CN108734813A - The distribution method and device of Temporary Access Control Card - Google Patents

The distribution method and device of Temporary Access Control Card Download PDF

Info

Publication number
CN108734813A
CN108734813A CN201710255812.4A CN201710255812A CN108734813A CN 108734813 A CN108734813 A CN 108734813A CN 201710255812 A CN201710255812 A CN 201710255812A CN 108734813 A CN108734813 A CN 108734813A
Authority
CN
China
Prior art keywords
user
access control
control card
attribute information
temporary access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710255812.4A
Other languages
Chinese (zh)
Other versions
CN108734813B (en
Inventor
卓松
李俊聪
朱佳
范铭
彭诗辉
贾镕企
罗挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710255812.4A priority Critical patent/CN108734813B/en
Publication of CN108734813A publication Critical patent/CN108734813A/en
Application granted granted Critical
Publication of CN108734813B publication Critical patent/CN108734813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Abstract

The present invention proposes a kind of distribution method and device of Temporary Access Control Card, wherein method includes:Obtain the verification information for being verified to user identity and verification;The attribute information of user is obtained after being verified;According to the attribute information of user Temporary Access Control Card is provided to user;Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.After being verified as a result, by the verification information verified to user identity, there is the temporary card of different access permissions for different user granting, simple and convenient, accuracy is high, to improve the safety of Temporary Access Control Card granting.

Description

The distribution method and device of Temporary Access Control Card
Technical field
The present invention relates to technical field of information processing more particularly to the distribution methods and device of a kind of Temporary Access Control Card.
Background technology
In enterprise's scene, the case where employee leaves behind access card, is all occurring daily, and employee gets interim gate inhibition in application When card, mainly by registering essential information manually on foreground, provided after then being verified to the identity of employee by foreground personnel One Temporary Access Control Card.
It is existing that Temporary Access Control Card is manually provided for employee by foreground, it is understood that there may be to be difficult to correctly identify worker or knowledge Wrong situation does not happen occasionally, and leading to Temporary Access Control Card granting, there are prodigious security risks.
Invention content
The present invention proposes a kind of distribution method and its device of Temporary Access Control Card, is manually member for solving existing by foreground Work provides Temporary Access Control Card, it is understood that there may be is difficult to correctly identify that worker or the situation of identification mistake happen occasionally, cause There is prodigious security risk in Temporary Access Control Card granting.
First aspect present invention embodiment proposes a kind of distribution method of Temporary Access Control Card, includes the following steps:It obtains Verification information for being verified to user identity and verification;The attribute information of the user is obtained after being verified;Root According to the attribute information of the user Temporary Access Control Card is provided to the user;Wherein, what the user of different attribute got is interim Access card has different access permissions.
Second aspect of the present invention embodiment proposes a kind of distribution method of Temporary Access Control Card, including:Server will be used for The Quick Response Code verified to user identity is sent to first terminal;The first terminal is shown the Quick Response Code by screen To user so that the user scans the Quick Response Code by second terminal;The second terminal is by the Quick Response Code after scanning The server is sent to be verified;The server obtained after being verified the user attribute information issue it is described First terminal;The first terminal provides Temporary Access Control Card according to the attribute information of the user to the user;Wherein, different The Temporary Access Control Card that the user of attribute gets has different access permissions.
Third aspect present invention embodiment proposes a kind of first terminal, including:Authentication module, for obtain for Verification information that family identity is verified and verification;Acquisition module, the attribute for obtaining the user after being verified are believed Breath;Module is provided, for providing Temporary Access Control Card to the user according to the attribute information of the user;Wherein, different attribute The Temporary Access Control Card that gets of user there is different access permissions.
Fourth aspect present invention embodiment proposes a kind of access card delivery system, including:Server, for that will be used for pair The Quick Response Code that user identity is verified is sent to first terminal, receives the two dimension that second terminal used by a user is sent Code is simultaneously verified, and the attribute information that the user is obtained after being verified is handed down to the first terminal;Described first eventually End, for receiving the Quick Response Code and the Quick Response Code being shown to user so that the user passes through second terminal by screen It scans the Quick Response Code, and receives the attribute for the user that the server issues after to being verified of the user Information, and Temporary Access Control Card is provided to the user according to the attribute information of the user;The second terminal, for scanning It states Quick Response Code and is sent to the server and verified;Wherein, the Temporary Access Control Card that the user of different attribute gets has Different access permissions.
Technical solution provided in an embodiment of the present invention can include the following benefits:
After being verified by the verification information verified to user identity, have not for different user granting Simple and convenient with the temporary card of access permission, accuracy is high, to improve the safety of Temporary Access Control Card granting.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description Obviously, or practice through the invention is recognized.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein:
Fig. 1 is a kind of flow diagram of the distribution method of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of the distribution method of second of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram provided in an embodiment of the present invention for obtaining facial image;
Fig. 4 is the process schematic that an image provided in an embodiment of the present invention uploads;
Fig. 5 is the flow diagram of the distribution method of the third Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of Quick Response Code display mode provided in an embodiment of the present invention;
Fig. 7 is the flow diagram of the distribution method of the 4th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 8 is the flow diagram of the distribution method of the 5th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 9 is a kind of flow diagram of the acquisition methods of current access permission provided in an embodiment of the present invention;
Figure 10 is the flow diagram of the distribution method of the 6th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Figure 11 is the schematic diagram that the different flow of selection provided in an embodiment of the present invention carries out authentication;
Figure 12 is the flow diagram of the distribution method of the 7th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Figure 13 is a kind of flow diagram of the recognition methods of Temporary Access Control Card provided in an embodiment of the present invention;
Figure 14 is the flow diagram of the recognition methods of another Temporary Access Control Card provided in an embodiment of the present invention;
Figure 15 is the flow interaction figure that a Temporary Access Control Card of the embodiment of the present invention is handled;
Figure 16 (a) is the validation of information schematic diagram of the embodiment of the present invention;
Figure 16 (b) is the schematic diagram of the input extension number of the embodiment of the present invention;
Figure 16 (c) is the notification information schematic diagram of the embodiment of the present invention;
Figure 17 is a kind of structural schematic diagram of first terminal provided in an embodiment of the present invention;
Figure 18 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention;
Figure 19 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention;
Figure 20 is the structural schematic diagram of another entrance guard recognition device provided in an embodiment of the present invention;
Figure 21 is a kind of structural schematic diagram of first terminal provided in an embodiment of the present invention;
Figure 22 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention;
Figure 23 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Below with reference to the accompanying drawings the distribution method and device of the Temporary Access Control Card of the embodiment of the present invention are described.
Specifically, whether in living scene, owner leaves behind access card, needs to believe by the way that registration is basic manually at entrance guard Breath provides a Temporary Access Control Card after then being verified to owner's identity by entrance guard, owner can by the Temporary Access Control Card Into flat building and the corresponding floor that takes a lift;Or in enterprise's scene, employee leaves behind access card, needs to pass through Foreground personnel provide a Temporary Access Control Card after being verified to the identity of employee, and employee can be entered by the Temporary Access Control Card Office building and corresponding office.
Therefore, the user for leaving behind access card for convenience needs to provide Temporary Access Control Card to it.The present invention provides one kind The distribution method of Temporary Access Control Card, it should be noted that compared with the granting Temporary Access Control Card method of the prior art, the present embodiment Manually user identity need not be verified, accuracy higher, and there are different access permissions for different user granting Temporary card, it is safe.
For ease of description, the interim of end side (such as self-service pusher side) the description embodiment of the present invention is concentrated on first below The distribution method of access card.
It should be noted that the terminal in the present embodiment can be laid on enterprise's office building, residential building etc..
Specifically, Fig. 1 is the flow diagram of the distribution method of the first Temporary Access Control Card provided in an embodiment of the present invention. As shown in Figure 1, the distribution method of the Temporary Access Control Card includes the following steps:
S101 obtains the verification information for being verified to user identity and verification.
Specifically, it when verifying user identity, needs to obtain the verification information for verifying user identity, and Verification information is verified.It should be noted that according to concrete application scene difference use can be obtained in different ways In the verification information and verification verified to user identity, it is illustrated below:
The first example, the facial image that user is acquired by photographic device is used as verification information, by the face figure of user As being matched with the facial image in face database, if the first user in the facial image and face database of user When first matching degree of facial image is more than preset first numerical value, then pass through the verification to user identity.
Second of example generates Quick Response Code by the server for the application program installed, Quick Response Code is shown by screen Show to user, so that user is by the application scan Quick Response Code on mobile terminal and the mark generation of mobile terminal is combined to test Card information is issued server and is verified.
The third example, the voice messaging that user is acquired by sound pick up equipment are used as verification information, and the voice of user is believed Breath is matched with the voice messaging in speech database, if second user in the voice messaging and speech database of user When second matching degree of voice messaging is more than preset second value, pass through the verification to user identity.
4th kind of example, the ID card information that acquisition user is scanned by scanning means are used as verification information, inquire data Then pass through the verification to user identity if there is ID card information with the presence or absence of ID card information in library.
5th kind of example inputs identity information related to user by the dummy keyboard carried on terminal screen, such as Then the information such as identity card, cell-phone number inquire database as verification information, if there is above-mentioned verification information, then by right The verification of user identity.For example, when user is a visitor, a reservation code can be exported by dummy keyboard and be used as verification Information.When user is zooid's working hour, ID card information or the phone number that itself can be inputted with dummy keyboard are used as and test Demonstrate,prove information.
It should be noted that the verification information and verification mode to acquisition for being verified to user identity are only above For example, can be selected and be adjusted according to the actual application.
S102 obtains the attribute information of user after being verified.
Specifically, after being verified, in order to accurately provide Temporary Access Control Card to user, then the attribute for obtaining user is needed Information.Wherein it is possible to according to practical application scene needs, different verification modes is selected, using different verification modes, is obtained The attribute information of user is different, is illustrated below:
The first example, for facial image as verification information, the attribute information for obtaining user includes from face database The attribute information for obtaining the first user, using the attribute information of the first user as the attribute information of user.
Second of example, application scan Quick Response Code are verified and the mark of mobile terminal are combined to generate verification information, obtain The attribute information for taking family includes the attribute information for receiving the user that server is sent after being verified, the wherein attribute of user Information is got according to the mark of mobile terminal by server.
The third example, for voice messaging as verification information, the attribute information for obtaining user includes from speech database The attribute information for obtaining second user, using the attribute information of second user as the attribute information of user.
4th kind of example, for ID card information as verification information, the attribute information for obtaining user includes acquisition and identity card The attribute information of the corresponding third user of information, using the attribute information of third user as the attribute information of user.
It should be noted that with upper type be only when be verified after acquisition user attribute information for example, can To select or be arranged according to the actual application in a manner of others.
S103 provides Temporary Access Control Card, wherein the user of different attribute gets according to the attribute information of user to user Temporary Access Control Card have different access permissions.
Specifically, it after the attribute information for obtaining user, needs to provide interim door to user according to the attribute information of user Prohibit card.After determining the corresponding access permission of user according to attribute information, the interim gate inhibition of corresponding permission is sent to user Card.The safety of Temporary Access Control Card transmission is further increased as a result,.
It should be noted that can be believed in different ways according to the attribute of user according to practical application scene needs It ceases to user and provides Temporary Access Control Card, be illustrated below:
The first example pre-sets the correspondence between the attribute information querying attributes of user and access permission, into And according to the attribute information of user, it inquires the correspondence and obtains corresponding target access permission.Further, according to target door Prohibit permission and Temporary Access Control Card be generated for user, by access card with entity card or virtual card (can mobile terminal etc. just Take in equipment and show) form to user provide Temporary Access Control Card.
Second of example is prestored and is obtained after determining the attribute information of user with the relevant Processing Algorithm of attribute information The relevant parameter of Processing Algorithm for taking and prestoring is calculated, and determines target access permission corresponding with the attribute information, and Temporary Access Control Card is generated for user according to target access permission, access card (can moved with entity card or virtual card Being shown in the portable equipments such as dynamic terminal) form provides Temporary Access Control Card to user.
It should be noted that being only the citing for providing Temporary Access Control Card to user according to the attribute information of user with upper type Illustrate, can select or be arranged other modes according to the actual application.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, passes through what is verified to user identity After verification information is verified, there is the temporary card of different access permissions for different user granting, it is simple and convenient, Accuracy is high, to improve the safety of Temporary Access Control Card granting.
Based on above example, in order to which more clearly how description obtains the verification for being verified to user identity Information is simultaneously verified, and the attribute information of user is obtained after being verified, is described as follows by Fig. 2-embodiment illustrated in fig. 6:
Fig. 2 is the flow diagram of the distribution method of second of Temporary Access Control Card provided in an embodiment of the present invention.
The present embodiment is according to facial image as verification information, by the facial image in facial image and face database Carry out matching be verified after, attribute information of the attribute information as user of the first user is obtained from face database.
It illustrates as shown in Fig. 2, the step S101 i.e. in above-described embodiment includes:S201-S203;Step S102 packets It includes:S204-S205.
S201, the facial image that user is acquired by photographic device are used as verification information.
S202 matches the facial image of user with the facial image in face database.
S203, when the first matching degree of the facial image of the first user in the facial image and face database of user is more than When preset first numerical value, then pass through the verification to user identity.
Specifically, photographic device is provided on self-service machine, user can trigger photographic device by modes such as manual, voices It starts to work, and acquires the facial image of user as verification information.Wherein, the mode that photographic device obtains facial image has very It is a variety of, selection setting can be carried out according to the actual application.
As a kind of way of realization, as shown in figure 3, photographic device reaches predeterminable area in the face for detecting active user When, triggering positioning lamp lights, and prompts the eyes of active user to look at positioning lamp straight in preset time, and in the eyes of active user Corresponding facial image is acquired during direct-view positioning lamp.Wherein, predeterminable area is pre-set can to carry out facial knowledge Other region, the i.e. face of active user, which enter in the predeterminable area, indicates that facial recognition modules can start collecting work.
In turn, the facial image of acquisition is matched with the facial image in face database.Wherein, face database It builds and stores in advance.In the present embodiment, according to preset first database construction strategy, face number is built in advance According to library.
It should be noted that be at least stored in face database the facial image of the first user, the first user attribute Correspondence between information and the facial image and the attribute information of the first user of the first user.
It should be noted that according to different application scenarios, the first data construction strategy difference is to ensure information security And recognition efficiency.As an example with enterprise's scene, the form that institutional framework grouping may be used carries out construction strategy, first It accesses Human Resource Department's interface to obtain the attribute informations such as name, institutional framework and the head portrait of employee and preserve, then by employee's group Structure duplicate removal (for example employee A had not only belonged to institutional framework B but also belonged to institutional framework C, and A employee, which is belonged to institutional framework C, to delete) is knitted, Create face database according to institutional framework, finally employee information traversed, according to institutional framework, by the name of employee and Head portrait is created in the corresponding face database of organizational structure.
In practical applications, it such as in above-mentioned enterprise's scene, there are employee's change conditions, needs periodically to human face data Library is updated, to ensure the safety of Temporary Access Control Card granting.Continue with enterprise's scene as an example, from related data All employees of the previous day record are obtained in library, then obtain current employee's record, the person of comparison by accessing Human Resource Department's interface Whether the institutional framework of work has altered, and in the case where having altered, needs to be updated employee information, while comparing employee's shape State always deletes Personnel Who Left from face database, will be in rigid entrant update to face database.
Wherein, can be periodically one day, two days etc., selection setting according to the actual application.
Specifically, in recognition of face, the facial image of user is matched with the facial image in face database, The facial image characteristic of user is matched with the facial image characteristic in face database, is known if comparing Matching result is more than preset first numerical value, it is determined that the identity of active user has legitimacy, such as first numerical value can be with It is 95%.
Further, it is at least stored with the attribute information of the first user in face database, can also include the first user Other information, for example, the essential informations such as phone number, ID card information, extension number, age, gender.Wherein, the hand of user Machine number, ID card information, extension number etc. can be as the identification informations of user.
When the first matching degree of the facial image of the first user in the facial image and face database of user is no more than in advance If the first numerical value when, then by specifically including following steps to the verification of user identity:
Obtain the identification information of user.For example in above-mentioned enterprise's scene, further user can be required to input other Identification information, can be user base extension number or phone number, to determine corresponding first user of the user.
After getting the identification information of user, the identification information that can will be got is used in face database first The identification information at family is compared, and when the identification information of the two is consistent, then can pass through the verification to user identity.
For example, user's input handset number can be prompted, in order to further increase the accuracy of authentication, upper When the identification information both stated is consistent, further according to the phone number of the input of user, send a wechat to user hand On machine, user carries out secondary-confirmation by the link in wechat, after being determined as user after being identified through, then by user The verification of identity.In the present embodiment, the secondary verification of phone number is introduced on the basis of recognition of face, is changed traditional single Recognition mode provides more rich application scenarios, safety higher for identification.
It should be noted that when user is in the case of recognition of face failure, further other manner is selected to be verified By rear, user can be reminded to upload newest head portrait, user actively to user's pushed information (being not limited to short message, wechat form) Head portrait upload operation can be directly carried out by the link in pushed information, promotes face verification discrimination next time.
Fig. 4 is the process schematic that an image provided in an embodiment of the present invention uploads, as shown in Figure 4:
Specifically, it after user opens pushed information link by point, shows as shown in left side interface in Fig. 4 in front of the user, Remind user in order to occur the case where promoting self-service machine recognition of face accuracy, that is, avoid recognition failures next time, user can be with It clicks " upload pictures " and uploads and meet pictures without a hat on, without requirements such as ink marks, clear and uniform lights.It clicks and " uploads in user After photo ", suitable photo upload can be selected, the result of upload is as shown in Fig. 4 intermediate interfaces, and user is by click " in confirmation Pass " photo upload is completed, display uploads successfully interface, on the right of Fig. 4 shown in interface.It is understood that interface between in Fig. 4 Shown, user can also click on " taking pictures again ", and the photo of user in real is uploaded, and further promotes face and knows Other accuracy.
In the present embodiment, a closed loop can be formed during recognition of face, after recognition can with proactive notification, and And may remind the user that and upload nearest user's facial image, it allows entire identification process to form closed loop, improves recognition efficiency.
It should be noted that when the two identification information is inconsistent, it is determined as non-user.
In practical application as two the first users similar there are two looks in face database, when by the people of user When face image is matched with the facial image in face database, so that it may the facial image of user and two first can occur First matching degree of the facial image of user exceeds the case where preset first numerical value, at this point, in order to improve Temporary Access Control Card hair The accuracy put needs the other information for further verifying user, such as can be four, extension set after the phone number of user Number etc., to determine the first user corresponding to the user in two the first users.For example, there are two the first user A by user X And B, then the extension of user X inputs is 4567, and the extension of the first user A is 0123 in face database, and The extension of first user B is 4567, then can determine that user X is corresponding with the first user B, i.e., by the category of the first user B Attribute information of the property information as user X.
S204 obtains the attribute information of the first user from face database.
S205, using the attribute information of the first user as the attribute information of user.
Specifically, after being verified, that is, the facial image of facial image and the user X in face database is determined Match, the attribute information of user X is obtained from face database.Getting the attribute information of the first user and as user Attribute information.
In the present embodiment, by taking enterprise's scene as an example, attribute information can be the post type of user, or user's Employee's type etc..Can be the different rank of different post settings, different ranks can correspond to different in the present embodiment Access permission.Different posies may include occurrences in human life post, administrative post etc..Alternatively, can be that different employee's types is arranged Different ranks, employee's type may include:Sales force, administrative staff etc..For another example user is further divided into office worker Work carries out employee or visitor etc., and the relevant information and image of visitor can also be prestored in face database.
As an example, corresponding access permission is arranged according to position level, for example common staff has unlatching The permission of place office door;Line manager has the permission for opening all office doors of department.In addition also directed to difference The corresponding access permission of Department formation, such as the employee of administrative department have the permission for opening meeting room door;Research and development department has Open the permission of laboratory door.And it can be arranged with the permission etc. into company's gate and elevator for visitor.
Fig. 5 is the flow diagram of the distribution method of the third Temporary Access Control Card provided in an embodiment of the present invention.
The present embodiment is according to application scan Quick Response Code and the mark generation verification information of mobile terminal to be combined to issue Server authentication, and server gets the attribute information of user according to the mark of mobile terminal after being verified.
It illustrates as shown in figure 5, the step S101 i.e. in above-described embodiment includes:S301-S302;Step S102 packets It includes:S303.
S301 generates Quick Response Code by the server for the application program installed.
S302, by Quick Response Code by screen display to user, so that user passes through the application scan on mobile terminal The mark generation verification information of Quick Response Code and combination mobile terminal is issued server and is verified.
Specifically, the information such as belonging positions, itself title and a random number are supplied to the application of installation by self-service machine The server of program, server encode above- mentioned information, generate the Quick Response Code with chained address by screen display to use Family, as shown in Figure 6.
In turn, user can (mobile phone as shown in Figure 6 can also be tablet computer, smartwatch by second terminal Deng) application program (wechat as shown in FIG. 6 can also be QQ etc.) scan the two-dimensional code, and combine mobile terminal mark (no With the corresponding mobile terminal of user mark it is different, so can determine that the uniqueness of user) generate verification information and issue clothes Business device is verified.
Specifically, server is able to verify that whether the permission of mobile terminal, i.e. user have access rights according to verification information.
S303 receives the attribute information for the user that server is sent after being verified;The attribute information of wherein user is It is got according to the mark of mobile terminal by server.
Specifically, after server authentication passes through, the attribute information of the user of server transmission can be received, that is, is serviced According to the corresponding user of the identifier lookup of mobile terminal, and obtain its attribute information.
In the present embodiment, server can in advance be acquired the essential information of user, such as the attribute information of user, The essential informations such as phone number, the identification code of mobile terminal, ID card information, extension number, age, gender are acquired.With enterprise For industry scene, enterprise can register a public platform in the server, and employee can pay close attention to the public platform, then fill out It is written from oneself essential information, this completes the information collections to employee.Further, the user of visitor's class can also be to this Public platform is paid close attention to, and then selection preengages and fills in relevant essential information under public platform.
Fig. 7 is the flow diagram of the distribution method of the 4th kind of Temporary Access Control Card provided in an embodiment of the present invention.
The present embodiment be using voice messaging as verification information, by the voice messaging in voice messaging and speech database into After row matching is verified, attribute information of the attribute information of second user as user is obtained from speech database.
It illustrates as shown in fig. 7, the step S101 i.e. in above-described embodiment includes:S401-S203;Step S402 packets It includes:S404-S405.
S401, the voice messaging that user is acquired by sound pick up equipment are used as verification information.
S402 matches the voice messaging of user with the voice messaging in speech database.
S403, when the second matching degree of the voice messaging of second user in the voice messaging and speech database of user is more than When preset second value, pass through the verification to user identity.
Specifically, sound pick up equipment is provided on self-service machine, user can trigger sound pick up equipment by the modes such as manual and start Work, and acquire user voice messaging (such as user according to interface provide text read aloud one section words or be at will to say one section Words) it is used as verification information.
In turn, the voice messaging of acquisition is matched with the voice messaging in voice messaging library.More specifically, passing through language Message breath is handled, and vocal print feature is then extracted, and establishes related sound-groove model, and last vocal print is compared to determine whether to match. And the second matching degree of the voice messaging of second user is more than preset second in the voice messaging and speech database of user Pass through the verification to user identity when numerical value.
Wherein, speech database builds and stores in advance.In the present embodiment, according to preset second database Construction strategy builds speech database in advance.
It should be noted that be at least stored in speech database the voice messaging of second user, second user attribute Correspondence between the attribute information of the voice messaging and second user of information and second user.
It should be noted that according to different application scenarios, the second data construction strategy difference is to ensure information security And recognition efficiency.Second data construction strategy can be identical as the first data construction strategy, can be built according to institutional framework Speech database, the building process about speech database can be found in the building process of face database, and details are not described herein again.
Further, it is at least stored with the attribute information of second user in speech database, can also include second user Other information, for example, the essential informations such as phone number, ID card information, extension number, age, gender.Wherein, the hand of user Machine number, ID card information, extension number etc. can be as the identification informations of user.
When the second matching degree of the voice messaging of second user in the voice messaging and speech database of user is more than default Second value when, then by specifically including following steps to the verification of user identity:
Obtain the identification information of user.For example in above-mentioned enterprise's scene, further user can be required to input other Identification information, can be user base extension number or latter four of phone number, to determine the user corresponding the Two users.
After getting the identification information of user, the identification information that can will be got is used in speech database second The identification information at family is compared, and when the identification information of the two is consistent, then can pass through the verification to user identity.
There are similar two second users of two voices in practical application, when by the voice messaging and voice data of user When voice messaging in library is matched, so that it may the facial image of the facial image of user and two second users can occur Second matching degree exceeds the case where preset second value, at this point, in order to improve the accuracy of Temporary Access Control Card granting, need into It verifies to one step the other information of user, such as can be four after the phone number of user, extension etc., to two the Second user corresponding to the user is determined in two users.For example, user X is there are two second user C and D, then user X inputs Extension is 4567, and the extension of second user C is 0123 in face database, and the extension number of second user D Code is 4567, then can determine that user X is corresponding with second user D, i.e., using the attribute information of second user D as user X's Attribute information.
It is understood that if in the voice messaging and speech database of user the voice messaging of second user second When matching degree is no more than preset second value, do not pass through the verification to user identity.
S404 obtains the attribute information of second user from speech database.
S405, using the attribute information of second user as the attribute information of user.
Specifically, after being verified, that is, the voice messaging of facial image and the user Y in speech database is determined Match, the attribute information of user Y is obtained from speech database, and as the attribute information of user.About attribute information The record that can be found in related content in embodiment in above-described embodiment is introduced, details are not described herein again.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, by different modes to user identity After the verification information verified is verified, there is the temporary card of different access permissions, behaviour for different user granting Make simple and convenient, accuracy height, to the efficiency for improving Temporary Access Control Card granting, safe, reduction cost of labor.
Fig. 8 is the flow diagram of the distribution method of the 5th kind of Temporary Access Control Card provided in an embodiment of the present invention, in step After S102, the distribution method of the Temporary Access Control Card further includes:
S501 is obtained according to the correspondence between the attribute information querying attributes and access permission of user with user's The corresponding target access permission of attribute information.
Specifically, different attribute-bits is set for different attributes in advance, and not for different access permission settings Same capability identification utilizes the correspondence between attribute-bit and capability identification structure attribute and permission.Further, this is right Further include the storage address of permission in should being related to, i.e., stored in the corresponding memory space of storage address have permission it is specific in Hold.That is, correspondence includes the mapping relations between attribute-bit, capability identification and storage address.
Fig. 9 is to be obtained with user's according to the correspondence between the attribute information querying attributes and access permission of user The flow diagram of the corresponding target access permission of attribute information, specifically includes following steps:
S5011 inquires correspondence according to the attribute-bit of user, obtains target gate inhibition power corresponding with attribute-bit The capability identification of limit.
Specifically, the method that can be recorded according to above-described embodiment obtains the attribute information of user, the attribute letter of the user Breath is attribute-bit.
S5012 inquires storage address corresponding with capability identification from the correspondence.
S5013 positions memory space according to storage address, target access permission is read from memory space.
In the present embodiment, different memory spaces is set in advance for different access permissions, each memory space has one A storage address is stored with the particular content of access permission in the memory space.In the permission mark according to target access permission Know, after the storage address of capability identification that can get the target access permission in correspondence, so as to navigate to The corresponding memory space of the storage address, then reads the particular content of target access permission from the memory space.
Temporary Access Control Card is generated for user according to target access permission in S502.
Specifically, the correspondence between attribute and access permission is prestored, is looked into according to the user information attribute of acquisition The correspondence is ask, target access permission corresponding with the attribute information of user is obtained, and is user according to target access permission Generate Temporary Access Control Card.I.e. Temporary Access Control Card, which can be directed to different user, has different permissions.
It, (can be with entity card or virtual card by access card it should be noted that after generating gate inhibition's temporary card Shown in the portable equipments such as mobile terminal) form to user provide Temporary Access Control Card.
After Temporary Access Control Card is issued to user, the term of validity of Temporary Access Control Card can be monitored, and After user gets Temporary Access Control Card, the long-term access card which is possessed is arranged within the term of validity of Temporary Access Control Card At failure state safety can be improved to ensure that company can only be entered using an access card in one user of synchronization Property.
The mark of Temporary Access Control Card and possessed target access permission are sent to access control system, so that door by S503 Access control system is associated registration to the mark of Temporary Access Control Card with possessed target access permission.
In the present embodiment, the mark of access card and possessed target access permission can be sent to access control system, After access control system receives the mark of Temporary Access Control Card, the mark of Temporary Access Control Card and possessed target access permission are closed Connection registration.
In practical application, when user uses gate inhibition's temporary card, access control system can carry out respective handling to it, specifically Ground reads access card mark, judges whether it has the permission allowed access into, if there is allowing access into, if not provided, can lead to The modes such as voice, whistle are crossed to be prompted.Wherein, the mark of Temporary Access Control Card refers to that can determine unique access card, is had only One property.
It should be noted that in order to further improve the security, Temporary Access Control Card has term of validity, such as specially 8 Hour, 24 hours etc..
The term of validity of Temporary Access Control Card is issued access control system, so that access control system has Temporary Access Control Card by S504 Effect property is monitored.
Specifically, different Temporary Access Control Cards may have different term of validity.Thus, it is desirable to by Temporary Access Control Card The term of validity issues access control system, and access control system can allow access into the Temporary Access Control Card with permission in the term of validity;To not All Temporary Access Control Cards before the deadline are all prohibited from entering.For example, the term of validity of Temporary Access Control Card is 24 hours, it is small more than 24 Shi Hou, the access card no longer have permission, effectively promote the safety of Temporary Access Control Card granting.Access control system can have according to this The effect time limit recycles the access permission of Temporary Access Control Card, and after expiring the term of validity of Temporary Access Control Card, access control system can The elimination of the access permission of Temporary Access Control Card or the Temporary Access Control Card are in failure state.
Figure 10 is the flow diagram of the distribution method of the 6th kind of Temporary Access Control Card provided in an embodiment of the present invention.Such as Figure 10 Shown, the distribution method of the Temporary Access Control Card includes the following steps:
S601, for server by for being sent to first terminal to the Quick Response Code that user identity is verified, first terminal is logical It crosses screen and Quick Response Code is shown to user, so that user is scanned the two-dimensional code by second terminal, second terminal is by two after scanning Dimension code is sent to server and is verified.
Specifically, user can by selecting different flow to carry out authentication according to oneself identity, as shown in figure 11, In enterprise's scene, the click left side " about visitor " can be selected to start to verify flow if user is visitor's identity; If user is worker, " the employee's startup " of clicking the right can be selected to start to verify flow.
In turn, (for example " member in Figure 11 is clicked according to oneself worker after user starts selection according to actual needs Work starts "), by for being sent to first terminal to the Quick Response Code that user identity is verified, first terminal passes through screen display Give user (as shown in Fig. 6 in above-described embodiment).It is understood that generating Quick Response Code can show, as a result, by two Tie up code by screen display to user before, need the Quick Response Code that generates and sends of server for receiving application program.
In turn, user (can be not limited to one kind in mobile phone, tablet computer and intelligent wearable device etc. by second terminal Or it is a variety of) on application program (being not limited to one or more of wechat, QQ and microblogging etc.) scan the two-dimensional code and issue The server of application program is verified.
Specifically, the mark of Quick Response Code and second terminal after scanning is sent to server by second terminal;Server root Authentication is carried out according to Quick Response Code, the attribute information that server obtains user after being verified issues first terminal, including:Clothes Business device obtains the attribute information of user after being verified according to the mark of second terminal, and server sends out the attribute information of user Give first terminal.
It is understood that server is previously stored with the attribute information of user, as a kind of realization method, server connects It receives the essential information that user sends and forms customer data base, wherein essential information includes attribute information and the second end of user The mark at end.Obtain the attribute information of user according to the mark of second terminal after server authentication passes through as a result, including:Clothes Business device inquires customer data base after being verified according to the mark of second terminal, obtains the attribute information of user.
S602, the attribute information that server obtains user after being verified issue first terminal.
Specifically, server returns to the attribute information of first terminal user after being verified.
S603, first terminal provide Temporary Access Control Card according to the attribute information of user to user, wherein the use of different attribute The Temporary Access Control Card that family is got has different access permissions.
Specifically, it after the attribute information for obtaining user, needs to provide interim door to user according to the attribute information of user Prohibit card.After determining the corresponding access permission of user according to attribute information, the interim gate inhibition of corresponding permission is sent to user Card.The safety of Temporary Access Control Card transmission is further increased as a result,.
It should be noted that can be according to practical application scene needs, first terminal is in different ways according to user Attribute information to user provide Temporary Access Control Card, be illustrated below:
The first example, first terminal is according to pre-setting between the attribute information querying attributes of user and access permission Correspondence, and then according to the attribute information of user, inquire the correspondence and obtain corresponding target access permission, with according to mesh Temporary Access Control Card is generated for user in mark access permission, (can be in mobile terminal with entity card or virtual card by access card Being shown in equal portable equipments) form provides Temporary Access Control Card to user.
Second of example, first terminal according to prestore with the relevant Processing Algorithm of attribute information, determining user's After attribute information, the relevant parameter of Processing Algorithm for obtaining and prestoring is calculated, and determines target corresponding with the attribute information Access permission, and Temporary Access Control Card is generated for user according to target access permission, by access card with entity card or virtually Card (can show) that form provides Temporary Access Control Card to user in the portable equipments such as mobile terminal.
It should be noted that being only the citing for providing Temporary Access Control Card to user according to the attribute information of user with upper type Illustrate, can select or be arranged other modes according to the actual application.
By taking the first example as an example, Temporary Access Control Card is provided to user and by the mark of access card and possessed Target access permission is sent to access control system (after access control system receives the mark of Temporary Access Control Card, by the mark of Temporary Access Control Card It is associated registration with possessed target access permission).As a result, when user uses gate inhibition's temporary card, access control system can It is carried out accordingly (to read access card mark, judge whether it has the permission allowed access into, if there is allowing access into, such as Fruit does not have, and can be prompted by modes such as voice, whistles).Wherein, the mark of Temporary Access Control Card refers to that can determine uniquely Access card has uniqueness.
It should be noted that in order to further improve the security, Temporary Access Control Card has term of validity, such as specially 8 Hour, 24 hours etc..
Specifically, different Temporary Access Control Cards may have different term of validity.Thus, it is desirable to by Temporary Access Control Card The term of validity issues access control system, and access control system can allow access into the Temporary Access Control Card with permission in the term of validity;To not All Temporary Access Control Cards before the deadline are all prohibited from entering.For example, the term of validity of Temporary Access Control Card is 24 hours, it is small more than 24 Shi Hou, the access card no longer have permission, effectively promote the safety of Temporary Access Control Card granting.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, will be used for by server to user's body The Quick Response Code verified of part is sent to first terminal, then first terminal by screen display to user so that user passes through Second terminal scans the two-dimensional code and issues the server of application program and verified, and the attribute of user is obtained after being verified Information issues first terminal, and last first terminal provides Temporary Access Control Card according to the attribute information of user to user, wherein different The Temporary Access Control Card that the user of attribute gets has different access permissions, simple and convenient, and accuracy is high, to improve The safety of Temporary Access Control Card granting.
In order to more comprehensively illustrate the embodiment of the present invention Temporary Access Control Card distribution method, below concentrate to apply journey Sequence (such as wechat, QQ etc.) server side describes the distribution method of the Temporary Access Control Card of the embodiment of the present invention.
Figure 12 is the flow diagram of the distribution method of the 7th kind of Temporary Access Control Card provided in an embodiment of the present invention.Such as Figure 12 Shown, the distribution method of the Temporary Access Control Card includes the following steps:
S701 receives verification information of the mobile terminal transmission of user for being verified to user identity, verification information It include the mark of Quick Response Code and mobile terminal.
S702 carries out authentication according to the Quick Response Code in verification information.
Specifically, apps server is needed to address, terminal iidentification belonging to specific terminal (such as self-service machine) in advance And the information such as random number encode generating Quick Response Code and being sent to terminal and be shown.
In turn, verification information that user sends by way of scanning the two-dimensional code (including Quick Response Code and movement can be received The mark of terminal).Authentication is carried out according to the Quick Response Code in verification information as a result,.After scanning the two-dimensional code, by applying journey The permission of relevant interface (such as openid of wechat) the verification mobile terminal of sequence completes authentication.
S703 obtains the attribute information of user after being verified according to the mark of mobile terminal.
The attribute information of user is sent to terminal by S704, so that terminal provides interim door according to attribute information to user Prohibit card, wherein the Temporary Access Control Card that the user of different attribute gets has different access permissions.
It should be noted that the essential information that apps server receives user's transmission in advance (includes the attribute of user The mark of information and mobile terminal) and form customer data base.
In turn, after being verified, customer data base is inquired according to the mark of mobile terminal, obtains the attribute information of user It is sent to terminal, so that the user for different attribute provides Temporary Access Control Card of the card with different access permissions.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, the mobile terminal by receiving user is sent out The verification information of the mark including Quick Response Code and mobile terminal for being verified to user identity is sent, and according to verification information In Quick Response Code carry out authentication, then after being verified according to mobile terminal mark obtain user attribute information send out Terminal is given, so that the user for different attribute provides Temporary Access Control Card of the card with different access permissions.It operates as a result, It is simple and convenient, accuracy is high, to improve Temporary Access Control Card granting safety and reduce cost of labor.
Based on above-described embodiment, in order to more clearly describe after sending Temporary Access Control Card to user, entrance guard device is such as What carries out different operation and controls for the Temporary Access Control Card of different rights, below with a kind of interim described in the collection of entrance guard device side The recognition methods of access card.
Figure 13 is a kind of flow diagram of the recognition methods of Temporary Access Control Card provided in an embodiment of the present invention.Such as Figure 13 institutes Show, the recognition methods of the Temporary Access Control Card includes the following steps:
S801 obtains the access permission of Temporary Access Control Card.
Specifically, it when there is the permission for opening target door to judge Temporary Access Control Card, needs to obtain interim gate inhibition The access permission of card.It should be noted that according to concrete application scene difference interim gate inhibition can be obtained in different ways The access permission of card, is illustrated below:
The first example receives the mark for the Temporary Access Control Card that target door is sent, and is inquired according to the mark of Temporary Access Control Card Incidence relation between the mark of Temporary Access Control Card and possessed access permission, gets the access permission of Temporary Access Control Card. Illustrate how target door obtains Temporary Access Control Card mark as a kind of scene:(gate inhibition is interim by way of swiping the card by user Card is entity card) so that target door obtains the mark of Temporary Access Control Card.How target door is illustrated as another scene Obtain Temporary Access Control Card mark:User establishes connection by mobile terminal and target door and sends Temporary Access Control Card mark so that mesh Mark the mark (the case where Temporary Access Control Card is virtual card can be directed to) that door obtains Temporary Access Control Card.
The mark of Temporary Access Control Card is directly sent to entrance guard device by second of example, user by mobile terminal, in turn, Mark of the entrance guard device according to the mark inquiry Temporary Access Control Card of Temporary Access Control Card and being associated between possessed access permission Relationship gets the access permission of Temporary Access Control Card.
It should be noted that the above access permission mode to obtaining Temporary Access Control Card is by way of example only, it can basis Practical application is selected and is adjusted.
It is understood that the association for pre-saving the mark and possessed access permission of each Temporary Access Control Card is closed System can obtain its access permission having according to the mark of Temporary Access Control Card.Specifically, in the present embodiment, it can receive The mark and possessed access permission for each Temporary Access Control Card that terminal is sent, and according to the mark of each Temporary Access Control Card and institute The access permission having, establishes incidence relation.
S802 judges whether that Temporary Access Control Card has the permission for opening target door according to access permission.
S803 then opens target door when judging that Temporary Access Control Card has the permission for opening target door.
Specifically, it may determine that whether Temporary Access Control Card has the permission for opening target door according to the access permission of acquisition, When Temporary Access Control Card has the permission for opening target door, target door is opened.It is understood that not having in Temporary Access Control Card When opening the permission of target door, target door closure state is kept.
It should be noted that Temporary Access Control Card has term of validity.Need the term of validity of reception Temporary Access Control Card, and root The validity of Temporary Access Control Card is monitored according to term of validity.
As an example, when judging that Temporary Access Control Card has the permission for opening target door, further basis is needed Term of validity judges whether Temporary Access Control Card has validity, and target door is opened when Temporary Access Control Card has validity;? When Temporary Access Control Card does not have validity, target door closure state is kept.
In conclusion the recognition methods of the Temporary Access Control Card of the embodiment of the present invention, by the gate inhibition for obtaining Temporary Access Control Card Permission, and judge whether that Temporary Access Control Card has the permission for opening target door according to access permission, finally when judging interim door Prohibit card and opens target door when there is the permission for opening target door.It is user-friendly as a result, by improving recognition efficiency, and root Effective monitoring is carried out according to the Temporary Access Control Card term of validity, further increases safety.
Figure 14 is the flow diagram of the recognition methods of another Temporary Access Control Card provided in an embodiment of the present invention, in step After S803, the recognition methods of the Temporary Access Control Card further includes:
S901, after user gets Temporary Access Control Card, by the long-term access card of user Temporary Access Control Card the term of validity It is arranged to failure state in limit.
S902 recycles Temporary Access Control Card, deletes the access permission in Temporary Access Control Card.
Specifically, it after providing Temporary Access Control Card, needs facing the other access cards of the user (such as long-term access card) When access card term of validity in be arranged to failure state.To ensure that a user can only be by a card with entering corresponding target Point improves safety.
Specifically, Temporary Access Control Card can be recycled for different situations according to concrete application scene, be illustrated below:
The first example deletes the access permission in the Temporary Access Control Card when user gives back Temporary Access Control Card.
Second of example, Temporary Access Control Card delete the access permission in the Temporary Access Control Card when exceeding term of validity.
It should be noted that by way of example only above in relation to different situation recycling Temporary Access Control Cards, it can be according to reality Border application is selected and is adjusted.
As a result, by after user gets Temporary Access Control Card, by long-term access card the having in Temporary Access Control Card of user It is arranged to failure state and recycling Temporary Access Control Card in the effect time limit, deletes the access permission in Temporary Access Control Card, further increase Safety.
Figure 15 is the flow interaction figure that a Temporary Access Control Card of the embodiment of the present invention is handled.
Referring to Figure 15, illustrate by taking enterprise's scene as an example, the present embodiment includes:Employee, self-service machine, wechat, guest system, people Face system, access control system and pass gate.The present embodiment is provided in this embodiment by the information exchange citing description between equipment The concrete application scene of the flow of Temporary Access Control Card granting, identification, is described as follows:
It should be noted that self-service machine can carry out generating wechat verification Quick Response Code, crawl facial image, provide casual labour Card, the also operations such as card.Wechat public platform is authenticated mainly for worker.Guest system mainly verifies worker.Face system System mainly verifies worker by Face datection.Access control system be substantially carried out registration access permission, verification access permission, Recycle the operations such as access permission.
Specifically, employee enter company find leave behind access card, can by trigger self-service machine generate Quick Response Code and Photographic device on self-service machine takes pictures two ways progress authentication to provide Temporary Access Control Card.It is divided to two kinds of examples below, point The specific verification process of above two mode is not described.
Example one, after generating Quick Response Code, employee can be scanned the two-dimensional code by the wechat execution installed on mobile terminal Operation verifies worker by wechat, and provides Temporary Access Control Card after being verified.
In order to which those skilled in the art are more clear how to verify the detailed process of worker by wechat, with reference to Figure 16 (a) it is described as follows:
Specifically, after being scanned (as shown in Fig. 6 in above-described embodiment) to Quick Response Code by wechat, such as Figure 16 (a) Shown, employee enters handset identities and confirms the page, accesses system and verifies mobile phone permission, i.e., non-employee's hand by the openid of wechat Machine number does not allow access for, and employee confirms that this confirmation is saved in caching while is arranged by identity, guest system on mobile phone Out-of-service time (such as 1 minute, two minutes).
It should be noted that self-service machine is in advance by letters such as affiliated address, mark (such as title, sequence number etc.) and random numbers Breath is sent to guest system, and guest system encodes above- mentioned information, generates the Quick Response Code with chained address.Employee is scanned as a result, Associated verification interface can be entered after Quick Response Code.
Specifically, in order to further ensure safety, self-service machine per preset time (such as 3 seconds), again by affiliated address, The mark information such as (such as title, sequence number etc.) and random number are sent to guest system and are recycled, and guest system is from caching Query result after confirming worker, will confirm that result notice to self-service machine, self-service machine carries out interim door after receiving confirmation result Prohibit card printing (the Temporary Access Control Card granting i.e. in above-described embodiment).
Example two, after starting photographic device and being taken pictures, after face system detects worker by facial image, Input extension number interface is shown on self-service machine, and provides Temporary Access Control Card after extension number input is correct.
In order to which those skilled in the art are more clear how to verify the detailed process of worker by facial image, illustrate It is as follows:
Specifically, employee can select oneself corresponding institutional framework, self-service machine by calling system (such as Avicap32.dll) start photographic device, employee is self-service by facial alignment camera (as shown in Fig. 3 in above-described embodiment) Machine intercepts shooting area facial image by the screenshotss function of system.
In turn, facial image is sent to guest system by self-service machine, guest system call face system on human face image into Row detection, after being confirmed as face, corresponding facial image is found by employee's institutional framework in preset face database, and It is matched, matching degree is returned into self-service machine more than predetermined threshold value, that is, successful result.
In turn, after detecting worker by facial image, input extension number interface, such as Figure 16 are shown on self-service machine (b) shown in, " five figure extension number please be input ", and provide Temporary Access Control Card after extension number input is correct.
Specifically, can (can pre-set by way of wechat information after providing Temporary Access Control Card Automatically reply mode) notify employee to get Temporary Access Control Card to further ensure that safety.Display interface can be such as figure Shown in 16 (c).
It is understood that before providing Temporary Access Control Card, it is also necessary to determine the access permission of employee, you can to pass through The modes such as the work card number of employee are sent to guest system, the interface that guest system is provided by entrance guard device as the mark of employee The permission of work card number is verified, and result is returned into self-service machine.It is directed to the interim gate inhibition that different employees provide different access permissions Card.
It should be noted that neocaine is not no concrete power limit, need to carry out registration to entrance guard device by card reader to award The modes such as power assign different permissions to neocaine and are stored in self-service machine as Temporary Access Control Card.
In turn, when self-service machine receives the work card number corresponding permission of employee, pass through and printer interface printing is called to correspond to Temporary Access Control Card.It is understood that the Temporary Access Control Card in the present embodiment is entity card form.
It should be noted that during printing, if it find that Temporary Access Control Card unauthorized, is recycled, stop Only print.
It should be noted that guest system predetermined period (such as daily) Temporary Access Control Card provided is looked into It askes, the Temporary Access Control Card for not given back (being more than term of validity) to employee actively recycles permission.
The efficiency that Temporary Access Control Card is got thereby, it is possible to greatly improve employee alleviates working peak period foreground people Member operating pressure, reduce cost of labor, and can automatic accurate granting Temporary Access Control Card, realize the automatic decentralization of access permission And recycling, substantially increase safety.
In order to realize that above-described embodiment, the present invention also propose a kind of first terminal.
Figure 17 is the structural schematic diagram of the first first terminal provided in an embodiment of the present invention.The first terminal includes:It tests Demonstrate,prove module 11, acquisition module 12 and sending module 13.
Wherein, authentication module 11, for obtaining verification information and verification for being verified to user identity.
Acquisition module 12, the attribute information for obtaining user after being verified.
Module 13 is provided, for providing Temporary Access Control Card to user according to the attribute information of user;Wherein, different attribute The Temporary Access Control Card that user gets has different access permissions.
It should be noted that the aforementioned explanation to Temporary Access Control Card distribution method embodiment is also applied for the present embodiment Terminal, details are not described herein again.
In conclusion the first terminal of the embodiment of the present invention, is carried out by the verification information verified to user identity After being verified, there is the temporary card of different access permissions for different user granting, simple and convenient, accuracy is high, from And improve the safety of Temporary Access Control Card granting.
Figure 18 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention.The access card granting system System includes:First terminal 1, server 2 and second terminal 3.
Wherein, server 2 are received for will be used to be sent to first terminal 1 to the Quick Response Code that user identity is verified The Quick Response Code of the transmission of second terminal 3 used by a user is simultaneously verified, under the attribute information that user is obtained after being verified Issue first terminal 1.
First terminal 1, for receiving Quick Response Code and Quick Response Code being shown to user by screen so that user is by second Terminal 3 scans the two-dimensional code, and receives the attribute information for the user that server 2 issues after to being verified of user, and root According to the attribute information of user Temporary Access Control Card is provided to user.
Second terminal 3 is verified for scanning the two-dimensional code and being sent to server 2.
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
It should be noted that first terminal can be provided simultaneously with the function of recognition of face and language identification, that is, someone is set Face database sharing module and language database structure module and respective update module, user can be according to the demands of oneself Selection is verified using facial image or is verified by language message, or is verified by way of Quick Response Code.
It should be noted that the aforementioned explanation to Temporary Access Control Card distribution method embodiment is also applied for the present embodiment Access card delivery system, details are not described herein again.
In conclusion the access card delivery system of the embodiment of the present invention, will be used to carry out user identity by server The Quick Response Code of verification is sent to first terminal, then first terminal by screen display to user so that user passes through second eventually It holds the server for scanning the two-dimensional code and issuing application program to be verified, and obtains the attribute information hair of user after being verified To first terminal, last first terminal provides Temporary Access Control Card according to the attribute information of user to user, wherein different attribute The Temporary Access Control Card that user gets has different access permissions, simple and convenient, and accuracy is high, interim to improve The safety of access card granting.
Figure 19 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention.The entrance guard recognition device is used Attempt unlatching target door using Temporary Access Control Card in user, including:Acquisition module 41, judgment module 42, opening module 43.
Wherein, acquisition module 41, the access permission for obtaining Temporary Access Control Card.
Judgment module 42, for judging whether that Temporary Access Control Card has the permission for opening target door according to access permission.
Opening module 43, for when judging that Temporary Access Control Card has the permission for opening target door, then opening target door.
Further, acquisition module 41 are specifically used for receiving the mark for the Temporary Access Control Card that target door is sent, according to interim Incidence relation between the mark and possessed access permission of the mark inquiry Temporary Access Control Card of access card, gets interim door Prohibit the access permission of card.
Further, as a kind of possible realization method, Figure 20 is that another gate inhibition provided in an embodiment of the present invention knows The structural schematic diagram of other device, as shown in figure 20, on the basis of Figure 19, which further includes:Mould is established in association Block 44, monitoring module 45 and failure setup module 46.
Wherein, module 41 is established in association, for before the access permission for obtaining Temporary Access Control Card, receiving what terminal was sent The mark of each Temporary Access Control Card and possessed access permission, and the mark according to each Temporary Access Control Card and possessed door Prohibit permission, establishes incidence relation.
In one embodiment of the invention, Temporary Access Control Card has term of validity, monitoring module 45 interim for receiving The term of validity of access card is monitored the validity of Temporary Access Control Card according to term of validity.
Further, opening module 43, specifically for when judge Temporary Access Control Card have open target door permission when, Judge whether Temporary Access Control Card has validity according to term of validity, if Temporary Access Control Card has validity, opens target Door.
Further, fail setup module 46, for after user gets Temporary Access Control Card, by the long-term gate inhibition of user It is stuck in the term of validity of Temporary Access Control Card and is arranged to failure state.
It should be noted that the aforementioned explanation to Temporary Access Control Card recognition methods embodiment is also applied for the present embodiment Entrance guard recognition device, details are not described herein again.
In conclusion the entrance guard recognition device of the embodiment of the present invention, by obtaining the access permission of Temporary Access Control Card, and root According to access permission judge whether Temporary Access Control Card have open target door permission, finally when judge Temporary Access Control Card have open Target door is opened when the permission for opening target door.It is user-friendly as a result, by improving recognition efficiency, and according to interim gate inhibition The card term of validity carries out effective monitoring, further increases safety.
In order to realize that above-described embodiment, the present invention also propose a kind of terminal, including:It memory, processor and is stored in On reservoir and the computer program that can run on a processor, which is characterized in that processor realizes above-mentioned implementation when executing program In the first to the 5th kind of Temporary Access Control Card distribution method.
In order to realize that above-described embodiment, the present invention also propose a kind of first terminal.
Figure 21 is a kind of structural schematic diagram of first terminal provided in an embodiment of the present invention.
Wherein, it should be noted that Figure 21 is by taking first terminal side as an example.As shown in figure 20, which may include: Processor 11;Memory 12 for storing processor-executable instruction.Wherein, processor 11 is configured as:Obtain for pair Verification information that user identity is verified and verification;The attribute information of user is obtained after being verified;According to the category of user Property information to user provide Temporary Access Control Card;Wherein, the Temporary Access Control Card that the user of different attribute gets has different doors Prohibit permission.
Figure 22 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention.
Wherein, it should be noted that as shown in figure 22, which may include:Processor 11;For depositing Store up the memory 12 of processor-executable instruction.Wherein, processor 11 is configured as:Server will be used to carry out user identity The Quick Response Code of verification is sent to first terminal;Quick Response Code is shown to user so that user is by second by first terminal by screen Terminal scans the two-dimensional code;Quick Response Code after scanning is sent to server and verified by second terminal;Server is being verified The attribute information for obtaining user afterwards issues first terminal;First terminal provides interim gate inhibition according to the attribute information of user to user Card;Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
Figure 23 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention.
Wherein, it should be noted that as shown in figure 23, which may include:Processor 11;For storing The memory 12 of processor-executable instruction.Wherein, processor 11 is configured as:Obtain the access permission of Temporary Access Control Card;Root Judge whether that Temporary Access Control Card has the permission for opening target door according to access permission;Mesh is opened when judging that Temporary Access Control Card has When marking the permission of door, then target door is opened.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (system of such as computer based system including processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicating, propagating or passing Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage Or firmware is realized.Such as, if realized in another embodiment with hardware, following skill well known in the art can be used Any one of art or their combination are realized:With for data-signal realize logic function logic gates from Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the present invention System, those skilled in the art can be changed above-described embodiment, change, replace and become within the scope of the invention Type.

Claims (14)

1. a kind of distribution method of Temporary Access Control Card, which is characterized in that including:
Obtain the verification information for being verified to user identity and verification;
The attribute information of the user is obtained after being verified;
According to the attribute information of the user Temporary Access Control Card is provided to the user;Wherein, the user of different attribute gets Temporary Access Control Card have different access permissions.
2. the distribution method of Temporary Access Control Card according to claim 1, which is characterized in that the acquisition is for user's body The verification information verified of part and verification, including:
The facial image that the user is acquired by photographic device is used as the verification information;
The facial image of the user is matched with the facial image in face database;
If the facial image of the user and the first matching degree of the facial image of the first user in the face database are super When crossing preset first numerical value, then pass through the verification to the user identity;
The attribute information that the user is obtained after being verified, including:
The attribute information of first user is obtained from the face database;
Using the attribute information of first user as the attribute information of the user.
3. the distribution method of Temporary Access Control Card according to claim 2, which is characterized in that further include:
According to preset first database construction strategy, the face database is built in advance, wherein in the face database At least it is stored with the facial image of the facial image of the first user, the attribute information of first user and first user Correspondence between the attribute information of first user;
Periodically the face database is updated.
4. the distribution method of Temporary Access Control Card according to claim 1, which is characterized in that the acquisition is for user's body The verification information verified of part and verification, including:
Quick Response Code is generated by the server for the application program installed;
By the Quick Response Code by screen display give the user so that the user pass through on mobile terminal it is described apply journey Sequence, which scans the Quick Response Code and issues the server in conjunction with the mark of the mobile terminal generation verification information, to be tested Card;
The attribute information that the user is obtained after being verified, including:
Receive the attribute information for the user that the server is sent after being verified;The attribute information of the wherein described user It is to be got according to the mark of the mobile terminal by the server.
5. the distribution method of Temporary Access Control Card according to claim 1, which is characterized in that the acquisition is for user's body The verification information verified of part and verification, including:
The voice messaging that the user is acquired by sound pick up equipment is used as the verification information;
The voice messaging of the user is matched with the voice messaging in speech database;
If the voice messaging of the user and the second matching degree of the voice messaging of second user in the speech database are super When crossing preset second value, pass through the verification to the user identity;
The attribute information that the user is obtained after being verified, including:
The attribute information of the second user is obtained from the speech database;
Using the attribute information of the second user as the attribute information of the user.
6. the distribution method of Temporary Access Control Card according to claim 5, which is characterized in that further include:
According to preset second database sharing strategy, the speech database is built in advance, wherein in the speech database At least it is stored with the voice messaging of the voice messaging of second user, the attribute information of the second user and the second user Correspondence between the attribute information of the second user;
Periodically the speech database is updated.
7. according to the distribution method of claim 1-6 any one of them Temporary Access Control Cards, which is characterized in that described in the basis The attribute information of user provides Temporary Access Control Card to the user, including:
According to the correspondence between the attribute information querying attributes and access permission of the user, the category with the user is obtained The property corresponding target access permission of information;
It is that the user generates the Temporary Access Control Card according to the target access permission.
8. the distribution method of Temporary Access Control Card according to claim 7, which is characterized in that further include:
The term of validity of the Temporary Access Control Card is monitored;
After the user gets the Temporary Access Control Card, by the long-term access card of the user in the Temporary Access Control Card It is arranged to failure state in term of validity.
9. a kind of distribution method of Temporary Access Control Card, which is characterized in that including:
Server will be for being sent to first terminal to the Quick Response Code that user identity is verified;
The Quick Response Code is shown to user so that the user scans institute by second terminal by the first terminal by screen State Quick Response Code;
The Quick Response Code after scanning is sent to the server and verified by the second terminal;
The attribute information that the server obtains the user after being verified issues the first terminal;
The first terminal provides Temporary Access Control Card according to the attribute information of the user to the user;
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
10. the distribution method of Temporary Access Control Card according to claim 9, which is characterized in that the first terminal is according to institute The attribute information for stating user provides Temporary Access Control Card to the user, including:
The first terminal according to the correspondence between the attribute information querying attributes and access permission of the user, obtain with The corresponding target access permission of attribute information of the user;
The first terminal is that the user generates the Temporary Access Control Card according to the target access permission.
11. the distribution method of Temporary Access Control Card according to claim 9, which is characterized in that the second terminal will scan The Quick Response Code afterwards is sent to the server and is verified, including:
The mark of the Quick Response Code and the second terminal after scanning is sent to the server by the second terminal;It is described Server carries out authentication according to the Quick Response Code;
The attribute information that the server obtains the user after being verified issues the first terminal, including:
The server obtains the attribute information of the user after being verified according to the mark of the second terminal;
The attribute information of the user is sent to the first terminal by the server.
12. the distribution method of Temporary Access Control Card according to claim 11, which is characterized in that further include:
The server receives the essential information that user sends and forms customer data base, wherein the essential information includes institute State the mark of the attribute information and the second terminal of user;
The attribute information for obtaining the user according to the mark of the second terminal after server authentication passes through, including:
The server inquires the customer data base after being verified according to the mark of the second terminal, obtains the use The attribute information at family.
13. a kind of first terminal, which is characterized in that including:
Authentication module, for obtaining verification information and verification for being verified to user identity;
Acquisition module, the attribute information for obtaining the user after being verified;
Module is provided, for providing Temporary Access Control Card to the user according to the attribute information of the user;
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
14. a kind of access card delivery system, which is characterized in that including:
Server receives user and is used for will be used to be sent to first terminal to the Quick Response Code that user identity is verified Second terminal send the Quick Response Code and verified, the attribute information that the user is obtained after being verified is handed down to The first terminal;
The first terminal, for receiving the Quick Response Code and the Quick Response Code being shown to user so that the use by screen The Quick Response Code is scanned in family by second terminal, and receives what the server issued after to being verified of the user The attribute information of the user, and Temporary Access Control Card is provided to the user according to the attribute information of the user;
The second terminal is verified for scanning the Quick Response Code and being sent to the server;
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
CN201710255812.4A 2017-04-19 2017-04-19 Method and device for issuing temporary access control card Active CN108734813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710255812.4A CN108734813B (en) 2017-04-19 2017-04-19 Method and device for issuing temporary access control card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710255812.4A CN108734813B (en) 2017-04-19 2017-04-19 Method and device for issuing temporary access control card

Publications (2)

Publication Number Publication Date
CN108734813A true CN108734813A (en) 2018-11-02
CN108734813B CN108734813B (en) 2022-08-23

Family

ID=63924269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710255812.4A Active CN108734813B (en) 2017-04-19 2017-04-19 Method and device for issuing temporary access control card

Country Status (1)

Country Link
CN (1) CN108734813B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN109615757A (en) * 2019-02-27 2019-04-12 西安艾润物联网技术服务有限责任公司 Visitor's access control management method, system and storage medium
CN109859356A (en) * 2019-01-24 2019-06-07 广州市天河区保安服务公司 A kind of access control management method and system
CN110021088A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 It is distributed the page control open-door system and method for authorization architecture
CN110136315A (en) * 2019-06-27 2019-08-16 广东电网有限责任公司 A kind of substation safety region prevention and control system based on Internet of Things and recognition of face
CN110164009A (en) * 2019-05-29 2019-08-23 华翔翔能电气股份有限公司 A kind of two dimensional code access control system
CN110321835A (en) * 2019-07-01 2019-10-11 杭州创匠信息科技有限公司 Face guard method, system and equipment
CN112053485A (en) * 2020-09-08 2020-12-08 上海善一智能科技有限公司 Department intelligent authority distribution system
CN112435386A (en) * 2019-08-06 2021-03-02 南京理工大学 Identity authentication and card issuing all-in-one machine and working method thereof
CN112634501A (en) * 2021-01-04 2021-04-09 深圳市法本信息技术股份有限公司 Visitor authorization method for property management
CN113689603A (en) * 2021-08-20 2021-11-23 青岛海信智慧生活科技股份有限公司 Access control authority management method and device
CN114596656A (en) * 2020-12-03 2022-06-07 中移互联网有限公司 Electronic pass processing method, device and equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102881064A (en) * 2012-10-08 2013-01-16 无锡天授信息科技有限公司 Visitor management system and method based on face identification
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN104065652A (en) * 2014-06-09 2014-09-24 韩晟 Method, device and system for identity verification and related device
CN105678872A (en) * 2015-12-30 2016-06-15 福建星网锐捷通讯股份有限公司 Entrance guard manage system, authorization method thereof and entrance guard terminal device
CN205334578U (en) * 2015-12-22 2016-06-22 深圳市施德朗电气有限公司 Self -service visitor system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102881064A (en) * 2012-10-08 2013-01-16 无锡天授信息科技有限公司 Visitor management system and method based on face identification
CN103023917A (en) * 2012-12-26 2013-04-03 百度在线网络技术(北京)有限公司 Method, system and device for authorization aiming at intelligent household electrical appliance
CN104065652A (en) * 2014-06-09 2014-09-24 韩晟 Method, device and system for identity verification and related device
CN205334578U (en) * 2015-12-22 2016-06-22 深圳市施德朗电气有限公司 Self -service visitor system
CN105678872A (en) * 2015-12-30 2016-06-15 福建星网锐捷通讯股份有限公司 Entrance guard manage system, authorization method thereof and entrance guard terminal device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021088A (en) * 2018-10-29 2019-07-16 深圳市微开互联科技有限公司 It is distributed the page control open-door system and method for authorization architecture
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN109859356A (en) * 2019-01-24 2019-06-07 广州市天河区保安服务公司 A kind of access control management method and system
CN109615757B (en) * 2019-02-27 2021-08-03 西安艾润物联网技术服务有限责任公司 Visitor access control management method, system and storage medium
CN109615757A (en) * 2019-02-27 2019-04-12 西安艾润物联网技术服务有限责任公司 Visitor's access control management method, system and storage medium
CN110164009A (en) * 2019-05-29 2019-08-23 华翔翔能电气股份有限公司 A kind of two dimensional code access control system
CN110136315A (en) * 2019-06-27 2019-08-16 广东电网有限责任公司 A kind of substation safety region prevention and control system based on Internet of Things and recognition of face
CN110321835A (en) * 2019-07-01 2019-10-11 杭州创匠信息科技有限公司 Face guard method, system and equipment
CN112435386A (en) * 2019-08-06 2021-03-02 南京理工大学 Identity authentication and card issuing all-in-one machine and working method thereof
CN112053485A (en) * 2020-09-08 2020-12-08 上海善一智能科技有限公司 Department intelligent authority distribution system
CN114596656A (en) * 2020-12-03 2022-06-07 中移互联网有限公司 Electronic pass processing method, device and equipment
CN114596656B (en) * 2020-12-03 2023-09-19 中移互联网有限公司 Electronic pass processing method, device and equipment
CN112634501A (en) * 2021-01-04 2021-04-09 深圳市法本信息技术股份有限公司 Visitor authorization method for property management
CN113689603A (en) * 2021-08-20 2021-11-23 青岛海信智慧生活科技股份有限公司 Access control authority management method and device

Also Published As

Publication number Publication date
CN108734813B (en) 2022-08-23

Similar Documents

Publication Publication Date Title
CN108734813A (en) The distribution method and device of Temporary Access Control Card
US11276131B2 (en) Property management system utilizing a blockchain network
CN105913527B (en) Visitor's two dimensional code intelligent verification system and verification method based on cell cloud
CN104240342B (en) Access control method and device based on identity authentication
CN110148232B (en) Visitor management system, method, device and storage medium
JP7038293B2 (en) Gate open / close control device and gate open / close control method
CN103827878B (en) Automate Password Management
WO2020179334A1 (en) Facial authentication management server and facial authentication management method
JP7026341B2 (en) Face recognition machine and face recognition method
JP6998568B2 (en) Face recognition system and face recognition method
CN105872104A (en) Method and system for managing intelligent entrance guard by combining mobile terminal
JP2013196349A (en) Employee information management system, information processing apparatus, employee information management system generation method, employee information management system generation program and information acquisition method
JP2023157932A (en) Face authentication registration device, and a face authentication registration method
CN109840403A (en) Using login method, device, computer readable storage medium and computer equipment
JP7296607B2 (en) Face recognition machine and face recognition method
JP7266185B2 (en) Face authentication system and face authentication method
JP2022084586A (en) Entrance control apparatus and entrance control method
JP2023111936A (en) Face authentication apparatus and face authentication method
JP2023101822A (en) Face authentication machine and face authentication method
CN116777019A (en) Pass evidence verification device and pass evidence verification method
CN114926927A (en) Method, system, electronic device and medium for checking and passing personnel entrance and exit identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant