CN116012991A - Method, device and related equipment for site access management - Google Patents

Method, device and related equipment for site access management Download PDF

Info

Publication number
CN116012991A
CN116012991A CN202211377515.4A CN202211377515A CN116012991A CN 116012991 A CN116012991 A CN 116012991A CN 202211377515 A CN202211377515 A CN 202211377515A CN 116012991 A CN116012991 A CN 116012991A
Authority
CN
China
Prior art keywords
user
access control
verification
result
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211377515.4A
Other languages
Chinese (zh)
Inventor
刘立峰
高灿锦
李欣
李泰然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Network Technology Beijing Co Ltd
Original Assignee
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Network Technology Beijing Co Ltd filed Critical Yunding Network Technology Beijing Co Ltd
Publication of CN116012991A publication Critical patent/CN116012991A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses a method, a device and related equipment for site access management, wherein a site at least comprises a first access control and a second access control, if a first user initiates a request for entering operation at the second access control of the site, the second access control can verify the first user to obtain a first verification result for indicating that the first user is a legal user of the site, and the second access control shares the first verification result to other access controls of the site; if the first user initiates a request entry operation at a first access control of the place, the first access control receives a first request comprising the identification of the first user, the first access control determines that the identification of the first user in the first request is matched with a first verification result received from a second access control, and accordingly a first response corresponding to the first request is generated directly based on the first verification result, and the first response is used for indicating that an entry corresponding to the first access control is opened for the first user. Thus, the efficiency and the intelligent level of the place authority management are improved.

Description

Method, device and related equipment for site access management
The present application claims priority from the chinese patent application filed at month 31 of 2022, the chinese national intellectual property agency, application No. 202211054210.X, application name "a method and apparatus for traffic management", the entire contents of which are incorporated herein by reference.
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and apparatus for location access management, and related devices.
Background
In order to ensure the security of a place, terminal devices (also referred to as entrance guards) are generally installed at different entrances of the place, and are used for verifying whether personnel to be passed have permission to enter the corresponding entrances of the place, and controlling whether the passing devices of the corresponding entrances are released based on the verification result. For example, a cell is typically equipped with access controls at the entrance to the cell, at the entrance to the unit, and at the entrance to the cell in public places (e.g., medical stations, supermarkets, natatorium, etc.), respectively; for another example, office buildings are typically equipped with access doors at entrances to the office building, at floor entrances, and at entrances to office areas, respectively.
At present, all the entrance guards in the place need to maintain the information of legal personnel authorized to enter the area corresponding to the entrance guard, and each time a person passes through one entrance guard in the place, the entrance guard needs to compare the acquired information of the person with the information of the legal personnel maintained on the entrance guard so as to verify whether the person has the authority to pass through the entrance corresponding to the entrance guard. The current scheme of site access management is complicated in process and quite unfriendly for personnel entering the site.
Disclosure of Invention
The method, the device and the related equipment for site access management can avoid repeated verification of a plurality of access control agents on the basis of ensuring safety by sharing verification results among a plurality of access control agents of a site and directly using the obtained verification results for access control, and improve the experience of personnel on site access management.
In a first aspect, the present application provides a method for venue access management, the method being applied to a first access control of a venue, the method may include:
receiving a first verification result sent by a second portal of the place, wherein the first verification result is used for indicating that a first user is a legal user of the place, and the first verification result comprises an identification of the first user;
responding to a request entering operation of the first user at the first access control, and obtaining a first request, wherein the first request comprises an identification of the first user;
and generating a first response corresponding to the first request according to the first verification result of the identification matching of the first user, wherein the first response is used for indicating that an entry corresponding to the first access control is opened for the first user.
Optionally, the method further comprises:
Responding to a request entering operation of a second user on the first access control, and obtaining a second request, wherein the second request comprises an identification of the second user;
if the identification of the second user is matched with the identification of the locally maintained user with access rights, a first verification sub-result is obtained, wherein the first verification sub-result is used for indicating that the second user is the user with access rights to the place;
acquiring the health condition of the second user based on the identification of the second user;
if the health condition of the second user meets the health requirement of entering the place, a second verification sub-result is obtained, wherein the second verification sub-result is used for indicating that the second user is a healthy user;
and determining a second verification result based on the first verification sub-result and the second verification sub-result, wherein the second verification result is used for indicating that the second user is a legal user of the place, and the second verification result comprises an identification of the second user.
Optionally, the method further comprises:
and sending the second verification result to other access control of the place, wherein the other access control comprises the second access control.
Optionally, the method further comprises:
responding to a request of a third user for temporarily accessing the place, and acquiring temporary visitor information, wherein the temporary visitor information comprises an identification of the third user;
responding to the request entering operation of the third user in the first access control, and obtaining a third request, wherein the third request comprises the identification of the third user;
if the identification of the third user is determined to be matched with the temporary visitor information maintained locally, a third verification sub-result is obtained, wherein the third verification sub-result is used for indicating that the second user is a temporary user with permission to access the place;
based on the identification of the third user, obtaining the health condition of the third user;
if the health condition of the third user is determined to meet the health requirement of entering the place, a fourth verification sub-result is obtained, wherein the fourth verification sub-result is used for indicating that the third user is a healthy user;
and determining a third verification result based on the third verification sub-result and the fourth verification sub-result, wherein the third verification result is used for indicating that the third user is a temporary visitor of the place, and the third verification result comprises an identification of the third user.
Optionally, the temporary visitor information further includes an access valid condition of the third user, and the obtaining a third verification sub-result includes:
and if the identification of the third user is determined to be matched with the temporary visitor information which is maintained locally, and the access valid condition of the third user is determined to be met when the first request occurs, obtaining the third verification sub-result.
Optionally, the temporary visitor information further includes a target area of the venue accessed by the third user, and the method further includes:
and sending the third verification result to a third access control of the target area, wherein the third verification result is used by the third access control to respond to a request entering operation of the third user to enter the target area.
Optionally, the method further comprises:
and if the activity of the third user in the place is not consistent with the target area, generating prompt information, wherein the prompt information is used for indicating the third user to illegally access the place.
Optionally, the method further comprises:
and sending verification information of a user initiating a request for access operation at the first access control to a management platform of the place, so that the management platform is used for counting and analyzing the working condition of each access control in the place by the received verification information.
In a second aspect, the present application further provides a device for venue access management, applied to a first access control of a venue, the device including:
the receiving unit is used for receiving a first verification result sent by a second portal of the place, wherein the first verification result is used for indicating that a first user is a legal user of the place, and the first verification result comprises an identifier of the first user;
a first obtaining unit, configured to obtain a first request in response to a request entry operation of the first user at the first access control, where the first request includes an identifier of the first user;
the first generation unit is used for generating a first response corresponding to the first request according to the first verification result matched with the identification of the first user, wherein the first response is used for indicating that an entry corresponding to the first access control is opened for the first user.
Optionally, the apparatus further comprises:
a second obtaining unit, configured to obtain a second request in response to a request entry operation of a second user at the first access control, where the second request includes an identifier of the second user;
a third obtaining unit, configured to obtain a first verification sub-result if it is determined that the identifier of the second user matches the identifier of the locally maintained user with access rights, where the first verification sub-result is used to indicate that the second user is a user with access rights to the location;
A fourth obtaining unit, configured to obtain a health condition of the second user based on the identifier of the second user;
a fifth obtaining unit, configured to obtain a second verification sub-result if it is determined that the health condition of the second user meets the health requirement of entering the location, where the second verification sub-result is used to indicate that the second user is a healthy user;
the first determining unit is configured to determine a second verification result based on the first verification sub-result and the second verification sub-result, where the second verification result is used to indicate that the second user is a legal user in the venue, and the second verification result includes an identifier of the second user.
Optionally, the apparatus further comprises:
and the first sending unit is used for sending the second verification result to other access control of the place, wherein the other access control comprises the second access control.
Optionally, the apparatus further comprises:
a sixth obtaining unit configured to obtain temporary visitor information in response to passage of a request of a third user to temporarily access the location, the temporary visitor information including an identification of the third user;
a seventh obtaining unit, configured to obtain a third request in response to a request entry operation of the third user at the first access control, where the third request includes an identifier of the third user;
An eighth obtaining unit, configured to obtain a third verification sub-result if it is determined that the identifier of the third user matches the temporary visitor information that is maintained locally, where the third verification sub-result is used to indicate that the second user is a temporary user who has permission to access the location;
a ninth obtaining unit, configured to obtain a health condition of the third user based on the identifier of the third user;
a tenth obtaining unit, configured to obtain a fourth verification sub-result if it is determined that the health condition of the third user meets the health requirement of entering the location, where the fourth verification sub-result is used to indicate that the third user is a healthy user;
the second determining unit is configured to determine a third verification result based on the third verification sub-result and the fourth verification sub-result, where the third verification result is used to indicate that the third user is a temporary visitor in the venue, and the third verification result includes an identifier of the third user.
Optionally, the temporary visitor information further includes an access valid condition of the third user, and the eighth obtaining unit is specifically configured to:
and if the identification of the third user is determined to be matched with the temporary visitor information which is maintained locally, and the access valid condition of the third user is determined to be met when the first request occurs, obtaining the third verification sub-result.
Optionally, the temporary visitor information further includes a target area of the location accessed by the third user, and the apparatus further includes:
the second sending unit is used for sending the third verification result to a third access control of the target area, and the third verification result is used by the third access control to respond to a request entering operation of the third user to enter the target area.
Optionally, the apparatus further comprises:
and the second generation unit is used for generating prompt information if the activity of the third user in the place is not consistent with the target area, wherein the prompt information is used for indicating the third user to illegally access the place.
Optionally, the apparatus further comprises:
and the third sending unit is used for sending verification information of the user who initiates the request for access operation at the first access control to the management platform of the place, so that the management platform is used for counting and analyzing the working condition of each access control in the place through the received verification information.
In a third aspect, the present application also provides an electronic device, which may include a processor and a memory:
the memory is used for storing a computer program;
The processor is configured to execute the method according to the first aspect and any implementation manner of the first aspect according to the computer program.
In a fourth aspect, the present application further provides a computer readable storage medium, where the computer readable storage medium is configured to store a computer program, where the computer program is configured to perform the method according to any one of the embodiments of the first aspect and the first aspect.
In the above implementation manner of the present application, a method for venue access management is provided, where a venue includes at least a first access control and a second access control, if a first user initiates a request entry operation at the second access control, the second access control verifies the first user, and obtains a first verification result indicating that the first user is a legal user of the venue, then the second access control shares the first verification result to other access controls of the venue, the first verification result includes an identifier of the first user, so, if the first user initiates a request entry operation at the first access control, the first access control receives a first request including the identifier of the first user, at this time, the first access control can determine that the identifier of the first user in the first request matches with the first verification result received from the second access control, so as to generate a first response corresponding to the first request directly based on the first verification result, where the first response is used to indicate that an entry corresponding to the first access control is opened by the first user. Thus, through the method provided by the application, the verification results of the user can be shared by a plurality of access control devices in the same place, after the user passes through the verification of one access control device, other access control devices do not need to search, verify and other complicated works from a massive database, the access control device directly executes the access control to the user on the basis of the received verification results, the plurality of access control devices in the place are overcome to verify the same access person for a plurality of times, repeated verification of a plurality of access control devices can be avoided on the basis of ensuring safety, the efficiency and the intelligent level of the access control in the place are improved, and the user experience of the access control in the place is also improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
FIG. 1 is a schematic diagram of a system for venue access management according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for venue access management according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a device for site access management according to an embodiment of the present application;
fig. 4 is a schematic hardware structure of an electronic device in an embodiment of the present application.
Detailed Description
For security, a venue (e.g., a community, a district, or an office building) is provided with multiple access controls in different areas or different entrances, each of which is capable of controlling a pass-through device (e.g., a door, a pedestrian gate, or a garage release lever) in a corresponding area to enable access management to a user or a user's vehicle.
At present, a plurality of access control devices in a place are isolated from each other, a plurality of access control devices are needed to respectively verify the user in different areas of the place, for example, the places of public renting communities or secret-related enterprise units have strict requirements on the identity of entering personnel, more access control devices and more complex and complicated verification contents can be set, each access control device respectively verifies the entering user, the verification workload of equipment is increased, the working efficiency of the equipment is reduced, and inconvenience such as longer waiting for verification results is also added to the user. Moreover, entering a place requires that the health status of the user meets the requirements for epidemic situations and the like, namely, in special cases, each access control needs to interact with other equipment and verify more contents during verification. It can be seen that the current access management method of the place is complicated in flow and not friendly enough for users, and is not intelligent and convenient enough for the management party of the place.
Based on this, considering that in the process that each user accesses one place at a time, the verification results of the respective verification of the multiple access control units are generally basically consistent, the embodiment of the application provides a method for managing the access of the place, in the method, the multiple access control units in the same place can share the verification results of the user, and other access control units can directly use the received verification results without executing repeated verification. Taking an example that a place at least comprises a first access control and a second access control, the method can comprise: if the first user initiates a request entry operation at the second entrance guard, the second entrance guard verifies the first user to obtain a first verification result for indicating that the first user is a legal user of the place, then the second entrance guard shares the first verification result to other entrance guards of the place, the first verification result comprises the identification of the first user, so if the first user initiates the request entry operation at the first entrance guard, the first entrance guard receives the first request comprising the identification of the first user, at the moment, the first entrance guard can determine that the identification of the first user in the first request is matched with the first verification result received from the second entrance guard, and accordingly a first response corresponding to the first request is generated directly based on the first verification result, and the first response is used for indicating that an entrance corresponding to the first entrance guard is opened for the first user.
Thus, through the method provided by the embodiment of the application, the verification results of the user can be shared by a plurality of entrance guards in the same place, after the user passes through the verification of one entrance guard, other entrance guards do not need to search, verify and other complicated works from a massive database, the authority management of the entrance guard to the user is directly executed based on the received verification results, the condition that the plurality of entrance guards in one place verify the same entering person for a plurality of times is overcome, the repeated verification of the plurality of entrance guards can be avoided on the basis of ensuring safety, the efficiency and the intelligent level of the authority management in the place are improved, and the experience of the user on the access management in the place is also improved.
It should be noted that, in the embodiment of the present application, the entrance guard refers to a terminal device for controlling a venue passing device, and the entrance guard includes an acquisition module for user identification; communication can be realized between the access control and the management platform of the place. Optionally, the access control can be connected with other third-party servers (such as health monitoring servers) under the condition of obtaining authorization, and relevant information needing to participate in verification is pulled from the third-party servers.
Fig. 1 is a schematic structural diagram of a system for venue access management applicable to an embodiment of the present application. As shown in fig. 1, the system 100 may include: entrance guard 121, entrance guard 122, … …, entrance guard 12N and management platform 110, N being an integer greater than 1. The entrance guard 121 is connected with a passing device 131 of the door 1; the gate 122 is connected with the passing device 132 of the pedestrian gate 2, the gate 12N is connected with the communication device 13M1 of the sidewalk and the communication device 13M2 of the garage, and M is an integer larger than 1. The management platform 110 is a device for managing access to the location, etc., for example, the management platform 110 may be a management platform of a property center of a cell, and the management platform 110 may include a management server and a management display screen. Staff at the venue (e.g., community manager or corporate personnel) can enter information about users with access rights at the management platform 110. The management platform 110 may send the related information of the user with access rights entered by the management platform 110 to the corresponding entrance guard. Each gate inhibition can carry out matching verification based on a request corresponding to the request entry operation of the user and related information of the locally maintained user with access rights, and each gate inhibition can also determine whether to allow the user to pass through an entry corresponding to the gate inhibition based on the request corresponding to the request entry operation of the user and a received verification result. And each access control can also be communicated with a third-party server for pulling user related information required by verification or obtaining related information of temporary visitors qualified in application. It can be seen that the system 100 enables more rational and friendly access management to a venue.
In order to facilitate understanding of the specific implementation of the method for venue access management provided in the embodiments of the present application, the following description will be made with reference to the accompanying drawings.
It should be noted that, the main body of the method for implementing the location access management may be the device for location access management provided in the embodiment of the present application (i.e., the access control mentioned in the embodiment of the present application, such as the first access control), and the device for location access management may be carried in an electronic device or a functional module of the electronic device. The electronic device in the embodiment of the present application may be any device capable of implementing the method of venue access management in the embodiment of the present application, for example, may be an internet of things (Internet ofThings, ioT) device.
Fig. 2 is a flow chart of a method for venue access management according to an embodiment of the present application. The method may be applied to a device for venue access management, such as device 300 for venue access management shown in fig. 3; alternatively, the method may be applied to an electronic device that integrates an apparatus for venue access management, such as the electronic device 400 shown in fig. 4. The device for managing the access to the location may also be referred to as a first access control, and the first access control may be any one of the systems for managing the access to the location shown in fig. 1, for example, the first access control may be any one of the access control 121, the access control 122, … …, and the access control 12N.
As shown in fig. 2, the method provided in the embodiment of the present application may, for example, include:
s101, receiving a first verification result sent by a second portal of the place, wherein the first verification result is used for indicating that a first user is a legal user of the place, and the first verification result comprises an identification of the first user.
In this embodiment of the present application, the identification of the user refers to biometric information that can uniquely identify the user, and may include, for example, face information or fingerprint information of the user. If the user identification comprises the face information of the user, the access control comprises an image acquisition module or is connected with the image acquisition module, and the access control obtains the user identification by obtaining the face information of the user acquired by the image acquisition module from the image acquisition module. If the user's identification includes the user's fingerprint information, then the access control includes fingerprint collection module or connects fingerprint collection module, and the access control obtains user's identification through obtaining the fingerprint information of the user that this fingerprint collection module gathered from fingerprint collection module.
It should be noted that, the first verification result is a verification result obtained after the second access control processes the request entering operation of the first user. The first authentication result includes at least an identification of the first user.
As an example, before S101, the method may further include a process of authenticating the first user by the second portal, which may include, for example: s11, responding to a request entering operation of a first user in the second access control, and obtaining a fourth request by the second access control, wherein the fourth request comprises an identification of the first user; s12, if the identification of the first user is determined to be matched with the identification of the user with access rights which is locally maintained, a second portal obtains a fifth verification sub-result, wherein the fifth verification sub-result is used for indicating that the first user is the user with access rights to the place; s13, a second access control is based on the identification of the first user, and the health condition of the first user is obtained; s14, if the health condition of the first user is determined to meet the health requirement of entering the place, a second portal obtains a sixth verification sub-result, wherein the sixth verification sub-result is used for indicating that the first user is a healthy user; s15, a second access control determines a first verification result based on the fifth verification sub-result and the sixth verification sub-result, wherein the first verification result is used for indicating that the first user is a legal user of the place, and the first verification result comprises an identification of the first user; s16, the second access control sends a first verification result to the first access control.
The step S11 may be that the first user triggers a request entry operation for the second portal by entering the identifier of the first user on the second portal, and then the second portal generates, as a response to the request entry operation, a fourth request including the identifier of the first user, where the fourth request is used to request the second portal to verify whether the first user can enter the location according to the identifier of the first user.
The method comprises the steps that each access control of a place can obtain related information of a user with authority to access the place from a management platform of the place, and the related information of the user with authority to access the place comprises an identification of the user. Then, for S12, the second access control may search for whether there is a user matching the identifier of the first user in the first request from the stored related information of the user having access to the location, and if so, determine that the first user is a user having access to the location, so as to obtain a fifth verification sub-result, where the fifth verification sub-result is used to indicate that the first user is a user having access to the location.
In one case, if the place has no requirement on the health condition of the personnel, the second portal in S13-S14 and S15 can be skipped after S12 to obtain the first verification result based on the fifth verification sub-result, and the information indicated by the first verification result and the fifth verification sub-result are the same, and the content may be the same or there is a small amount of information difference.
In another case, if the place has a requirement on the health condition of the entering person, after S12, the health condition of the first user can be verified through S13 to S14. For S13, the second access control may request the health status of the first user from the other device based on the identification of the first user, and receive the health status of the first user sent by the other device. For example, the second access control may obtain the health status of the first user from other terminal devices or servers, which may include, for example, but not limited to, at least one of the following information: the first user's body temperature, the first user's health code, the first user's trip code, or the first user's vaccine condition. For S14, the second access control may compare the obtained health status of the first user with the health requirement of the location, and if both of them are satisfied, obtain a sixth verification sub-result. Health requirements may include, for example: the body temperature is not more than 37.3 ℃, the health code is green code and the travel code is normal. If the health condition of the first user includes the body temperature of the first user, the first user may obtain the body temperature of the first user from the second access-connected temperature sensor, or the first user may also obtain the body temperature of the first user from the second access-connected health monitoring server, where the body temperature of the first user on the health monitoring server may be uploaded by the first user through a client or applet corresponding to the health monitoring server. If the health condition of the first user includes the health code of the first user, the first user may obtain the health code of the first user from a health monitoring server connected to a second portal, which may need to be authorized to obtain the health code of the first user from the health monitoring server.
If the identification of the first user is not matched with the identification of the locally maintained user with access rights, and/or the health condition of the first user is determined to be not in accordance with the health requirement of entering the place. A fourth verification result may be generated, where the fourth verification result is used to indicate that the first user is an illegal user at the location, and the fourth verification result may include, in addition to the identification of the first user, a reason that the first user fails to pass the verification, and identity information and/or health status of the first user. In addition, the second portal may further send the fourth verification result to the management platform, so that the management platform may perform statistics and analysis on the illegal personnel information applied to enter the location. Or the second entrance guard can also send the fourth verification result to other entrance guards of the place so as to enable the other entrance guards to quickly respond to the request of the first user for entering operation.
It should be noted that the second entrance guard may be an entrance guard corresponding to a first entrance of a user entering the place, the first entrance guard is an entrance guard corresponding to an entrance of a certain area inside the place, for example, the second entrance guard may be an entrance guard corresponding to a cell gate, and the first entrance guard may be an entrance guard of a cell gate of a certain cell building of a cell; for another example, the second access may be an access corresponding to a front access of the company, and the first access may be an access to a door of an archive of the company.
S102, responding to a request entering operation of the first user at the first access control, and obtaining a first request, wherein the first request comprises an identification of the first user.
And triggering a request entry operation of the first access control by the first user on the first access control through entering the identification of the first user, and then generating a first request comprising the identification of the first user by the first access control as a response of the request entry operation, wherein the first request is used for requesting the first access control to determine whether the first user can enter an entry corresponding to the first access control.
And S103, generating a first response corresponding to the first request according to the first verification result of the identification matching of the first user, wherein the first response is used for indicating that an entry corresponding to the first access control is opened for the first user.
After S102, the first access control may search for whether there is a verification result matching with the identity of the first user in the first request from the received verification results, and if so, consider that the first user is a legal user that has passed the verification in the venue, and execute S103; if not, the first user is considered to be not authenticated or not authenticated, and the authentication process of the first user on the second access control is executed to complete the authentication of the first user.
The entrance corresponding to the first entrance guard may be a pedestrian entrance, and then the first response controls the passing device of the gate or the gate of the pedestrian entrance to work so as to release the first user; alternatively, the corresponding entrance of the first portal may be a garage entrance, and the first responsive means for controlling the passage means of the release lever of the garage entrance operates to release the vehicle driven by the first user.
In the embodiment of the application, each access control can manage the visitor authority based on the received verification result shared by other access controls, and can also finish the management of the visitor authority through local verification, wherein the functions of each access control are the same, but the visitor authority management method executed by the access control is determined based on the position of the access control deployed in the place or the path of the user entering the place. Unlike S101-S103, if the first access control is deployed at an entrance (such as a cell or company gate) into a venue, then the authentication process of the first access control for the application is described using the authentication process of the second user on the first access control as an example. As an example, the method may further comprise: s21, responding to a request entering operation of a second user on the first access control, wherein the first access control obtains a second request which comprises an identification of the second user; s22, if the identification of the second user is determined to be matched with the identification of the user with the access right which is locally maintained, the first access control obtains a first verification sub-result, wherein the first verification sub-result is used for indicating that the second user is the user with the access right to the place; s23, the first access control obtains the health condition of the second user based on the identification of the second user; s24, if the health condition of the second user is determined to meet the health requirement of entering the place, the first access control obtains a second verification sub-result, wherein the second verification sub-result is used for indicating that the second user is a healthy user; s25, the first access control determines a second verification result based on the first verification sub-result and the second verification sub-result, wherein the second verification result is used for indicating that the second user is a legal user of the place, and the second verification result comprises an identification of the second user. After S25, the method may further include: s26, the first access control sends the second verification result to other access controls of the place, wherein the other access controls comprise the second access control. Therefore, the first access control can share the verification result of the second user with other access controls of the place, so that when the second user needs to pass through other access controls, the verification process of the second user by other access controls can be simplified, the other access controls can respond to the request of the second user quickly, and the door opening time of the second user is also saved.
The implementation and effect achieved in S21 to S26 can be seen from the description of S11 to S16.
In some implementations, in consideration of a place including a user (such as a resident of a cell or an employee of a company) who is often accessed, some temporary guests may be included, in order to make the method provided in the embodiments of the present application applicable to the temporary guests, the embodiments of the present application may further include: s31, responding to the request of a third user for temporarily accessing the place, and acquiring temporary visitor information by a first access control, wherein the temporary visitor information comprises the identification of the third user; s32, responding to a request entering operation of the third user on the first access control, wherein the first access control obtains a third request which comprises an identification of the third user; s33, if the identification of the third user is determined to be matched with the temporary visitor information maintained locally, the first access control obtains a third verification sub-result, wherein the third verification sub-result is used for indicating that the second user is a temporary user with permission to access the place; s34, the first access control obtains the health condition of the third user based on the identification of the third user; s35, if the health condition of the third user meets the health requirement of entering the place, the first access control obtains a fourth verification sub-result, wherein the fourth verification sub-result is used for indicating that the third user is a healthy user; s36, the first access control determines a third verification result based on the third verification sub-result and the fourth verification sub-result, wherein the third verification result is used for indicating that the third user is a temporary visitor of the place, and the third verification result comprises an identification of the third user.
The S31 may be temporary visitor information entered by the temporary user or the manager of the first access control (or the manager of the place) on the first access control or the management platform after the temporary user passes the information audit of the manager of the first access control, for example. The temporary user may include a third user, and the temporary access information may include temporary access information associated with the third user, the temporary access information associated with the third user including an identification of the third user.
The specific implementation and effect of S32 to S36 can be seen from the description of S11 to S15.
As an example, considering that the temporary visitor access to the venue is temporary and may fail, in order to improve the security of venue access management, in the method, the temporary visitor information further includes an access valid condition of the third user, and obtaining the third authentication sub-result in S33 may include: and if the identification of the third user is determined to be matched with the temporary visitor information which is maintained locally, and the access effective condition of the third user is satisfied when the first request occurs, the first access control acquires the third verification sub-result. Wherein the access validity condition includes a threshold of access times of the temporary user (e.g., 2 times) or an access duration limit of the temporary user (e.g., 3 hours). In this example, the third verification result is further used to indicate a valid condition of the third user accessing the location, so that after sharing the verification result with other access control devices, the other access control devices can determine whether the third user belongs to a valid and authorized temporary visitor based on the received verification result. The effective access condition of the third user in the temporary visitor information can be that the third user applies for and transmits the request to the management platform or the first access control through a client side agency with the requirement of accessing the place on own terminal equipment, or can be that a manager distributes and inputs the request to the third user and inputs the request to the management platform or the first access control.
As another example, considering that the destination to be accessed after some temporary visitors (e.g., takers or couriers) usually enter the venue is fixed, in order to avoid the temporary visitor from lying out and doing other adverse actions on the venue and on personnel in the venue, in the embodiment of the present application, the temporary visitor information further includes the target area accessed by the third user in the venue, and then the method may further include: the first access control sends the third verification result to a third access control of the target area, and the third verification result is used by the third access control to respond to a request entering operation of the third user to enter the target area. In the example, the first access control does not share the third verification result to other access controls except for the access control corresponding to the target area, or the first access control or the management platform does not send temporary visitor information related to the third user to the access control irrelevant to the target area of the place where the third user enters, so that strict management on access of the temporary visitor is ensured, and the safety of the place is ensured. The temporary visitor information may be recorded by a client on the terminal device of the third user and transmitted to the management platform or the first access control.
In this example, to improve the security of the venue, after the temporary visitor enters the portal corresponding to the first access portal, the method may further include: if the activity of the third user in the place is not consistent with the target area, the first access control or management platform generates prompt information, and the prompt information is used for indicating the third user to illegally access the place. And judging whether the activities of the third user in the place are consistent with the target area or not, wherein the judgment can be performed by the first access control or the management platform. The activities of the third user in the place can be obtained from monitoring equipment in the place by the first access control or management platform, and can also be obtained from acquisition devices of other access controls in the place, and the acquisition devices of other access controls for obtaining the activities of the third user in the place can be acquisition devices of the access controls which the third user initiates the request for entering operation.
It should be noted that, if it is determined that the activity of the third user in the location does not match the target area, the first access control or the management platform may further control to close the temporary visitor permission of the third user. The temporary visitor permission of the third user is controlled to be closed and the prompt information is generated, which can be concurrent; or after the first access control or management platform generates the prompt information, controlling to close the temporary visitor permission of the third user based on the prompt information; the first access control or the management platform can control the temporary visitor permission of the third user to be closed, and then prompt information is generated for safety and information statistics.
In some implementations, each access control within a venue may send verification information for a user initiating a request for access operation at the access control to a management platform of the venue, such that the management platform is configured to calculate and analyze the behavior of each access control in the venue for the received verification information. For example, the second access control or the first access control may send a first verification result of the first user to the management platform of the venue, the first access control may send a second verification result of the second user to the management platform of the venue, and the first access control may send a third verification result of the third user to the management platform of the venue.
It should be noted that, in the method provided by the embodiment of the present application, a legal user may refer to a healthy user having access to a location, and if the location has no requirement on the health condition of an entering person, the legal user may refer to a user having access to the location.
It should be noted that, in the method provided by the embodiment of the present application, the gate inhibition also generates the verification result of the illegal user, and shares the verification result of the illegal user to the management platform or other gate inhibition, so as to quickly respond to the entry request of the illegal user and make statistics on the situation. An illegal user may refer to a user who does not have access to the site rights and/or a user who does not meet health requirements, and if the site does not have requirements on the health condition of the entering person, the illegal user may refer to a user who does not have access to the site rights.
Therefore, in the method provided by the embodiment of the application, the multiple access control devices in the same place can share the verification result of the user, after the user passes through the verification of one access control device, other access control devices do not need to search, verify and other complicated works from a massive database, the access control device directly executes the access control on the authority management of the user based on the received verification result, multiple times of verification on the same access person by the multiple access control devices in the place are overcome, repeated verification of the multiple access control devices can be avoided on the basis of ensuring safety, the efficiency and the intelligent level of the access management of the place are improved, and the experience of the user on the access management of the place is also improved.
In addition, the embodiment of the application also provides a device 300 for site access management. Referring to fig. 3, fig. 3 is a schematic structural diagram of an apparatus 300 for venue access management according to an embodiment of the present application, where the apparatus 300 may include: a receiving unit 301, a first obtaining unit 302, and a first generating unit 303.
Wherein:
a receiving unit 301, configured to receive a first verification result sent by a second portal of the venue, where the first verification result is used to indicate that a first user is a legal user of the venue, and the first verification result includes an identifier of the first user;
A first obtaining unit 302, configured to obtain a first request in response to a request entry operation of the first user at the first access control, where the first request includes an identifier of the first user;
the first generating unit 303 is configured to generate a first response corresponding to the first request according to the first verification result that the identifier of the first user matches, where the first response is used to indicate that an entry corresponding to the first access control is open for the first user.
Optionally, the apparatus 300 further includes:
a second obtaining unit, configured to obtain a second request in response to a request entry operation of a second user at the first access control, where the second request includes an identifier of the second user;
a third obtaining unit, configured to obtain a first verification sub-result if it is determined that the identifier of the second user matches the identifier of the locally maintained user with access rights, where the first verification sub-result is used to indicate that the second user is a user with access rights to the location;
a fourth obtaining unit, configured to obtain a health condition of the second user based on the identifier of the second user;
a fifth obtaining unit, configured to obtain a second verification sub-result if it is determined that the health condition of the second user meets the health requirement of entering the location, where the second verification sub-result is used to indicate that the second user is a healthy user;
The first determining unit is configured to determine a second verification result based on the first verification sub-result and the second verification sub-result, where the second verification result is used to indicate that the second user is a legal user in the venue, and the second verification result includes an identifier of the second user.
Optionally, the apparatus 300 further includes:
and the first sending unit is used for sending the second verification result to other access control of the place, wherein the other access control comprises the second access control.
Optionally, the apparatus 300 further includes:
a sixth obtaining unit configured to obtain temporary visitor information in response to passage of a request of a third user to temporarily access the location, the temporary visitor information including an identification of the third user;
a seventh obtaining unit, configured to obtain a third request in response to a request entry operation of the third user at the first access control, where the third request includes an identifier of the third user;
an eighth obtaining unit, configured to obtain a third verification sub-result if it is determined that the identifier of the third user matches the temporary visitor information that is maintained locally, where the third verification sub-result is used to indicate that the second user is a temporary user who has permission to access the location;
A ninth obtaining unit, configured to obtain a health condition of the third user based on the identifier of the third user;
a tenth obtaining unit, configured to obtain a fourth verification sub-result if it is determined that the health condition of the third user meets the health requirement of entering the location, where the fourth verification sub-result is used to indicate that the third user is a healthy user;
the second determining unit is configured to determine a third verification result based on the third verification sub-result and the fourth verification sub-result, where the third verification result is used to indicate that the third user is a temporary visitor in the venue, and the third verification result includes an identifier of the third user.
Optionally, the temporary visitor information further includes an access valid condition of the third user, and the eighth obtaining unit is specifically configured to:
and if the identification of the third user is determined to be matched with the temporary visitor information which is maintained locally, and the access valid condition of the third user is determined to be met when the first request occurs, obtaining the third verification sub-result.
Optionally, the temporary visitor information further includes a target area of the location accessed by the third user, and the apparatus 300 further includes:
The second sending unit is used for sending the third verification result to a third access control of the target area, and the third verification result is used by the third access control to respond to a request entering operation of the third user to enter the target area.
Optionally, the apparatus 300 further includes:
and the second generation unit is used for generating prompt information if the activity of the third user in the place is not consistent with the target area, wherein the prompt information is used for indicating the third user to illegally access the place.
Optionally, the apparatus 300 further includes:
and the third sending unit is used for sending verification information of the user who initiates the request for access operation at the first access control to the management platform of the place, so that the management platform is used for counting and analyzing the working condition of each access control in the place through the received verification information.
It should be noted that, because the content of information interaction and execution process between the modules and units of the apparatus 300 is based on the same concept as the method embodiment in the embodiment of the present application, the technical effects brought by the content are the same as the method embodiment in the embodiment of the present application, and the specific content can be referred to the description in the foregoing illustrated method embodiment in the embodiment of the present application, which is not repeated herein.
In addition, the embodiment of the application also provides the electronic device 400. Referring to fig. 4, fig. 4 shows a schematic hardware structure of an electronic device 400 according to an embodiment of the present application, where the electronic device 400 may include a processor 401 and a memory 402.
Wherein the memory 402 is configured to store a computer program;
the processor 401 is configured to execute the method for venue access management described in the above method embodiment according to the computer program.
In addition, the embodiment of the application also provides a computer readable storage medium for storing a computer program for executing the method for venue access management described in the embodiment of the method.
The "first" in the names of the "first user", "first access control", etc. in the embodiments of the present application is only used to make name identification, and does not represent the first in sequence. The rule applies equally to "second", "third", etc.
From the above description of embodiments, it will be apparent to those skilled in the art that all or part of the steps of the above described example methods may be implemented in software plus general hardware platforms. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a read-only memory (ROM)/RAM, a magnetic disk, an optical disk, or the like, including several instructions for causing a computer device (which may be a personal computer, a server, or a network communication device such as a router) to perform the methods described in the embodiments or some parts of the embodiments of the present application.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points. The apparatus embodiments described above are merely illustrative, in which the modules illustrated as separate components may or may not be physically separate, and the components shown as modules may or may not be physical modules, i.e., may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the objective of the embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application.

Claims (11)

1. A method of venue access management, applied to a first access control of a venue, the method comprising:
Receiving a first verification result sent by a second portal of the place, wherein the first verification result is used for indicating that a first user is a legal user of the place, and the first verification result comprises an identification of the first user;
responding to a request entering operation of the first user at the first access control, and obtaining a first request, wherein the first request comprises an identification of the first user;
and generating a first response corresponding to the first request according to the first verification result of the identification matching of the first user, wherein the first response is used for indicating that an entry corresponding to the first access control is opened for the first user.
2. The method according to claim 1, wherein the method further comprises:
responding to a request entering operation of a second user on the first access control, and obtaining a second request, wherein the second request comprises an identification of the second user;
if the identification of the second user is matched with the identification of the locally maintained user with access rights, a first verification sub-result is obtained, wherein the first verification sub-result is used for indicating that the second user is the user with access rights to the place;
acquiring the health condition of the second user based on the identification of the second user;
If the health condition of the second user meets the health requirement of entering the place, a second verification sub-result is obtained, wherein the second verification sub-result is used for indicating that the second user is a healthy user;
and determining a second verification result based on the first verification sub-result and the second verification sub-result, wherein the second verification result is used for indicating that the second user is a legal user of the place, and the second verification result comprises an identification of the second user.
3. The method according to claim 2, wherein the method further comprises:
and sending the second verification result to other access control of the place, wherein the other access control comprises the second access control.
4. A method according to any one of claims 1-3, wherein the method further comprises:
responding to a request of a third user for temporarily accessing the place, and acquiring temporary visitor information, wherein the temporary visitor information comprises an identification of the third user;
responding to the request entering operation of the third user in the first access control, and obtaining a third request, wherein the third request comprises the identification of the third user;
if the identification of the third user is determined to be matched with the temporary visitor information maintained locally, a third verification sub-result is obtained, wherein the third verification sub-result is used for indicating that the second user is a temporary user with permission to access the place;
Based on the identification of the third user, obtaining the health condition of the third user;
if the health condition of the third user is determined to meet the health requirement of entering the place, a fourth verification sub-result is obtained, wherein the fourth verification sub-result is used for indicating that the third user is a healthy user;
and determining a third verification result based on the third verification sub-result and the fourth verification sub-result, wherein the third verification result is used for indicating that the third user is a temporary visitor of the place, and the third verification result comprises an identification of the third user.
5. The method of claim 4, wherein the temporary guest information further includes an access valid condition of the third user, and wherein the obtaining a third authentication sub-result comprises:
and if the identification of the third user is determined to be matched with the temporary visitor information which is maintained locally, and the access valid condition of the third user is determined to be met when the first request occurs, obtaining the third verification sub-result.
6. The method of claim 4, wherein the temporary visitor information further includes a target area of the venue for the third user to access, the method further comprising:
And sending the third verification result to a third access control of the target area, wherein the third verification result is used by the third access control to respond to a request entering operation of the third user to enter the target area.
7. The method of claim 6, wherein the method further comprises:
and if the activity of the third user in the place is not consistent with the target area, generating prompt information, wherein the prompt information is used for indicating the third user to illegally access the place.
8. The method according to claim 1, wherein the method further comprises:
and sending verification information of a user initiating a request for access operation at the first access control to a management platform of the place, so that the management platform is used for counting and analyzing the working condition of each access control in the place by the received verification information.
9. An apparatus for venue access management, the apparatus comprising:
the receiving unit is used for receiving a first verification result sent by a second portal of the place, wherein the first verification result is used for indicating that a first user is a legal user of the place, and the first verification result comprises an identifier of the first user;
The obtaining unit is used for responding to the request entering operation of the first user at the first access control, and obtaining a first request which comprises the identification of the first user;
the generating unit is used for generating a first response corresponding to the first request according to the first verification result of the identification matching of the first user, wherein the first response is used for indicating that an entry corresponding to the first access control is opened for the first user.
10. An electronic device, the electronic device comprising a processor and a memory:
the memory is used for storing a computer program;
the processor is configured to perform the method of any of claims 1-8 according to the computer program.
11. A computer readable storage medium, characterized in that the computer readable storage medium is for storing a computer program for executing the method of any one of claims 1-8.
CN202211377515.4A 2022-08-31 2022-11-04 Method, device and related equipment for site access management Pending CN116012991A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211054210X 2022-08-31
CN202211054210 2022-08-31

Publications (1)

Publication Number Publication Date
CN116012991A true CN116012991A (en) 2023-04-25

Family

ID=86019881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211377515.4A Pending CN116012991A (en) 2022-08-31 2022-11-04 Method, device and related equipment for site access management

Country Status (1)

Country Link
CN (1) CN116012991A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111714341A (en) * 2019-03-19 2020-09-29 奥普托图尼股份公司 System for eye training and use of a system for eye training
CN116820160A (en) * 2023-08-29 2023-09-29 绵阳光耀新材料有限责任公司 Spheroidizing machine parameter regulation and control method and system based on glass bead state monitoring

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205892A (en) * 2015-10-08 2015-12-30 广东欧珀移动通信有限公司 Door access control method and system
CN105427414A (en) * 2015-11-03 2016-03-23 徐承柬 Visitor management method and system
CN112712631A (en) * 2020-12-16 2021-04-27 深圳市亚联讯网络科技有限公司 Cloud access control method and system
CN112884966A (en) * 2021-03-31 2021-06-01 厦门熵基科技有限公司 Access control method and device, electronic equipment and storage medium
CN113611032A (en) * 2021-05-24 2021-11-05 沈阳格林豪森物业管理有限公司 Access control management method and system based on face recognition
CN113763620A (en) * 2021-09-14 2021-12-07 孟琦 Combined access control, method and device for controlling combined access control, and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105205892A (en) * 2015-10-08 2015-12-30 广东欧珀移动通信有限公司 Door access control method and system
CN105427414A (en) * 2015-11-03 2016-03-23 徐承柬 Visitor management method and system
CN112712631A (en) * 2020-12-16 2021-04-27 深圳市亚联讯网络科技有限公司 Cloud access control method and system
CN112884966A (en) * 2021-03-31 2021-06-01 厦门熵基科技有限公司 Access control method and device, electronic equipment and storage medium
CN113611032A (en) * 2021-05-24 2021-11-05 沈阳格林豪森物业管理有限公司 Access control management method and system based on face recognition
CN113763620A (en) * 2021-09-14 2021-12-07 孟琦 Combined access control, method and device for controlling combined access control, and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111714341A (en) * 2019-03-19 2020-09-29 奥普托图尼股份公司 System for eye training and use of a system for eye training
CN116820160A (en) * 2023-08-29 2023-09-29 绵阳光耀新材料有限责任公司 Spheroidizing machine parameter regulation and control method and system based on glass bead state monitoring

Similar Documents

Publication Publication Date Title
CN116012991A (en) Method, device and related equipment for site access management
CN103248484B (en) Access control system and method
CN113053013B (en) Access control method and device based on face recognition, computer equipment and medium
JP6081859B2 (en) Entrance / exit management system and entrance / exit management method
CN108510626B (en) Dynamic password access control management method and management system thereof
US20030005326A1 (en) Method and system for implementing a security application services provider
KR102490323B1 (en) System and method for access control using blockchain network and computer program for the same
US20070050634A1 (en) Service authentication system, server, network equipment, and method for service authentication
CN111199602B (en) Access control method based on personnel big data acquisition and analysis
CN113160472A (en) Intelligent management method, device, system, equipment and medium for community access control
CN113611032A (en) Access control management method and system based on face recognition
CN110675537A (en) Method and system for access control management of restricted area
KR20180125729A (en) Vehicle access control system and method through code display
CN110768942B (en) Identity authentication system
CN111292454A (en) Intelligent identity access control identification system and method
CN108364376A (en) A kind of gate inhibition and integrated Work attendance method of checking card
KR102088918B1 (en) A method and server for managing shared space information using router
US20220014388A1 (en) Virtual security guard
US8756655B2 (en) Integrated physical access control and information technology (IT) security
EP3550488A1 (en) System and method for credentialing access to restricted rooms
CN110634217B (en) House lease management method and server
CN111049811A (en) Visitor information management method, access control card management method and visitor system
CN115563620A (en) Credible security method and security protection system for intelligent education platform
JP7450569B2 (en) Visitor management system and visitor management method
CN109272607A (en) A kind of reservation visitor recognition methods and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination