CN107123178B - Access control system - Google Patents

Access control system Download PDF

Info

Publication number
CN107123178B
CN107123178B CN201610044039.2A CN201610044039A CN107123178B CN 107123178 B CN107123178 B CN 107123178B CN 201610044039 A CN201610044039 A CN 201610044039A CN 107123178 B CN107123178 B CN 107123178B
Authority
CN
China
Prior art keywords
access control
database
door
management module
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610044039.2A
Other languages
Chinese (zh)
Other versions
CN107123178A (en
Inventor
朱亚
李晋全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anlangjie Security Technology (china) Co Ltd
Original Assignee
Anlangjie Security Technology (china) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anlangjie Security Technology (china) Co Ltd filed Critical Anlangjie Security Technology (china) Co Ltd
Priority to CN201610044039.2A priority Critical patent/CN107123178B/en
Publication of CN107123178A publication Critical patent/CN107123178A/en
Application granted granted Critical
Publication of CN107123178B publication Critical patent/CN107123178B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

The invention provides an access control system, which is connected with a plurality of bottom access control systems and comprises an authority management module, a database module and an access control management module, wherein the authority management module is used for managing the user authority of the bottom access control systems; the database module is used for storing the equipment and user information of the plurality of bottom access control systems; and the door control management module is used for controlling the door opening and closing operations of the bottom layer door control systems. The invention can realize the unified management and control of a plurality of bottom access control systems.

Description

Access control system
Technical Field
The invention relates to the field of security, in particular to an access control management system in the field of security.
Background
At present, most of access control systems deployed in subways are relatively independent. For example, one set of access control system is deployed on the first subway line, the other set of access control system is deployed on the second subway line, and so on. The access control systems of all subway lines are independent of each other, and interaction is avoided under general conditions. Even if interaction exists, the system is docked with other platforms (such as a smart card or comprehensive monitoring), and integration or interaction of a plurality of subway line access control systems is not available. With the increasing of subway lines in a city, more and more access control users can purchase and deploy a plurality of access control systems. These access systems may be from the same manufacturer or may be from different manufacturers. Generally, a plurality of deployed access control systems are relatively closed, and there is no interaction between the access control systems, let alone can be uniformly managed and configured.
In this case, personnel management across different subway lines (e.g., the same user needs to access the doors of different access systems) can be cumbersome. Under the condition, card issuing authorization can be only carried out on each access control system one by one, so that tracking and recording cannot be well realized. In addition, when the number of such authorization conditions across the access control system increases, confusion is likely to occur, and management vulnerabilities are also likely to occur.
Because the access control systems are relatively closed and the access control systems of the subway lines are independent, it is very difficult to uniformly query and control the relevant information of all the subway line access control systems in a city. For example, it is very difficult and cumbersome to uniformly manage and maintain all subway line access control devices, card holders, and access control events. The statistical personnel need to go to the access control management system of each subway line to read data or carry out relevant operation, and the work load is difficult to imagine, and the operation is complicated and easy to produce careless omission. In addition, the comparison of the states of events and devices between different access control systems is difficult. Only relevant data can be exported from each access control management system, and then unified comparison is carried out. This is not only inefficient, but also prone to errors.
In addition, for access control management systems of different manufacturers and different versions, users need to arrange specially-assigned persons for learning, training, operation and maintenance, which also results in higher operation cost of the users.
Disclosure of Invention
The invention aims to provide an access control system which is connected with and manages a plurality of bottom access control systems, transmits information with each bottom access control system and uniformly manages and controls the bottom access control systems. Therefore, management and control of a plurality of bottom layer access control systems can be realized only by operating the access control system.
The invention provides an access control system, which is connected with a plurality of bottom access control systems and can comprise an authority management module, a database module and an access control management module, wherein the authority management module is used for managing the user authority of the bottom access control systems; the database module is used for storing the equipment and user information of the plurality of bottom access control systems; and the door control management module is used for controlling the door opening and closing operations of the bottom layer door control systems.
In a preferred embodiment, the database module includes a system database and an intermediate database, and the intermediate database is used for storing interaction information between the access control management system and the plurality of underlying access control systems. Further, the interaction information is packaged in a file in an XML format; or, the interaction information includes one or more of: authorization information, pre-authorization information, and a door control instruction.
The above-mentioned access control management system may further include an access control configuration management module and an access control event management module, wherein the access control configuration management module is configured to manage the devices and user information of the plurality of bottom layer access control systems, and the access control event management module is configured to manage the access control events of the plurality of bottom layer access control systems.
In a preferred embodiment, the access control system may further include an account management module, where the account management module is configured to manage account information of the access control system and the plurality of bottom-layer access control systems.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosure. The drawings illustrate embodiments of the disclosure and, together with the description, serve to explain the principles of the disclosure. The technical solutions of the present disclosure and their advantages will become apparent after reading the following examples of the present disclosure, which are not intended to be limiting. Wherein:
fig. 1 shows an operating environment of an access control system according to the present invention.
Fig. 2 is a schematic structural diagram of an access control system according to the present invention.
Fig. 3 is a schematic diagram illustrating data interaction between an access control system and a plurality of underlying access control systems according to an embodiment of the present invention.
Fig. 4 is a schematic diagram illustrating data interaction between an access control system and a plurality of underlying access control systems according to another embodiment of the present invention.
Detailed Description
Various technical features and advantageous details of the present disclosure are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Also, the following description omits descriptions of well-known raw materials, processing techniques, components, and apparatuses so as not to unnecessarily obscure the technical points of the present disclosure. However, those of ordinary skill in the art will appreciate that the description and specific examples, while indicating embodiments of the present disclosure, are given by way of illustration and not of limitation.
Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts. Further, although the terms used in the present disclosure are selected from publicly known and commonly used terms, some of the terms mentioned in the specification of the present disclosure may be selected by the disclosure person at his or her discretion, the detailed meanings of which are described in relevant parts of the description herein. Furthermore, it is required that the present disclosure is understood, not simply by the actual terms used but by the meaning of each term lying within.
Fig. 1 shows an operating environment of an access control system according to the present invention. The system comprises a server 101 and a workstation 102, wherein a database 103 is deployed on the server 101, and the database 103 is used for storing relevant data in an access control management system, including but not limited to: user information of the access control system, device information of a plurality of underlying access control systems (e.g., line 1 access control system 107, line 2 access control system 108, and business district access control system 109), and names, card numbers, authorities, access times, and the like of persons who come in and go out. The access control system is connected with a plurality of bottom access control systems through a network 106. The general user 105 can access relevant information within the scope of his authority, for example, through the workstation 102, and the administrator 104 can manage the access control system through the server 101, for example, configuring the corresponding authority for the user, viewing the device and user information of each underlying access control system, and the like. The access control system provided by the invention can run on the server 101 and the workstation 102, and is connected with the servers 101 of a plurality of bottom access control systems through the network 106, so that the management and control of each bottom access control system are realized.
Fig. 2 is a schematic structural diagram of an access control system according to an embodiment of the present invention. As shown in fig. 2, the access control system 200 may include a rights management module 201, an access control configuration management module 202, a database module 203, an access control management module 204, an access control event management module 205, and an account management module 206.
The right management module 201 may manage the access rights of all the bottom layer access control systems connected to the access control management system 200. For example, corresponding access rights are set for one or more users of a plurality of underlying access control systems, such as a user can enter or exit one or more doors within a specified time (e.g., 8 o 'clock-18 o' clock in a working day). In general, only the user with administrator's authority can set the authority of the underlying access control system through the authority management module 201.
The access control configuration management module 202 is configured and managed for a plurality of bottom access control systems. For example, device information, personnel information, historical events and the like of a plurality of underlying access control systems are checked, and relevant information is changed when the devices and personnel of the access control systems are changed.
Database module 203 may include a system database and an intermediate database. The system database may store related information of the access control system 200, such as an electronic map of all underlying access control systems connected to the access control system 200, device information, and user information (e.g., names and permissions of people coming in and going out). When other functional modules (such as a right management module, an access configuration management module, a door control management module, an access event management module, and an account management module) interact with a user, it may be necessary to read information from the system database or write information into the system database. The system database may also provide statistical functionality to the user, such as statistics or import/export of specific data or reports, and the like. Meanwhile, the system database can also provide data backup when the bottom layer access control system fails or is subjected to an unrecoverable disaster, so that the normal operation of the bottom layer access control system is ensured.
The intermediate database is used to assist the access control system 200 in authorizing the access control system at the bottom layer. Referring to fig. 2 and 3, in one embodiment, one or more underlying access control systems 303 first upload personnel to be changed (e.g., stored in an underlying database 304) and corresponding authorization data to the staging database 302; the right management module 201 stores the corresponding authorization change information into the intermediate database 302 according to the data, the corresponding bottom-layer access control system 303 reads the authorization change information from the intermediate database 302 and executes corresponding operations, and then the operation result (success or failure) is updated to the intermediate database 302 so that the access control system 200 can know the operation result; if the operation is successful, the intermediate database 302 transmits the corresponding authorization information to the system database 301 to update the information of the database. In this way, the access control system 200 can implement rights management for the underlying access control system 303.
The bottom-level access control system 303 may obtain the new authorization information in the intermediate database 302 by detecting the intermediate database 302 at regular time, or may actively notify the corresponding bottom-level access control system 303 after the access control management system 200 saves the relevant information. Similarly, the door access management system 200 may also periodically check the staging database 302 to obtain the operation results.
In another embodiment, the access management system 200 may determine whether one or more underlying access systems 303 are authorized, wherein the authorized functions include direct authorization or pre-authorization. In the direct authorization mode, one or more authorized underlying access control systems 303 may directly manage rights-related operations in the access control system. After the authorization information of the access control system is changed, the bottom-layer access control system 303 further needs to store the changed authorization information in the intermediate database 302 to notify the access control management system 200 to update.
In the pre-authorization mode, one or more bottom layer access control systems 303 store the changed pre-authorization information in the intermediate database 302, the access control management system 200 obtains the pre-authorization information and performs an audit on the pre-authorization information, then the audit result is fed back to the intermediate database 302, and the corresponding bottom layer access control system 303 performs a corresponding authorization or authorization cancellation operation according to the audit result.
In a preferred embodiment, the data stored in the intermediate database 302, such as the authorization change information, the pre-authorization information, the audit result, etc., may be a file (e.g., an XML file) with a specified format for the convenience of packaging and parsing.
The door control management module 204 is configured to send a door control command, such as a door opening or closing command, to one or more underlying door control systems. The transmission mode of the door control command can be the same as or different from the authorization information. For example, the door control instructions may be packaged in a file of a specified format and stored in an intermediate database for detection and reading by the various underlying door control systems.
In another embodiment, as shown in fig. 2 and 4, the door command may be sent directly by the door management module 204 to one or more underlying door access systems 402 without forwarding or dumping via other intermediary components. In this way, the access control system 200 can perform access control management on each underlying access control system 402. The bottom access control systems are independent from each other and are not interactive.
The access control event management module 205 is configured to manage access control events of a plurality of bottom-layer access control systems, for example, check various events (for example, swiping a card to open a door) of each bottom-layer access control system in real time, monitor the device state of each bottom-layer access control system and the situation of entering and exiting of related personnel, and thus, for example, draw a movement trajectory of the personnel.
The account management module 206 is configured to manage account information of the access control system 200, and set corresponding operation permissions for the accounts. For example, the administrator account may view and configure other account information, use all functions of the access control system 200, and set relevant information of all bottom-layer access control systems connected to the access control system 200 (e.g., set user permissions, send access control instructions, etc.); the user of each bottom layer access control system may also have a restricted account of the access control management system 200, and the restricted account may only view or configure information related to the respective access control system.
Those skilled in the art can understand that the access control management system related to the present invention may include, for example, the right management module, the database module and the door control management module, instead of the above six modules, the right management module, the door control configuration management module, the database module, the door control event management module and the account management module, and the related functions of the door control configuration management module, the door control event management module and the account management module are implemented by the door control management module. Of course, the access control system may also include one or more of an access control configuration management module, an access control event management module, and an account management module.
While several embodiments of the present invention have been described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, substitutions and modifications will occur to those skilled in the art without departing from the scope of the invention. It is intended that the following claims define the scope of the invention and that methods and structures within the scope of these claims and their equivalents be covered thereby.

Claims (6)

1. An entrance guard management system is connected with a plurality of bottom entrance guard systems and comprises an authority management module, a database module and an entrance guard management module, wherein,
the authority management module is used for managing the user authority of the plurality of bottom layer access control systems;
the system comprises a database module, an intermediate database, a plurality of bottom access control systems and an operation result updating module, wherein the database module is used for storing equipment and user information of the bottom access control systems, the database module comprises a system database and an intermediate database, the intermediate database is used for assisting the access control management systems to realize authority authorization of the bottom access control systems, the authority authorization change information is stored in the authority management module and comprises personnel needing to be changed and corresponding authorization data, the corresponding bottom access control systems in the bottom access control systems are read from the intermediate database, corresponding operation is executed, and then the operation result is updated to the intermediate database:
the plurality of bottom access control systems can acquire newly-added authorization information by detecting the intermediate database at regular time, in the direct authorization mode, the authorized bottom access control systems can directly manage the authority related operation in the access control system, and after the authorization information of the access control system is changed, the changed authorization information is stored in the intermediate database to inform the access control management system to update, in the pre-authorization mode, one or more bottom access control systems store the changed pre-authorization information in the intermediate database, the access control management system acquires the pre-authorization information and audits the pre-authorization information, then the audit result is fed back to the intermediate database, and the corresponding bottom access control system executes corresponding authorization or authorization cancelling operation according to the audit result; and
the door control management module is used for controlling door opening and closing operations of the bottom layer door control systems.
2. The door access management system of claim 1, wherein the database module comprises a system database and an intermediate database, and the intermediate database is used for storing interaction information between the door access management system and the plurality of underlying door access systems.
3. The access control management system of claim 2, wherein the interaction information comprises one or more of: authorization information, pre-authorization information, and a door control instruction.
4. The door access management system of claim 1, further comprising a door access configuration management module and a door access event management module, wherein the door access configuration management module is configured to manage the device and user information of the plurality of bottom layer door access systems, and the door access event management module is configured to manage the door access events of the plurality of bottom layer door access systems.
5. Entrance guard management system according to claim 2 or 3, the mutual information is encapsulated in a file in XML format.
6. The access control management system of any one of claims 1-4, further comprising an account management module, the account management module being configured to manage account information of the access control management system and the plurality of underlying access control systems.
CN201610044039.2A 2016-01-22 2016-01-22 Access control system Active CN107123178B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610044039.2A CN107123178B (en) 2016-01-22 2016-01-22 Access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610044039.2A CN107123178B (en) 2016-01-22 2016-01-22 Access control system

Publications (2)

Publication Number Publication Date
CN107123178A CN107123178A (en) 2017-09-01
CN107123178B true CN107123178B (en) 2019-12-31

Family

ID=59716972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610044039.2A Active CN107123178B (en) 2016-01-22 2016-01-22 Access control system

Country Status (1)

Country Link
CN (1) CN107123178B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107680222A (en) * 2017-09-30 2018-02-09 克立司帝控制系统(上海)有限公司 Central-controlled door access control system and method based on distributed data base
CN107945347A (en) * 2017-12-08 2018-04-20 苏州高新文体集团有限公司 A kind of personal identification method
CN110599651A (en) * 2019-09-11 2019-12-20 云南九机信息技术有限公司 Access control system based on unified authorization center and control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101620624A (en) * 2009-08-13 2010-01-06 公安部第一研究所 Method for synchronizing data between different databases under physical isolating condition
CN102129478A (en) * 2011-04-26 2011-07-20 广州从兴电子开发有限公司 Database synchronization method and system thereof
CN102393935A (en) * 2011-07-08 2012-03-28 长沙赢行家网络科技有限公司 Wireless inventory verification system based on database synchronization
CN204303062U (en) * 2014-12-08 2015-04-29 安朗杰安防技术(中国)有限公司 A kind of many access control systems

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150235173A1 (en) * 2014-02-18 2015-08-20 David R. Hall Automated Tracking-Number Based Administration of Access Codes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101620624A (en) * 2009-08-13 2010-01-06 公安部第一研究所 Method for synchronizing data between different databases under physical isolating condition
CN102129478A (en) * 2011-04-26 2011-07-20 广州从兴电子开发有限公司 Database synchronization method and system thereof
CN102393935A (en) * 2011-07-08 2012-03-28 长沙赢行家网络科技有限公司 Wireless inventory verification system based on database synchronization
CN204303062U (en) * 2014-12-08 2015-04-29 安朗杰安防技术(中国)有限公司 A kind of many access control systems

Also Published As

Publication number Publication date
CN107123178A (en) 2017-09-01

Similar Documents

Publication Publication Date Title
US10565809B2 (en) Method, system and device for securing and managing access to a lock and providing surveillance
CN108475447B (en) System and method for controlling access to a physical space
CN101329781B (en) Access control system with rules engine architecture
CN104423370B (en) Remote asset management service for industrial assets
CN101232203B (en) Apparatus, methods and system for role-based access in an intelligent electronic device
US7356372B1 (en) Facilities management system with programmable logic control
US7340314B1 (en) Facilities management system with local display and user interface
CN101052970B (en) Access control system and access control method
CN105900540B (en) Data center's control method and system
US20050273444A1 (en) Access administration system and method for a currency compartment
CN107123178B (en) Access control system
CN104318650A (en) Dynamic coded lock management and control system
US20090031397A1 (en) Use management system
US11373472B2 (en) Compact encoding of static permissions for real-time access control
US20080189797A1 (en) Computer Workstation and Method
CN204390320U (en) A kind of dynamic puzzle-lock system
JP2002021383A (en) Article depository and article management system
CN204215457U (en) A kind of control system
CN107862777A (en) A kind of gate control system of comprehensive anti-anti-pass that can be offline
US20100223662A1 (en) Programmable electronic access control system
CN110310073A (en) A kind of operation system in mini storehouse
US20190122127A1 (en) System and method for specifying rules for operational systems
JP4634198B2 (en) Entrance / exit management system and entrance / exit management method
JP5775492B2 (en) Entrance / exit management system
US11257310B2 (en) Function module for an electronic access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant