CN107093237A - One kind reports the loss access card processing alarm management system - Google Patents

One kind reports the loss access card processing alarm management system Download PDF

Info

Publication number
CN107093237A
CN107093237A CN201710241370.8A CN201710241370A CN107093237A CN 107093237 A CN107093237 A CN 107093237A CN 201710241370 A CN201710241370 A CN 201710241370A CN 107093237 A CN107093237 A CN 107093237A
Authority
CN
China
Prior art keywords
access card
loss
authentication
management system
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710241370.8A
Other languages
Chinese (zh)
Inventor
乔生平
包云飞
蒋万龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Happy Cat Wei (beijing) Network Technology Co Ltd
Original Assignee
Happy Cat Wei (beijing) Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Happy Cat Wei (beijing) Network Technology Co Ltd filed Critical Happy Cat Wei (beijing) Network Technology Co Ltd
Priority to CN201710241370.8A priority Critical patent/CN107093237A/en
Publication of CN107093237A publication Critical patent/CN107093237A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Abstract

Access card processing alarm management system is reported the loss the invention provides one kind, including card reader, the first authentication module, background server and alarm module, also include with lower module, door lock module including the first door locks, the second door locks and self-locking door lock, re-authentication module for carrying out secondary authentication to client, the present invention solves to use and reports the loss the problem of access card is into building, it is ensured that the person and property safety of user in building by way of re-authentication.

Description

One kind reports the loss access card processing alarm management system
Technical field
Access card processing alarm management system is reported the loss the present invention relates to building gate inhibition's management domain, particularly one kind.
Background technology
Gate control system as current smart home important component, it is adaptable to various confidential departments, factory, family, Intellectual communityintellectualized village and office etc..Traditional gate control system is used cooperatively with access card, generally comprises a background server And card reader, the identity information of access card, which is registered in access card on background server, can launch including self-identity information Radiofrequency signal, obtains the identity information of access card by card reader when using, and judges the identity information by background server Registration whether has been carried out to decide whether to be opened the door.The need for developing with intelligent home device, the work of traditional access card Operation mode can not meet intelligentized use demand, and the problem of existing is also more and more obvious.When access card is lost, general Processing method is exactly to handle to report the loss at property, and an access card is handled again, and original access card can not then used, The function of enabling is lost, the problem of so processing has two aspects:1st, the access card lost can not be reused;2nd, easily Cause potential safety hazard.
Publication No. 103280011A application for a patent for invention discloses a kind of building entrance guard safety management system, including many Individual monitor terminal and a security administration server.The security administration server is connected respectively at multiple monitor terminals, described Monitor terminal is respectively distributed in building at the different gate inhibition in multiple positions, by the voice of the people in front of gate inhibition, face or The radio frequency identification IC-card that person uses carries out user's identification, when the monitor terminal recognizes user, the security management services Device controls the opening of the gate inhibition of the monitor terminal present position.Although the invention employs a variety of authentication methods to solve safety Problem, but not proposing to be directed to reports the loss how access card should be handled.
The content of the invention
In order to solve problem above, the present invention proposes one kind and reports the loss access card processing alarm management system, by secondary The mode of certification, solves to use and reports the loss the problem of access card is into building, it is ensured that the person and property safety of user in building.
The present invention provides one kind and reports the loss access card processing alarm management system, including card reader, the first authentication module, backstage Server and alarm module, also comprising with lower module:
Door lock module:Including the first door locks, the second door locks and self-locking door lock;
Re-authentication module:For carrying out secondary authentication to client.
Preferably, the access card processing alarm management system of reporting the loss also includes video capture device and audio-frequency module.
In such scheme preferably, the card reader is used to read the information of access card and pass to described first to recognize Demonstrate,prove module.
In such scheme preferably, first authentication module is used to judge whether the access card is to report the loss card.
In such scheme preferably, when the access card when reporting the loss card, to open first door locks, from It is dynamic to start the re-authentication module, and access card information transmission will be reported the loss to the background server.
In such scheme preferably, after reporting the loss gate inhibition's card information described in being connected to when the background server, enter automatically Enter yellow guard.
In such scheme preferably, the secondary authentication includes:Finger print identifying, voice authentication, face authentication, At least one of privacy problem certification and other certifications.
In such scheme preferably, when the secondary authentication failure, the re-authentication module starts pre- Alert pattern.
In such scheme preferably, the modes of warning includes following at least one action:
A, send and instruct to second door locks, close second door locks;
B, send and instruct to the self-locking door lock, start the self-locking door lock;
C, to the video capture device send instruct, automatically snap holder;
D, to the audio frequency apparatus send instruct, to holder play voice messaging;
E, to the background server information is sent, notify described in the background server holder's re-authentication to fail;
F, to the alarm module send instruct, send warning message.
In such scheme preferably, the self-locking door lock can only just can be with by the special equipment of infrastructure management company Open.
In such scheme preferably, the video capture device after the picture is taken, photo or video is sent to described Background server.
In such scheme preferably, after the background server sends it to the information of the re-authentication module, from It is dynamic to start red guard.
In such scheme preferably, the red guard is directed to property manager, property Security Officer, section responsibility People's police send alarm or information warning with least one of former holder of access card is reported the loss.
In such scheme preferably, the alarm module receives the report for police service after information, sends alarm signal.
In such scheme preferably, the alarm signal includes at least one of blinking red lamp and audible alarm
In such scheme preferably, the background server is used for the personal information for storing gate inhibition's cardholder.
In such scheme preferably, the personal information includes name, sex, age, work unit, position, connection It is at least one of mode, fingerprint, face, voice, privacy problem and described access card card number.
In such scheme preferably, the personal information needs gate inhibition's cardholder to be done to infrastructure management company Reason.
In such scheme preferably, the access card includes actual IC access cards, magnetic stripe access card and virtual door Prohibit at least one of card.
In such scheme preferably, the virtual access card refer to be integrated in the mobile phone of user, it is smart machine, vehicle-mounted Access card at least one of computer.
In such scheme preferably, the personal information also includes the virtual access card card number, the hand of holder At least one of machine number, Mobile PIN, smart machine ISN, motor vehicle trade mark and motor car engine code.
In such scheme preferably, when being entered using the virtual access card, first authentication module The virtual access card is authenticated using virtual certification principle.
In such scheme preferably, the certification principle is when the virtual access card is mobile phone virtual access card When, transfer the phone number and the Mobile PIN is authenticated.
In such scheme preferably, the certification principle is when the virtual access card is the virtual gate inhibition of smart machine During card, transfer the smart machine ISN and be authenticated.
In such scheme preferably, the certification principle is when the virtual access card is Vehicular virtual access card When, transfer the motor vehicle trade mark and motor car engine code is authenticated.
It is above-mentioned report the loss access card processing alarm management system in, when someone using report the loss access card swipe the card enter when, adopt Holder is authenticated with the mode of re-authentication, if certification does not pass through, starts safety measure, the sect of self-closed two Prohibit, and notify infrastructure management company, cell security protection hidden danger can be reduced, danger is strangled in rudiment in time.
Brief description of the drawings
Fig. 1 is the module map of the preferred embodiment for reporting the loss access card processing alarm management system according to the present invention.
Fig. 2 be according to the present invention report the loss access card processing alarm management system enter building using access card in kind The method flow diagram of one preferred embodiment.
Fig. 3 is to enter building according to the virtual access cards of use APP for reporting the loss access card processing alarm management system of the present invention The method flow diagram of one preferred embodiment of space.
Fig. 4 is to enter building according to the use Vehicular virtual access card for reporting the loss access card processing alarm management system of the present invention The method flow diagram of one preferred embodiment of space.
Fig. 5 is the preferred embodiment for handling access card that access card handles alarm management system of reporting the loss according to the present invention Method flow diagram.
Fig. 6 is the structure of the preferred embodiment of the gate inhibition for reporting the loss access card processing alarm management system according to the present invention Schematic diagram.
Fig. 7 is preferred real according to one with video authentication gate inhibition for reporting the loss access card processing alarm management system of the present invention Apply the structural representation of example.
Embodiment
For a better understanding of the present invention, the present invention is elaborated with reference to specific embodiment.It is clear that can Different modifications are carried out to the present invention with remodeling without departing from the broader spirit and scope of the present invention of appended claims. Therefore, following examples have exemplary without the implication of limitation.
Embodiment 1
As shown in figure 1, system include card reader 100, the first authentication module 110, re-authentication module 120, door lock module 130, Background server 140, video capture device 150, alarm module 160 and audio-frequency module 170, wherein door lock module 130 include the One door locks 131, the second door locks 132 and self-locking door lock 133.
As shown in Fig. 2 performing step 200, gate inhibition's cardholder is swiped the card using access card in kind in card reader 100, is read Card device 100 reads the information on access card in kind, and is sent to the first authentication module 110.Perform step 210, the first certification mould Block 110 reads data from background server 140, and certification is carried out to gate inhibition's card.If the access card is not the enabling of this unit Access card, then perform step 215, and the first door locks 131 are closed, are not turned on.If the access card is the enabling gate inhibition of this unit Card and be not to report the loss access card, then perform step 211, the first door locks 131 open, ask holder to enter.Step 212 is performed, Audio-frequency module 170 transfers the data in background server 140, playing welcome announcement, such as " Mr. X/Ms, welcome back ", together Shi Zhihang steps 213, the second door locks 132 are opened, and ask holder to enter building.If the access card is the enabling door of this unit Taboo is blocked and is to report the loss access card, then performs step 220, and the first door locks 131 are opened, and asks holder to enter, while the first certification Module 110 sends message to background server 140, informs that the someone of background server 140 enters building using access card is reported the loss, after Platform server 140, which is transferred, reports the loss gate inhibition's card information, automatically into yellow guard, opens video capture device 150, locking holds People.Step 230 is performed, re-authentication module 120 is opened, carry out re-authentication.Re-authentication includes:Enter pedestrian using camera Face certification, using fingerprint recording instrument carry out finger print identifying, using touch-screen carry out cipher authentication and privacy problem certification, use sound Microphone in frequency module 170 carries out voice authentication.If re-authentication passes through, step 231, the second door locks 132 are performed Automatically open up, allow holder to enter.Order performs step 232 and step 233 simultaneously, and re-authentication module 120 is to background service Device sends information, and background server notifies infrastructure management company.Infrastructure management company contacts with holder, informs holder someone using reporting the loss Access card enters building, is confirmed whether it is holder or holder knows this thing, the human face photo that camera is gathered Holder is sent to be confirmed.If holder confirms, infrastructure management company releases yellow guard in background server, if held Card people does not confirm that the people that then infrastructure management company goes to the building to report the loss access card into building to holding inquires.If secondary Certification not over.Step 240 is then performed, re-authentication module 120 starts modes of warning, while step 241 is performed, to second Door locks 132 send instruction, and the second door locks are connected to after order and closed;Step 242, send and instruct to self-locking door lock 133, start Self-locking door lock 133;Step 243, send and instruct to video capture device 150, the automatic shooting holder of video capture device 150, And background server 140 is uploaded in real time;Step 244, send and instruct to audio frequency apparatus 170, the loudspeaker of audio frequency apparatus 170 to Holder plays voice messaging, informs that holder waits the arrival of property personnel;Step 245, send and believe to background server 170 Breath, notifies holder's re-authentication failure described in background server 140, and background server 140 starts red guard, notifies property Manager, property Security Officer, section responsibility people's police and the former holder for reporting the loss access card;Step 246, sent out to the alarm module Instruction is sent, warning message is sent, alarm signal includes blinking red lamp and audible alarm.
Embodiment 2
As shown in Figure 1, Figure 3, step 300 is performed, gate inhibition's cardholder uses the virtual gate inhibitions of APP on mobile phone or smart machine Card opens the first door locks 131, by solicited message of opening the door(Including building number, unit number, room number, the phone number for sending information, hair Deliver letters breath mobile phone model and send information Mobile PIN)It is sent to the first authentication module 110.Perform step 310, first Authentication module 110 reads reserved data from background server 140(Including phone number, mobile phone model, Mobile PIN), it is right The virtual access cards of APP are authenticated.If the enabling solicited message is identical with the reserved data information that background server 140 is provided And be not to report the loss the virtual access cards of APP, then step 311 is performed, the first door locks 131 are opened, ask holder to enter.Perform step 312, audio-frequency module 170 transfers the data in background server 140, playing welcome announcement, and for example " Mr. X/Ms welcomes to return Come ", while performing step 313, the second door locks 132 are opened, and ask holder to enter building.If the enabling solicited message is with after The virtual access cards of APP that the reserved data information that platform server 140 is provided is differed or reported the loss, then perform step 320, the first door locks 131 are opened, and ask holder to enter, and are disappeared while the first authentication module 110 is sent to background server 140 Breath, informs that the someone of background server 140 enters building using access card is reported the loss, background server 140, which is transferred, reports the loss access card letter Breath, automatically into yellow guard, opens video capture device 150, locks holder.Perform step 330, re-authentication module 120 open, and carry out re-authentication.Re-authentication includes:Face authentication is carried out using camera, referred to using fingerprint recording instrument Line certification, using touch-screen carry out cipher authentication and privacy problem certification, use the microphone in audio-frequency module 170 to carry out voice Certification.If re-authentication passes through, step 331 is performed, the second door locks 132 are automatically opened up, and allow holder to enter.It is simultaneously suitable Sequence performs step 332 and step 333, and re-authentication module 120 sends information to background server, and background server notifies property Company.Infrastructure management company contacts with holder, informs that holder someone enters building using access card is reported the loss, is confirmed whether it is and holds People or holder know this thing, and the human face photo that camera is gathered is sent into holder is confirmed.If held People confirms that then infrastructure management company releases yellow guard in background server, if holder does not confirm, infrastructure management company goes to the building The people that space reports the loss access card into building to holding inquires.If re-authentication not over.Then perform step 340, two Secondary authentication module 120 starts modes of warning, while performing following steps:Step 341, send and instruct to the second door locks 132, the Two sects are locked to after order and closed;Step 342, send and instruct to self-locking door lock 133, start self-locking door lock 133;Step 343, Send and instruct to video capture device 150, the automatic shooting holder of video capture device 150, and background service is uploaded in real time Device 140;Step 344, send and instruct to audio frequency apparatus 170, the loudspeaker of audio frequency apparatus 170 plays voice messaging to holder, Inform that holder waits the arrival of property personnel;Step 345, information is sent to background server 170, notifies background server Holder's re-authentication described in 140 fails, and background server 140 starts red guard, notifies property manager, property constabulary Long, section responsibility people's police and the former holder for reporting the loss access card;Step 346, send and instruct to the alarm module, send alarm Information, alarm signal includes blinking red lamp and audible alarm;Step 347.Background server 140 locks mobile phone by GPS location Position.
Embodiment 3
As Figure 1 and Figure 4, step 400 is performed, gate inhibition's cardholder opens the first door locks using Vehicular virtual access card 131, by solicited message of opening the door(Including building number, unit number, room number, motor vehicle trade mark and motor car engine code)It is sent to first Authentication module 110.Step 410 is performed, the first authentication module 110 reads reserved data from background server 140(Including motor-driven License plate number and motor car engine code), Vehicular virtual access card is authenticated.If the enabling solicited message and background service The reserved data information that device 140 is provided is identical and is not to report the loss Vehicular virtual access card, then performs step 411, the first door locks 131 open, and please drive holder's entrance.Step 412 is performed, audio-frequency module 170 is transferred the data in background server 140, broadcast Salutatory is put, for example " Mr. X/Ms, welcome back ", while performing step 413, the second door locks 132 are opened, and ask holder Driving enters garage.If the reserved data information that the enabling solicited message is provided with background server 140 is differed either The Vehicular virtual access card reported the loss, then perform step 420, and the first door locks 131 are opened, and asks holder to drive to enter, together When the first authentication module 110 send message to background server 140, inform the someone of background server 140 using reporting the loss access card Into building, background server 140, which is transferred, reports the loss gate inhibition's card information, automatically into yellow guard, opens video capture device 150, lock holder.Step 430 is performed, re-authentication module 120 is opened, carry out re-authentication.Re-authentication includes:Use Camera is carried out face authentication, finger print identifying is carried out using fingerprint recording instrument, asked using touch-screen progress cipher authentication and secret Inscribe certification, carry out voice authentication using the microphone in audio-frequency module 170.If re-authentication passes through, step 431 is performed, Second door locks 132 are automatically opened up, and allow holder to enter.Order performs step 432 and step 433, re-authentication module simultaneously 120 send information to background server, and background server notifies infrastructure management company.Infrastructure management company contacts with holder, informs and holds People someone enters building using access card is reported the loss, and is confirmed whether it is holder or holder knows this thing, by camera The human face photo of collection is sent to holder and confirmed.If holder confirms, infrastructure management company releases in background server Yellow guard, if holder does not confirm, the people that infrastructure management company goes to the building to report the loss access card into building to holding enters Row inquiry.If re-authentication not over.Step 440 is then performed, re-authentication module 120 starts modes of warning, held simultaneously Row following steps:Step 441, send and instruct to the second door locks 132, the second door locks are connected to after order and closed;Step 442, Send and instruct to self-locking door lock 133, start self-locking door lock 133;Step 443, send and instruct to video capture device 150, video Collecting device 150 automatically snaps holder, and uploads to background server 140 in real time;Step 444, sent to audio frequency apparatus 170 Instruction, the loudspeaker of audio frequency apparatus 170 plays voice messaging to holder, informs that holder waits the arrival of property personnel;Step Rapid 445, information is sent to background server 170, holder's re-authentication failure described in background server 140, backstage clothes is notified Business device 140 starts red guard, notifies property manager, property Security Officer, section responsibility people's police and reports the loss the original of access card and hold Block people;Step 446, send and instruct to the alarm module, send warning message, alarm signal includes blinking red lamp and sound report It is alert;Step 447, ground bumping post before and after rising.
Embodiment 4
As shown in Figure 1, shown in Figure 5, perform step 500, House Property owner demonstrate,proves with House Property, personal identity card and other do The people and certificate for managing access card handle access card to infrastructure management company.Perform step 510, the related money of infrastructure management company staff examination & verification Material, confirms identity.If the data of the access card person of handling does not meet the condition of handling, step 511 is performed, gate inhibition is handled in stopping Card.If the data of the access card person of handling is not complete, perform step 500, please the person of handling personal information is provided again.If gate inhibition The data of the card person of handling meets the condition of handling, then performs step 520, and infrastructure management company staff records on background server 140 Enter the personal essential information of the person of handling(Including name, sex, age, Lou Hao, unit number, room number etc.), and gather the person of handling as Lower information:Full face, left and right sides photo, finger print information, voice messaging, password protection problem and answer).Performed after typing information Step 530, it is determined that the type of the access card to be handled.If handling access card in kind, step 540 is performed, submits personal Contact method and alternative contact mode(Including cell-phone number, WeChat ID, No. qq etc.);If handling the virtual access cards of APP, hold Row step 541, downloads APP on smart mobile phone or smart machine, obtains the essential information of mobile phone or smart machine(Including hand Machine number, Mobile PIN, smart machine ISN, MAC Address)And be sent to background server 140 and preserved;If done Vehicular virtual access card is managed, then performs step 542, it is necessary to install vehicle-mounted access control equipment, obtains vehicle essential information(Including car plate Number and engine mumber)And be sent to background server 140 and preserved.Three above step performs step after handling respectively 550, the personal additional information of input(Including work unit, position, personal like etc.).Step 560 is performed, access card is handled into Work(, infrastructure management company staff provides access card to the person of handling.
Embodiment 5
Fig. 6 sees gate inhibition's structural plan at two sects for station inwards on building doorway.
As shown in Fig. 1, Fig. 6, label 600 for building body, the first door locks 131 are arranged on the right side at the first sect, built-in First authentication module, card reader 100 is provided with the first door locks 131.Second door locks 132 are arranged on the right side at the second sect Side, built-in re-authentication module is provided with video capture device 150, audio-frequency module 170, liquid crystal on the second door locks 131 Display screen 610, keyboard 620 and the self-locking door lock 133 of finger print input device 630. are arranged on the top of the fan door of first sect or so two, interior Put 4 stainless steel columns 640.Flash alarm 650 is arranged on the roof between the first sect and the second sect.
Gate inhibition holder's brush access card in card reader 100, certification is by rear, and the first door locks 131 are opened, and holder enters Enter, audio-frequency module 170 is played the second door locks 132 while welcoming voice and opened.
Gate inhibition holder's brush access card in card reader 100, certification is obstructed out-of-date, and the first door locks 131 are not opened.
Gate inhibition holder's brush access card in card reader 100, certification by but the access card for report the loss card when, the first sect Lock 131 is opened, and holder enters.Audio-frequency module 170 plays voice, points out holder to be operated according to voice message.Liquid crystal Prompting carries out face authentication, the visual video capture device 150 of holder on display screen 610;After collection, on LCDs 610 Prompting carries out voice authentication, and holder says the word pointed out on LCDs 610 in face of audio-frequency module 170;After collection, Prompting carries out finger print identifying, holder's typing fingerprint on finger print input device 630 on LCDs 610;After typing, liquid crystal Prompting carries out cipher authentication on display screen 610, and holder inputs on keyboard 620 enters password;After input, LCDs Prompting carries out password protection problem certification on 610, and holder inputs password protection problem answers by keyboard 620.Certification passes through rear, second Door-lock opening, audio-frequency module 170 plays voice, points out holder to release reporting the loss for access card as early as possible.If certification does not pass through, from The automatic spring of stainless steel column 640 locked a door on 133, is stuck in the neck on the first sect so that the first sect can not be beaten Open, flashing light alarm 650 flashes alarm, audio-frequency module plays voice, and video capture device records the situation of holder automatically;Wait The arrival of property personnel.
Embodiment 6
Fig. 7 sees gate inhibition's structural plan at two sects for station inwards on building doorway.
As shown in Figure 1, Figure 7 shows, label 700 for building body, the first door locks 131 are arranged on the right side at the first sect, built-in First authentication module, card reader 100 is provided with the first door locks 131, and main shooting is provided with the top of the first door locks 131 Head array 760, secondary camera array 761 is provided with the leftward position of the door contour with main camera array 760.Second sect Lock 132 is arranged on the right sides at the second sect, built-in re-authentication module, and on the second door locks 131 being provided with secondary video adopts Collect equipment 150, audio-frequency module 170, LCDs 710, keyboard 720 and finger print input device 730.Self-locking door lock 133 is installed The top of door, built-in 4 stainless steel columns 740 are fanned at first sect or so two.Flash alarm 750 be arranged on the first sect with On roof between second sect.
Gate inhibition holder's brush access card in card reader 100, access card and video authentication by rear certification by rear, first Door locks 131 are opened, and holder enters, and audio-frequency module 170 is played the second door locks 132 while welcoming voice and opened.
Gate inhibition holder's brush access card in card reader 100, access card and video authentication it is obstructed after, the first door locks 131 open, and holder enters.Audio-frequency module 170 plays voice, points out holder to be operated according to voice message.Liquid crystal Prompting carries out face authentication, the visual secondary video collecting device 150 of holder in display screen 710;After collection, LCDs 710 Upper prompting carries out voice authentication, and holder says the word pointed out on LCDs 710 in face of audio-frequency module 170;Collection Afterwards, prompting carries out finger print identifying, holder's typing fingerprint on finger print input device 630 on LCDs 710;After typing, Prompting carries out cipher authentication on LCDs 710, and holder inputs on keyboard 720 enters password;After input, liquid crystal display Prompting carries out password protection problem certification on screen 710, and holder inputs password protection problem answers by keyboard 720.Certification is by rear, and second Door locks are opened, and audio-frequency module 170 plays voice, point out holder to release reporting the loss for access card as early as possible.If certification does not pass through, The automatic spring of stainless steel column 740 on self-locking door lock 133, is stuck in the neck on the first sect so that the first sect can not Open, flashing light alarm 750 flashes alarm, audio-frequency module plays voice, and video capture device records the situation of holder automatically;Deng Treat the arrival of property personnel.
For a better understanding of the present invention, it is described in detail above in association with the specific embodiment of the present invention, but is not Limitation of the present invention.Every technical spirit according to the present invention still belongs to any simple modification made for any of the above embodiments In the scope of technical solution of the present invention.What each embodiment was stressed in this specification be it is different from other embodiments it Same or analogous part cross-reference between place, each embodiment.For system embodiment, due to itself and method Embodiment is corresponded to substantially, so description is fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
The method and system of the present invention may be achieved in many ways.For example, can by software, hardware, firmware or Software, hardware, firmware any combinations come realize the present invention method and system.The said sequence of the step of for methods described Order described in detail above is not limited to merely to illustrate, the step of method of the invention, it is special unless otherwise Do not mentionlet alone bright.In addition, in certain embodiments, the present invention can be also embodied as recording to program in the recording medium, these programs Including the machine readable instructions for realizing the method according to the invention.Thus, the present invention also covering storage is used to perform basis The recording medium of the program of the method for the present invention.
Description of the invention is provided for the sake of example and description, and is not exhaustively or by the present invention It is limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.Select and retouch State embodiment and be more preferably to illustrate the principle and practical application of the present invention, and one of ordinary skill in the art is managed The solution present invention is so as to design the various embodiments with various modifications suitable for special-purpose.

Claims (10)

1. one kind reports the loss access card processing alarm management system, including card reader, the first authentication module, background server and alarm Module, it is characterised in that also comprising with lower module:
Door lock module:Including the first door locks, the second door locks and self-locking door lock;
Re-authentication module:For carrying out secondary authentication to client.
2. as claimed in claim 1 report the loss access card processing alarm management system, it is characterised in that described to report the loss at access card Managing alarm management system also includes video capture device and audio-frequency module.
3. as claimed in claim 2 report the loss access card processing alarm management system, it is characterised in that the card reader is used to read Take the information of access card and pass to first authentication module.
4. as claimed in claim 3 report the loss access card processing alarm management system, it is characterised in that first authentication module For judging whether the access card is to report the loss card.
5. as claimed in claim 4 report the loss access card processing alarm management system, it is characterised in that when the access card is extension When losing card, first door locks, re-authentication module described in automatic start are opened, and access card information transmission will be reported the loss To the background server.
6. as claimed in claim 5 report the loss access card processing alarm management system, it is characterised in that when the background server Reported the loss described in being connected to after gate inhibition's card information, automatically into yellow guard.
7. as claimed in claim 6 report the loss access card processing alarm management system, it is characterised in that the secondary authentication Including:At least one of finger print identifying, voice authentication, face authentication, privacy problem certification and other certifications.
8. as claimed in claim 7 report the loss access card processing alarm management system, it is characterised in that when the secondary identity is recognized During card failure, the re-authentication module starts modes of warning.
9. as claimed in claim 8 report the loss access card processing alarm management system, it is characterised in that the modes of warning includes Following at least one action:
A, send and instruct to second door locks, close second door locks;
B, send and instruct to the self-locking door lock, start the self-locking door lock;
C, to the video capture device send instruct, automatically snap holder;
D, to the audio frequency apparatus send instruct, to holder play voice messaging;
E, to the background server information is sent, notify described in the background server holder's re-authentication to fail;
F, to the alarm module send instruct, send warning message.
10. as claimed in claim 9 report the loss access card processing alarm management system, it is characterised in that the self-locking door lock is only It is able to can just be opened by the special equipment of infrastructure management company.
CN201710241370.8A 2017-04-13 2017-04-13 One kind reports the loss access card processing alarm management system Pending CN107093237A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710241370.8A CN107093237A (en) 2017-04-13 2017-04-13 One kind reports the loss access card processing alarm management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710241370.8A CN107093237A (en) 2017-04-13 2017-04-13 One kind reports the loss access card processing alarm management system

Publications (1)

Publication Number Publication Date
CN107093237A true CN107093237A (en) 2017-08-25

Family

ID=59636981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710241370.8A Pending CN107093237A (en) 2017-04-13 2017-04-13 One kind reports the loss access card processing alarm management system

Country Status (1)

Country Link
CN (1) CN107093237A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859453A (en) * 2009-09-30 2010-10-13 深圳市安捷信联科技有限公司 Smart card loss reporting method based on short message service and system
CN103280011A (en) * 2013-06-09 2013-09-04 无锡北斗星通信息科技有限公司 Building entrance guard safety management system
CN103475997A (en) * 2013-08-23 2013-12-25 北京创毅讯联科技股份有限公司 Method and device for verifying terminals in LTE (Long Term Evolution) enterprise network
JP2014139727A (en) * 2013-01-21 2014-07-31 Hitachi Systems Ltd Security card management service system and security card management service method
CN104616384A (en) * 2013-06-09 2015-05-13 邓继红 Safety management system for access control of building
CN105243719A (en) * 2015-10-30 2016-01-13 桂林信通科技有限公司 Control method and system for access control
CN105243718A (en) * 2015-10-29 2016-01-13 桂林力拓信息科技有限公司 Control method and system for access control
CN105335806A (en) * 2014-08-14 2016-02-17 江苏晓山信息产业股份有限公司 Anti-tailing channel of jail and management method of anti-tailing channel of jail
JP2016058015A (en) * 2014-09-12 2016-04-21 戸田建設株式会社 Entrance/exit management system for people by image authentication device
CN205297041U (en) * 2015-04-07 2016-06-08 傅万清 Electronic lock of compatible electron password of NFC cell -phone unblock
CN107195038A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of intelligent cloud lock system and method for unlocking based on Quick Response Code

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859453A (en) * 2009-09-30 2010-10-13 深圳市安捷信联科技有限公司 Smart card loss reporting method based on short message service and system
JP2014139727A (en) * 2013-01-21 2014-07-31 Hitachi Systems Ltd Security card management service system and security card management service method
CN103280011A (en) * 2013-06-09 2013-09-04 无锡北斗星通信息科技有限公司 Building entrance guard safety management system
CN104616384A (en) * 2013-06-09 2015-05-13 邓继红 Safety management system for access control of building
CN103475997A (en) * 2013-08-23 2013-12-25 北京创毅讯联科技股份有限公司 Method and device for verifying terminals in LTE (Long Term Evolution) enterprise network
CN105335806A (en) * 2014-08-14 2016-02-17 江苏晓山信息产业股份有限公司 Anti-tailing channel of jail and management method of anti-tailing channel of jail
JP2016058015A (en) * 2014-09-12 2016-04-21 戸田建設株式会社 Entrance/exit management system for people by image authentication device
CN205297041U (en) * 2015-04-07 2016-06-08 傅万清 Electronic lock of compatible electron password of NFC cell -phone unblock
CN105243718A (en) * 2015-10-29 2016-01-13 桂林力拓信息科技有限公司 Control method and system for access control
CN105243719A (en) * 2015-10-30 2016-01-13 桂林信通科技有限公司 Control method and system for access control
CN107195038A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of intelligent cloud lock system and method for unlocking based on Quick Response Code

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张菲菲: "校园一卡通管理系统的设计研究", 《全国优秀硕士学位论文全文数据库信息科技辑》 *

Similar Documents

Publication Publication Date Title
CN103489291B (en) A kind of integrated safety-protection system of comprehensive intelligent wireless
CN108492551A (en) Taxi queuing management method, system and computer readable storage medium
CN106846655B (en) Internet-based key management cabinet and control method
CN1219260A (en) System for administrating of remotely-proctored secure examination
CN106127369A (en) A kind of round-the-clock show window integrated management system of laboratory instruments and method thereof
CN108269330A (en) A kind of access control method, apparatus and system
CN112200948A (en) Smart and safe campus visitor reservation platform
CN205541046U (en) Special theftproof electromagnetic lock of electric power system based on two -dimensional code and GPS verify
CN213070103U (en) Safety monitoring system
CN112991604A (en) Health information-based access control management system and method
CN108528387A (en) A kind of control method for vehicle and device
CN106652119A (en) Dynamic password management system
CN107093236A (en) A kind of double access control systems recognized based on fuzzy video
CN107992910B (en) Management system and method for preventing drunk driving of vehicle keys
CN108573557A (en) The application method of seal protecting box and seal protecting box
CN109809262B (en) Elevator permission safety control system
CN110599636A (en) Customs lock, customs lock key, and customs lock opening and closing method and system
CN107093237A (en) One kind reports the loss access card processing alarm management system
CN110288492A (en) A kind of hotel occupancy method, computer equipment and readable storage medium storing program for executing
CN207267409U (en) Internet of Things intelligence seal system
CN109035534A (en) A kind of gate inhibition's monitoring method, controller and system
CN210627200U (en) Online visitor system
CN210039128U (en) Parking system
CN112530069A (en) Control method, control device and medium for campus parking lot system
JP4253064B2 (en) Station service system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20210601

AD01 Patent right deemed abandoned