CN107123178B - Access control system - Google Patents
Access control system Download PDFInfo
- Publication number
- CN107123178B CN107123178B CN201610044039.2A CN201610044039A CN107123178B CN 107123178 B CN107123178 B CN 107123178B CN 201610044039 A CN201610044039 A CN 201610044039A CN 107123178 B CN107123178 B CN 107123178B
- Authority
- CN
- China
- Prior art keywords
- access control
- database
- door
- management module
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
- Lock And Its Accessories (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides an access control system, which is connected with a plurality of bottom access control systems and comprises an authority management module, a database module and an access control management module, wherein the authority management module is used for managing the user authority of the bottom access control systems; the database module is used for storing the equipment and user information of the plurality of bottom access control systems; and the door control management module is used for controlling the door opening and closing operations of the bottom layer door control systems. The invention can realize the unified management and control of a plurality of bottom access control systems.
Description
Technical Field
The invention relates to the field of security, in particular to an access control management system in the field of security.
Background
At present, most of access control systems deployed in subways are relatively independent. For example, one set of access control system is deployed on the first subway line, the other set of access control system is deployed on the second subway line, and so on. The access control systems of all subway lines are independent of each other, and interaction is avoided under general conditions. Even if interaction exists, the system is docked with other platforms (such as a smart card or comprehensive monitoring), and integration or interaction of a plurality of subway line access control systems is not available. With the increasing of subway lines in a city, more and more access control users can purchase and deploy a plurality of access control systems. These access systems may be from the same manufacturer or may be from different manufacturers. Generally, a plurality of deployed access control systems are relatively closed, and there is no interaction between the access control systems, let alone can be uniformly managed and configured.
In this case, personnel management across different subway lines (e.g., the same user needs to access the doors of different access systems) can be cumbersome. Under the condition, card issuing authorization can be only carried out on each access control system one by one, so that tracking and recording cannot be well realized. In addition, when the number of such authorization conditions across the access control system increases, confusion is likely to occur, and management vulnerabilities are also likely to occur.
Because the access control systems are relatively closed and the access control systems of the subway lines are independent, it is very difficult to uniformly query and control the relevant information of all the subway line access control systems in a city. For example, it is very difficult and cumbersome to uniformly manage and maintain all subway line access control devices, card holders, and access control events. The statistical personnel need to go to the access control management system of each subway line to read data or carry out relevant operation, and the work load is difficult to imagine, and the operation is complicated and easy to produce careless omission. In addition, the comparison of the states of events and devices between different access control systems is difficult. Only relevant data can be exported from each access control management system, and then unified comparison is carried out. This is not only inefficient, but also prone to errors.
In addition, for access control management systems of different manufacturers and different versions, users need to arrange specially-assigned persons for learning, training, operation and maintenance, which also results in higher operation cost of the users.
Disclosure of Invention
The invention aims to provide an access control system which is connected with and manages a plurality of bottom access control systems, transmits information with each bottom access control system and uniformly manages and controls the bottom access control systems. Therefore, management and control of a plurality of bottom layer access control systems can be realized only by operating the access control system.
The invention provides an access control system, which is connected with a plurality of bottom access control systems and can comprise an authority management module, a database module and an access control management module, wherein the authority management module is used for managing the user authority of the bottom access control systems; the database module is used for storing the equipment and user information of the plurality of bottom access control systems; and the door control management module is used for controlling the door opening and closing operations of the bottom layer door control systems.
In a preferred embodiment, the database module includes a system database and an intermediate database, and the intermediate database is used for storing interaction information between the access control management system and the plurality of underlying access control systems. Further, the interaction information is packaged in a file in an XML format; or, the interaction information includes one or more of: authorization information, pre-authorization information, and a door control instruction.
The above-mentioned access control management system may further include an access control configuration management module and an access control event management module, wherein the access control configuration management module is configured to manage the devices and user information of the plurality of bottom layer access control systems, and the access control event management module is configured to manage the access control events of the plurality of bottom layer access control systems.
In a preferred embodiment, the access control system may further include an account management module, where the account management module is configured to manage account information of the access control system and the plurality of bottom-layer access control systems.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure. The drawings illustrate embodiments of the disclosure and, together with the description, serve to explain the principles of the disclosure. The technical solutions of the present disclosure and their advantages will become apparent after reading the following examples of the present disclosure, which are not intended to be limiting. Wherein:
fig. 1 shows an operating environment of an access control system according to the present invention.
Fig. 2 is a schematic structural diagram of an access control system according to the present invention.
Fig. 3 is a schematic diagram illustrating data interaction between an access control system and a plurality of underlying access control systems according to an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating data interaction between an access control system and a plurality of underlying access control systems according to another embodiment of the present invention.
Detailed Description
Various technical features and advantageous details of the present disclosure are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Also, the following description omits descriptions of well-known raw materials, processing techniques, components, and apparatuses so as not to unnecessarily obscure the technical points of the present disclosure. However, those of ordinary skill in the art will appreciate that the description and specific examples, while indicating embodiments of the present disclosure, are given by way of illustration and not of limitation.
Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. Further, although the terms used in the present disclosure are selected from publicly known and commonly used terms, some of the terms mentioned in the specification of the present disclosure may be selected by the disclosure person at his or her discretion, the detailed meanings of which are described in relevant parts of the description herein. Furthermore, it is required that the present disclosure is understood, not simply by the actual terms used but by the meaning of each term lying within.
Fig. 1 shows an operating environment of an access control system according to the present invention. The system comprises a server 101 and a workstation 102, wherein a database 103 is deployed on the server 101, and the database 103 is used for storing relevant data in an access control management system, including but not limited to: user information of the access control system, device information of a plurality of underlying access control systems (e.g., line 1 access control system 107, line 2 access control system 108, and business district access control system 109), and names, card numbers, authorities, access times, and the like of persons who come in and go out. The access control system is connected with a plurality of bottom access control systems through a network 106. The general user 105 can access relevant information within the scope of his authority, for example, through the workstation 102, and the administrator 104 can manage the access control system through the server 101, for example, configuring the corresponding authority for the user, viewing the device and user information of each underlying access control system, and the like. The access control system provided by the invention can run on the server 101 and the workstation 102, and is connected with the servers 101 of a plurality of bottom access control systems through the network 106, so that the management and control of each bottom access control system are realized.
Fig. 2 is a schematic structural diagram of an access control system according to an embodiment of the present invention. As shown in fig. 2, the access control system 200 may include a rights management module 201, an access control configuration management module 202, a database module 203, an access control management module 204, an access control event management module 205, and an account management module 206.
The right management module 201 may manage the access rights of all the bottom layer access control systems connected to the access control management system 200. For example, corresponding access rights are set for one or more users of a plurality of underlying access control systems, such as a user can enter or exit one or more doors within a specified time (e.g., 8 o 'clock-18 o' clock in a working day). In general, only the user with administrator's authority can set the authority of the underlying access control system through the authority management module 201.
The access control configuration management module 202 is configured and managed for a plurality of bottom access control systems. For example, device information, personnel information, historical events and the like of a plurality of underlying access control systems are checked, and relevant information is changed when the devices and personnel of the access control systems are changed.
Database module 203 may include a system database and an intermediate database. The system database may store related information of the access control system 200, such as an electronic map of all underlying access control systems connected to the access control system 200, device information, and user information (e.g., names and permissions of people coming in and going out). When other functional modules (such as a right management module, an access configuration management module, a door control management module, an access event management module, and an account management module) interact with a user, it may be necessary to read information from the system database or write information into the system database. The system database may also provide statistical functionality to the user, such as statistics or import/export of specific data or reports, and the like. Meanwhile, the system database can also provide data backup when the bottom layer access control system fails or is subjected to an unrecoverable disaster, so that the normal operation of the bottom layer access control system is ensured.
The intermediate database is used to assist the access control system 200 in authorizing the access control system at the bottom layer. Referring to fig. 2 and 3, in one embodiment, one or more underlying access control systems 303 first upload personnel to be changed (e.g., stored in an underlying database 304) and corresponding authorization data to the staging database 302; the right management module 201 stores the corresponding authorization change information into the intermediate database 302 according to the data, the corresponding bottom-layer access control system 303 reads the authorization change information from the intermediate database 302 and executes corresponding operations, and then the operation result (success or failure) is updated to the intermediate database 302 so that the access control system 200 can know the operation result; if the operation is successful, the intermediate database 302 transmits the corresponding authorization information to the system database 301 to update the information of the database. In this way, the access control system 200 can implement rights management for the underlying access control system 303.
The bottom-level access control system 303 may obtain the new authorization information in the intermediate database 302 by detecting the intermediate database 302 at regular time, or may actively notify the corresponding bottom-level access control system 303 after the access control management system 200 saves the relevant information. Similarly, the door access management system 200 may also periodically check the staging database 302 to obtain the operation results.
In another embodiment, the access management system 200 may determine whether one or more underlying access systems 303 are authorized, wherein the authorized functions include direct authorization or pre-authorization. In the direct authorization mode, one or more authorized underlying access control systems 303 may directly manage rights-related operations in the access control system. After the authorization information of the access control system is changed, the bottom-layer access control system 303 further needs to store the changed authorization information in the intermediate database 302 to notify the access control management system 200 to update.
In the pre-authorization mode, one or more bottom layer access control systems 303 store the changed pre-authorization information in the intermediate database 302, the access control management system 200 obtains the pre-authorization information and performs an audit on the pre-authorization information, then the audit result is fed back to the intermediate database 302, and the corresponding bottom layer access control system 303 performs a corresponding authorization or authorization cancellation operation according to the audit result.
In a preferred embodiment, the data stored in the intermediate database 302, such as the authorization change information, the pre-authorization information, the audit result, etc., may be a file (e.g., an XML file) with a specified format for the convenience of packaging and parsing.
The door control management module 204 is configured to send a door control command, such as a door opening or closing command, to one or more underlying door control systems. The transmission mode of the door control command can be the same as or different from the authorization information. For example, the door control instructions may be packaged in a file of a specified format and stored in an intermediate database for detection and reading by the various underlying door control systems.
In another embodiment, as shown in fig. 2 and 4, the door command may be sent directly by the door management module 204 to one or more underlying door access systems 402 without forwarding or dumping via other intermediary components. In this way, the access control system 200 can perform access control management on each underlying access control system 402. The bottom access control systems are independent from each other and are not interactive.
The access control event management module 205 is configured to manage access control events of a plurality of bottom-layer access control systems, for example, check various events (for example, swiping a card to open a door) of each bottom-layer access control system in real time, monitor the device state of each bottom-layer access control system and the situation of entering and exiting of related personnel, and thus, for example, draw a movement trajectory of the personnel.
The account management module 206 is configured to manage account information of the access control system 200, and set corresponding operation permissions for the accounts. For example, the administrator account may view and configure other account information, use all functions of the access control system 200, and set relevant information of all bottom-layer access control systems connected to the access control system 200 (e.g., set user permissions, send access control instructions, etc.); the user of each bottom layer access control system may also have a restricted account of the access control management system 200, and the restricted account may only view or configure information related to the respective access control system.
Those skilled in the art can understand that the access control management system related to the present invention may include, for example, the right management module, the database module and the door control management module, instead of the above six modules, the right management module, the door control configuration management module, the database module, the door control event management module and the account management module, and the related functions of the door control configuration management module, the door control event management module and the account management module are implemented by the door control management module. Of course, the access control system may also include one or more of an access control configuration management module, an access control event management module, and an account management module.
While several embodiments of the present invention have been described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, substitutions and modifications will occur to those skilled in the art without departing from the scope of the invention. It is intended that the following claims define the scope of the invention and that methods and structures within the scope of these claims and their equivalents be covered thereby.
Claims (6)
1. An entrance guard management system is connected with a plurality of bottom entrance guard systems and comprises an authority management module, a database module and an entrance guard management module, wherein,
the authority management module is used for managing the user authority of the plurality of bottom layer access control systems;
the system comprises a database module, an intermediate database, a plurality of bottom access control systems and an operation result updating module, wherein the database module is used for storing equipment and user information of the bottom access control systems, the database module comprises a system database and an intermediate database, the intermediate database is used for assisting the access control management systems to realize authority authorization of the bottom access control systems, the authority authorization change information is stored in the authority management module and comprises personnel needing to be changed and corresponding authorization data, the corresponding bottom access control systems in the bottom access control systems are read from the intermediate database, corresponding operation is executed, and then the operation result is updated to the intermediate database:
the plurality of bottom access control systems can acquire newly-added authorization information by detecting the intermediate database at regular time, in the direct authorization mode, the authorized bottom access control systems can directly manage the authority related operation in the access control system, and after the authorization information of the access control system is changed, the changed authorization information is stored in the intermediate database to inform the access control management system to update, in the pre-authorization mode, one or more bottom access control systems store the changed pre-authorization information in the intermediate database, the access control management system acquires the pre-authorization information and audits the pre-authorization information, then the audit result is fed back to the intermediate database, and the corresponding bottom access control system executes corresponding authorization or authorization cancelling operation according to the audit result; and
the door control management module is used for controlling door opening and closing operations of the bottom layer door control systems.
2. The door access management system of claim 1, wherein the database module comprises a system database and an intermediate database, and the intermediate database is used for storing interaction information between the door access management system and the plurality of underlying door access systems.
3. The access control management system of claim 2, wherein the interaction information comprises one or more of: authorization information, pre-authorization information, and a door control instruction.
4. The door access management system of claim 1, further comprising a door access configuration management module and a door access event management module, wherein the door access configuration management module is configured to manage the device and user information of the plurality of bottom layer door access systems, and the door access event management module is configured to manage the door access events of the plurality of bottom layer door access systems.
5. Entrance guard management system according to claim 2 or 3, the mutual information is encapsulated in a file in XML format.
6. The access control management system of any one of claims 1-4, further comprising an account management module, the account management module being configured to manage account information of the access control management system and the plurality of underlying access control systems.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610044039.2A CN107123178B (en) | 2016-01-22 | 2016-01-22 | Access control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610044039.2A CN107123178B (en) | 2016-01-22 | 2016-01-22 | Access control system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107123178A CN107123178A (en) | 2017-09-01 |
CN107123178B true CN107123178B (en) | 2019-12-31 |
Family
ID=59716972
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610044039.2A Active CN107123178B (en) | 2016-01-22 | 2016-01-22 | Access control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107123178B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107680222A (en) * | 2017-09-30 | 2018-02-09 | 克立司帝控制系统(上海)有限公司 | Central-controlled door access control system and method based on distributed data base |
CN107945347A (en) * | 2017-12-08 | 2018-04-20 | 苏州高新文体集团有限公司 | A kind of personal identification method |
CN110599651A (en) * | 2019-09-11 | 2019-12-20 | 云南九机信息技术有限公司 | Access control system based on unified authorization center and control method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101620624A (en) * | 2009-08-13 | 2010-01-06 | 公安部第一研究所 | Method for synchronizing data between different databases under physical isolating condition |
CN102129478A (en) * | 2011-04-26 | 2011-07-20 | 广州从兴电子开发有限公司 | Database synchronization method and system thereof |
CN102393935A (en) * | 2011-07-08 | 2012-03-28 | 长沙赢行家网络科技有限公司 | Wireless inventory verification system based on database synchronization |
CN204303062U (en) * | 2014-12-08 | 2015-04-29 | 安朗杰安防技术(中国)有限公司 | A kind of many access control systems |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150235173A1 (en) * | 2014-02-18 | 2015-08-20 | David R. Hall | Automated Tracking-Number Based Administration of Access Codes |
-
2016
- 2016-01-22 CN CN201610044039.2A patent/CN107123178B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101620624A (en) * | 2009-08-13 | 2010-01-06 | 公安部第一研究所 | Method for synchronizing data between different databases under physical isolating condition |
CN102129478A (en) * | 2011-04-26 | 2011-07-20 | 广州从兴电子开发有限公司 | Database synchronization method and system thereof |
CN102393935A (en) * | 2011-07-08 | 2012-03-28 | 长沙赢行家网络科技有限公司 | Wireless inventory verification system based on database synchronization |
CN204303062U (en) * | 2014-12-08 | 2015-04-29 | 安朗杰安防技术(中国)有限公司 | A kind of many access control systems |
Also Published As
Publication number | Publication date |
---|---|
CN107123178A (en) | 2017-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10565809B2 (en) | Method, system and device for securing and managing access to a lock and providing surveillance | |
CN108475447B (en) | System and method for controlling access to a physical space | |
CN101329781B (en) | Access control system with rules engine architecture | |
CN104423370B (en) | Remote asset management service for industrial assets | |
CN101232203B (en) | Apparatus, methods and system for role-based access in an intelligent electronic device | |
US7356372B1 (en) | Facilities management system with programmable logic control | |
US7340314B1 (en) | Facilities management system with local display and user interface | |
CN101052970B (en) | Access control system and access control method | |
CN105900540B (en) | Data center's control method and system | |
US20050273444A1 (en) | Access administration system and method for a currency compartment | |
CN107123178B (en) | Access control system | |
CN104318650A (en) | Dynamic coded lock management and control system | |
US20090031397A1 (en) | Use management system | |
US11373472B2 (en) | Compact encoding of static permissions for real-time access control | |
US20080189797A1 (en) | Computer Workstation and Method | |
CN204390320U (en) | A kind of dynamic puzzle-lock system | |
JP2002021383A (en) | Article depository and article management system | |
CN204215457U (en) | A kind of control system | |
CN107862777A (en) | A kind of gate control system of comprehensive anti-anti-pass that can be offline | |
US20100223662A1 (en) | Programmable electronic access control system | |
CN110310073A (en) | A kind of operation system in mini storehouse | |
US20190122127A1 (en) | System and method for specifying rules for operational systems | |
JP4634198B2 (en) | Entrance / exit management system and entrance / exit management method | |
JP5775492B2 (en) | Entrance / exit management system | |
US11257310B2 (en) | Function module for an electronic access control |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |