TW201824811A - Time limit door access control management system by guest authentication and method thereof - Google Patents
Time limit door access control management system by guest authentication and method thereof Download PDFInfo
- Publication number
- TW201824811A TW201824811A TW105143364A TW105143364A TW201824811A TW 201824811 A TW201824811 A TW 201824811A TW 105143364 A TW105143364 A TW 105143364A TW 105143364 A TW105143364 A TW 105143364A TW 201824811 A TW201824811 A TW 201824811A
- Authority
- TW
- Taiwan
- Prior art keywords
- information
- access control
- visitor
- verification
- module
- Prior art date
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
Description
一種門禁管理系統及其方法,尤其是指一種兼具訪客身份驗證以及時間限制管理的門禁管理系統及其方法。An access control management system and method thereof, in particular to an access control management system and method thereof with both guest identity verification and time limit management.
目前對於商業大樓的門禁管理方式,包含有人工方式門禁管理、半電子化門禁管理以及電子化門禁管理。At present, the access control management methods for commercial buildings include manual access control management, semi-electronic access control management and electronic access control management.
人工方式門禁管理即是門禁管理完全由保全人員進行出入人員的門禁管控,然而保全人員並不可能管控到所有的人員出入,即會造成人員出入管理漏洞的問題。Manual access control is the access control of the access control personnel. The security personnel are not likely to control all personnel access, which will cause the personnel to enter and manage the loopholes.
半電子化門禁管理即是訪客需要透過保全人員換取可以通過特定門禁裝置的門禁卡,但仍存在訪客拜訪後忘記再次進行門禁卡換取的問題,這也會造成門禁卡的消耗與建製成本的增加。Semi-electronic access control is the need for visitors to exchange access control cards for specific access control devices. However, there is still the problem of forgetting to exchange access cards again after the visitor visits. This will also result in an increase in the consumption and cost of the access control card. .
電子化門禁管理則是訪客不需要透過保全人員進行門禁卡的換取,然而則是需要被拜訪的公司派遣專人來代領訪客通過門禁,這也會造成被拜訪的公司的困擾。Electronic access control management means that visitors do not need to exchange the access control card through the security personnel. However, it is necessary for the visited company to send a special person to pass the access control, which will also cause trouble for the company being visited.
綜上所述,可知先前技術中長期以來一直存在現有門禁管理不便的問題,因此有必要提出改進的技術手段,來解決此一問題。In summary, it can be seen that in the prior art, the problem of inconvenient management of the existing access control has existed for a long time, so it is necessary to propose an improved technical means to solve this problem.
有鑒於先前技術存在現有門禁管理不便的問題,本發明遂揭露一種具訪客身份驗證的時限門禁管理系統及其方法,其中:In view of the prior art, the existing access control management problem is inconvenient, and the present invention discloses a time limit access control management system with guest identity verification and a method thereof, wherein:
本發明所揭露的具訪客身份驗證的時限門禁管理系統,其包含:客戶端、管理伺服器端、保全管理裝置以及門禁裝置,客戶端更包含:第一接收模組、生成模組以及第一傳送模組;管理伺服器端更包含:第二接收模組、儲存模組、驗證模組以及第二傳送模組;保全管理裝置更包含:影像擷取模組、解碼模組、第三傳送模組、第三接收模組以及門禁管理模組;及門禁裝置更包含:第四接收模組、第四傳送模組以及門禁模組。The invention provides a time limit access control management system with a guest identity verification, comprising: a client, a management server, a security management device and an access control device, wherein the client further comprises: a first receiving module, a generating module and a first The transmission module further includes: a second receiving module, a storage module, a verification module and a second transmission module; the security management device further comprises: an image capturing module, a decoding module, and a third transmission The module, the third receiving module and the access control module; and the access control device further comprise: a fourth receiving module, a fourth transmitting module and an access control module.
客戶端的第一接收模組是用以接收訪客個人資訊;客戶端的生成模組是用以將訪客個人資訊與客戶端資訊生成為訪客資訊,並將訪客資訊生成為二維條碼;及客戶端的第一傳送模組是用以傳送訪客資訊,以及傳送二維條碼至訪客手持式裝置。The first receiving module of the client is used for receiving personal information of the visitor; the generating module of the client is used to generate the personal information of the visitor and the information of the client as the visitor information, and generate the visitor information as a two-dimensional barcode; and the client's A transfer module is used to transmit visitor information and to transmit a two-dimensional bar code to the visitor's handheld device.
管理伺服器端的第二接收模組是用以自第一傳送模組接收訪客資訊,接收驗證訪客資訊,接收門禁管理資訊,以及接收驗證識別碼與門禁管理識別碼;管理伺服器端的儲存模組是用以儲存訪客資訊,以及儲存門禁管理資訊;管理伺服器端的驗證模組是用以依據被儲存的訪客資訊對驗證訪客資訊進行驗證,並當驗證訪客資訊通過驗證後生成驗證通過響應,以及依據被儲存的門禁管理資訊對驗證識別碼以及門禁管理識別碼進行驗證,並當驗證識別碼以及門禁管理識別碼通過驗證且系統時間介於門禁管理資訊的訪問時間範圍之間生成門禁解除指令;及管理伺服器端的第二傳送模組是用以傳送驗證通過響應,以及傳送門禁解除指令。The second receiving module of the management server is configured to receive visitor information from the first transmitting module, receive the verified visitor information, receive the access control management information, and receive the verification identification code and the access control identification code; and manage the storage module of the server end. It is used for storing visitor information and storing access control management information; the authentication module of the management server is used for verifying the verified visitor information according to the stored visitor information, and generating a verification pass response after verifying that the visitor information is verified, and Verifying the verification identification code and the access control identification code according to the stored access control management information, and generating an access cancellation command when the verification identification code and the access control identification code pass the verification and the system time is between the access time ranges of the access control information; And the second transmission module of the management server is configured to transmit a verification pass response and a transfer access release command.
保全管理裝置的影像擷取模組是用以擷取訪客手持式裝置所顯示的二維條碼;保全管理裝置的解碼模組是用以將二維條碼解碼出驗證訪客資訊;保全管理裝置的第三傳送模組是用以傳送驗證訪客資訊至第二接收模組,傳送門禁管理資訊;保全管理裝置的第三接收模組是用以自第二傳送模組接收驗證通過響應,自訪客手持式裝置接收訪客手持式裝置所具有的唯一識別碼;及保全管理裝置的門禁管理模組是當第三接收模組接收到驗證通過響應時,建立唯一識別碼、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊。The image capturing module of the security management device is for capturing the two-dimensional barcode displayed by the guest handheld device; the decoding module of the security management device is for decoding the two-dimensional barcode to verify the visitor information; The third transmission module is configured to transmit the verification visitor information to the second receiving module to transmit the access control management information; the third receiving module of the security management device is configured to receive the verification response response from the second transmission module, from the visitor handheld The device receives the unique identification code of the visitor handheld device; and the access management module of the security management device is configured to establish a unique identification code and a visit time range and at least one access time when the third receiving module receives the verification response The correspondence of the access control identification code is the access control information.
門禁裝置的第四接收模組是用以接收驗證識別碼,以及自第二傳送模組接收門禁解除指令;門禁裝置的第四傳送模組是用以傳送驗證識別碼以及門禁管理識別碼至第二接收模組;及門禁裝置的門禁模組是當第四接收模組接收到門禁解除指令時,則暫時解鎖門禁。The fourth receiving module of the access control device is configured to receive the verification identification code and receive the access cancellation command from the second transmission module; the fourth transmission module of the access control device is configured to transmit the verification identification code and the access control identification code to the first The second receiving module; and the access control module of the access control device temporarily unlocks the access control when the fourth receiving module receives the access cancellation command.
本發明所揭露的具訪客身份驗證的時限門禁管理方法,其包含下列步驟:The method for managing time limit access control with visitor authentication disclosed in the present invention comprises the following steps:
首先,提供接收訪客個人資訊的客戶端;接著,客戶端將訪客個人資訊與客戶端資訊生成為訪客資訊,並將訪客資訊生成為二維條碼;接著,客戶端傳送訪客資訊至管理伺服器端;接著,客戶端傳送二維條碼至具有唯一識別碼的訪客手持式裝置;接著,管理伺服器端儲存訪客資訊;接著,保全管理裝置擷取訪客手持式裝置所顯示的二維條碼;接著,保全管理裝置將二維條碼解碼出驗證訪客資訊並傳送至管理伺服器端;接著,管理伺服器端依據被儲存的訪客資訊對驗證訪客資訊進行驗證,並當驗證訪客資訊通過驗證後生成驗證通過響應;接著,管理伺服器端傳送驗證通過響應至保全管理裝置時,保全管理裝置建立唯一識別碼、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊;接著,保全管理裝置傳送門禁管理資訊至管理伺服器端;接著,管理伺服器端儲存門禁管理資訊;接著,門禁裝置自訪客手持式裝置接收唯一識別碼為驗證識別碼以及門禁管理識別碼並傳送至管理伺服器端;接著,管理伺服器端依據被儲存的門禁管理資訊對驗證識別碼以及門禁管理識別碼進行驗證,並當驗證識別碼以及門禁管理識別碼通過驗證且系統時間介於門禁管理資訊的訪問時間範圍之間生成門禁解除指令;最後,管理伺服器端傳送門禁解除指令至門禁裝置時,門禁裝置暫時解鎖門禁。First, a client that receives the personal information of the visitor is provided; then, the client generates the visitor personal information and the client information as the visitor information, and generates the visitor information as a two-dimensional barcode; then, the client transmits the visitor information to the management server Then, the client transmits the 2D barcode to the visitor handheld device with the unique identifier; then, the management server stores the visitor information; then, the security management device retrieves the 2D barcode displayed by the visitor handheld device; The security management device decodes the two-dimensional barcode to verify the visitor information and transmits it to the management server; then, the management server verifies the verification visitor information according to the stored visitor information, and generates verification after verifying that the visitor information is verified. Response; then, when the management server transmits the verification by responding to the security management device, the security management device establishes the unique identification code, the correspondence between the access time range in the visitor information and the at least one access control identification code is the access control information; and then, the security management The device transmits the access control information to the management servo Then, the management server stores the access control management information; then, the access control device receives the unique identification code from the visitor handheld device as the verification identification code and the access control identification code and transmits it to the management server; and then, the management server is based on The stored access control management information verifies the verification identification code and the access control identification code, and generates an access cancellation command when the verification identification code and the access control identification code pass the verification and the system time is within the access time range of the access control information; When the management server transmits the access cancellation command to the access control device, the access control device temporarily unlocks the access control.
本發明所揭露的系統及方法如上,與先前技術之間的差異在於本發明透過客戶端於管理伺服器端中建立訪客資訊,以及提供轉換為二維條碼的訪客資訊至訪客手持式裝置,訪客即可使用訪客手持式裝置透過保全管理裝置至管理伺服器端中進行身份驗證以及門禁管理資訊的建立,訪客可透過訪客手持式裝置於時限內可以通過被許可的門禁裝置。The system and method disclosed by the present invention are as above, and the difference from the prior art is that the present invention establishes visitor information in the management server terminal through the client, and provides visitor information converted to a two-dimensional barcode to the visitor handheld device, the visitor The visitor handheld device can be used to authenticate and manage the access control information through the security management device to the management server, and the visitor can access the licensed access device through the visitor handheld device within the time limit.
透過上述的技術手段,本發明可以達成提高門禁管理便利性的技術功效。Through the above technical means, the present invention can achieve the technical effect of improving the convenience of access control management.
以下將配合圖式及實施例來詳細說明本發明的實施方式,藉此對本發明如何應用技術手段來解決技術問題並達成技術功效的實現過程能充分理解並據以實施。The embodiments of the present invention will be described in detail below with reference to the drawings and embodiments, so that the application of the technical means to solve the technical problems and achieve the technical effects can be fully understood and implemented.
以下將以一個實施例來說明本發明實施態樣的運作系統與方法,並請同時參考「第1圖」、「第2A圖」至「第2C圖」以及「第3圖」所示,「第1圖」繪示為本發明具訪客身份驗證的時限門禁管理系統的系統方塊圖;「第2A圖」至「第2C圖」繪示為本發明具訪客身份驗證的時限門禁管理方法的方法流程圖;「第3圖」繪示為本發明具訪客身份驗證的時限門禁管理的系統架構示意圖。Hereinafter, an operation system and method according to an embodiment of the present invention will be described with reference to an embodiment, and reference is also made to "1", "2A" to "2C" and "3", " 1 is a system block diagram of a time limit access control management system with a guest identity verification method; and FIG. 2A to 2C is a method for a time limit access control management method with a guest identity verification method according to the present invention. Flowchart; "Fig. 3" is a schematic diagram showing the system architecture of the time limit access control with guest authentication.
本發明所揭露的具訪客身份驗證的時限門禁管理系統,其包含:客戶端10、管理伺服器端20、保全管理裝置30以及門禁裝置40,客戶端10更包含:第一接收模組11、生成模組12以及第一傳送模組13;管理伺服器端20更包含:第二接收模組21、儲存模組22、驗證模組23以及第二傳送模組24;保全管理裝置30更包含:影像擷取模組31、解碼模組32、第三傳送模組33、第三接收模組34以及門禁管理模組35;及門禁裝置40更包含:第四接收模組41、第四傳送模組42以及門禁模組43。The time limit access control system with a visitor authentication method includes a client 10, a management server 20, a security management device 30, and an access control device 40. The client 10 further includes: a first receiving module 11, The generating module 12 and the first transmitting module 13 further include: a second receiving module 21, a storage module 22, a verification module 23, and a second transmission module 24; the security management device 30 further includes The image capturing module 31, the decoding module 32, the third transmitting module 33, the third receiving module 34, and the access control module 35; and the access control device 40 further includes: a fourth receiving module 41, and a fourth transmission Module 42 and access module 43.
在訪客需要訪問公司時,公司的管理人員會先透過設置於公司內客戶端10所提供的使用者介面進行訪客個人資訊的輸入,訪客個人資訊包含有訪客姓名、訪客身份證號、訪客電子郵件、訪客連絡電話、訪問時間範圍…等的組合,在此僅為舉例說明之,並不以此侷限本發明的應用範疇,上述客戶端10例如是:電腦、筆記型電腦、平板電腦、智慧型裝置…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。When a visitor needs to visit the company, the company's management personnel will first input the personal information of the visitor through the user interface provided by the client 10 provided in the company. The personal information of the visitor includes the visitor's name, visitor ID number, and visitor email. The combination of the guest contact telephone number, the access time range, and the like is merely an example, and is not limited to the application scope of the present invention. The client 10 is, for example, a computer, a notebook computer, a tablet computer, or a smart type. The device, etc., is for illustrative purposes only and is not intended to limit the scope of application of the invention.
在透過客戶端10所提供的使用者介面輸入完訪客個人資訊後,客戶端10的第一接收模組11即會接收訪客個人資訊(步驟101),並由客戶端10的生成模組12將訪客個人資訊與客戶端資訊生成為訪客資訊61,並將訪客資訊61生成為二維條碼62(步驟102),上述客戶端資訊是預先建立於客戶端10中,上述客戶端資訊包含有公司名稱、公司編號、到達公司必須經過的門禁管理識別碼…等的組合,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。After the personal information of the visitor is input through the user interface provided by the client 10, the first receiving module 11 of the client 10 receives the personal information of the visitor (step 101), and is generated by the generating module 12 of the client 10. The visitor personal information and the client information are generated as the visitor information 61, and the visitor information 61 is generated as a two-dimensional barcode 62 (step 102). The client information is pre-established in the client 10, and the client information includes the company name. The combination of the company number, the access control identification code that must be passed by the company, etc., is merely illustrative here, and is not intended to limit the scope of application of the present invention.
在客戶端10的生成模組12將訪客個人資訊與客戶端資訊生成為訪客資訊61,並將訪客資訊61生成為二維條碼62後,客戶端10會分別與管理伺服器端20以及訪客手持式裝置50透過有線傳輸方式(例如是:電纜網路、光纖網路…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,即可再由客戶端10的第一傳送模組13傳送訪客資訊61至管理伺服器端20(步驟103),以及由客戶端10的第一傳送模組13傳送二維條碼62至訪客手持式裝置50(步驟104),上述訪客手持式裝置50例如是:智慧型手機、個人數位助理(Personal Digital Assistant, PDA)…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。After the generating module 12 of the client 10 generates the guest personal information and the client information as the visitor information 61, and generates the visitor information 61 as the two-dimensional barcode 62, the client 10 will respectively be associated with the management server 20 and the visitor. The device 50 is transmitted by means of a wired transmission (for example, a cable network, a fiber optic network, etc., which is merely illustrative, and is not limited to the scope of application of the present invention) or a wireless transmission method (for example, Wi: -Fi, 3G, 4G, etc., which are merely exemplified herein, and are not limited to the scope of application of the present invention. The connection information can be transmitted again by the first transmission module 13 of the client 10. To the management server end 20 (step 103), and the first transfer module 13 of the client 10 transmits the two-dimensional barcode 62 to the visitor handheld device 50 (step 104), for example, the smart handheld device 50 Mobile phones, personal digital assistants (PDAs), etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention.
在管理伺服器端20的第二接收模組21自客戶端10的第一傳送模組13接收訪客資訊61後,管理伺服器端20的儲存模組22即可儲存管理伺服器端20的第二接收模組21所接收的訪客資訊61(步驟105)。After the second receiving module 21 of the management server 20 receives the visitor information 61 from the first transmitting module 13 of the client 10, the storage module 22 of the management server 20 can store the management server 20 The visitor information 61 received by the receiving module 21 is received (step 105).
訪客手持式裝置50亦可自客戶端10的第一傳送模組13接收二維條碼62,並當訪客拜訪公司時,訪客即可透過自客戶端10所獲得的二維條碼62於大樓管理處進行身份的驗證與門禁管理的建立,大樓管理處設置有保全管理裝置30,保全管理裝置30的影像擷取模組31即可擷取訪客手持式裝置50所顯示的二維條碼62(步驟106)。The guest handheld device 50 can also receive the two-dimensional barcode 62 from the first delivery module 13 of the client 10, and when the visitor visits the company, the visitor can use the two-dimensional barcode 62 obtained from the client 10 at the building management office. For the identity verification and the establishment of the access control, the building management office is provided with the security management device 30, and the image capturing module 31 of the security management device 30 can capture the two-dimensional barcode 62 displayed by the guest handheld device 50 (step 106). ).
在保全管理裝置30的影像擷取模組31擷取訪客手持式裝置50所顯示的二維條碼後,保全管理裝置30的解碼模組32即可將二維條碼解碼出驗證訪客資訊63,並且保全管理裝置30與管理伺服器端20透過有線傳輸方式(例如是:電纜網路、光纖網路…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,以透過保全管理裝置30的第三傳送模組33將驗證訪客資訊63傳送至管理伺服器端20(步驟107)。After the image capturing module 31 of the security management device 30 captures the two-dimensional barcode displayed by the guest handheld device 50, the decoding module 32 of the security management device 30 can decode the two-dimensional barcode to verify the visitor information 63, and The security management device 30 and the management server terminal 20 are transmitted by means of a wired transmission (for example, a cable network, a fiber optic network, etc., which are merely exemplified herein, and are not limited to the scope of application of the present invention) or wireless. The transmission mode (for example, Wi-Fi, 3G, 4G, etc., is merely exemplified herein, and is not limited to the application scope of the present invention) to establish a connection to pass the third transmission mode of the security management device 30. Group 33 transmits the verification visitor information 63 to the management server side 20 (step 107).
管理伺服器端20的第二接收模組21即可自保全管理裝置30的第三傳送模組33接收驗證訪客資訊63,並透過管理伺服器端20的驗證模組23依據被儲存的訪客資訊61對驗證訪客資訊63進行驗證,即管理伺服器端20的驗證模組23是比對驗證訪客資訊63是否與被儲存的訪客資訊61相符,當驗證訪客資訊63與被儲存的訪客資訊61比對相符時,則驗證訪客資訊63通過管理伺服器端20的驗證模組23的驗證,此時管理伺服器端20的驗證模組23即會生成驗證通過響應64(步驟108)。The second receiving module 21 of the management server 20 can receive the verification visitor information 63 from the third transmission module 33 of the security management device 30, and can be based on the stored visitor information through the verification module 23 of the management server terminal 20. 61 verifies the verification visitor information 63, that is, the verification module 23 of the management server terminal 20 compares the verification visitor information 63 with the stored visitor information 61, and compares the verified visitor information 63 with the stored visitor information 61. When there is a match, the verification visitor information 63 is verified by the verification module 23 of the management server terminal 20, and at this time, the verification module 23 of the management server terminal 20 generates a verification pass response 64 (step 108).
在管理伺服器端20的驗證模組23生成驗證通過響應64後,由管理伺服器端20的第二傳送模組24傳送管理伺服器端20的驗證模組23所生成的驗證通過響應64至保全管理裝置30。After the verification module 23 of the management server 20 generates the verification response 64, the verification by the verification module 23 of the management server 20 is transmitted by the second transmission module 24 of the management server 20 to the verification response 64 to The management device 30 is secured.
保全管理裝置30的第三接收模組34即可自管理伺服器端20的第二傳送模組24接收驗證通過響應64,在保全管理裝置30的第三接收模組34接收到驗證通過響應64時,即表示驗證訪客資訊63通過管理伺服器端20的驗證,並進一步由保全管理裝置30的第三接收模組34透過有線傳輸方式(例如是:傳輸線…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、藍牙、RFID、近場通訊…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)自訪客手持式裝置50接收訪客手持式裝置50所具有的唯一識別碼65,上述唯一識別碼65例如是:國際移動設備識別碼(International Mobile Equipment Identity,IMEI)、製造序號…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇。The third receiving module 34 of the security management device 30 can receive the verification pass response 64 from the second transfer module 24 of the management server terminal 20, and receive the verification pass response 64 at the third receiving module 34 of the security management device 30. The verification of the visitor information 63 is verified by the management server 20, and is further transmitted by the third receiving module 34 of the security management device 30 through a wired transmission method (for example, a transmission line, etc., which is merely an example here. , which is not limited to the scope of application of the present invention, or a wireless transmission method (for example, Wi-Fi, Bluetooth, RFID, near field communication, etc., which is merely illustrative here, and is not limited thereto) The application area includes receiving a unique identification code 65 of the guest handheld device 50 from the visitor handheld device 50, such as an International Mobile Equipment Identity (IMEI), a manufacturing serial number, etc. This is for illustrative purposes only and is not intended to limit the scope of application of the invention.
在保全管理裝置30的第三接收模組34自訪客手持式裝置50接收唯一識別碼65後,即可由保全管理裝置30的門禁管理模組35建立唯一識別碼65、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊66(步驟109),上述門禁管理識別碼是自訪客資訊中客戶端資訊所取得。After the third receiving module 34 of the security management device 30 receives the unique identification code 65 from the guest handheld device 50, the access control module 35 of the security management device 30 can establish the unique identification code 65, the access time range in the visitor information, and The correspondence between the at least one access control identification code is the access control information 66 (step 109), and the access control identification code is obtained from the client information in the visitor information.
在保全管理裝置30的門禁管理模組35建立唯一識別碼65、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊66後,即可由保全管理裝置30的第三傳送模組33將門禁管理資訊66傳送至管理伺服器端20(步驟110)。After the access control module 35 of the security management device 30 establishes the unique identification code 65, and the correspondence between the access time range of the visitor information and the at least one access control identification code is the access control information 66, the third transfer mode of the security management device 30 can be used. Group 33 transmits access control information 66 to management server 20 (step 110).
管理伺服器端20的第二接收模組21即可自保全管理裝置30的第三傳送模組33接收門禁管理資訊66,並由管理伺服器端20的儲存模組22儲存門禁管理資訊66(步驟111)。The second receiving module 21 of the management server terminal 20 can receive the access control management information 66 from the third transmission module 33 of the security management device 30, and store the access control management information 66 by the storage module 22 of the management server terminal 20 ( Step 111).
在訪客透過訪客手持式裝置50靠近門禁裝置40時,門禁裝置40與訪客手持式裝置50會透過無線傳輸方式(例如是:Wi-Fi、藍牙、RFID、近場通訊…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,門禁裝置40即可由第四接收模組41自訪客手持式裝置50獲得訪客手持式裝置50所具有的唯一識別碼作為驗證識別碼67。When the visitor approaches the access control device 40 through the visitor handheld device 50, the access control device 40 and the visitor handheld device 50 are wirelessly transmitted (for example: Wi-Fi, Bluetooth, RFID, near field communication, etc., here only By way of example, the connection is not limited by the application scope of the present invention, and the access control device 40 can obtain the unique identification code of the visitor handheld device 50 from the visitor handheld device 50 as the verification by the fourth receiving module 41. Identification code 67.
在門禁裝置40的第四接收模組41自訪客手持式裝置50接收驗證識別碼67之後,門禁裝置40與管理伺服器端20透過有線傳輸方式(例如是:電纜網路、光纖網路…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)或是無線傳輸方式(例如是:Wi-Fi、3G、4G…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)建立連線,即可由門禁裝置40的第四傳送模組42傳送門禁裝置40的第四接收模組41所接收到的驗證識別碼67以及門禁裝置40所具有的門禁管理識別碼68至管理伺服器端20(步驟112)。After the fourth receiving module 41 of the access control device 40 receives the verification identification code 67 from the visitor handheld device 50, the access control device 40 and the management server terminal 20 transmit the wired transmission method (for example, cable network, optical network, etc.) This is for illustrative purposes only, and is not intended to limit the scope of application of the present invention or wireless transmission methods (for example, Wi-Fi, 3G, 4G, etc., which are merely illustrative here, and are not The limitation of the application of the present invention is to establish a connection, that is, the verification identification code 67 received by the fourth receiving module 41 of the access control device 40 and the access control device 40 are transmitted by the fourth transmission module 42 of the access control device 40. The access control identification code 68 is sent to the management server 20 (step 112).
在管理伺服器端20的第二接收模組21即可自門禁裝置40的第四傳送模組42接收驗證識別碼67以及門禁管理識別碼68之後,管理伺服器端20的驗證模組23即可依據被儲存的門禁管理資訊66對驗證識別碼67以及門禁管理識別碼68進行驗證,即管理伺服器端20的驗證模組23是比對驗證識別碼67以及門禁管理識別碼68是否與被儲存的門禁管理資訊66中唯一識別碼65以及門禁管理識別碼是否相符,當驗證識別碼67以及門禁管理識別碼68與被儲存的門禁管理資訊66中唯一識別碼65以及門禁管理識別碼相符時,則驗證識別碼67以及門禁管理識別碼68通過管理伺服器端20的驗證模組23的驗證,且管理伺服器端20的系統時間介於門禁管理資訊66的訪問時間範圍之間時,管理伺服器端20的驗證模組23即會生成門禁解除指令69(步驟113)。After the second receiving module 21 of the management server terminal 20 can receive the verification identification code 67 and the access control identification code 68 from the fourth transmission module 42 of the access control device 40, the verification module 23 of the management server terminal 20 is The verification identification code 67 and the access control identification code 68 can be verified according to the stored access control management information 66, that is, whether the verification module 23 of the management server terminal 20 compares the verification identification code 67 and the access control identification code 68 with or not Whether the unique identification code 65 and the access control identification code in the stored access control information 66 match, when the verification identification code 67 and the access control identification code 68 match the unique identification code 65 and the access control identification code in the stored access control management information 66 Then, the verification identification code 67 and the access control management identification code 68 are managed by the verification module 23 of the management server terminal 20, and when the system time of the management server terminal 20 is between the access time ranges of the access control management information 66, management The verification module 23 of the server terminal 20 generates an access cancellation command 69 (step 113).
在管理伺服器端20的驗證模組23生成門禁解除指令69後,即可由管理伺服器端20的第二傳送模組24將門禁解除指令69傳送至門禁裝置40,門禁裝置40的第四接收模組41即可自管理伺服器端20的第二傳送模組24接收門禁解除指令69。After the verification module 23 of the management server terminal 20 generates the access cancellation command 69, the second transmission module 24 of the management server terminal 20 can transmit the access cancellation command 69 to the access control device 40, and the fourth reception of the access device 40. The module 41 can receive the access cancellation command 69 from the second transfer module 24 of the management server terminal 20.
在門禁裝置40的第四接收模組41接收到門禁解除指令69時,門禁裝置40的門禁模組43即可暫時解鎖門禁(步驟114),藉以讓訪客可使用訪客手持式裝置50於被設定的訪問時間範圍內可以通過被許可的門禁裝置40。When the fourth receiving module 41 of the access control device 40 receives the access cancellation command 69, the access control module 43 of the access device 40 can temporarily unlock the access control (step 114), so that the visitor can use the visitor handheld device 50 to be set. The access control device 40 can be passed within the access time range.
在管理伺服器端20中更包含有刪除模組25,當門禁管理資訊66中訪問時間範圍的上限值再加上預設時間範圍超時時,即假設門禁管理資訊中訪問時間範圍為“13時至15時”且預設時間範圍為“1小時”。The management server 20 further includes a deletion module 25. When the upper limit value of the access time range in the access control information 66 is added and the preset time range expires, it is assumed that the access time range in the access control information is " Between 13:00 and 15:00" and the preset time range is "1 hour".
若管理伺服器端20的系統時間為“15時30分”,訪問時間範圍的上限值為“15時”再加上預設時間範圍為“1小時”所計算出的時間為“16時”,而管理伺服器端20的系統時間為“15時30分”即可判斷出未超時,此時管理伺服器端20的刪除模組25不會進行門禁管理資訊的刪除。If the system time of the management server 20 is "15:30", the upper limit of the access time range is "15" and the time calculated by the preset time range of "1 hour" is "16". The system time of the management server 20 is "15:30", and it can be judged that the timeout has not expired. At this time, the deletion module 25 of the management server terminal 20 does not delete the access control information.
管理伺服器端20的系統時間為“16時30分”,訪問時間範圍的上限值為“15時”再加上預設時間範圍為“1小時”所計算出的時間為“16時”,而管理伺服器端20的系統時間為“16時30分”即可判斷出已超時,此時管理伺服器端20的刪除模組25即會刪除該筆門禁管理資訊。The system time of the management server 20 is "16:30", and the upper limit of the access time range is "15" plus the time calculated by the preset time range of "1 hour" is "16 hours". The system time of the management server terminal 20 is "16:30" to determine that the timeout has expired. At this time, the deletion module 25 of the management server terminal 20 deletes the access control management information.
當訪客的訪問時間超時時,可進一步由客戶端10所提供的使用者介面輸入時限延長資訊,並透過客戶端10的第一接收模組11透過無線傳輸方式(例如是:Wi-Fi、藍牙、RFID、近場通訊…等,在此僅為舉例說明之,並不以此侷限本發明的應用範疇)自訪客手持式裝置50接收唯一識別碼65,以及自客戶端10所提供的使用者介面接收時限延長資訊。When the visitor's access time expires, the user interface may further input the time limit extension information provided by the client 10, and transmit the wireless transmission mode through the first receiving module 11 of the client 10 (for example: Wi-Fi, Bluetooth, RFID, near field communication, etc., are merely illustrative here, and are not intended to limit the scope of application of the present invention. The unique identification code 65 is received from the guest handheld device 50, and the use provided by the client 10 is provided. The interface receives the time limit extension information.
在客戶端10的第一接收模組11接收唯一識別碼以及時限延長資訊之後,即可由客戶端10的生成模組12將唯一識別碼、客戶端資訊以及時限延長資訊生成為訪客時限延長資訊71,再由客戶端10的第一傳送模組13傳送訪客時限延長資訊至管理伺服器端20,管理伺服器端20的第二接收模組21即可自客戶端10的第一傳送模組13接收訪客時限延長資訊71。After the first receiving module 11 of the client 10 receives the unique identification code and the time limit extension information, the unique identification code, the client information, and the time limit extension information can be generated by the generating module 12 of the client 10 as the visitor time extension information 71. Then, the first transmission module 13 of the client 10 transmits the visitor time limit extension information to the management server terminal 20. The second receiving module 21 of the management server terminal 20 can be transmitted from the first transmission module 13 of the client terminal 10. Receive visitor time limit extension information 71.
在管理伺服器端20的第二接收模組21接收到訪客時限延長資訊71之後,即可由管理伺服器端20的驗證模組23對依據被儲存的訪客資訊61以及門禁管理資訊66對訪客時限延長資訊71進行驗證,即管理伺服器端20的驗證模組23是比對被儲存的訪客資訊61中客戶端資訊是否與訪客時限延長資訊71中客戶端資訊相符,以及比對被儲存的門禁管理資訊66中唯一識別碼65是否與訪客時限延長資訊71中唯一識別碼相符,當被儲存的訪客資訊61中客戶端資訊與訪客時限延長資訊71中客戶端資訊相符,且被儲存的門禁管理資訊66中唯一識別碼65與訪客時限延長資訊71中唯一識別碼相符時,則訪客時限延長資訊71通過管理伺服器端20的驗證模組23的驗證,此時管理伺服器端20的儲存模組22即可依據訪客時限延長資訊71中的唯一識別碼以及時限延長資訊更新被儲存的門禁管理資訊66中訪問時間範圍,藉此可以提供訪客訪問時間延長以避免門禁失效。After the second receiving module 21 of the management server 20 receives the visitor time extension information 71, the visitor time limit of the stored visitor information 61 and the access control information 66 can be determined by the verification module 23 of the management server terminal 20. The extension information 71 is verified, that is, the verification module 23 of the management server 20 compares the client information in the stored visitor information 61 with the client information in the visitor time extension information 71, and compares the stored access control. Whether the unique identification code 65 in the management information 66 matches the unique identification code in the visitor time extension information 71, and the client information in the stored visitor information 61 matches the client information in the visitor time extension extension information 71, and the stored access control management When the unique identification code 65 in the information 66 matches the unique identification code in the visitor time extension information 71, the visitor time limit extension information 71 is verified by the verification module 23 of the management server terminal 20, and at this time, the storage mode of the server terminal 20 is managed. The group 22 can update the stored access control information 66 in accordance with the unique identifier in the visitor time extension information 71 and the time limit extension information. Range, thereby to provide guest access to avoid prolonged access failure.
綜上所述,可知本發明與先前技術之間的差異在於本發明透過客戶端於管理伺服器端中建立訪客資訊,以及提供轉換為二維條碼的訪客資訊至訪客手持式裝置,訪客即可使用訪客手持式裝置透過保全管理裝置至管理伺服器端中進行身份驗證以及門禁管理資訊的建立,訪客可透過訪客手持式裝置於時限內可以通過被許可的門禁裝置。In summary, it can be seen that the difference between the present invention and the prior art is that the present invention establishes visitor information in the management server through the client, and provides visitor information converted into a two-dimensional barcode to the visitor handheld device, and the visitor can Using the guest handheld device to authenticate and manage access control information through the security management device to the management server, the visitor can access the licensed access device through the visitor handheld device within the time limit.
藉由此一技術手段可以來解決先前技術所存在現有門禁管理不便的問題,進而達成提高門禁管理便利性的技術功效。By means of this technical means, the problem of the inconvenience of the existing access control management in the prior art can be solved, thereby achieving the technical effect of improving the convenience of the access control management.
雖然本發明所揭露的實施方式如上,惟所述的內容並非用以直接限定本發明的專利保護範圍。任何本發明所屬技術領域中具有通常知識者,在不脫離本發明所揭露的精神和範圍的前提下,可以在實施的形式上及細節上作些許的更動。本發明的專利保護範圍,仍須以所附的申請專利範圍所界定者為準。While the embodiments of the present invention have been described above, the above description is not intended to limit the scope of the invention. Any changes in the form and details of the embodiments may be made without departing from the spirit and scope of the invention. The scope of the invention is to be determined by the scope of the appended claims.
10‧‧‧客戶端10‧‧‧Client
11‧‧‧第一接收模組11‧‧‧First Receiver Module
12‧‧‧生成模組12‧‧‧Generation Module
13‧‧‧第一傳送模組13‧‧‧First transmission module
20‧‧‧管理伺服器端20‧‧‧Manage server side
21‧‧‧第二接收模組21‧‧‧second receiving module
22‧‧‧儲存模組22‧‧‧ Storage Module
23‧‧‧驗證模組23‧‧‧ verification module
24‧‧‧第二傳送模組24‧‧‧second transmission module
25‧‧‧刪除模組25‧‧‧Delete module
30‧‧‧保全管理裝置30‧‧‧Security management device
31‧‧‧影像擷取模組31‧‧‧Image capture module
32‧‧‧解碼模組32‧‧‧Decoding module
33‧‧‧第三傳送模組33‧‧‧3rd transmission module
34‧‧‧第三接收模組34‧‧‧ Third Receiver Module
35‧‧‧門禁管理模組35‧‧‧Access Control Module
40‧‧‧門禁裝置40‧‧‧Access control device
41‧‧‧第四接收模組41‧‧‧fourth receiving module
42‧‧‧第四傳送模組42‧‧‧fourth transmission module
43‧‧‧門禁模組43‧‧‧Access Control Module
50‧‧‧訪客手持式裝置50‧‧‧ Visitor Handheld Devices
61‧‧‧訪客資訊61‧‧‧ Visitor Information
62‧‧‧二維條碼62‧‧‧2D barcode
63‧‧‧驗證訪客資訊63‧‧‧Verify visitor information
64‧‧‧驗證通過響應64‧‧‧Verification by response
65‧‧‧唯一識別碼65‧‧‧ unique identification code
66‧‧‧門禁管理資訊66‧‧‧Access Control Information
67‧‧‧驗證識別碼67‧‧‧Verification ID
68‧‧‧門禁管理識別碼68‧‧‧Access Control Identification Code
69‧‧‧門禁解除指令69‧‧‧Access cancellation order
71‧‧‧訪客時限延長資訊71‧‧‧ Visitor time limit extension information
步驟 101‧‧‧提供接收訪客個人資訊的客戶端Steps 101‧‧‧Provides a client that receives personal information from visitors
步驟 102‧‧‧客戶端將訪客個人資訊與客戶端資訊生成為訪客資訊,並將訪客資訊生成為二維條碼Step 102‧‧‧ The client generates the visitor personal information and client information as visitor information, and generates the visitor information as a 2D barcode
步驟 103‧‧‧客戶端傳送訪客資訊至管理伺服器端Step 103‧‧‧ The client transmits the visitor information to the management server
步驟 104‧‧‧客戶端傳送二維條碼至具有唯一識別碼的訪客手持式裝置Step 104‧‧‧ The client transmits the 2D barcode to the visitor handheld device with a unique identifier
步驟 105‧‧‧管理伺服器端儲存訪客資訊Step 105‧‧‧Manage server side to store visitor information
步驟 106‧‧‧保全管理裝置擷取訪客手持式裝置所顯示的二維條碼Step 106‧‧‧Security management device captures the 2D barcode displayed by the visitor's handheld device
步驟 107‧‧‧保全管理裝置將二維條碼解碼出驗證訪客資訊並傳送至管理伺服器端Step 107‧‧‧Security management device decodes the 2D barcode to verify the visitor information and transfer it to the management server
步驟 108‧‧‧管理伺服器端依據被儲存的訪客資訊對驗證訪客資訊進行驗證,並當驗證訪客資訊通過驗證後生成驗證通過響應Step 108‧‧‧ The management server verifies the verification visitor information based on the stored visitor information, and generates a verification response by verifying the visitor information after verification
步驟 109‧‧‧管理伺服器端傳送驗證通過響應至保全管理裝置時,保全管理裝置建立唯一識別碼、訪客資訊中訪問時間範圍與至少一門禁管理識別碼的對應為門禁管理資訊Step 109‧‧‧Management server-side transmission verification When responding to the security management device, the security management device establishes a unique identification code, and the correspondence between the access time range in the visitor information and the at least one access control identification code is the access control information.
步驟 110‧‧‧保全管理裝置傳送門禁管理資訊至管理伺服器端Step 110‧‧‧Security management device transmits access control information to the management server
步驟 111‧‧‧管理伺服器端儲存門禁管理資訊Step 111‧‧‧Manage server storage access control information
步驟 112‧‧‧門禁裝置自訪客手持式裝置接收唯一識別碼為驗證識別碼以及門禁管理識別碼並傳送至管理伺服器端Step 112‧‧‧ The access control device receives the unique identification code from the visitor handheld device as the verification identification code and the access control identification code and transmits it to the management server
步驟 113‧‧‧管理伺服器端依據被儲存的門禁管理資訊對驗證識別碼以及門禁管理識別碼進行驗證,並當驗證識別碼以及門禁管理識別碼通過驗證且系統時間介於門禁管理資訊的訪問時間範圍之間生成門禁解除指令Step 113‧‧‧ The management server verifies the verification identification code and the access control identification code according to the stored access control management information, and when the verification identification code and the access control identification code pass the verification and the system time is between the access control information access Generate an access cancellation command between time ranges
步驟 114‧‧‧管理伺服器端傳送門禁解除指令至門禁裝置時,門禁裝置暫時解鎖門禁Step 114‧‧‧When the management server transmits the access control release command to the access control device, the access control device temporarily unlocks the access control
第1圖繪示為本發明具訪客身份驗證的時限門禁管理系統的系統方塊圖。 第2A圖至第2C圖繪示為本發明具訪客身份驗證的時限門禁管理方法的方法流程圖。 第3圖繪示為本發明具訪客身份驗證的時限門禁管理的系統架構示意圖。FIG. 1 is a system block diagram of a time limit access control management system with guest identity verification according to the present invention. 2A to 2C are flowcharts showing a method for managing a time limit access control method for a guest identity verification according to the present invention. FIG. 3 is a schematic diagram showing the system architecture of the time limit access control management with the guest identity verification according to the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW105143364A TW201824811A (en) | 2016-12-27 | 2016-12-27 | Time limit door access control management system by guest authentication and method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW105143364A TW201824811A (en) | 2016-12-27 | 2016-12-27 | Time limit door access control management system by guest authentication and method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
TW201824811A true TW201824811A (en) | 2018-07-01 |
Family
ID=63640199
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW105143364A TW201824811A (en) | 2016-12-27 | 2016-12-27 | Time limit door access control management system by guest authentication and method thereof |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW201824811A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI742474B (en) * | 2019-11-28 | 2021-10-11 | 二零八八資訊科技有限公司 | Management system |
-
2016
- 2016-12-27 TW TW105143364A patent/TW201824811A/en unknown
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI742474B (en) * | 2019-11-28 | 2021-10-11 | 二零八八資訊科技有限公司 | Management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2019344067B2 (en) | Wireless access credential system | |
US9842446B2 (en) | Systems and methods for lock access management using wireless signals | |
US10362613B2 (en) | Pairing management method, recording medium, and terminal apparatus | |
US20180174384A1 (en) | Time-Limit Door Access Control Management System With Guest Authentication, And Method Thereof | |
TWI530610B (en) | Access control system using near field communication | |
KR101242122B1 (en) | Method for remotely controlling doorlock apparatus using smart phone and the doorlock appratus | |
CN104157029A (en) | Access control system, mobile terminal based control method thereof and mobile terminal | |
CN105227516A (en) | The access method of Smart Home, control centre's equipment and dress terminal | |
US10891599B2 (en) | Use of state objects in near field communication (NFC) transactions | |
US11025595B2 (en) | Secure and anonymous data sharing | |
US11042954B2 (en) | System and method for communication between devices | |
KR20190036068A (en) | Method for device-to-device communication between terminals comprising device-to-device authentication using hash-chain | |
KR20200115387A (en) | Method for authenticating and authorizing user mobile deivce in online service server | |
JP2018010449A (en) | Smart lock authentication system and method in smart lock | |
JP2019173523A (en) | Electric lock system and lock control terminal | |
KR101603963B1 (en) | Authentication method using fingerprint information and certification number, user terminal and financial institution server | |
KR20160146753A (en) | Network node security using short range communication | |
US20140157372A1 (en) | Image forming apparatus, wireless communication system, control method, and computer-readable medium | |
WO2018098725A1 (en) | Unlocking method, terminal, and system | |
TW201824811A (en) | Time limit door access control management system by guest authentication and method thereof | |
CN112767576B (en) | Lockset authorization management method and lockset authorization management system | |
KR101525306B1 (en) | system for key issue using portable terminal and method thereof | |
US10701557B2 (en) | Authentication method for connecting a companion device when same is disconnected from a subscriber device | |
JP6037434B2 (en) | Communications system | |
KR102007897B1 (en) | System and Method for Managing Entrance and Exit of Employee Using Digital Signiture |