TW201824811A - Time limit door access control management system by guest authentication and method thereof - Google Patents

Time limit door access control management system by guest authentication and method thereof Download PDF

Info

Publication number
TW201824811A
TW201824811A TW105143364A TW105143364A TW201824811A TW 201824811 A TW201824811 A TW 201824811A TW 105143364 A TW105143364 A TW 105143364A TW 105143364 A TW105143364 A TW 105143364A TW 201824811 A TW201824811 A TW 201824811A
Authority
TW
Taiwan
Prior art keywords
information
access control
visitor
verification
module
Prior art date
Application number
TW105143364A
Other languages
Chinese (zh)
Inventor
邱全成
Original Assignee
英業達股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 英業達股份有限公司 filed Critical 英業達股份有限公司
Priority to TW105143364A priority Critical patent/TW201824811A/en
Publication of TW201824811A publication Critical patent/TW201824811A/en

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

A time limit door access control management system by guest authentication and a method thereof are provided. Guest information is created in a server by a client. A two-dimensional barcode contained the guest information is transferred to guest's handheld device. Guest identity is authenticated by the server from the guest's handheld device through a security management device and door access control management information is also created. Guest is allowed to pass the door access control device by using the guest's handheld device within a time limit. Therefore, the improve efficiency and convenience of door access control management may be achieved.

Description

具訪客身份驗證的時限門禁管理系統及其方法Time limit access control management system with guest authentication and method thereof

一種門禁管理系統及其方法,尤其是指一種兼具訪客身份驗證以及時間限制管理的門禁管理系統及其方法。An access control management system and method thereof, in particular to an access control management system and method thereof with both guest identity verification and time limit management.

目前對於商業大樓的門禁管理方式,包含有人工方式門禁管理、半電子化門禁管理以及電子化門禁管理。At present, the access control management methods for commercial buildings include manual access control management, semi-electronic access control management and electronic access control management.

人工方式門禁管理即是門禁管理完全由保全人員進行出入人員的門禁管控,然而保全人員並不可能管控到所有的人員出入,即會造成人員出入管理漏洞的問題。Manual access control is the access control of the access control personnel. The security personnel are not likely to control all personnel access, which will cause the personnel to enter and manage the loopholes.

半電子化門禁管理即是訪客需要透過保全人員換取可以通過特定門禁裝置的門禁卡,但仍存在訪客拜訪後忘記再次進行門禁卡換取的問題,這也會造成門禁卡的消耗與建製成本的增加。Semi-electronic access control is the need for visitors to exchange access control cards for specific access control devices. However, there is still the problem of forgetting to exchange access cards again after the visitor visits. This will also result in an increase in the consumption and cost of the access control card. .

電子化門禁管理則是訪客不需要透過保全人員進行門禁卡的換取,然而則是需要被拜訪的公司派遣專人來代領訪客通過門禁,這也會造成被拜訪的公司的困擾。Electronic access control management means that visitors do not need to exchange the access control card through the security personnel. However, it is necessary for the visited company to send a special person to pass the access control, which will also cause trouble for the company being visited.

綜上所述,可知先前技術中長期以來一直存在現有門禁管理不便的問題,因此有必要提出改進的技術手段,來解決此一問題。In summary, it can be seen that in the prior art, the problem of inconvenient management of the existing access control has existed for a long time, so it is necessary to propose an improved technical means to solve this problem.

有鑒於先前技術存在現有門禁管理不便的問題,本發明遂揭露一種具訪客身份驗證的時限門禁管理系統及其方法,其中:In view of the prior art, the existing access control management problem is inconvenient, and the present invention discloses a time limit access control management system with guest identity verification and a method thereof, wherein:

本發明所揭露的具訪客身份驗證的時限門禁管理系統,其包含:客戶端、管理伺服器端、保全管理裝置以及門禁裝置,客戶端更包含:第一接收模組、生成模組以及第一傳送模組;管理伺服器端更包含:第二接收模組、儲存模組、驗證模組以及第二傳送模組;保全管理裝置更包含:影像擷取模組、解碼模組、第三傳送模組、第三接收模組以及門禁管理模組;及門禁裝置更包含:第四接收模組、第四傳送模組以及門禁模組。The invention provides a time limit access control management system with a guest identity verification, comprising: a client, a management server, a security management device and an access control device, wherein the client further comprises: a first receiving module, a generating module and a first The transmission module further includes: a second receiving module, a storage module, a verification module and a second transmission module; the security management device further comprises: an image capturing module, a decoding module, and a third transmission The module, the third receiving module and the access control module; and the access control device further comprise: a fourth receiving module, a fourth transmitting module and an access control module.

客戶端的第一接收模組是用以接收訪客個人資訊;客戶端的生成模組是用以將訪客個人資訊與客戶端資訊生成為訪客資訊,並將訪客資訊生成為二維條碼;及客戶端的第一傳送模組是用以傳送訪客資訊,以及傳送二維條碼至訪客手持式裝置。The first receiving module of the client is used for receiving personal information of the visitor; the generating module of the client is used to generate the personal information of the visitor and the information of the client as the visitor information, and generate the visitor information as a two-dimensional barcode; and the client's A transfer module is used to transmit visitor information and to transmit a two-dimensional bar code to the visitor's handheld device.

管理伺服器端的第二接收模組是用以自第一傳送模組接收訪客資訊,接收驗證訪客資訊,接收門禁管理資訊,以及接收驗證識別碼與門禁管理識別碼;管理伺服器端的儲存模組是用以儲存訪客資訊,以及儲存門禁管理資訊;管理伺服器端的驗證模組是用以依據被儲存的訪客資訊對驗證訪客資訊進行驗證,並當驗證訪客資訊通過驗證後生成驗證通過響應,以及依據被儲存的門禁管理資訊對驗證識別碼以及門禁管理識別碼進行驗證,並當驗證識別碼以及門禁管理識別碼通過驗證且系統時間介於門禁管理資訊的訪問時間範圍之間生成門禁解除指令;及管理伺服器端的第二傳送模組是用以傳送驗證通過響應,以及傳送門禁解除指令。The second receiving module of the management server is configured to receive visitor information from the first transmitting module, receive the verified visitor information, receive the access control management information, and receive the verification identification code and the access control identification code; and manage the storage module of the server end. It is used for storing visitor information and storing access control management information; the authentication module of the management server is used for verifying the verified visitor information according to the stored visitor information, and generating a verification pass response after verifying that the visitor information is verified, and Verifying the verification identification code and the access control identification code according to the stored access control management information, and generating an access cancellation command when the verification identification code and the access control identification code pass the verification and the system time is between the access time ranges of the access control information; And the second transmission module of the management server is configured to transmit a verification pass response and a transfer access release command.

保全管理裝置的影像擷取模組是用以擷取訪客手持式裝置所顯示的二維條碼;保全管理裝置的解碼模組是用以將二維條碼解碼出驗證訪客資訊;保全管理裝置的第三傳送模組是用以傳送驗證訪客資訊至第二接收模組,傳送門禁管理資訊;保全管理裝置的第三接收模組是用以自第二傳送模組接收驗證通過響應,自訪客手持式裝置接收訪客手持式裝置所具有的唯一識別碼;及保全管理裝置的門禁管理模組是當第三接收模組接收到驗證通過響應時,建立唯一識別碼、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊。The image capturing module of the security management device is for capturing the two-dimensional barcode displayed by the guest handheld device; the decoding module of the security management device is for decoding the two-dimensional barcode to verify the visitor information; The third transmission module is configured to transmit the verification visitor information to the second receiving module to transmit the access control management information; the third receiving module of the security management device is configured to receive the verification response response from the second transmission module, from the visitor handheld The device receives the unique identification code of the visitor handheld device; and the access management module of the security management device is configured to establish a unique identification code and a visit time range and at least one access time when the third receiving module receives the verification response The correspondence of the access control identification code is the access control information.

門禁裝置的第四接收模組是用以接收驗證識別碼,以及自第二傳送模組接收門禁解除指令;門禁裝置的第四傳送模組是用以傳送驗證識別碼以及門禁管理識別碼至第二接收模組;及門禁裝置的門禁模組是當第四接收模組接收到門禁解除指令時,則暫時解鎖門禁。The fourth receiving module of the access control device is configured to receive the verification identification code and receive the access cancellation command from the second transmission module; the fourth transmission module of the access control device is configured to transmit the verification identification code and the access control identification code to the first The second receiving module; and the access control module of the access control device temporarily unlocks the access control when the fourth receiving module receives the access cancellation command.

本發明所揭露的具訪客身份驗證的時限門禁管理方法,其包含下列步驟:The method for managing time limit access control with visitor authentication disclosed in the present invention comprises the following steps:

首先,提供接收訪客個人資訊的客戶端;接著,客戶端將訪客個人資訊與客戶端資訊生成為訪客資訊,並將訪客資訊生成為二維條碼;接著,客戶端傳送訪客資訊至管理伺服器端;接著,客戶端傳送二維條碼至具有唯一識別碼的訪客手持式裝置;接著,管理伺服器端儲存訪客資訊;接著,保全管理裝置擷取訪客手持式裝置所顯示的二維條碼;接著,保全管理裝置將二維條碼解碼出驗證訪客資訊並傳送至管理伺服器端;接著,管理伺服器端依據被儲存的訪客資訊對驗證訪客資訊進行驗證,並當驗證訪客資訊通過驗證後生成驗證通過響應;接著,管理伺服器端傳送驗證通過響應至保全管理裝置時,保全管理裝置建立唯一識別碼、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊;接著,保全管理裝置傳送門禁管理資訊至管理伺服器端;接著,管理伺服器端儲存門禁管理資訊;接著,門禁裝置自訪客手持式裝置接收唯一識別碼為驗證識別碼以及門禁管理識別碼並傳送至管理伺服器端;接著,管理伺服器端依據被儲存的門禁管理資訊對驗證識別碼以及門禁管理識別碼進行驗證,並當驗證識別碼以及門禁管理識別碼通過驗證且系統時間介於門禁管理資訊的訪問時間範圍之間生成門禁解除指令;最後,管理伺服器端傳送門禁解除指令至門禁裝置時,門禁裝置暫時解鎖門禁。First, a client that receives the personal information of the visitor is provided; then, the client generates the visitor personal information and the client information as the visitor information, and generates the visitor information as a two-dimensional barcode; then, the client transmits the visitor information to the management server Then, the client transmits the 2D barcode to the visitor handheld device with the unique identifier; then, the management server stores the visitor information; then, the security management device retrieves the 2D barcode displayed by the visitor handheld device; The security management device decodes the two-dimensional barcode to verify the visitor information and transmits it to the management server; then, the management server verifies the verification visitor information according to the stored visitor information, and generates verification after verifying that the visitor information is verified. Response; then, when the management server transmits the verification by responding to the security management device, the security management device establishes the unique identification code, the correspondence between the access time range in the visitor information and the at least one access control identification code is the access control information; and then, the security management The device transmits the access control information to the management servo Then, the management server stores the access control management information; then, the access control device receives the unique identification code from the visitor handheld device as the verification identification code and the access control identification code and transmits it to the management server; and then, the management server is based on The stored access control management information verifies the verification identification code and the access control identification code, and generates an access cancellation command when the verification identification code and the access control identification code pass the verification and the system time is within the access time range of the access control information; When the management server transmits the access cancellation command to the access control device, the access control device temporarily unlocks the access control.

本發明所揭露的系統及方法如上,與先前技術之間的差異在於本發明透過客戶端於管理伺服器端中建立訪客資訊,以及提供轉換為二維條碼的訪客資訊至訪客手持式裝置,訪客即可使用訪客手持式裝置透過保全管理裝置至管理伺服器端中進行身份驗證以及門禁管理資訊的建立,訪客可透過訪客手持式裝置於時限內可以通過被許可的門禁裝置。The system and method disclosed by the present invention are as above, and the difference from the prior art is that the present invention establishes visitor information in the management server terminal through the client, and provides visitor information converted to a two-dimensional barcode to the visitor handheld device, the visitor The visitor handheld device can be used to authenticate and manage the access control information through the security management device to the management server, and the visitor can access the licensed access device through the visitor handheld device within the time limit.

透過上述的技術手段,本發明可以達成提高門禁管理便利性的技術功效。Through the above technical means, the present invention can achieve the technical effect of improving the convenience of access control management.

以下將配合圖式及實施例來詳細說明本發明的實施方式,藉此對本發明如何應用技術手段來解決技術問題並達成技術功效的實現過程能充分理解並據以實施。The embodiments of the present invention will be described in detail below with reference to the drawings and embodiments, so that the application of the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented.

以下將以一個實施例來說明本發明實施態樣的運作系統與方法,並請同時參考「第1圖」、「第2A圖」至「第2C圖」以及「第3圖」所示,「第1圖」繪示為本發明具訪客身份驗證的時限門禁管理系統的系統方塊圖;「第2A圖」至「第2C圖」繪示為本發明具訪客身份驗證的時限門禁管理方法的方法流程圖;「第3圖」繪示為本發明具訪客身份驗證的時限門禁管理的系統架構示意圖。Hereinafter, an operation system and method according to an embodiment of the present invention will be described with reference to an embodiment, and reference is also made to "1", "2A" to "2C" and "3", " 1 is a system block diagram of a time limit access control management system with a guest identity verification method; and FIG. 2A to 2C is a method for a time limit access control management method with a guest identity verification method according to the present invention. Flowchart; "Fig. 3" is a schematic diagram showing the system architecture of the time limit access control with guest authentication.

本發明所揭露的具訪客身份驗證的時限門禁管理系統,其包含:客戶端10、管理伺服器端20、保全管理裝置30以及門禁裝置40,客戶端10更包含:第一接收模組11、生成模組12以及第一傳送模組13;管理伺服器端20更包含:第二接收模組21、儲存模組22、驗證模組23以及第二傳送模組24;保全管理裝置30更包含:影像擷取模組31、解碼模組32、第三傳送模組33、第三接收模組34以及門禁管理模組35;及門禁裝置40更包含:第四接收模組41、第四傳送模組42以及門禁模組43。The time limit access control system with a visitor authentication method includes a client 10, a management server 20, a security management device 30, and an access control device 40. The client 10 further includes: a first receiving module 11, The generating module 12 and the first transmitting module 13 further include: a second receiving module 21, a storage module 22, a verification module 23, and a second transmission module 24; the security management device 30 further includes The image capturing module 31, the decoding module 32, the third transmitting module 33, the third receiving module 34, and the access control module 35; and the access control device 40 further includes: a fourth receiving module 41, and a fourth transmission Module 42 and access module 43.

在訪客需要訪問公司時,公司的管理人員會先透過設置於公司內客戶端10所提供的使用者介面進行訪客個人資訊的輸入,訪客個人資訊包含有訪客姓名、訪客身份證號、訪客電子郵件、訪客連絡電話、訪問時間範圍…等的組合,在此僅為舉例說明之,並不以此侷限本發明的應用範疇,上述客戶端10例如是:電腦、筆記型電腦、平板電腦、智慧型裝置…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。When a visitor needs to visit the company, the company's management personnel will first input the personal information of the visitor through the user interface provided by the client 10 provided in the company. The personal information of the visitor includes the visitor's name, visitor ID number, and visitor email. The combination of the guest contact telephone number, the access time range, and the like is merely an example, and is not limited to the application scope of the present invention. The client 10 is, for example, a computer, a notebook computer, a tablet computer, or a smart type. The device, etc., is for illustrative purposes only and is not intended to limit the scope of application of the invention.

在透過客戶端10所提供的使用者介面輸入完訪客個人資訊後,客戶端10的第一接收模組11即會接收訪客個人資訊(步驟101),並由客戶端10的生成模組12將訪客個人資訊與客戶端資訊生成為訪客資訊61,並將訪客資訊61生成為二維條碼62(步驟102),上述客戶端資訊是預先建立於客戶端10中,上述客戶端資訊包含有公司名稱、公司編號、到達公司必須經過的門禁管理識別碼…等的組合,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。After the personal information of the visitor is input through the user interface provided by the client 10, the first receiving module 11 of the client 10 receives the personal information of the visitor (step 101), and is generated by the generating module 12 of the client 10. The visitor personal information and the client information are generated as the visitor information 61, and the visitor information 61 is generated as a two-dimensional barcode 62 (step 102). The client information is pre-established in the client 10, and the client information includes the company name. The combination of the company number, the access control identification code that must be passed by the company, etc., is merely illustrative here, and is not intended to limit the scope of application of the present invention.

在客戶端10的生成模組12將訪客個人資訊與客戶端資訊生成為訪客資訊61,並將訪客資訊61生成為二維條碼62後,客戶端10會分別與管理伺服器端20以及訪客手持式裝置50透過有線傳輸方式(例如是:電纜網路、光纖網路…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,即可再由客戶端10的第一傳送模組13傳送訪客資訊61至管理伺服器端20(步驟103),以及由客戶端10的第一傳送模組13傳送二維條碼62至訪客手持式裝置50(步驟104),上述訪客手持式裝置50例如是:智慧型手機、個人數位助理(Personal Digital Assistant, PDA)…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。After the generating module 12 of the client 10 generates the guest personal information and the client information as the visitor information 61, and generates the visitor information 61 as the two-dimensional barcode 62, the client 10 will respectively be associated with the management server 20 and the visitor. The device 50 is transmitted by means of a wired transmission (for example, a cable network, a fiber optic network, etc., which is merely illustrative, and is not limited to the scope of application of the present invention) or a wireless transmission method (for example, Wi: -Fi, 3G, 4G, etc., which are merely exemplified herein, and are not limited to the scope of application of the present invention. The connection information can be transmitted again by the first transmission module 13 of the client 10. To the management server end 20 (step 103), and the first transfer module 13 of the client 10 transmits the two-dimensional barcode 62 to the visitor handheld device 50 (step 104), for example, the smart handheld device 50 Mobile phones, personal digital assistants (PDAs), etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention.

在管理伺服器端20的第二接收模組21自客戶端10的第一傳送模組13接收訪客資訊61後,管理伺服器端20的儲存模組22即可儲存管理伺服器端20的第二接收模組21所接收的訪客資訊61(步驟105)。After the second receiving module 21 of the management server 20 receives the visitor information 61 from the first transmitting module 13 of the client 10, the storage module 22 of the management server 20 can store the management server 20 The visitor information 61 received by the receiving module 21 is received (step 105).

訪客手持式裝置50亦可自客戶端10的第一傳送模組13接收二維條碼62,並當訪客拜訪公司時,訪客即可透過自客戶端10所獲得的二維條碼62於大樓管理處進行身份的驗證與門禁管理的建立,大樓管理處設置有保全管理裝置30,保全管理裝置30的影像擷取模組31即可擷取訪客手持式裝置50所顯示的二維條碼62(步驟106)。The guest handheld device 50 can also receive the two-dimensional barcode 62 from the first delivery module 13 of the client 10, and when the visitor visits the company, the visitor can use the two-dimensional barcode 62 obtained from the client 10 at the building management office. For the identity verification and the establishment of the access control, the building management office is provided with the security management device 30, and the image capturing module 31 of the security management device 30 can capture the two-dimensional barcode 62 displayed by the guest handheld device 50 (step 106). ).

在保全管理裝置30的影像擷取模組31擷取訪客手持式裝置50所顯示的二維條碼後,保全管理裝置30的解碼模組32即可將二維條碼解碼出驗證訪客資訊63,並且保全管理裝置30與管理伺服器端20透過有線傳輸方式(例如是:電纜網路、光纖網路…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,以透過保全管理裝置30的第三傳送模組33將驗證訪客資訊63傳送至管理伺服器端20(步驟107)。After the image capturing module 31 of the security management device 30 captures the two-dimensional barcode displayed by the guest handheld device 50, the decoding module 32 of the security management device 30 can decode the two-dimensional barcode to verify the visitor information 63, and The security management device 30 and the management server terminal 20 are transmitted by means of a wired transmission (for example, a cable network, a fiber optic network, etc., which are merely exemplified herein, and are not limited to the scope of application of the present invention) or wireless. The transmission mode (for example, Wi-Fi, 3G, 4G, etc., is merely exemplified herein, and is not limited to the application scope of the present invention) to establish a connection to pass the third transmission mode of the security management device 30. Group 33 transmits the verification visitor information 63 to the management server side 20 (step 107).

管理伺服器端20的第二接收模組21即可自保全管理裝置30的第三傳送模組33接收驗證訪客資訊63,並透過管理伺服器端20的驗證模組23依據被儲存的訪客資訊61對驗證訪客資訊63進行驗證,即管理伺服器端20的驗證模組23是比對驗證訪客資訊63是否與被儲存的訪客資訊61相符,當驗證訪客資訊63與被儲存的訪客資訊61比對相符時,則驗證訪客資訊63通過管理伺服器端20的驗證模組23的驗證,此時管理伺服器端20的驗證模組23即會生成驗證通過響應64(步驟108)。The second receiving module 21 of the management server 20 can receive the verification visitor information 63 from the third transmission module 33 of the security management device 30, and can be based on the stored visitor information through the verification module 23 of the management server terminal 20. 61 verifies the verification visitor information 63, that is, the verification module 23 of the management server terminal 20 compares the verification visitor information 63 with the stored visitor information 61, and compares the verified visitor information 63 with the stored visitor information 61. When there is a match, the verification visitor information 63 is verified by the verification module 23 of the management server terminal 20, and at this time, the verification module 23 of the management server terminal 20 generates a verification pass response 64 (step 108).

在管理伺服器端20的驗證模組23生成驗證通過響應64後,由管理伺服器端20的第二傳送模組24傳送管理伺服器端20的驗證模組23所生成的驗證通過響應64至保全管理裝置30。After the verification module 23 of the management server 20 generates the verification response 64, the verification by the verification module 23 of the management server 20 is transmitted by the second transmission module 24 of the management server 20 to the verification response 64 to The management device 30 is secured.

保全管理裝置30的第三接收模組34即可自管理伺服器端20的第二傳送模組24接收驗證通過響應64,在保全管理裝置30的第三接收模組34接收到驗證通過響應64時,即表示驗證訪客資訊63通過管理伺服器端20的驗證,並進一步由保全管理裝置30的第三接收模組34透過有線傳輸方式(例如是:傳輸線…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、藍牙、RFID、近場通訊…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)自訪客手持式裝置50接收訪客手持式裝置50所具有的唯一識別碼65,上述唯一識別碼65例如是:國際移動設備識別碼(International Mobile Equipment Identity,IMEI)、製造序號…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The third receiving module 34 of the security management device 30 can receive the verification pass response 64 from the second transfer module 24 of the management server terminal 20, and receive the verification pass response 64 at the third receiving module 34 of the security management device 30. The verification of the visitor information 63 is verified by the management server 20, and is further transmitted by the third receiving module 34 of the security management device 30 through a wired transmission method (for example, a transmission line, etc., which is merely an example here. , which is not limited to the scope of application of the present invention, or a wireless transmission method (for example, Wi-Fi, Bluetooth, RFID, near field communication, etc., which is merely illustrative here, and is not limited thereto) The application area includes receiving a unique identification code 65 of the guest handheld device 50 from the visitor handheld device 50, such as an International Mobile Equipment Identity (IMEI), a manufacturing serial number, etc. This is for illustrative purposes only and is not intended to limit the scope of application of the invention.

在保全管理裝置30的第三接收模組34自訪客手持式裝置50接收唯一識別碼65後,即可由保全管理裝置30的門禁管理模組35建立唯一識別碼65、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊66(步驟109),上述門禁管理識別碼是自訪客資訊中客戶端資訊所取得。After the third receiving module 34 of the security management device 30 receives the unique identification code 65 from the guest handheld device 50, the access control module 35 of the security management device 30 can establish the unique identification code 65, the access time range in the visitor information, and The correspondence between the at least one access control identification code is the access control information 66 (step 109), and the access control identification code is obtained from the client information in the visitor information.

在保全管理裝置30的門禁管理模組35建立唯一識別碼65、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊66後,即可由保全管理裝置30的第三傳送模組33將門禁管理資訊66傳送至管理伺服器端20(步驟110)。After the access control module 35 of the security management device 30 establishes the unique identification code 65, and the correspondence between the access time range of the visitor information and the at least one access control identification code is the access control information 66, the third transfer mode of the security management device 30 can be used. Group 33 transmits access control information 66 to management server 20 (step 110).

管理伺服器端20的第二接收模組21即可自保全管理裝置30的第三傳送模組33接收門禁管理資訊66,並由管理伺服器端20的儲存模組22儲存門禁管理資訊66(步驟111)。The second receiving module 21 of the management server terminal 20 can receive the access control management information 66 from the third transmission module 33 of the security management device 30, and store the access control management information 66 by the storage module 22 of the management server terminal 20 ( Step 111).

在訪客透過訪客手持式裝置50靠近門禁裝置40時,門禁裝置40與訪客手持式裝置50會透過無線傳輸方式(例如是:Wi-Fi、藍牙、RFID、近場通訊…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,門禁裝置40即可由第四接收模組41自訪客手持式裝置50獲得訪客手持式裝置50所具有的唯一識別碼作為驗證識別碼67。When the visitor approaches the access control device 40 through the visitor handheld device 50, the access control device 40 and the visitor handheld device 50 are wirelessly transmitted (for example: Wi-Fi, Bluetooth, RFID, near field communication, etc., here only By way of example, the connection is not limited by the application scope of the present invention, and the access control device 40 can obtain the unique identification code of the visitor handheld device 50 from the visitor handheld device 50 as the verification by the fourth receiving module 41. Identification code 67.

在門禁裝置40的第四接收模組41自訪客手持式裝置50接收驗證識別碼67之後,門禁裝置40與管理伺服器端20透過有線傳輸方式(例如是:電纜網路、光纖網路…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,即可由門禁裝置40的第四傳送模組42傳送門禁裝置40的第四接收模組41所接收到的驗證識別碼67以及門禁裝置40所具有的門禁管理識別碼68至管理伺服器端20(步驟112)。After the fourth receiving module 41 of the access control device 40 receives the verification identification code 67 from the visitor handheld device 50, the access control device 40 and the management server terminal 20 transmit the wired transmission method (for example, cable network, optical network, etc.) This is for illustrative purposes only, and is not intended to limit the scope of application of the present invention or wireless transmission methods (for example, Wi-Fi, 3G, 4G, etc., which are merely illustrative here, and are not The limitation of the application of the present invention is to establish a connection, that is, the verification identification code 67 received by the fourth receiving module 41 of the access control device 40 and the access control device 40 are transmitted by the fourth transmission module 42 of the access control device 40. The access control identification code 68 is sent to the management server 20 (step 112).

在管理伺服器端20的第二接收模組21即可自門禁裝置40的第四傳送模組42接收驗證識別碼67以及門禁管理識別碼68之後,管理伺服器端20的驗證模組23即可依據被儲存的門禁管理資訊66對驗證識別碼67以及門禁管理識別碼68進行驗證,即管理伺服器端20的驗證模組23是比對驗證識別碼67以及門禁管理識別碼68是否與被儲存的門禁管理資訊66中唯一識別碼65以及門禁管理識別碼是否相符,當驗證識別碼67以及門禁管理識別碼68與被儲存的門禁管理資訊66中唯一識別碼65以及門禁管理識別碼相符時,則驗證識別碼67以及門禁管理識別碼68通過管理伺服器端20的驗證模組23的驗證,且管理伺服器端20的系統時間介於門禁管理資訊66的訪問時間範圍之間時,管理伺服器端20的驗證模組23即會生成門禁解除指令69(步驟113)。After the second receiving module 21 of the management server terminal 20 can receive the verification identification code 67 and the access control identification code 68 from the fourth transmission module 42 of the access control device 40, the verification module 23 of the management server terminal 20 is The verification identification code 67 and the access control identification code 68 can be verified according to the stored access control management information 66, that is, whether the verification module 23 of the management server terminal 20 compares the verification identification code 67 and the access control identification code 68 with or not Whether the unique identification code 65 and the access control identification code in the stored access control information 66 match, when the verification identification code 67 and the access control identification code 68 match the unique identification code 65 and the access control identification code in the stored access control management information 66 Then, the verification identification code 67 and the access control management identification code 68 are managed by the verification module 23 of the management server terminal 20, and when the system time of the management server terminal 20 is between the access time ranges of the access control management information 66, management The verification module 23 of the server terminal 20 generates an access cancellation command 69 (step 113).

在管理伺服器端20的驗證模組23生成門禁解除指令69後,即可由管理伺服器端20的第二傳送模組24將門禁解除指令69傳送至門禁裝置40,門禁裝置40的第四接收模組41即可自管理伺服器端20的第二傳送模組24接收門禁解除指令69。After the verification module 23 of the management server terminal 20 generates the access cancellation command 69, the second transmission module 24 of the management server terminal 20 can transmit the access cancellation command 69 to the access control device 40, and the fourth reception of the access device 40. The module 41 can receive the access cancellation command 69 from the second transfer module 24 of the management server terminal 20.

在門禁裝置40的第四接收模組41接收到門禁解除指令69時,門禁裝置40的門禁模組43即可暫時解鎖門禁(步驟114),藉以讓訪客可使用訪客手持式裝置50於被設定的訪問時間範圍內可以通過被許可的門禁裝置40。When the fourth receiving module 41 of the access control device 40 receives the access cancellation command 69, the access control module 43 of the access device 40 can temporarily unlock the access control (step 114), so that the visitor can use the visitor handheld device 50 to be set. The access control device 40 can be passed within the access time range.

在管理伺服器端20中更包含有刪除模組25,當門禁管理資訊66中訪問時間範圍的上限值再加上預設時間範圍超時時,即假設門禁管理資訊中訪問時間範圍為“13時至15時”且預設時間範圍為“1小時”。The management server 20 further includes a deletion module 25. When the upper limit value of the access time range in the access control information 66 is added and the preset time range expires, it is assumed that the access time range in the access control information is " Between 13:00 and 15:00" and the preset time range is "1 hour".

若管理伺服器端20的系統時間為“15時30分”,訪問時間範圍的上限值為“15時”再加上預設時間範圍為“1小時”所計算出的時間為“16時”,而管理伺服器端20的系統時間為“15時30分”即可判斷出未超時,此時管理伺服器端20的刪除模組25不會進行門禁管理資訊的刪除。If the system time of the management server 20 is "15:30", the upper limit of the access time range is "15" and the time calculated by the preset time range of "1 hour" is "16". The system time of the management server 20 is "15:30", and it can be judged that the timeout has not expired. At this time, the deletion module 25 of the management server terminal 20 does not delete the access control information.

管理伺服器端20的系統時間為“16時30分”,訪問時間範圍的上限值為“15時”再加上預設時間範圍為“1小時”所計算出的時間為“16時”,而管理伺服器端20的系統時間為“16時30分”即可判斷出已超時,此時管理伺服器端20的刪除模組25即會刪除該筆門禁管理資訊。The system time of the management server 20 is "16:30", and the upper limit of the access time range is "15" plus the time calculated by the preset time range of "1 hour" is "16 hours". The system time of the management server terminal 20 is "16:30" to determine that the timeout has expired. At this time, the deletion module 25 of the management server terminal 20 deletes the access control management information.

當訪客的訪問時間超時時,可進一步由客戶端10所提供的使用者介面輸入時限延長資訊,並透過客戶端10的第一接收模組11透過無線傳輸方式(例如是:Wi-Fi、藍牙、RFID、近場通訊…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)自訪客手持式裝置50接收唯一識別碼65,以及自客戶端10所提供的使用者介面接收時限延長資訊。When the visitor's access time expires, the user interface may further input the time limit extension information provided by the client 10, and transmit the wireless transmission mode through the first receiving module 11 of the client 10 (for example: Wi-Fi, Bluetooth, RFID, near field communication, etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention. The unique identification code 65 is received from the guest handheld device 50, and the use provided by the client 10 is provided. The interface receives the time limit extension information.

在客戶端10的第一接收模組11接收唯一識別碼以及時限延長資訊之後,即可由客戶端10的生成模組12將唯一識別碼、客戶端資訊以及時限延長資訊生成為訪客時限延長資訊71,再由客戶端10的第一傳送模組13傳送訪客時限延長資訊至管理伺服器端20,管理伺服器端20的第二接收模組21即可自客戶端10的第一傳送模組13接收訪客時限延長資訊71。After the first receiving module 11 of the client 10 receives the unique identification code and the time limit extension information, the unique identification code, the client information, and the time limit extension information can be generated by the generating module 12 of the client 10 as the visitor time extension information 71. Then, the first transmission module 13 of the client 10 transmits the visitor time limit extension information to the management server terminal 20. The second receiving module 21 of the management server terminal 20 can be transmitted from the first transmission module 13 of the client terminal 10. Receive visitor time limit extension information 71.

在管理伺服器端20的第二接收模組21接收到訪客時限延長資訊71之後,即可由管理伺服器端20的驗證模組23對依據被儲存的訪客資訊61以及門禁管理資訊66對訪客時限延長資訊71進行驗證,即管理伺服器端20的驗證模組23是比對被儲存的訪客資訊61中客戶端資訊是否與訪客時限延長資訊71中客戶端資訊相符,以及比對被儲存的門禁管理資訊66中唯一識別碼65是否與訪客時限延長資訊71中唯一識別碼相符,當被儲存的訪客資訊61中客戶端資訊與訪客時限延長資訊71中客戶端資訊相符,且被儲存的門禁管理資訊66中唯一識別碼65與訪客時限延長資訊71中唯一識別碼相符時,則訪客時限延長資訊71通過管理伺服器端20的驗證模組23的驗證,此時管理伺服器端20的儲存模組22即可依據訪客時限延長資訊71中的唯一識別碼以及時限延長資訊更新被儲存的門禁管理資訊66中訪問時間範圍,藉此可以提供訪客訪問時間延長以避免門禁失效。After the second receiving module 21 of the management server 20 receives the visitor time extension information 71, the visitor time limit of the stored visitor information 61 and the access control information 66 can be determined by the verification module 23 of the management server terminal 20. The extension information 71 is verified, that is, the verification module 23 of the management server 20 compares the client information in the stored visitor information 61 with the client information in the visitor time extension information 71, and compares the stored access control. Whether the unique identification code 65 in the management information 66 matches the unique identification code in the visitor time extension information 71, and the client information in the stored visitor information 61 matches the client information in the visitor time extension extension information 71, and the stored access control management When the unique identification code 65 in the information 66 matches the unique identification code in the visitor time extension information 71, the visitor time limit extension information 71 is verified by the verification module 23 of the management server terminal 20, and at this time, the storage mode of the server terminal 20 is managed. The group 22 can update the stored access control information 66 in accordance with the unique identifier in the visitor time extension information 71 and the time limit extension information. Range, thereby to provide guest access to avoid prolonged access failure.

綜上所述,可知本發明與先前技術之間的差異在於本發明透過客戶端於管理伺服器端中建立訪客資訊,以及提供轉換為二維條碼的訪客資訊至訪客手持式裝置,訪客即可使用訪客手持式裝置透過保全管理裝置至管理伺服器端中進行身份驗證以及門禁管理資訊的建立,訪客可透過訪客手持式裝置於時限內可以通過被許可的門禁裝置。In summary, it can be seen that the difference between the present invention and the prior art is that the present invention establishes visitor information in the management server through the client, and provides visitor information converted into a two-dimensional barcode to the visitor handheld device, and the visitor can Using the guest handheld device to authenticate and manage access control information through the security management device to the management server, the visitor can access the licensed access device through the visitor handheld device within the time limit.

藉由此一技術手段可以來解決先前技術所存在現有門禁管理不便的問題,進而達成提高門禁管理便利性的技術功效。By means of this technical means, the problem of the inconvenience of the existing access control management in the prior art can be solved, thereby achieving the technical effect of improving the convenience of the access control management.

雖然本發明所揭露的實施方式如上,惟所述的內容並非用以直接限定本發明的專利保護範圍。任何本發明所屬技術領域中具有通常知識者,在不脫離本發明所揭露的精神和範圍的前提下,可以在實施的形式上及細節上作些許的更動。本發明的專利保護範圍,仍須以所附的申請專利範圍所界定者為準。While the embodiments of the present invention have been described above, the above description is not intended to limit the scope of the invention. Any changes in the form and details of the embodiments may be made without departing from the spirit and scope of the invention. The scope of the invention is to be determined by the scope of the appended claims.

10‧‧‧客戶端10‧‧‧Client

11‧‧‧第一接收模組11‧‧‧First Receiver Module

12‧‧‧生成模組12‧‧‧Generation Module

13‧‧‧第一傳送模組13‧‧‧First transmission module

20‧‧‧管理伺服器端20‧‧‧Manage server side

21‧‧‧第二接收模組21‧‧‧second receiving module

22‧‧‧儲存模組22‧‧‧ Storage Module

23‧‧‧驗證模組23‧‧‧ verification module

24‧‧‧第二傳送模組24‧‧‧second transmission module

25‧‧‧刪除模組25‧‧‧Delete module

30‧‧‧保全管理裝置30‧‧‧Security management device

31‧‧‧影像擷取模組31‧‧‧Image capture module

32‧‧‧解碼模組32‧‧‧Decoding module

33‧‧‧第三傳送模組33‧‧‧3rd transmission module

34‧‧‧第三接收模組34‧‧‧ Third Receiver Module

35‧‧‧門禁管理模組35‧‧‧Access Control Module

40‧‧‧門禁裝置40‧‧‧Access control device

41‧‧‧第四接收模組41‧‧‧fourth receiving module

42‧‧‧第四傳送模組42‧‧‧fourth transmission module

43‧‧‧門禁模組43‧‧‧Access Control Module

50‧‧‧訪客手持式裝置50‧‧‧ Visitor Handheld Devices

61‧‧‧訪客資訊61‧‧‧ Visitor Information

62‧‧‧二維條碼62‧‧‧2D barcode

63‧‧‧驗證訪客資訊63‧‧‧Verify visitor information

64‧‧‧驗證通過響應64‧‧‧Verification by response

65‧‧‧唯一識別碼65‧‧‧ unique identification code

66‧‧‧門禁管理資訊66‧‧‧Access Control Information

67‧‧‧驗證識別碼67‧‧‧Verification ID

68‧‧‧門禁管理識別碼68‧‧‧Access Control Identification Code

69‧‧‧門禁解除指令69‧‧‧Access cancellation order

71‧‧‧訪客時限延長資訊71‧‧‧ Visitor time limit extension information

步驟 101‧‧‧提供接收訪客個人資訊的客戶端Steps 101‧‧‧Provides a client that receives personal information from visitors

步驟 102‧‧‧客戶端將訪客個人資訊與客戶端資訊生成為訪客資訊,並將訪客資訊生成為二維條碼Step 102‧‧‧ The client generates the visitor personal information and client information as visitor information, and generates the visitor information as a 2D barcode

步驟 103‧‧‧客戶端傳送訪客資訊至管理伺服器端Step 103‧‧‧ The client transmits the visitor information to the management server

步驟 104‧‧‧客戶端傳送二維條碼至具有唯一識別碼的訪客手持式裝置Step 104‧‧‧ The client transmits the 2D barcode to the visitor handheld device with a unique identifier

步驟 105‧‧‧管理伺服器端儲存訪客資訊Step 105‧‧‧Manage server side to store visitor information

步驟 106‧‧‧保全管理裝置擷取訪客手持式裝置所顯示的二維條碼Step 106‧‧‧Security management device captures the 2D barcode displayed by the visitor's handheld device

步驟 107‧‧‧保全管理裝置將二維條碼解碼出驗證訪客資訊並傳送至管理伺服器端Step 107‧‧‧Security management device decodes the 2D barcode to verify the visitor information and transfer it to the management server

步驟 108‧‧‧管理伺服器端依據被儲存的訪客資訊對驗證訪客資訊進行驗證,並當驗證訪客資訊通過驗證後生成驗證通過響應Step 108‧‧‧ The management server verifies the verification visitor information based on the stored visitor information, and generates a verification response by verifying the visitor information after verification

步驟 109‧‧‧管理伺服器端傳送驗證通過響應至保全管理裝置時,保全管理裝置建立唯一識別碼、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊Step 109‧‧‧Management server-side transmission verification When responding to the security management device, the security management device establishes a unique identification code, and the correspondence between the access time range in the visitor information and the at least one access control identification code is the access control information.

步驟 110‧‧‧保全管理裝置傳送門禁管理資訊至管理伺服器端Step 110‧‧‧Security management device transmits access control information to the management server

步驟 111‧‧‧管理伺服器端儲存門禁管理資訊Step 111‧‧‧Manage server storage access control information

步驟 112‧‧‧門禁裝置自訪客手持式裝置接收唯一識別碼為驗證識別碼以及門禁管理識別碼並傳送至管理伺服器端Step 112‧‧‧ The access control device receives the unique identification code from the visitor handheld device as the verification identification code and the access control identification code and transmits it to the management server

步驟 113‧‧‧管理伺服器端依據被儲存的門禁管理資訊對驗證識別碼以及門禁管理識別碼進行驗證,並當驗證識別碼以及門禁管理識別碼通過驗證且系統時間介於門禁管理資訊的訪問時間範圍之間生成門禁解除指令Step 113‧‧‧ The management server verifies the verification identification code and the access control identification code according to the stored access control management information, and when the verification identification code and the access control identification code pass the verification and the system time is between the access control information access Generate an access cancellation command between time ranges

步驟 114‧‧‧管理伺服器端傳送門禁解除指令至門禁裝置時,門禁裝置暫時解鎖門禁Step 114‧‧‧When the management server transmits the access control release command to the access control device, the access control device temporarily unlocks the access control

第1圖繪示為本發明具訪客身份驗證的時限門禁管理系統的系統方塊圖。 第2A圖至第2C圖繪示為本發明具訪客身份驗證的時限門禁管理方法的方法流程圖。 第3圖繪示為本發明具訪客身份驗證的時限門禁管理的系統架構示意圖。FIG. 1 is a system block diagram of a time limit access control management system with guest identity verification according to the present invention. 2A to 2C are flowcharts showing a method for managing a time limit access control method for a guest identity verification according to the present invention. FIG. 3 is a schematic diagram showing the system architecture of the time limit access control management with the guest identity verification according to the present invention.

Claims (8)

一種具訪客身份驗證的時限門禁管理系統,其包含: 一客戶端,所述客戶端更包含: 一第一接收模組,用以接收一訪客個人資訊; 一生成模組,用以將所述訪客個人資訊與一客戶端資訊生成為一訪客資訊,並將所述訪客資訊生成為一二維條碼;及 一第一傳送模組,用以傳送所述訪客資訊,以及傳送所述二維條碼至一訪客手持式裝置; 一管理伺服器端,所述管理伺服器端更包含: 一第二接收模組,用以自所述第一傳送模組接收所述訪客資訊,接收一驗證訪客資訊,接收一門禁管理資訊,以及接收一驗證識別碼; 一儲存模組,用以儲存所述訪客資訊,以及儲存所述門禁管理資訊; 一驗證模組,用以依據被儲存的所述訪客資訊對所述驗證訪客資訊進行驗證,並當所述驗證訪客資訊通過驗證後生成一驗證通過響應,以及依據被儲存的所述門禁管理資訊對所述驗證識別碼以及所述門禁管理識別碼進行驗證,並當所述驗證識別碼以及所述門禁管理識別碼通過驗證且系統時間介於所述門禁管理資訊的所述訪問時間範圍之間生成一門禁解除指令;及 一第二傳送模組,用以傳送所述驗證通過響應,以及傳送所述門禁解除指令; 一保全管理裝置,所述保全管理裝置更包含: 一影像擷取模組,用以擷取所述訪客手持式裝置所顯示的所述二維條碼; 一解碼模組,用以將所述二維條碼解碼出所述驗證訪客資訊; 一第三傳送模組,用以傳送所述驗證訪客資訊至所述第二接收模組,傳送所述門禁管理資訊; 一第三接收模組,用以自所述第二傳送模組接收所述驗證通過響應,自所述訪客手持式裝置接收所述訪客手持式裝置所具有的一唯一識別碼;及 一門禁管理模組,當所述第三接收模組接收到所述驗證通過響應時,建立所述唯一識別碼、所述訪客資訊中一訪問時間範圍與至少一門禁管理識別碼的對應為所述門禁管理資訊;及 一門禁裝置,所述門禁裝置所具有的所述門禁管理識別碼,所述門禁裝置更包含: 一第四接收模組,用以接收所述驗證識別碼,以及自所述第二傳送模組接收所述門禁解除指令; 一第四傳送模組,用以傳送所述驗證識別碼以及所述門禁管理識別碼至所述第二接收模組;及 一門禁模組,當所述第四接收模組接收到所述門禁解除指令時,則暫時解鎖門禁。A time limit access control management system with a visitor authentication, comprising: a client, the client further comprising: a first receiving module for receiving a visitor personal information; a generating module for using the The guest personal information and a client information are generated as a visitor information, and the visitor information is generated as a two-dimensional barcode; and a first transmission module is configured to transmit the visitor information and transmit the two-dimensional barcode And a management server, the management server further includes: a second receiving module, configured to receive the visitor information from the first transmitting module, and receive a verification visitor information Receiving an access control information and receiving a verification identification code; a storage module for storing the visitor information and storing the access control management information; and a verification module for using the stored visitor information Verifying the verification visitor information, and generating a verification pass response when the verification visitor information is verified, and according to the stored access control management resource Verifying the verification identification code and the access control identification code, and when the verification identification code and the access control identification code pass verification and the system time is between the access time ranges of the access control information Generating a banned release command; and a second transfer module for transmitting the verification pass response and transmitting the access release command; and a security management device, the security management device further comprising: an image capture module The second module is configured to capture the two-dimensional barcode displayed by the visitor handheld device; a decoding module is configured to decode the two-dimensional barcode from the verification visitor information; and a third transmission module is configured to: Transmitting the verification visitor information to the second receiving module to transmit the access control management information; a third receiving module, configured to receive the verification pass response from the second transmitting module, from the visitor The handheld device receives a unique identification code of the visitor handheld device; and an access control module, when the third receiving module receives the verification response Establishing the unique identification code, the correspondence between an access time range and the at least one access control identification code in the visitor information is the access control management information; and an access control device, the access control device having the access control identification The access control device further includes: a fourth receiving module, configured to receive the verification identification code, and receive the access cancellation command from the second transmission module; a fourth transmission module, configured to: Transmitting the verification identification code and the access control management code to the second receiving module; and an access control module, when the fourth receiving module receives the access cancellation command, temporarily unlocking the access control. 如申請專利範圍第1項所述的具訪客身份驗證的時限門禁管理系統,其中所述管理伺服器端更包含一刪除模組,用以當所述門禁管理資訊中所述訪問時間範圍的上限值再加上預設時間範圍超時時,將所述門禁管理資訊加以刪除。The time limit access control system with a visitor authentication method according to claim 1, wherein the management server further includes a deletion module for using the access time range in the access control information. The access control information is deleted when the limit value plus the preset time range expires. 如申請專利範圍第1項所述的具訪客身份驗證的時限門禁管理系統,其中所述第一接收模組更包含接收所述唯一識別碼以及一時限延長資訊,由所述生成模組將所述唯一識別碼、所述客戶端資訊以及所述時限延長資訊生成一訪客時限延長資訊,由所述第一傳送模組傳送所述訪客時限延長資訊至所述第二接收模組,所述驗證模組用以依據被儲存的所述訪客資訊以及所述門禁管理資訊對所述訪客時限延長資訊進行驗證,並當所述訪客時限延長資訊通過驗證後,所述儲存模組依據所述訪客時限延長資訊中的所述唯一識別碼以及所述時限延長資訊更新所述門禁管理資訊。The method of claim 1, wherein the first receiving module further comprises receiving the unique identification code and a time extension extension information, wherein the generating module Generating a visitor time limit extension information by the unique identification code, the client information, and the time limit extension information, and transmitting, by the first transmission module, the visitor time limit extension information to the second receiving module, the verification The module is configured to verify the visitor time limit extension information according to the stored visitor information and the access control management information, and when the visitor time limit extension information is verified, the storage module is based on the visitor time limit Updating the access control information by extending the unique identifier in the information and the time extension extension information. 如申請專利範圍第1項所述的具訪客身份驗證的時限門禁管理系統,其中所述第一接收模組至所述第四接收模組是分別透過有線傳輸方式或是無限傳輸方式接收對應的資訊、響應或是指令。The time-limited access control management system with a visitor authentication method according to the first aspect of the invention, wherein the first receiving module to the fourth receiving module respectively receive corresponding data through a wired transmission manner or an infinite transmission manner. Information, response or instructions. 一種具訪客身份驗證的時限門禁管理方法,其包含: 提供接收一訪客個人資訊的一客戶端; 所述客戶端將所述訪客個人資訊與一客戶端資訊生成為一訪客資訊,並將所述訪客資訊生成為一二維條碼; 所述客戶端傳送所述訪客資訊至一管理伺服器端; 所述客戶端傳送所述二維條碼至具有一唯一識別碼的一訪客手持式裝置; 所述管理伺服器端儲存所述訪客資訊; 一保全管理裝置擷取所述訪客手持式裝置所顯示的所述二維條碼; 所述保全管理裝置將所述二維條碼解碼出一驗證訪客資訊並傳送至所述管理伺服器端; 所述管理伺服器端依據被儲存的所述訪客資訊對所述驗證訪客資訊進行驗證,並當所述驗證訪客資訊通過驗證後生成一驗證通過響應; 所述管理伺服器端傳送所述驗證通過響應至所述保全管理裝置時,所述保全管理裝置建立所述唯一識別碼、所述訪客資訊中一訪問時間範圍與至少一門禁管理識別碼的對應為一門禁管理資訊; 所述保全管理裝置傳送所述門禁管理資訊至所述管理伺服器端; 所述管理伺服器端儲存所述門禁管理資訊; 具有所述門禁管理識別碼的一門禁裝置自訪客手持式裝置接收所述唯一識別碼為一驗證識別碼以及所述門禁管理識別碼並傳送至所述管理伺服器端; 所述管理伺服器端依據被儲存的所述門禁管理資訊對所述驗證識別碼以及所述門禁管理識別碼進行驗證,並當所述驗證識別碼以及所述門禁管理識別碼通過驗證且系統時間介於所述門禁管理資訊的所述訪問時間範圍之間生成一門禁解除指令;及 所述管理伺服器端傳送所述門禁解除指令至所述門禁裝置時,所述門禁裝置暫時解鎖門禁。A time limit access control management method with a visitor authentication, comprising: providing a client that receives personal information of a visitor; the client generates the visitor personal information and a client information as a visitor information, and the The visitor information is generated as a two-dimensional barcode; the client transmits the visitor information to a management server; the client transmits the two-dimensional barcode to a visitor handheld device having a unique identification code; The management server stores the visitor information; the security management device retrieves the two-dimensional barcode displayed by the visitor handheld device; the security management device decodes the two-dimensional barcode to verify the visitor information and transmits To the management server end; the management server end verifies the verification visitor information according to the stored visitor information, and generates a verification pass response after the verification visitor information passes the verification; the management The server transmits the verification by the security management device to establish the unique identifier when responding to the security management device Corresponding to an access time range and at least one access control identification code in the visitor information is an access control information; the security management device transmits the access control information to the management server; the management server stores The access control information; the access control device having the access control identification code receives the unique identification code from the visitor handheld device as a verification identification code and the access control identification code and transmits the same to the management server; The management server verifies the verification identification code and the access control identification code according to the stored access control management information, and when the verification identification code and the access control identification code pass verification and system time And generating an access cancellation command between the access time ranges of the access control information; and when the management server transmits the access cancellation command to the access device, the access device temporarily unlocks the access control. 如申請專利範圍第5項所述的具訪客身份驗證的時限門禁管理方法,其中所述具訪客身份驗證的時限門禁管理方法更包含當所述門禁管理資訊中所述訪問時間範圍的上限值再加上預設時間範圍超時時,所述管理伺服器端將所述門禁管理資訊加以刪除。The method for managing a time limit access control with a visitor authentication method according to claim 5, wherein the method for managing the time limit access control with the visitor authentication further includes an upper limit value of the access time range in the access control information. In addition, when the preset time range expires, the management server deletes the access control information. 如申請專利範圍第5項所述的具訪客身份驗證的時限門禁管理方法,其中所述具訪客身份驗證的時限門禁管理方法更包含下列步驟: 所述客戶端接收所述唯一識別碼以及一時限延長資訊; 所述客戶端將所述唯一識別碼、所述客戶端資訊以及所述時限延長資訊生成為一訪客時限延長資訊; 所述客戶端傳送所述訪客時限延長資訊至所述管理伺服器端; 所述管理伺服器端依據被儲存的所述訪客資訊以及所述門禁管理資訊對所述訪客時限延長資訊進行驗證;及 當所述訪客時限延長資訊通過驗證後,所述管理伺服器端依據所述訪客時限延長資訊中的所述唯一識別碼以及所述訪客時限延長資訊更新所述門禁管理資訊。The method for managing a time limit access control with a visitor authentication method according to claim 5, wherein the method for managing the time limit access control with the visitor authentication further comprises the following steps: the client receiving the unique identifier and a time limit Extending the information; the client generates the unique identifier, the client information, and the time limit extension information as a visitor time extension extension information; the client transmits the visitor time limit extension information to the management server Ending; the management server end verifies the visitor time limit extension information according to the stored visitor information and the access control management information; and when the visitor time limit extension information is verified, the management server end Updating the access control information according to the unique identifier in the visitor time extension information and the visitor time extension information. 如申請專利範圍第5項所述的具訪客身份驗證的時限門禁管理方法,其中所述客戶端、所述管理伺服器端、所述訪客手持式裝置、所述保全管理裝置以及所述門禁裝置是分別透過有線傳輸方式或是無限傳輸方式接收對應的資訊、響應或是指令。The method for managing a visitor authentication time limit access control according to claim 5, wherein the client, the management server end, the visitor handheld device, the security management device, and the access control device The corresponding information, response or instruction is received through wired transmission or infinite transmission.
TW105143364A 2016-12-27 2016-12-27 Time limit door access control management system by guest authentication and method thereof TW201824811A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW105143364A TW201824811A (en) 2016-12-27 2016-12-27 Time limit door access control management system by guest authentication and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW105143364A TW201824811A (en) 2016-12-27 2016-12-27 Time limit door access control management system by guest authentication and method thereof

Publications (1)

Publication Number Publication Date
TW201824811A true TW201824811A (en) 2018-07-01

Family

ID=63640199

Family Applications (1)

Application Number Title Priority Date Filing Date
TW105143364A TW201824811A (en) 2016-12-27 2016-12-27 Time limit door access control management system by guest authentication and method thereof

Country Status (1)

Country Link
TW (1) TW201824811A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI742474B (en) * 2019-11-28 2021-10-11 二零八八資訊科技有限公司 Management system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI742474B (en) * 2019-11-28 2021-10-11 二零八八資訊科技有限公司 Management system

Similar Documents

Publication Publication Date Title
AU2019344067B2 (en) Wireless access credential system
US9842446B2 (en) Systems and methods for lock access management using wireless signals
US10362613B2 (en) Pairing management method, recording medium, and terminal apparatus
US20180174384A1 (en) Time-Limit Door Access Control Management System With Guest Authentication, And Method Thereof
TWI530610B (en) Access control system using near field communication
KR101242122B1 (en) Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN105227516A (en) The access method of Smart Home, control centre's equipment and dress terminal
US10891599B2 (en) Use of state objects in near field communication (NFC) transactions
US11025595B2 (en) Secure and anonymous data sharing
US11042954B2 (en) System and method for communication between devices
KR20190036068A (en) Method for device-to-device communication between terminals comprising device-to-device authentication using hash-chain
KR20200115387A (en) Method for authenticating and authorizing user mobile deivce in online service server
JP2018010449A (en) Smart lock authentication system and method in smart lock
JP2019173523A (en) Electric lock system and lock control terminal
KR101603963B1 (en) Authentication method using fingerprint information and certification number, user terminal and financial institution server
KR20160146753A (en) Network node security using short range communication
US20140157372A1 (en) Image forming apparatus, wireless communication system, control method, and computer-readable medium
WO2018098725A1 (en) Unlocking method, terminal, and system
TW201824811A (en) Time limit door access control management system by guest authentication and method thereof
CN112767576B (en) Lockset authorization management method and lockset authorization management system
KR101525306B1 (en) system for key issue using portable terminal and method thereof
US10701557B2 (en) Authentication method for connecting a companion device when same is disconnected from a subscriber device
JP6037434B2 (en) Communications system
KR102007897B1 (en) System and Method for Managing Entrance and Exit of Employee Using Digital Signiture