CN112530071A - Active invitation type visitor management method and device - Google Patents

Active invitation type visitor management method and device Download PDF

Info

Publication number
CN112530071A
CN112530071A CN202011479250.XA CN202011479250A CN112530071A CN 112530071 A CN112530071 A CN 112530071A CN 202011479250 A CN202011479250 A CN 202011479250A CN 112530071 A CN112530071 A CN 112530071A
Authority
CN
China
Prior art keywords
visitor
information
access
invited
access time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011479250.XA
Other languages
Chinese (zh)
Inventor
李川
马琳越
张茜
张攀
吴钢
李晓珍
利润霖
李兆隆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Information and Telecommunication Co Ltd
Original Assignee
State Grid Information and Telecommunication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Information and Telecommunication Co Ltd filed Critical State Grid Information and Telecommunication Co Ltd
Priority to CN202011479250.XA priority Critical patent/CN112530071A/en
Publication of CN112530071A publication Critical patent/CN112530071A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an active invitation type visitor management method and device, which are applied to the technical field of intelligent equipment, in the method, a visitor management system acquires visitor information and effective access time of an invited visitor submitted by a visitor, the visitor information and the effective access time are sent to an access subsystem, the access subsystem generates and feeds back access verification information to the visitor management system according to the visitor information and the effective access time, and the visitor management system sends the obtained access verification information and the effective access time to the invited visitor, the visitor information is submitted by the visitor in the method, the time consumed for filling the visitor information during visiting of the invited visitor is saved, meanwhile, the invited visitor can complete the visit verification by only displaying the access verification information obtained in advance, compared with the prior art, the time consumed in the verification process of the whole visitor can be effectively shortened, and the verification efficiency of the visitor is effectively improved.

Description

Active invitation type visitor management method and device
Technical Field
The invention belongs to the technical field of intelligent equipment, and particularly relates to an active invitation type visitor management method and device.
Background
The office place is an internal use place, has high requirements on safety and privacy, and generally strictly limits the entrance and exit of visitors, if the visitors temporarily enter the office area, strict inquiry registration management is required, and only visitors with confirmed identities can pass through.
In the existing visitor management method, when a visitor arrives, a manager at an entrance guard of an office needs to register visitor identity information, contact information, a visitor and other information, and further, after checking the visitor identity information and communicating with the visitor for verification, the manager allows the visitor to enter the office.
The existing visitor management method needs to register and verify personal private information of a visitor, and a large amount of time is needed in the information registration process and the verification process of the visitor, so that the verification efficiency is very low.
Disclosure of Invention
In view of the above, an object of the present invention is to provide a method and an apparatus for managing an actively invited visitor, in which an invited visitor initiates an active offer to an invited visitor, and the invited visitor completes verification only by displaying access verification information during visiting, so as to effectively improve verification efficiency of the visitor, and the specific scheme is as follows:
in a first aspect, the present invention provides an active invitation type visitor management method, applied to a visitor management system, the method including:
obtaining visitor information and effective access time of an invited visitor submitted by a visitor;
sending the visitor information and the effective access time to an access subsystem so that the access subsystem generates and feeds back access verification information according to the visitor information and the effective access time;
the access verification information is used as comparison information for verifying visitors by the access subsystem and is displayed when the invited visitors visit;
and sending the access verification information and the effective access time to the invited visitor.
Optionally, the sending the visitor information and the valid access time to an access subsystem includes:
judging whether the invited visitor exists in a preset blacklist or not according to the visitor information;
and if the invited visitor does not exist in the preset blacklist, sending the visitor information and the effective access time to an access subsystem.
Optionally, the visitor information includes a visitor name and a visitor phone number, and determining, according to the visitor information, whether the invited visitor exists in a preset blacklist includes:
traversing visitor names and visitor telephone numbers which are recorded in the preset blacklist and are forbidden to be accessed;
if the visitor name or the visitor phone number of the invited visitor is recorded in the preset blacklist, judging that the invited visitor exists in the preset blacklist;
and if the access name and the visitor telephone number of the invited visitor are not recorded in the preset blacklist, judging that the invited visitor does not exist in the preset blacklist.
Optionally, the visitor information further includes: and the face information of the invited visitor is used as the comparison information of the verification visitor of the access subsystem.
In a second aspect, the present invention provides an active-invitation type visitor management method, applied to an access subsystem, the method including:
obtaining visitor information and effective access time of an invited visitor, wherein the visitor information and the effective access time are provided by a visitor;
generating access verification information according to the visitor information and the effective access time;
feeding back the access authentication information to an access management system so that the access management system provides the access authentication information and the valid access time to the invited visitor;
acquiring access verification information and current access time displayed by a current visitor;
and if the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor, and the current access time is in the effective access time, controlling a gate machine to open.
Optionally, the guest information includes face information of the invited guest, and the method further includes:
acquiring the face information of the current visitor;
and if the face information of the current visitor is consistent with the face information of the invited visitor, and the current access time is in the effective access time, controlling a gate to be opened.
Optionally, the visitor verification information includes a two-dimensional verification code.
In a third aspect, the present invention provides an unsolicited visitor management device, comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring visitor information and effective access time of an invited visitor submitted by a visitor;
the first sending unit is used for sending the visitor information and the effective access time to an access subsystem so that the access subsystem generates and feeds back access verification information according to the visitor information and the effective access time;
the access verification information is used as comparison information for verifying visitors by the access subsystem and is displayed when the invited visitors visit;
a second sending unit, configured to send the access verification information and the valid access time to the invited guest.
Optionally, the first sending unit, configured to send the visitor information and the valid access time to the access subsystem, specifically includes:
judging whether the invited visitor exists in a preset blacklist or not according to the visitor information;
and if the invited visitor does not exist in the preset blacklist, sending the visitor information and the effective access time to an access subsystem.
In a fourth aspect, the present invention provides an active-offer guest management apparatus, comprising:
a second obtaining unit, configured to obtain visitor information and a valid access time of an invited visitor, where the visitor information and the valid access time are provided by a visitor;
the generating unit is used for generating access verification information according to the visitor information and the effective access time;
a feedback unit, configured to feed back the access authentication information to an access management system, so that the access management system provides the access authentication information and the valid access time to the invited visitor;
the third acquisition unit is used for acquiring the access verification information and the current access time displayed by the current visitor;
and the first control unit is used for controlling the gate to open if the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor and the current access time is within the effective access time.
Based on the technical scheme, according to the active invitation type visitor management method provided by the invention, after the visitor management system acquires visitor information and effective access time of an invited visitor submitted by a visitor, the obtained visitor information and the effective access time are sent to the access subsystem, the access subsystem generates and feeds back access verification information to the visitor management system according to the visitor information and the effective access time, and the visitor management system sends the obtained access verification information and the effective access time to the invited visitor, namely initiates an active invitation to the invited visitor, wherein the access verification information is used as comparison information for verifying the visitor by the access subsystem and is also displayed when the invited visitor visits. In application, the access subsystem can authenticate the invited visitor according to the access authentication information displayed when the invited visitor visits and the access authentication information of the invited visitor.
By the visitor management method, the visitor information is submitted by the invited visitor, time consumed for filling the visitor information during visiting of the invited visitor is saved, meanwhile, the invited visitor can finish visiting verification only by displaying the access verification information obtained in advance.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Fig. 1 is a flowchart of an active-offer guest management method according to an embodiment of the present invention;
fig. 2 is a flowchart of another active-offer guest management method according to an embodiment of the present invention;
fig. 3 is a block diagram illustrating an actively-invited guest management apparatus according to an embodiment of the present invention;
fig. 4 is a block diagram of another active-offer guest management apparatus according to an embodiment of the present invention;
fig. 5 is a block diagram illustrating a structure of yet another active-offer guest management apparatus according to an embodiment of the present invention.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
Referring to fig. 1, fig. 1 is a flowchart of an unsolicited visitor management method provided in an embodiment of the present invention, where the flow of the method may include:
s100, the visitor management system acquires visitor information and effective access time of an invited visitor submitted by a visitor.
In the visitor management method provided by the embodiment of the invention, the visitor actively sends out an offer to the visitor, which is also one of the keys of the method for solving the technical problems. It is conceivable that the visitor management system belongs to a management system of a visitor side, and information of all visitors who have authority to issue active invitation in the unit is naturally recorded in the system, so that, in practical application, after the visitors log in the visitor management system according to corresponding user names, the visitor management system can display corresponding application forms or operation interfaces for acquiring visitor information and effective access time of the invited visitors on a display device, and the visitors fill the application forms according to actual conditions or enter the visitor information and the corresponding effective access time of the invited visitors on the operation interfaces.
It should be noted that the above process of obtaining the visitor information and the effective access time of the invited visitor submitted by the visitor is only an example, and is not limited to an implementation manner, and any method that enables the visitor management system to obtain the visitor information and the effective access time of the invited visitor is optional, and the method also belongs to the protection scope of the present invention without departing from the scope of the core idea of the present invention.
Optionally, the content of the visitor information may include the name of the visitor, the telephone number of the visitor, and the face information of the invited visitor. Of course, other information related to the invited visitor may also be included, such as visitor gender, age, etc. The invention does not limit the specific content included in the visitor information.
It is conceivable that the determination of the effective access time may be a time determined after the two parties communicate, or may be a time determined by the visitor, which is optional in practical applications. The main effect of the effective access time is to require the invited visitor to visit within a specified time period, so that the aims of visitor diversion and reasonable management and control are fulfilled.
In the visitor management methods provided in the embodiments of the present invention and the following embodiments, the visitor information is used as comparison information for performing identity verification on a visitor, and the following contents are expanded in the specific use process.
S110, the visitor management system sends visitor information and effective access time to the access subsystem.
And after obtaining the visitor information and the effective access time of the invited visitor, the visitor management system further sends the visitor information and the effective access time to the access subsystem. Of course, the guest management system will also store the resulting guest information and valid access time of the invited guest in a local storage.
And S120, the access subsystem acquires visitor information and effective access time of the invited visitors.
And the access subsystem and the visitor management system carry out data transmission to obtain visitor information and effective access time of the invited visitor, which are submitted by the visitor. Of course, the manner in which the information is transmitted between the visitor management system and the access subsystem may be implemented by referring to the prior art, which is not specifically limited in the present invention.
And S130, the access subsystem generates access verification information according to the visitor information and the effective access time.
The access subsystem further generates access verification information based on the obtained visitor information and the valid access time. Optionally, the access verification information may specifically be a two-dimensional verification code. Of course, the access authentication information may also be implemented in other specific forms, for example, a digital authentication code, or a combined authentication code formed by a number and a letter, and any access authentication information that is obtained based on the visitor information and the effective access time and can perform the authentication function is optional without departing from the scope of the core idea of the present invention, and also belongs to the protection scope of the present invention.
It should be noted that, as to the specific method for generating the access verification information based on the visitor information and the effective access time, the present invention is not limited, and may be implemented based on the prior art.
Optionally, in practical application, the access subsystem is also responsible for controlling gates, and a plurality of gates are often arranged in the same unit to realize control over different accesses, and only part of the gates of the plurality of gates may be used, in which case, the gate in the working state needs to be authorized. The specific authorization mode is various, the gate in the working state can be authorized in a manual operation mode, and the information of the invited visitor, such as the visitor information, the effective access time and the like, can be sent to the gate in the working state, so that the authorization operation is realized.
And S140, the access subsystem feeds back access authentication information to the access management system.
The access subsystem further feeds back the access authentication information to the visitor management system after generating the access authentication information.
S150, the visitor management system sends the access verification information and the effective access time to the invited visitor.
In this embodiment, the visitor management system is further responsible for communication with the invited visitor, and sending the access verification information and the effective access time to the invited visitor, where the invited visitor needs to visit within a time period corresponding to the effective access time, and needs to display the access verification information to the access system, in order to realize the function of collecting the information such as the visitor information and the effective access time.
Optionally, the specific sending mode of the access verification information and the effective access time may be any mode capable of realizing information transmission in the prior art, for example, the access verification information may be sent to the invited visitor in a short message manner, or may be sent to the invited visitor in an email manner.
And S160, the access subsystem acquires the access verification information and the current access time of the current visitor.
As mentioned above, the access subsystem is responsible for controlling the gate, and therefore, in most application scenarios, the access authentication information and the current access time displayed by the current visitor and acquired by the access subsystem are provided by the gate, and the gate is provided with a corresponding access authentication information acquisition device, such as a camera or a scanner. The current visitor shows the held access verification information to the acquisition device of the gate, the gate acquires the system time, the system time is used as the current access time, the current access time and the acquired access verification information are sent to the access subsystem, and the access subsystem completes comparison.
S170, the access subsystem judges whether the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor and whether the current access time is within the effective access time, if so, S180 is executed.
Specifically, the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor, and the current visitor is indicated as the invited visitor; and when the current access time is within the effective access time, the invited visitor visits within the effective time, and when the two conditions are met, S180 is executed to release the visitor.
On the contrary, if the access verification information displayed by the current visitor is inconsistent with the access verification information corresponding to the invited visitor, or the current access time is not within the effective access time, the gate is not controlled to be opened, and the current visitor is prohibited from visiting.
And S180, controlling the gate opening of the gate by the access subsystem.
And after the judgment condition is met, the entrance and exit subsystem controls the gate to open, and the current visitor is released.
Optionally, if the visitor information includes face information of an invited visitor, the access subsystem may further perform identity verification on the current visitor according to the face information, when the visitor visits, the access subsystem acquires the face information of the current visitor, compares the face information of the current visitor with the face information of the invited visitor provided by the visitor management system, and controls the gate to open if the face information of the current visitor is consistent with the face information of the invited visitor and the current access time is within the effective access time. Under the control logic, on the premise that the current access time is in the effective access time, the current visitor can be released as long as one of the access verification information and the face information passes the verification.
Furthermore, the face information and the access verification information can be used as verification conditions together, namely after the face information of the current visitor is obtained, if the face information of the current visitor is consistent with the face information of the invited visitor, the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor, and the current access time is within the effective access time, the gate is controlled to be opened under the condition that the three verification items are met.
In summary, according to the visitor management method provided by the invention, the visitor information is submitted by the invited visitor, so that the time consumed for filling the visitor information during the visiting of the invited visitor is saved, meanwhile, the invited visitor can complete the visiting verification only by displaying the access verification information obtained in advance, and compared with the prior art, the visitor management method can effectively shorten the time consumed in the whole visitor verification process and effectively improve the verification efficiency of the visitor.
Optionally, in practical applications, sometimes visiting of some visitors may be prohibited, and if a visitor sends an active invitation to the visitor who is prohibited from visiting without knowing, it may affect normal operation of a unit, and to solve this problem, an embodiment of the present invention provides another active-invitation-type visitor management method, a specific flow of which is shown in fig. 2, and on the basis of the embodiment shown in fig. 1, the visitor management method provided in this embodiment further includes:
s1101, judging whether the invited visitor exists in a preset blacklist or not according to the visitor information, and if not, executing S1102.
It is conceivable that, in the preset blacklist described in this embodiment, information of a visitor prohibited from visiting is recorded, specifically, the visitor information that can be recorded in the preset blacklist includes a visitor name and a visitor phone number, after obtaining access information and valid access time of an invited visitor submitted by the visitor, the visitor name and the visitor phone number that are recorded in the preset blacklist are traversed, if the visitor name or the visitor phone number of the invited visitor is recorded in the preset blacklist, it is determined that the invited visitor is present in the preset blacklist, and conversely, if both the visitor name and the visitor phone number of the invited visitor are not recorded in the preset blacklist, it is determined that the invited visitor is not present in the preset blacklist.
And S1102, sending the visitor information and the effective access time to an access subsystem.
And under the condition that the invited visitor is judged not to exist in the preset blacklist, the visitor information and the effective access time can be sent to the access subsystem, and the subsequent relevant steps are executed.
It should be noted that, for other execution steps in the flowchart shown in fig. 2, the specific execution process may be executed with reference to corresponding steps in the embodiment shown in fig. 1, and will not be repeated here.
By the visitor management method provided by the embodiment of the invention, the visitor information of the invited visitor submitted by the visitor can be verified, the invitation to the visitor prohibited to access is avoided, and the management effect of visitor management is improved.
It is to be noted that the flow charts in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It should be noted that while the operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
In the following, the active-offer type visitor management apparatus provided in the embodiment of the present invention is introduced, and the active-offer type visitor management apparatus described below may be regarded as a functional module architecture that needs to be set in the central device to implement the active-offer type visitor management method provided in the embodiment of the present invention; the following description may be cross-referenced with the above.
Alternatively, referring to fig. 3, fig. 3 is a block diagram of an actively-invited guest management apparatus according to an embodiment of the present invention, where the apparatus includes:
a first obtaining unit 10, configured to obtain visitor information and effective access time of an invited visitor submitted by a visitor;
a first sending unit 20, configured to send the visitor information and the valid access time to an access subsystem, so that the access subsystem generates and feeds back access verification information according to the visitor information and the valid access time;
the access verification information is used as comparison information for verifying visitors by the access subsystem and is displayed when the invited visitors visit;
a second sending unit 30, configured to send the access verification information and the valid access time to the invited guest.
Optionally, the first sending unit 20 is configured to, when sending the visitor information and the valid access time to the access subsystem, specifically include:
judging whether the invited visitor exists in a preset blacklist or not according to the visitor information;
and if the invited visitor does not exist in the preset blacklist, sending the visitor information and the effective access time to an access subsystem.
Optionally, the visitor information includes a visitor name and a visitor phone number, and the first sending unit 20 is configured to determine whether the invited visitor is in a preset blacklist according to the visitor information, and specifically includes:
traversing visitor names and visitor telephone numbers which are recorded in the preset blacklist and are forbidden to be accessed;
if the visitor name or the visitor phone number of the invited visitor is recorded in the preset blacklist, judging that the invited visitor exists in the preset blacklist;
and if the access name and the visitor telephone number of the invited visitor are not recorded in the preset blacklist, judging that the invited visitor does not exist in the preset blacklist.
Alternatively, referring to fig. 4, fig. 4 is another active-solicited guest management apparatus according to an embodiment of the present invention, where the apparatus includes:
a second obtaining unit 40 for obtaining guest information and a valid access time of the invited guest, wherein the guest information and the valid access time are provided by the visitor;
a generating unit 50 for generating access verification information according to the visitor information and the valid access time;
a feedback unit 60, configured to feed back the access authentication information to an access management system, so that the access management system provides the access authentication information and the valid access time to the invited visitor;
a third obtaining unit 70, configured to obtain the access verification information and the current access time shown by the current visitor;
and the first control unit 80 is configured to control the gate to open if the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor and the current access time is within the effective access time.
Optionally, referring to fig. 5, fig. 5 is a further active-offer guest management apparatus according to an embodiment of the present invention, and on the basis of the embodiment shown in fig. 4, the apparatus further includes:
a fourth obtaining unit 90, configured to obtain face information of the current visitor;
and the second control unit 100 is used for controlling the gate to open if the face information of the current visitor is consistent with the face information of the invited visitor and the current access time is within the effective access time.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.
While several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.

Claims (10)

1. An active-invitation type visitor management method is applied to a visitor management system, and comprises the following steps:
obtaining visitor information and effective access time of an invited visitor submitted by a visitor;
sending the visitor information and the effective access time to an access subsystem so that the access subsystem generates and feeds back access verification information according to the visitor information and the effective access time;
the access verification information is used as comparison information for verifying visitors by the access subsystem and is displayed when the invited visitors visit;
and sending the access verification information and the effective access time to the invited visitor.
2. The unsolicited guest management method of claim 1, wherein the sending the guest information and the valid access time to an access subsystem comprises:
judging whether the invited visitor exists in a preset blacklist or not according to the visitor information;
and if the invited visitor does not exist in the preset blacklist, sending the visitor information and the effective access time to an access subsystem.
3. The unsolicited visitor management method of claim 2, wherein the visitor information includes a visitor name and a visitor phone number, the determining whether the invited visitor is present in a predetermined blacklist based on the visitor information comprises:
traversing visitor names and visitor telephone numbers which are recorded in the preset blacklist and are forbidden to be accessed;
if the visitor name or the visitor phone number of the invited visitor is recorded in the preset blacklist, judging that the invited visitor exists in the preset blacklist;
and if the access name and the visitor telephone number of the invited visitor are not recorded in the preset blacklist, judging that the invited visitor does not exist in the preset blacklist.
4. The unsolicited guest management method of claim 3, wherein the guest information further comprises: and the face information of the invited visitor is used as the comparison information of the verification visitor of the access subsystem.
5. An unsolicited visitor management method for use with an access subsystem, the method comprising:
obtaining visitor information and effective access time of an invited visitor, wherein the visitor information and the effective access time are provided by a visitor;
generating access verification information according to the visitor information and the effective access time;
feeding back the access authentication information to an access management system so that the access management system provides the access authentication information and the valid access time to the invited visitor;
acquiring access verification information and current access time displayed by a current visitor;
and if the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor, and the current access time is in the effective access time, controlling a gate machine to open.
6. The unsolicited guest management method of claim 5, wherein the guest information comprises facial information of the invited guest, the method further comprising:
acquiring the face information of the current visitor;
and if the face information of the current visitor is consistent with the face information of the invited visitor, and the current access time is in the effective access time, controlling a gate to be opened.
7. The unsolicited guest management method of any of claims 5-6, wherein the guest verification information comprises a two-dimensional passcode.
8. An active-offer visitor management apparatus, comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring visitor information and effective access time of an invited visitor submitted by a visitor;
the first sending unit is used for sending the visitor information and the effective access time to an access subsystem so that the access subsystem generates and feeds back access verification information according to the visitor information and the effective access time;
the access verification information is used as comparison information for verifying visitors by the access subsystem and is displayed when the invited visitors visit;
a second sending unit, configured to send the access verification information and the valid access time to the invited guest.
9. The active-solicitation visitor management apparatus of claim 8, wherein the first sending unit, when sending the visitor information and the valid access time to an access subsystem, further comprises:
judging whether the invited visitor exists in a preset blacklist or not according to the visitor information;
and if the invited visitor does not exist in the preset blacklist, sending the visitor information and the effective access time to an access subsystem.
10. An active-offer visitor management apparatus, comprising:
a second obtaining unit, configured to obtain visitor information and a valid access time of an invited visitor, where the visitor information and the valid access time are provided by a visitor;
the generating unit is used for generating access verification information according to the visitor information and the effective access time;
a feedback unit, configured to feed back the access authentication information to an access management system, so that the access management system provides the access authentication information and the valid access time to the invited visitor;
the third acquisition unit is used for acquiring the access verification information and the current access time displayed by the current visitor;
and the first control unit is used for controlling the gate to open if the access verification information displayed by the current visitor is consistent with the access verification information corresponding to the invited visitor and the current access time is within the effective access time.
CN202011479250.XA 2020-12-15 2020-12-15 Active invitation type visitor management method and device Pending CN112530071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011479250.XA CN112530071A (en) 2020-12-15 2020-12-15 Active invitation type visitor management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011479250.XA CN112530071A (en) 2020-12-15 2020-12-15 Active invitation type visitor management method and device

Publications (1)

Publication Number Publication Date
CN112530071A true CN112530071A (en) 2021-03-19

Family

ID=75000223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011479250.XA Pending CN112530071A (en) 2020-12-15 2020-12-15 Active invitation type visitor management method and device

Country Status (1)

Country Link
CN (1) CN112530071A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113794741A (en) * 2021-11-17 2021-12-14 中国南方电网有限责任公司超高压输电公司广州局 Visitor information registration method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617668A (en) * 2013-12-11 2014-03-05 广州中国科学院软件应用技术研究所 Visitor management system and visitor management method
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN107993328A (en) * 2017-12-22 2018-05-04 广州云系信息科技有限公司 Visitor invites passing method and system
CN108460888A (en) * 2018-05-23 2018-08-28 国政通科技股份有限公司 Gate system and hotel visitor room entry/exit management method
WO2018192472A1 (en) * 2017-04-19 2018-10-25 捷开通讯(深圳)有限公司 Access authentication method, server, smart terminal, and storage apparatus
CN109003362A (en) * 2018-07-03 2018-12-14 广州启盟信息科技有限公司 A kind of visitor invites passing method, device, system and storage medium
CN110517387A (en) * 2019-08-29 2019-11-29 宝钜(中国)儿童用品有限公司 Access control system, method, equipment and readable storage medium storing program for executing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617668A (en) * 2013-12-11 2014-03-05 广州中国科学院软件应用技术研究所 Visitor management system and visitor management method
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
WO2018192472A1 (en) * 2017-04-19 2018-10-25 捷开通讯(深圳)有限公司 Access authentication method, server, smart terminal, and storage apparatus
CN107993328A (en) * 2017-12-22 2018-05-04 广州云系信息科技有限公司 Visitor invites passing method and system
CN108460888A (en) * 2018-05-23 2018-08-28 国政通科技股份有限公司 Gate system and hotel visitor room entry/exit management method
CN109003362A (en) * 2018-07-03 2018-12-14 广州启盟信息科技有限公司 A kind of visitor invites passing method, device, system and storage medium
CN110517387A (en) * 2019-08-29 2019-11-29 宝钜(中国)儿童用品有限公司 Access control system, method, equipment and readable storage medium storing program for executing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113794741A (en) * 2021-11-17 2021-12-14 中国南方电网有限责任公司超高压输电公司广州局 Visitor information registration method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US10417849B2 (en) Entry control system
WO2017140240A1 (en) Guest authentication method and system
CN109767534B (en) Access control access method, system, management terminal and access control terminal based on block chain
CN101310286B (en) Improved single sign on
CN111787530B (en) Block chain digital identity management method based on SIM card
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN106850209A (en) A kind of identity identifying method and device
CN103400067A (en) Access control method, system and server
CN106375312A (en) Virtual key authorization method and system, mobile terminal and server
MX2013011116A (en) Distribution of premises access information.
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN108985037A (en) A kind of auth method, registration terminal and system
CN109685946A (en) Open method, device, equipment and the storage medium of lockset
CN110766850B (en) Visitor information management method, access control system, server and storage medium
CN108876987A (en) Building access control method, Cloud Server and computer readable storage medium
CN112530071A (en) Active invitation type visitor management method and device
DE102011075257A1 (en) Answering inquiries by means of the communication terminal of a user
CN114006700A (en) Client login method and device, computer equipment and storage medium
CN109087415A (en) A kind of method and apparatus of the data transmission based on cloud
CN109859348A (en) A kind of authorization method of remote door access, apparatus and system
CN111538973A (en) Personal authorization access control system based on state cryptographic algorithm
CN110399577A (en) Office facility sharing method and system
CN111369711B (en) Unlocking method, unlocking device, electronic equipment and computer readable storage medium
CN106790002A (en) The method and system of the User logs in of many certification approach of plug-in type

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210319

RJ01 Rejection of invention patent application after publication