CN112365643A - Access area authority management method and related device - Google Patents

Access area authority management method and related device Download PDF

Info

Publication number
CN112365643A
CN112365643A CN202011275709.4A CN202011275709A CN112365643A CN 112365643 A CN112365643 A CN 112365643A CN 202011275709 A CN202011275709 A CN 202011275709A CN 112365643 A CN112365643 A CN 112365643A
Authority
CN
China
Prior art keywords
electronic device
access area
information
personal credit
travel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011275709.4A
Other languages
Chinese (zh)
Inventor
戈东
侯怀德
吴岩
潘乐扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skycomm Co ltd
Original Assignee
Shenzhen Skycomm Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skycomm Co ltd filed Critical Shenzhen Skycomm Co ltd
Priority to CN202011275709.4A priority Critical patent/CN112365643A/en
Publication of CN112365643A publication Critical patent/CN112365643A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an access area authority management method and a related device, wherein the method comprises the following steps: the method comprises the steps that a server receives travel data sent by first electronic equipment, wherein the travel data are used for representing travel records of the first electronic equipment in an access area; the server generates personal credit information based on the travel data; the server determines access area authority information of the first electronic device based on the personal credit information when detecting that the first electronic device enters the access area; and the server sends the access area authority information to the first electronic equipment. Therefore, differentiated management of the access area authority of the visitor can be realized, and the occurrence of a divulgence event is effectively prevented.

Description

Access area authority management method and related device
Technical Field
The present application relates to the field of information technologies, and in particular, to a method and a related apparatus for managing access area permissions.
Background
At present, for important places such as camps, confidential research and development places, government office places and the like, a manual checking method is usually used for forbidding visitors from carrying mobile phones, or carrying mobile phones but forbidding photographing, recording, phone dialing and the like, so that the safety control of the places is realized, and the occurrence of a divulgence event is prevented. These methods of preventing disclosure tend to result in poor guest experience and, in addition, manual inspection does not completely prevent the occurrence of disclosure incidents.
Disclosure of Invention
The embodiment of the application provides an access area authority management method and a related device, which can generate personal credit information based on travel data of visitors in an access area, and then determine the access area authority information of the visitors based on the personal credit information, thereby realizing differentiated management of the access area authorities of the visitors and effectively preventing a divulgence event.
In a first aspect, an embodiment of the present application provides an access area authority management method, which is applied to a server, and the method includes:
receiving travel data sent by a first electronic device, wherein the travel data is used for representing a travel record of the first electronic device in an access area;
generating personal credit information based on the travel data, wherein the travel data comprises travel tracks, travel time and violation operation information of the first electronic device in the access area;
determining access area permission information of the first electronic device based on the personal credit information when the first electronic device is detected to enter the access area;
and sending the access area authority information to the first electronic equipment.
In a possible embodiment, the receiving the trip data sent by the first electronic device specifically includes:
and after detecting that the first electronic equipment leaves the access area, receiving the journey data sent by the first electronic equipment.
In a possible embodiment, the receiving the trip data sent by the first electronic device specifically includes:
receiving the travel data periodically transmitted by the first electronic device when the first electronic device is detected to be in the access area.
In a possible embodiment, the detecting that the first electronic device enters the access area specifically includes:
and judging whether the equipment identifier of the electronic equipment corresponding to the personal identity information is the first electronic equipment or not based on the personal identity information sent by the second electronic equipment, and if so, determining that the first electronic equipment enters the access area.
In a possible embodiment, the detecting that the first electronic device enters the access area specifically includes:
and after receiving a first instruction sent when the first electronic device scans the check-in two-dimensional code on the second electronic device, determining that the first electronic device enters the access area.
In a possible embodiment, the determining the access area authority information of the first electronic device based on the personal credit information specifically includes:
after determining a personal credit score based on the personal credit information, determining access area permission information for the first electronic device based on the personal credit score.
In a possible embodiment, the determining access area authority information of the first electronic device based on the personal credit score specifically includes:
if the personal credit score is higher than a preset threshold value, determining that the accessible area of the first electronic equipment comprises a first access area and a second access area; if the personal credit score is equal to or lower than the preset threshold value, determining that the accessible area of the first electronic equipment only comprises the second access area.
In a second aspect, an embodiment of the present application provides an access area right management apparatus, including: the processing unit is used for receiving travel data sent by a first electronic device through the communication unit, and the travel data is used for representing a travel record of the first electronic device in an access area; and for generating personal credit information based on the travel data, the travel data including a travel trajectory, travel time, and violation operation information for the first electronic device within the access area; and upon detecting entry of the first electronic device into the access area, determining access area permission information for the first electronic device based on the personal credit information; and the communication unit is used for sending the access area authority information to the first electronic equipment.
In a third aspect, embodiments provide a server comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps as in the first aspect of embodiments of the present application.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program comprising program instructions that, when executed by a processor, perform some or all of the steps as described in the first aspect of embodiments of the present application.
In a fifth aspect, embodiments of the present application provide a computer program product, wherein the computer program product comprises a non-transitory computer storage medium storing a computer program operable to cause a computer to perform some or all of the steps as described in the first aspect of embodiments of the present application. The computer program product may be a software installation package.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a system architecture according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a method for managing rights to access an area according to an embodiment of the present application;
fig. 3 is a flowchart illustrating another method for managing rights to access an area according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a server provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 6 is a block diagram illustrating functional units of an apparatus for managing rights of access areas according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be understood that the terms "first," "second," and the like in the description and claims of this application and in the drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device described in the embodiment of the present application may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a video matrix, a monitoring platform, a Mobile Internet device (MID, Mobile Internet Devices), or a wearable device, which are merely examples and are not exhaustive, and include but not limited to the above Devices.
Fig. 1 is a schematic structural diagram of a system architecture according to an embodiment of the present application.
As shown in fig. 1, the system architecture includes a server 110, an electronic device 120, and an electronic device 130. The server 110, the electronic device 120, and the electronic device 130 may all complete data interaction through communication connections.
The electronic device 120 may be a visitor machine accessing a doorway of an area, and has an information recognition function of a human face, a fingerprint, an iris, and the like. The electronic device 130 may be a handset carried by a visitor. When the visitor arrives at the door of the access area, the electronic device 120 may obtain the personal identity information and the on-site face information of the visitor, and send the personal identity information and the on-site face information to the server 110, and perform the on-site verification of the combination of the personal identification and the evidence (for example, the comparison verification of the face information on the identity card and the on-site face information) on the visitor through the server 110, thereby completing the registration of the visitor information. Further, the electronic device 120 may display the check-in two-dimensional code, the electronic device 130 may receive a code scanning operation of the visitor with respect to the check-in two-dimensional code, in response to the operation, the electronic device 130 may download a client, the client may be configured to record the travel data of the electronic device 130 in the access area, and may further implement management and control over the electronic device 130, for example, disable some functions, such as a photographing function, a recording function, and the like, on the electronic device 130, after receiving a registration operation or a login operation of the visitor on the client, the electronic device 130 may start recording the travel data of the electronic device 130, and display first prompt information for prompting the visitor to access the access area. When it is detected that the visitor leaves the access area, the electronic device 120 may display the check-out two-dimensional code, and the electronic device 130 may receive a code scanning operation of the visitor with respect to the check-out two-dimensional code, and in response to the operation, the electronic device 130 may display a second prompt message for prompting the visitor to leave the access area. Then, the electronic device 130 may upload the trip data accessed by the visitor this time to the server 110, the server 110 may generate personal credit information of the visitor based on the trip data, and when the visitor accesses again next time, the access area permission information of the visitor may be determined based on the personal credit information at this time, for example, a personal credit score may be determined based on the personal credit information at this time, and then the access area permission information of the visitor may be determined based on the personal credit score, for example, a high personal credit score indicates that the visitor may access a plurality of areas, and a low personal credit score indicates that the visitor may only access some public areas. Therefore, differentiated management of the access area authority of the visitor can be realized, and the occurrence of a divulgence event is effectively prevented.
Fig. 2 is a flowchart illustrating a method for managing rights to access an area according to an embodiment of the present application. Applied to a server, as shown in fig. 2, the method may specifically include the following steps:
step S201, the server receives the travel data sent by the first electronic device, where the travel data is used to represent a travel record of the first electronic device in the access area.
The first electronic device may be a mobile phone carried by a visitor, and the travel data may be used to represent a travel record of the first electronic device in the access area, that is, a travel record of the visitor in the access area.
In some possible embodiments, the server may receive the trip data sent by the first electronic device after detecting that the first electronic device leaves the access area, that is, after the first electronic device leaves the access area, the first electronic device may send all the trip data from entering the access area to leaving the access area to the server.
In other possible embodiments, the server may receive the travel data periodically transmitted by the first electronic device when detecting that the first electronic device is in the access area, that is, when the first electronic device enters the access area, the first electronic device may transmit the travel data of the first electronic device to the server at regular intervals until the first electronic device leaves the access area. The period may be 0.1 second, 0.5 second, 1 second, 2 seconds, 30 seconds, 60 seconds, etc., and is not limited herein.
In step S202, the server generates personal credit information based on the travel data.
The travel data may include a travel track, a travel time, and violation information of the first electronic device in the access area. Specifically, the travel route may be GPS coordinates of the first electronic device in the access area, and the server may determine whether the first electronic device enters a contact-prohibited portion or a key position in the access area based on the travel route; the access area may include a plurality of sub-areas, such as a first access area, a second access area, and the like, the travel time may be an access duration of the first electronic device in each of the sub-areas, and the server may determine, based on the travel time, whether the access duration of the first electronic device in each of the sub-areas is within a preset access duration; the illegal operation may be a photographing operation, a recording operation, etc. that the visitor attempts to target at the first electronic device.
The server may generate the personal credit information based on the trip data, where the personal credit information may be a set of violation information lists of the first electronic device in the access area, and the violations may include, but are not limited to, the following behaviors: a position or a key position where the first electronic device enters the access area and contact of the first electronic device is prohibited; the access duration of the first electronic device in some of the sub-areas is not within the preset access duration; the visitor attempts a photographing operation, a recording operation, etc. for the first electronic device described above.
Step S203, when the server detects that the first electronic device enters the access area, the server determines access area authority information of the first electronic device based on the personal credit information.
The detecting, by the server, that the first electronic device enters the access area may include: the server judges whether the equipment identifier of the electronic equipment corresponding to the personal identity information is the first electronic equipment or not based on the personal identity information sent by the second electronic equipment, and if so, the server determines that the first electronic equipment enters the access area, wherein the second electronic equipment can be a visitor machine at the door of the access area. In some possible embodiments, the server detecting that the first electronic device enters the access area may further include: and after receiving a first instruction sent by the first electronic device when the first electronic device scans the check-in two-dimensional code on the second electronic device, the server determines that the first electronic device enters the access area.
Specifically, the determining, by the server, the access area authority information of the first electronic device based on the personal credit information may include: the server determines a personal credit score based on the personal credit information, and then determines access area authority information of the first electronic device based on the personal credit score. If the personal credit score is higher than a preset threshold value, determining that the accessible area of the first electronic device can comprise a first access area and a second access area; if the personal credit score is equal to or lower than the preset threshold, determining that the accessible area of the first electronic device may only include the second access area, wherein the first access area may include one or more of a private area, a secret area and the like, and the second access area may be a public area. The server may further determine the access area authority information of the first electronic device by using other indexes, in addition to the index of the personal credit score, based on the personal credit information, and the server is not limited herein.
In some possible embodiments, the server determining the personal credit score based on the personal credit information may include: the personal credit score may be set to have a first preset threshold, and if the personal credit information does not have the violation, the personal credit score may be determined to be the first preset threshold, where the first preset threshold may be a highest score of the personal credit score. If the personal credit information includes the illegal action, each illegal action may correspond to a corresponding score, and the personal credit score may be determined as the sum of the scores corresponding to all the illegal actions subtracted from the first preset threshold. The personal credit score may be determined by other means based on the personal credit information, and is not limited herein.
In some possible embodiments, the determining, by the server, the access area authority information of the first electronic device based on the personal credit score may include: the personal credit score may be set with a second preset threshold, where the second preset threshold is lower than the first preset threshold, and the access area may include a first access area and a second access area, where the first access area may include one or more of a secret area, a private area, and the like, and the second access area may be a public area. If the personal credit score is higher than the second preset threshold, determining that the accessible area of the first electronic device may include all areas in the first access area and the second access area; determining that the accessible region of the first electronic device may only include the second access region if the personal credit score is equal to or lower than the second predetermined threshold.
In some possible embodiments, the personal credit score may be further set with a more preset threshold to manage access area rights of the first electronic device more finely. For example, the personal credit score may be further set with a third preset threshold and a fourth preset threshold, where the third preset threshold and the fourth preset threshold are both higher than the second preset threshold and lower than the first preset threshold, and the third preset threshold is higher than the fourth preset threshold. If the personal credit score is higher than the third preset threshold, determining that the accessible area of the first electronic device may include all areas in the first access area and the second access area; if the personal credit score is between the fourth preset threshold and the third preset threshold, determining that the accessible area of the first electronic device may include an area other than a private area in the first access area and the second access area; if the personal credit score is between the second preset threshold and the fourth preset threshold, determining that the accessible area of the first electronic device may include an area other than a private area and a secret area in the first access area and the second access area; determining that the accessible region of the first electronic device may only include a second access region if the personal credit score is equal to or lower than the second predetermined threshold.
And step S204, the server sends the access area authority information to the first electronic equipment.
Specifically, after determining the access area permission information of the first electronic device based on the personal credit information, the server may send the access area permission information to the first electronic device, so as to prompt the guest to enter an access area that the guest may only have permission to enter.
Fig. 3 is a flowchart illustrating another method for managing rights to access an area according to an embodiment of the present application. The following developments will provide a detailed description:
stage one (S301 to S313): visitor first registration
S301, the electronic device 120 acquires personal identity information and on-site face information of the visitor.
The electronic device 120 may be, among other things, a visitor machine that accesses a doorway of an area.
Specifically, when it is detected that the visitor arrives at the doorway of the access area, the electronic device 120 may obtain the personal identity information of the visitor through the identity card of the visitor; the electronic device 120 may capture a face picture of the visitor by using a camera to obtain on-site face picture information of the visitor.
S302-S303, the electronic device 120 sends the personal identity information of the visitor and the live face photo information acquired in the step S301 to the server 110, and after the server 110 receives the personal identity information of the visitor and the live face photo information sent by the electronic device 120, the site verification of the people and certificate integration is performed to complete the registration of the visitor information.
Specifically, the server 110 may compare the face photograph in the received personal identification information of the visitor with the live face photograph. And if the comparison is successful, the visitor completes the information registration. If the comparison fails, the electronic device 120 may take a live face picture of the visitor again, and then send the live face picture to the server 110 again, and the server 110 compares the face picture in the personal identity information with the live face picture again until the comparison is successful, and the visitor completes information registration.
In some possible embodiments, the registration information of the visitor may also be fingerprint information, iris information, etc. biometric information of the visitor.
S304-S308, the electronic device 120 may display the first check-in two-dimensional code, the electronic device 130 may download the first client after receiving a code scanning operation of the visitor with respect to the first check-in two-dimensional code, and then, the electronic device 130 may start recording the first travel data and display first prompt information after receiving a registration operation of the visitor with respect to the first client, where the first prompt information is used to prompt the visitor to enter all access areas.
The electronic device 130 may be a mobile phone carried by a visitor.
Specifically, the electronic device 120 may display the first check-in two-dimensional code, after the registration of the visitor information is completed by the server 110, the electronic device 130 may receive a code scanning operation of the visitor for the first check-in two-dimensional code, and download a first client, where the first client may be used to record the travel data on the electronic device 130, for example, the first travel data, and the first client may further implement control over the electronic device 130, such as disabling certain functions, such as a photographing function, a recording function, and the like, on the electronic device 130, where the first client may be an application program, or an applet or a fast application in the application program, and is not limited herein. Thereafter, the electronic device 130 may receive a registration operation of the guest for the first client, which may include: the visitor binds information such as a mobile phone number, mobile phone equipment information, personal identity information and the like. After receiving the registration operation of the visitor to the first client, the first client starts to disable some functions, such as a photographing function, a recording function, and the like, on the electronic device 130, and the electronic device 130 may start to record the first trip data and display first prompt information, where the first prompt information is used to prompt the visitor to enter all the access areas.
S309 to S312, the electronic device 120 may display the first two-dimensional code, after the electronic device 130 receives a code scanning operation of the visitor on the first two-dimensional code, the electronic device 130 may display second prompt information for prompting the visitor to leave the access area, and meanwhile, the electronic device 130 may send the first trip data to the server 110.
Specifically, the electronic device 120 may always display the first two-dimensional check-out code, or when the electronic device 120 detects the face information of the visitor, the first two-dimensional check-out code is displayed. After receiving the code scanning operation of the visitor on the first checked-out two-dimensional code, the electronic device 130 may display second prompt information for prompting that the user may leave the access area. The first client may disable certain functions of the electronic device 130, such as a photographing function and a recording function. Meanwhile, the electronic device 130 may transmit first travel data to the server 110, where the first travel data is used to represent a travel record of the electronic device 130 in the access area, that is, a travel record of the visitor in the access area.
In some possible embodiments, the server 110 may receive the trip data periodically transmitted by the electronic device 130 when detecting that the electronic device 130 is in the access area, that is, when the electronic device 130 enters the access area, the electronic device 130 may transmit the trip data of the electronic device 130 to the server 110 at regular intervals until the electronic device 130 leaves the access area, and the electronic device 130 transmits all the trip data, that is, the first trip data, to the server 110. The period may be 0.1 second, 0.5 second, 1 second, 2 seconds, 30 seconds, 60 seconds, etc., and is not limited herein.
S313, after the server 110 receives the first journey data of the visitor in the access area, the first personal credit information may be generated based on the first journey data.
The first travel data may include a travel track, a travel time, and violation information of the electronic device 130 in the access area. Specifically, the travel trajectory may be GPS coordinates of the electronic device 130 in the access area, and the server 110 may determine whether the electronic device 130 enters a contact-prohibited portion or a key position in the access area based on the travel trajectory; the access area may include a plurality of sub-areas, such as a first access area, a second access area, and the like, the travel time may be an access duration of the electronic device 130 in each of the sub-areas, and the server 110 may determine, based on the travel time, whether the access duration of the electronic device 130 in each of the sub-areas is within a preset access duration; the above-mentioned illegal operation may be a photographing operation, a recording operation, etc. that the visitor intends to aim at the electronic device 130.
The server 110 may generate the first personal credit information based on the first itinerary data, where the first personal credit information may be a set of violation information lists of the electronic device 130 in the access area, and the violations may include, but are not limited to, the following behaviors: the electronic device 130 enters a contact-prohibited portion or a key position in the access area; the access duration of the electronic device 130 in some of the sub-areas is not within the preset access duration; the visitor attempts a photographing operation, a recording operation, etc., with respect to the electronic device 130.
Stage two (S314-S327): visitor non-first registration (second registration as an example)
S314-S316, after the electronic device 120 acquires the personal identity information and the field face information of the visitor, the acquired personal identity information and the field face information of the visitor are sent to the server 110, and after the server 110 receives the personal identity information and the field face information of the visitor sent by the electronic device 120, the site verification of the integration of the personality and the evidence is carried out, and the registration of the visitor information is completed.
The specific implementation process of steps S314 to S316 may refer to the related contents of steps S301 to S303, which are not described herein again.
S317 to S319, the server 110 may acquire the first personal credit information generated in step S313 based on the registration information of the visitor, and determine the access area authority information of the visitor this time based on the first personal credit information, that is, determine the access area information that the visitor has authority to enter this time. The server 110 may then transmit the access area permission information of this time of the visitor to the electronic device 130 for prompting the visitor to enter only the access area to which the visitor has permission to enter.
Specifically, the server 110 may determine whether the device identifier of the electronic device corresponding to the personal identity information is the electronic device 130 based on the registration information of the visitor, for example, in a case that the first client is installed on the electronic device 130, where the server 110 determines whether the device identifier of the electronic device corresponding to the personal identity information is the electronic device 130 based on the personal identity information of the visitor sent to the server 110 by the electronic device 120, and if so, it is determined that the electronic device 130 enters the access area, and the server 110 may acquire the first personal credit information generated in step S313, that is, the personal credit information of the visitor at the last visit. Then, the server 110 may determine the access area authority information of the visitor this time, that is, the access area information to which the visitor is authorized to enter this time, based on the first person credit information. The server 110 may then transmit the access area permission information of this time of the visitor to the electronic device 130 for prompting the visitor to enter only the access area to which the visitor has permission to enter.
In some possible embodiments, the server 110 may acquire the first personal credit information generated in step S313 based on the registration information of the visitor, and may further include: in a case that the first client is not installed on the electronic device 130, after receiving a code scanning operation of the visitor on the second check-in two-dimensional code displayed on the electronic device 120, the electronic device 130 may download the first client, and send a first instruction to the server 110, after receiving the first instruction, the server 110 determines that the electronic device 130 enters the access area based on the registration information of the visitor, and further obtains the first personal credit information generated in step S313.
In step S318, the specific implementation manner of the server 110 determining the current access area permission information of the visitor based on the first personal credit information may refer to the relevant content in step S203 in the method embodiment shown in fig. 2, which is not described herein again.
S320-S322, after receiving the operation of the guest to open the first client, the electronic device 130 may display the access area permission information of the guest this time, where the access area permission information is used to indicate an access area that the guest has permission to enter this time. The first client may start to disable certain functions of the electronic device 130, such as a photographing function, a recording function, and the like. Meanwhile, the electronic device 130 starts recording the second trip data and displays a third prompt message for prompting the visitor to enter the access area authorized to enter this time.
The operation of the guest to open the first client may include: and the login operation of the visitor to the first client.
S323-S326, the electronic device 120 may display the second checked-out two-dimensional code, after the electronic device 130 receives a code scanning operation of the visitor on the second checked-out two-dimensional code, the electronic device 130 may display fourth prompting information for prompting the visitor to leave the access area, and meanwhile, the electronic device 130 may send the second trip data to the server 110.
Specifically, the electronic device 120 may always display the second checked-out two-dimensional code, or when the electronic device 120 detects the face information of the visitor, the second checked-out two-dimensional code is displayed. After receiving the code scanning operation of the visitor on the second checked-out two-dimensional code, the electronic device 130 may display fourth prompt information for prompting that the user may leave the access area. The first client may disable certain functions of the electronic device 130, such as a photographing function and a recording function. Meanwhile, the electronic device 130 may transmit second travel data to the server 110, where the second travel data is used to represent a travel record of the electronic device 130 in the access area, that is, a travel record of the visitor in the access area.
In some possible embodiments, the server 110 may receive the trip data periodically transmitted by the electronic device 130 when detecting that the electronic device 130 is in the access area, that is, when the electronic device 130 enters the access area, the electronic device 130 may transmit the trip data of the electronic device 130 to the server 110 at regular intervals until the electronic device 130 leaves the access area, and the electronic device 130 transmits all the trip data, that is, the second trip data, to the server 110. The period may be 0.1 second, 0.5 second, 1 second, 2 seconds, 30 seconds, 60 seconds, etc., and is not limited herein.
S327, the server 110 receives the second journey data of the visitor in the access area, and generates second person credit information based on the second journey data.
The second travel data may include a travel track, a travel time, and violation information of the electronic device 130 in the access area. Specifically, the travel trajectory may be GPS coordinates of the electronic device 130 in the access area, and the server 110 may determine whether the electronic device 130 enters a contact-prohibited portion or a key position in the access area based on the travel trajectory; the access area may include a plurality of sub-areas, such as a first access area, a second access area, and the like, the travel time may be an access duration of the electronic device 130 in each of the sub-areas, and the server 110 may determine, based on the travel time, whether the access duration of the electronic device 130 in each of the sub-areas is within a preset access duration; the above-mentioned illegal operation may be a photographing operation, a recording operation, etc. that the visitor intends to aim at the electronic device 130.
The server 110 may generate the second personal credit information based on the second trip data, where the second personal credit information may be a set of violation information lists of the electronic device 130 in the access area, and the violations may include, but are not limited to, the following behaviors: the electronic device 130 enters a contact-prohibited portion or a key position in the access area; the access duration of the electronic device 130 in some of the sub-areas is not within the preset access duration; the visitor attempts a photographing operation, a recording operation, etc., with respect to the electronic device 130.
It is easily understood that, if the visitor is registered for the nth time, where N is a positive integer greater than or equal to 2, the visitor's access area permission information is determined according to the personal credit information obtained after the visitor registers for the nth-1 time, that is, the visitor's access area permission information is determined according to the personal credit information obtained after the visitor last registered for access. The above-mentioned phase two (including steps S315-S327) is only for explaining the method of managing the right of accessing the area by taking the guest as an example for the second registration, and is not to be construed as limiting the present application.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Fig. 4 is a schematic structural diagram of a server 110 according to an embodiment of the present disclosure.
As shown in fig. 4, the server 110 includes a processor 111, a communication interface 112, and a memory 113, wherein the processor 111, the communication interface 112, and the memory 113 are connected to each other through a bus 114, and the bus 114 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 114 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus. Wherein the memory 113 is configured to store a computer program comprising program instructions, the processor 111 being configured to invoke the program instructions for performing the steps of:
receiving travel data sent by a first electronic device, wherein the travel data is used for representing a travel record of the first electronic device in an access area;
generating personal credit information based on the travel data, wherein the travel data comprises travel tracks, travel time and violation operation information of the first electronic device in the access area;
determining access area permission information of the first electronic device based on the personal credit information when the first electronic device is detected to enter the access area;
and sending the access area authority information to the first electronic equipment.
The specific implementation process of the above steps may refer to specific relevant contents in the method embodiment shown in fig. 2, and is not described herein again.
Fig. 5 is a schematic structural diagram of an electronic device 120 according to an embodiment of the present disclosure.
As shown in fig. 5, the electronic device 120 includes a processor 121, a communication interface 122 and a memory 123, wherein the processor 121, the communication interface 122 and the memory 123 are connected to each other through a bus 124, and the bus 124 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus or the like. The bus 124 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus. The memory 123 is configured to store a computer program, the computer program includes program instructions, and the processor 121 is configured to call the program instructions to execute steps in the method embodiment shown in fig. 3, where specific steps may refer to the foregoing related contents, and are not described herein again.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method embodiment, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 6 is a block diagram illustrating functional units of an apparatus 600 for managing rights of access areas according to an embodiment of the present application. As shown in fig. 6, the access area right management apparatus 600 includes a processing unit 620 and a communication unit 630, wherein,
the processing unit 620 is configured to receive, through the communication unit 630, journey data sent by a first electronic device, where the journey data is used to represent a journey record of the first electronic device in an access area; and for generating personal credit information based on the travel data, the travel data including a travel trajectory, travel time, and violation operation information for the first electronic device within the access area; and upon detecting entry of the first electronic device into the access area, determining access area permission information for the first electronic device based on the personal credit information; and for transmitting the access area right information to the first electronic device through the communication unit 630.
The access area right management apparatus 600 may further include a storage unit 610, and the storage unit 610 is used for storing program codes and data of the electronic device. The processing unit 620 may be a processor, the communication unit 630 may be a touch display screen or a transceiver, and the storage unit 610 may be a memory. For specific functional descriptions of each functional module in the access region right management apparatus 600, reference may be made to the method embodiments shown in fig. 2 and fig. 3, which are not described herein again.
Embodiments of the present application also provide a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program for electronic data exchange, and the computer program causes a computer to execute part or all of the steps of any one of the methods as described in the above method embodiments.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. An access area authority management method applied to a server is characterized by comprising the following steps:
receiving travel data sent by a first electronic device, wherein the travel data is used for representing a travel record of the first electronic device in an access area;
generating personal credit information based on the travel data, wherein the travel data comprises travel tracks, travel time and violation operation information of the first electronic device in the access area;
determining access area permission information of the first electronic device based on the personal credit information when the first electronic device is detected to enter the access area;
and sending the access area authority information to the first electronic equipment.
2. The method according to claim 1, wherein the receiving of the trip data sent by the first electronic device specifically includes:
and after detecting that the first electronic equipment leaves the access area, receiving the journey data sent by the first electronic equipment.
3. The method according to claim 1, wherein the receiving of the trip data sent by the first electronic device specifically includes:
receiving the travel data periodically transmitted by the first electronic device when the first electronic device is detected to be in the access area.
4. The method according to any one of claims 1 to 3, wherein the detecting that the first electronic device enters the access area specifically includes:
and judging whether the equipment identifier of the electronic equipment corresponding to the personal identity information is the first electronic equipment or not based on the personal identity information sent by the second electronic equipment, and if so, determining that the first electronic equipment enters the access area.
5. The method according to any one of claims 1 to 3, wherein the detecting that the first electronic device enters the access area specifically includes:
and after receiving a first instruction sent when the first electronic device scans the check-in two-dimensional code on the second electronic device, determining that the first electronic device enters the access area.
6. The method according to any one of claims 1 to 5, wherein the determining access area permission information of the first electronic device based on the personal credit information specifically comprises:
after determining a personal credit score based on the personal credit information, determining access area permission information for the first electronic device based on the personal credit score.
7. The method of claim 6, wherein determining access zone permission information for the first electronic device based on the personal credit score comprises:
if the personal credit score is higher than a preset threshold value, determining that the accessible area of the first electronic equipment comprises a first access area and a second access area;
if the personal credit score is equal to or lower than the preset threshold value, determining that the accessible area of the first electronic equipment only comprises the second access area.
8. An access area rights management arrangement comprising a processing unit and a communication unit, wherein,
the processing unit is used for receiving the travel data sent by the first electronic device through the communication unit, wherein the travel data is used for representing the travel record of the first electronic device in the access area; and for generating personal credit information based on the travel data, the travel data including a travel trajectory, travel time, and violation operation information for the first electronic device within the access area; and upon detecting entry of the first electronic device into the access area, determining access area permission information for the first electronic device based on the personal credit information; and the communication unit is used for sending the access area authority information to the first electronic equipment.
9. A server, comprising a processor, memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method according to any one of claims 1-7.
CN202011275709.4A 2020-11-16 2020-11-16 Access area authority management method and related device Pending CN112365643A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011275709.4A CN112365643A (en) 2020-11-16 2020-11-16 Access area authority management method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011275709.4A CN112365643A (en) 2020-11-16 2020-11-16 Access area authority management method and related device

Publications (1)

Publication Number Publication Date
CN112365643A true CN112365643A (en) 2021-02-12

Family

ID=74516256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011275709.4A Pending CN112365643A (en) 2020-11-16 2020-11-16 Access area authority management method and related device

Country Status (1)

Country Link
CN (1) CN112365643A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114180421A (en) * 2021-12-08 2022-03-15 日立楼宇技术(广州)有限公司 Elevator calling method and device, computer equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005149362A (en) * 2003-11-19 2005-06-09 Mitsubishi Electric Corp Visitor reception system
CN107016754A (en) * 2017-03-09 2017-08-04 武汉邮电科学研究院 A kind of intelligent community management system analyzed based on big data and method
CN107579947A (en) * 2016-07-05 2018-01-12 中兴通讯股份有限公司 A kind of control method, device, server and the mobile terminal of visitor's terminal
CN109800553A (en) * 2018-12-07 2019-05-24 平安科技(深圳)有限公司 A kind of computer room safety management method, system and readable storage medium storing program for executing
CN110473328A (en) * 2019-09-09 2019-11-19 腾讯科技(深圳)有限公司 Community's access control management method and device, storage medium, electronic equipment
WO2019245383A1 (en) * 2018-06-20 2019-12-26 Detec As Improved access control system and a method thereof controlling access of persons into restricted areas
CN111179484A (en) * 2019-10-30 2020-05-19 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium
CN211506610U (en) * 2020-03-25 2020-09-15 北京国信会视科技有限公司 Factory personnel track management system based on two-dimensional code

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005149362A (en) * 2003-11-19 2005-06-09 Mitsubishi Electric Corp Visitor reception system
CN107579947A (en) * 2016-07-05 2018-01-12 中兴通讯股份有限公司 A kind of control method, device, server and the mobile terminal of visitor's terminal
CN107016754A (en) * 2017-03-09 2017-08-04 武汉邮电科学研究院 A kind of intelligent community management system analyzed based on big data and method
WO2019245383A1 (en) * 2018-06-20 2019-12-26 Detec As Improved access control system and a method thereof controlling access of persons into restricted areas
CN109800553A (en) * 2018-12-07 2019-05-24 平安科技(深圳)有限公司 A kind of computer room safety management method, system and readable storage medium storing program for executing
CN110473328A (en) * 2019-09-09 2019-11-19 腾讯科技(深圳)有限公司 Community's access control management method and device, storage medium, electronic equipment
CN111179484A (en) * 2019-10-30 2020-05-19 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium
CN211506610U (en) * 2020-03-25 2020-09-15 北京国信会视科技有限公司 Factory personnel track management system based on two-dimensional code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114180421A (en) * 2021-12-08 2022-03-15 日立楼宇技术(广州)有限公司 Elevator calling method and device, computer equipment and storage medium
CN114180421B (en) * 2021-12-08 2023-07-07 日立楼宇技术(广州)有限公司 Ladder calling method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
JP7240030B2 (en) Identity authentication method, device and server
AU2016273888B2 (en) Controlling physical access to secure areas via client devices in a networked environment
EP2642685A1 (en) Method for providing active security authentication, and terminal and system for supporting same
CN107979571B (en) File use processing method, terminal and server
CN106537403A (en) System for accessing data from multiple devices
EP1980049A1 (en) Wireless authentication
MX2013011116A (en) Distribution of premises access information.
US10186101B2 (en) Method, device and system for controlling opening of A-B doors
JP2006331048A (en) Personal identification method and system by position information
CN108597066B (en) Visitor management method and device and computer readable storage medium
KR20160050841A (en) System, apparatus and method for managing entrance and exit
WO2019245383A1 (en) Improved access control system and a method thereof controlling access of persons into restricted areas
JP5359848B2 (en) IC card authentication system and IC card authentication method
WO2019234004A1 (en) Improved system and method for internet access age-verification
CN110766850B (en) Visitor information management method, access control system, server and storage medium
CN107231338B (en) Network connection method, device and device for network connection
CN112365643A (en) Access area authority management method and related device
CN112509197A (en) Visitor management method and related device
CN111862432B (en) Entrance guard verification method, entrance guard device, server and system
CN110084947B (en) Access control information updating method and device
JP2006172286A (en) Entrance and exit control system
CN111274577A (en) Information protection method, device, system and computer readable storage medium
CN111835692B (en) Information management and distribution system and method
CN115019427A (en) Anti-dive-back processing method, device and equipment
CN113395162A (en) System and method for counting votes in an electronic voting system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210212

RJ01 Rejection of invention patent application after publication