理有限公司 | Property integrated safety management system |
CN112040418A (en) * | 2020-09-01 | 2020-12-04 | 日立楼宇技术(广州)有限公司 | Visitor positioning method, visitor positioning device, visitor positioning server, visitor positioning storage medium and visitor positioning system |
CN112767583A (en) * | 2020-12-24 | 2021-05-07 | 广州粤盾保安服务有限公司 | Access control management method and system |
CN113362511A (en) * | 2021-01-18 | 2021-09-07 | 安徽中屏科技有限公司 | Unattended campus access control system |
CN113903111A (en) * | 2021-02-08 | 2022-01-07 | 苏州亿尔奇信息科技有限公司 | Method, device and system for controlling and reading card of village entrance and exit personnel |
CN113240846A (en) * | 2021-04-26 | 2021-08-10 | 联仁健康医疗大数据科技股份有限公司 | Visitor service management method and device, electronic equipment and storage medium |
CN113538759A (en) * | 2021-07-08 | 2021-10-22 | 深圳创维-Rgb电子有限公司 | Access control management method, device, equipment and storage medium based on display equipment |
CN113538759B (en) * | 2021-07-08 | 2023-08-04 | 深圳创维-Rgb电子有限公司 | Gate inhibition management method, device and equipment based on display equipment and storage medium |
CN113794741A (en) * | 2021-11-17 | 2021-12-14 | 中国南方电网有限责任公司超高压输电公司广州局 | Visitor information registration method and device, computer equipment and storage medium |
CN113794741B (en) * | 2021-11-17 | 2022-04-19 | 中国南方电网有限责任公司超高压输电公司广州局 | Visitor information registration method and device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109658579A (en) | A kind of access control method, system, equipment and storage medium | |
CN111488433B (en) | Artificial intelligence interactive system suitable for bank and capable of improving field experience | |
KR102351670B1 (en) | Method of construction and registration of gates and device therefor | |
WO2021175019A1 (en) | Guide method for audio and video recording, apparatus, computer device, and storage medium | |
US11315366B2 (en) | Conference recording method and data processing device employing the same | |
CN108682414A (en) | Sound control method, voice system, equipment and storage medium | |
CN109118616A (en) | access control method and access control device | |
JP2021533397A (en) | Speaker dialification using speaker embedding and a trained generative model | |
CN109660509A (en) | Login method, device, system and storage medium based on recognition of face | |
CN107799120A (en) | Service robot identifies awakening method and device | |
CN109979046A (en) | Security method, apparatus, computer installation and computer readable storage medium | |
CN107483445A (en) | A kind of silent Application on Voiceprint Recognition register method, device, server and storage medium | |
CN112200697B (en) | Remote video room watching method, device, equipment and computer storage medium | |
US9014347B2 (en) | Voice print tagging of interactive voice response sessions | |
CN109215646A (en) | Voice interaction processing method, device, computer equipment and storage medium | |
CN108449321A (en) | Login method, server and client side | |
CN103310139A (en) | Input validation method and input validation device | |
CN110399708A (en) | A kind of dual-identity authentication method, apparatus and electronic equipment | |
CN104965589A (en) | Human living body detection method and device based on human brain intelligence and man-machine interaction | |
CN104392723A (en) | Sharing instrument platform management method based on voiceprint recognition technology | |
CN109729067A (en) | Voice punch card method, device, equipment and computer storage medium | |
CN109697779A (en) | A kind of access control method and relevant apparatus | |
CN110826036A (en) | User operation behavior safety identification method and device and electronic equipment | |
CN111275444A (en) | Contract signing-based double recording method and device, terminal and storage medium | |
CN111400463B (en) | Dialogue response method, device, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190419 |
|
RJ01 | Rejection of invention patent application after publication |