CN108734813A - The distribution method and device of Temporary Access Control Card - Google Patents
The distribution method and device of Temporary Access Control Card Download PDFInfo
- Publication number
- CN108734813A CN108734813A CN201710255812.4A CN201710255812A CN108734813A CN 108734813 A CN108734813 A CN 108734813A CN 201710255812 A CN201710255812 A CN 201710255812A CN 108734813 A CN108734813 A CN 108734813A
- Authority
- CN
- China
- Prior art keywords
- user
- access control
- control card
- attribute information
- temporary access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
Abstract
The present invention proposes a kind of distribution method and device of Temporary Access Control Card, wherein method includes:Obtain the verification information for being verified to user identity and verification;The attribute information of user is obtained after being verified;According to the attribute information of user Temporary Access Control Card is provided to user;Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.After being verified as a result, by the verification information verified to user identity, there is the temporary card of different access permissions for different user granting, simple and convenient, accuracy is high, to improve the safety of Temporary Access Control Card granting.
Description
Technical field
The present invention relates to technical field of information processing more particularly to the distribution methods and device of a kind of Temporary Access Control Card.
Background technology
In enterprise's scene, the case where employee leaves behind access card, is all occurring daily, and employee gets interim gate inhibition in application
When card, mainly by registering essential information manually on foreground, provided after then being verified to the identity of employee by foreground personnel
One Temporary Access Control Card.
It is existing that Temporary Access Control Card is manually provided for employee by foreground, it is understood that there may be to be difficult to correctly identify worker or knowledge
Wrong situation does not happen occasionally, and leading to Temporary Access Control Card granting, there are prodigious security risks.
Invention content
The present invention proposes a kind of distribution method and its device of Temporary Access Control Card, is manually member for solving existing by foreground
Work provides Temporary Access Control Card, it is understood that there may be is difficult to correctly identify that worker or the situation of identification mistake happen occasionally, cause
There is prodigious security risk in Temporary Access Control Card granting.
First aspect present invention embodiment proposes a kind of distribution method of Temporary Access Control Card, includes the following steps:It obtains
Verification information for being verified to user identity and verification;The attribute information of the user is obtained after being verified;Root
According to the attribute information of the user Temporary Access Control Card is provided to the user;Wherein, what the user of different attribute got is interim
Access card has different access permissions.
Second aspect of the present invention embodiment proposes a kind of distribution method of Temporary Access Control Card, including:Server will be used for
The Quick Response Code verified to user identity is sent to first terminal;The first terminal is shown the Quick Response Code by screen
To user so that the user scans the Quick Response Code by second terminal;The second terminal is by the Quick Response Code after scanning
The server is sent to be verified;The server obtained after being verified the user attribute information issue it is described
First terminal;The first terminal provides Temporary Access Control Card according to the attribute information of the user to the user;Wherein, different
The Temporary Access Control Card that the user of attribute gets has different access permissions.
Third aspect present invention embodiment proposes a kind of first terminal, including:Authentication module, for obtain for
Verification information that family identity is verified and verification;Acquisition module, the attribute for obtaining the user after being verified are believed
Breath;Module is provided, for providing Temporary Access Control Card to the user according to the attribute information of the user;Wherein, different attribute
The Temporary Access Control Card that gets of user there is different access permissions.
Fourth aspect present invention embodiment proposes a kind of access card delivery system, including:Server, for that will be used for pair
The Quick Response Code that user identity is verified is sent to first terminal, receives the two dimension that second terminal used by a user is sent
Code is simultaneously verified, and the attribute information that the user is obtained after being verified is handed down to the first terminal;Described first eventually
End, for receiving the Quick Response Code and the Quick Response Code being shown to user so that the user passes through second terminal by screen
It scans the Quick Response Code, and receives the attribute for the user that the server issues after to being verified of the user
Information, and Temporary Access Control Card is provided to the user according to the attribute information of the user;The second terminal, for scanning
It states Quick Response Code and is sent to the server and verified;Wherein, the Temporary Access Control Card that the user of different attribute gets has
Different access permissions.
Technical solution provided in an embodiment of the present invention can include the following benefits:
After being verified by the verification information verified to user identity, have not for different user granting
Simple and convenient with the temporary card of access permission, accuracy is high, to improve the safety of Temporary Access Control Card granting.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description
Obviously, or practice through the invention is recognized.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, wherein:
Fig. 1 is a kind of flow diagram of the distribution method of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of the distribution method of second of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram provided in an embodiment of the present invention for obtaining facial image;
Fig. 4 is the process schematic that an image provided in an embodiment of the present invention uploads;
Fig. 5 is the flow diagram of the distribution method of the third Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram of Quick Response Code display mode provided in an embodiment of the present invention;
Fig. 7 is the flow diagram of the distribution method of the 4th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 8 is the flow diagram of the distribution method of the 5th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Fig. 9 is a kind of flow diagram of the acquisition methods of current access permission provided in an embodiment of the present invention;
Figure 10 is the flow diagram of the distribution method of the 6th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Figure 11 is the schematic diagram that the different flow of selection provided in an embodiment of the present invention carries out authentication;
Figure 12 is the flow diagram of the distribution method of the 7th kind of Temporary Access Control Card provided in an embodiment of the present invention;
Figure 13 is a kind of flow diagram of the recognition methods of Temporary Access Control Card provided in an embodiment of the present invention;
Figure 14 is the flow diagram of the recognition methods of another Temporary Access Control Card provided in an embodiment of the present invention;
Figure 15 is the flow interaction figure that a Temporary Access Control Card of the embodiment of the present invention is handled;
Figure 16 (a) is the validation of information schematic diagram of the embodiment of the present invention;
Figure 16 (b) is the schematic diagram of the input extension number of the embodiment of the present invention;
Figure 16 (c) is the notification information schematic diagram of the embodiment of the present invention;
Figure 17 is a kind of structural schematic diagram of first terminal provided in an embodiment of the present invention;
Figure 18 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention;
Figure 19 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention;
Figure 20 is the structural schematic diagram of another entrance guard recognition device provided in an embodiment of the present invention;
Figure 21 is a kind of structural schematic diagram of first terminal provided in an embodiment of the present invention;
Figure 22 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention;
Figure 23 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Below with reference to the accompanying drawings the distribution method and device of the Temporary Access Control Card of the embodiment of the present invention are described.
Specifically, whether in living scene, owner leaves behind access card, needs to believe by the way that registration is basic manually at entrance guard
Breath provides a Temporary Access Control Card after then being verified to owner's identity by entrance guard, owner can by the Temporary Access Control Card
Into flat building and the corresponding floor that takes a lift;Or in enterprise's scene, employee leaves behind access card, needs to pass through
Foreground personnel provide a Temporary Access Control Card after being verified to the identity of employee, and employee can be entered by the Temporary Access Control Card
Office building and corresponding office.
Therefore, the user for leaving behind access card for convenience needs to provide Temporary Access Control Card to it.The present invention provides one kind
The distribution method of Temporary Access Control Card, it should be noted that compared with the granting Temporary Access Control Card method of the prior art, the present embodiment
Manually user identity need not be verified, accuracy higher, and there are different access permissions for different user granting
Temporary card, it is safe.
For ease of description, the interim of end side (such as self-service pusher side) the description embodiment of the present invention is concentrated on first below
The distribution method of access card.
It should be noted that the terminal in the present embodiment can be laid on enterprise's office building, residential building etc..
Specifically, Fig. 1 is the flow diagram of the distribution method of the first Temporary Access Control Card provided in an embodiment of the present invention.
As shown in Figure 1, the distribution method of the Temporary Access Control Card includes the following steps:
S101 obtains the verification information for being verified to user identity and verification.
Specifically, it when verifying user identity, needs to obtain the verification information for verifying user identity, and
Verification information is verified.It should be noted that according to concrete application scene difference use can be obtained in different ways
In the verification information and verification verified to user identity, it is illustrated below:
The first example, the facial image that user is acquired by photographic device is used as verification information, by the face figure of user
As being matched with the facial image in face database, if the first user in the facial image and face database of user
When first matching degree of facial image is more than preset first numerical value, then pass through the verification to user identity.
Second of example generates Quick Response Code by the server for the application program installed, Quick Response Code is shown by screen
Show to user, so that user is by the application scan Quick Response Code on mobile terminal and the mark generation of mobile terminal is combined to test
Card information is issued server and is verified.
The third example, the voice messaging that user is acquired by sound pick up equipment are used as verification information, and the voice of user is believed
Breath is matched with the voice messaging in speech database, if second user in the voice messaging and speech database of user
When second matching degree of voice messaging is more than preset second value, pass through the verification to user identity.
4th kind of example, the ID card information that acquisition user is scanned by scanning means are used as verification information, inquire data
Then pass through the verification to user identity if there is ID card information with the presence or absence of ID card information in library.
5th kind of example inputs identity information related to user by the dummy keyboard carried on terminal screen, such as
Then the information such as identity card, cell-phone number inquire database as verification information, if there is above-mentioned verification information, then by right
The verification of user identity.For example, when user is a visitor, a reservation code can be exported by dummy keyboard and be used as verification
Information.When user is zooid's working hour, ID card information or the phone number that itself can be inputted with dummy keyboard are used as and test
Demonstrate,prove information.
It should be noted that the verification information and verification mode to acquisition for being verified to user identity are only above
For example, can be selected and be adjusted according to the actual application.
S102 obtains the attribute information of user after being verified.
Specifically, after being verified, in order to accurately provide Temporary Access Control Card to user, then the attribute for obtaining user is needed
Information.Wherein it is possible to according to practical application scene needs, different verification modes is selected, using different verification modes, is obtained
The attribute information of user is different, is illustrated below:
The first example, for facial image as verification information, the attribute information for obtaining user includes from face database
The attribute information for obtaining the first user, using the attribute information of the first user as the attribute information of user.
Second of example, application scan Quick Response Code are verified and the mark of mobile terminal are combined to generate verification information, obtain
The attribute information for taking family includes the attribute information for receiving the user that server is sent after being verified, the wherein attribute of user
Information is got according to the mark of mobile terminal by server.
The third example, for voice messaging as verification information, the attribute information for obtaining user includes from speech database
The attribute information for obtaining second user, using the attribute information of second user as the attribute information of user.
4th kind of example, for ID card information as verification information, the attribute information for obtaining user includes acquisition and identity card
The attribute information of the corresponding third user of information, using the attribute information of third user as the attribute information of user.
It should be noted that with upper type be only when be verified after acquisition user attribute information for example, can
To select or be arranged according to the actual application in a manner of others.
S103 provides Temporary Access Control Card, wherein the user of different attribute gets according to the attribute information of user to user
Temporary Access Control Card have different access permissions.
Specifically, it after the attribute information for obtaining user, needs to provide interim door to user according to the attribute information of user
Prohibit card.After determining the corresponding access permission of user according to attribute information, the interim gate inhibition of corresponding permission is sent to user
Card.The safety of Temporary Access Control Card transmission is further increased as a result,.
It should be noted that can be believed in different ways according to the attribute of user according to practical application scene needs
It ceases to user and provides Temporary Access Control Card, be illustrated below:
The first example pre-sets the correspondence between the attribute information querying attributes of user and access permission, into
And according to the attribute information of user, it inquires the correspondence and obtains corresponding target access permission.Further, according to target door
Prohibit permission and Temporary Access Control Card be generated for user, by access card with entity card or virtual card (can mobile terminal etc. just
Take in equipment and show) form to user provide Temporary Access Control Card.
Second of example is prestored and is obtained after determining the attribute information of user with the relevant Processing Algorithm of attribute information
The relevant parameter of Processing Algorithm for taking and prestoring is calculated, and determines target access permission corresponding with the attribute information, and
Temporary Access Control Card is generated for user according to target access permission, access card (can moved with entity card or virtual card
Being shown in the portable equipments such as dynamic terminal) form provides Temporary Access Control Card to user.
It should be noted that being only the citing for providing Temporary Access Control Card to user according to the attribute information of user with upper type
Illustrate, can select or be arranged other modes according to the actual application.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, passes through what is verified to user identity
After verification information is verified, there is the temporary card of different access permissions for different user granting, it is simple and convenient,
Accuracy is high, to improve the safety of Temporary Access Control Card granting.
Based on above example, in order to which more clearly how description obtains the verification for being verified to user identity
Information is simultaneously verified, and the attribute information of user is obtained after being verified, is described as follows by Fig. 2-embodiment illustrated in fig. 6:
Fig. 2 is the flow diagram of the distribution method of second of Temporary Access Control Card provided in an embodiment of the present invention.
The present embodiment is according to facial image as verification information, by the facial image in facial image and face database
Carry out matching be verified after, attribute information of the attribute information as user of the first user is obtained from face database.
It illustrates as shown in Fig. 2, the step S101 i.e. in above-described embodiment includes:S201-S203;Step S102 packets
It includes:S204-S205.
S201, the facial image that user is acquired by photographic device are used as verification information.
S202 matches the facial image of user with the facial image in face database.
S203, when the first matching degree of the facial image of the first user in the facial image and face database of user is more than
When preset first numerical value, then pass through the verification to user identity.
Specifically, photographic device is provided on self-service machine, user can trigger photographic device by modes such as manual, voices
It starts to work, and acquires the facial image of user as verification information.Wherein, the mode that photographic device obtains facial image has very
It is a variety of, selection setting can be carried out according to the actual application.
As a kind of way of realization, as shown in figure 3, photographic device reaches predeterminable area in the face for detecting active user
When, triggering positioning lamp lights, and prompts the eyes of active user to look at positioning lamp straight in preset time, and in the eyes of active user
Corresponding facial image is acquired during direct-view positioning lamp.Wherein, predeterminable area is pre-set can to carry out facial knowledge
Other region, the i.e. face of active user, which enter in the predeterminable area, indicates that facial recognition modules can start collecting work.
In turn, the facial image of acquisition is matched with the facial image in face database.Wherein, face database
It builds and stores in advance.In the present embodiment, according to preset first database construction strategy, face number is built in advance
According to library.
It should be noted that be at least stored in face database the facial image of the first user, the first user attribute
Correspondence between information and the facial image and the attribute information of the first user of the first user.
It should be noted that according to different application scenarios, the first data construction strategy difference is to ensure information security
And recognition efficiency.As an example with enterprise's scene, the form that institutional framework grouping may be used carries out construction strategy, first
It accesses Human Resource Department's interface to obtain the attribute informations such as name, institutional framework and the head portrait of employee and preserve, then by employee's group
Structure duplicate removal (for example employee A had not only belonged to institutional framework B but also belonged to institutional framework C, and A employee, which is belonged to institutional framework C, to delete) is knitted,
Create face database according to institutional framework, finally employee information traversed, according to institutional framework, by the name of employee and
Head portrait is created in the corresponding face database of organizational structure.
In practical applications, it such as in above-mentioned enterprise's scene, there are employee's change conditions, needs periodically to human face data
Library is updated, to ensure the safety of Temporary Access Control Card granting.Continue with enterprise's scene as an example, from related data
All employees of the previous day record are obtained in library, then obtain current employee's record, the person of comparison by accessing Human Resource Department's interface
Whether the institutional framework of work has altered, and in the case where having altered, needs to be updated employee information, while comparing employee's shape
State always deletes Personnel Who Left from face database, will be in rigid entrant update to face database.
Wherein, can be periodically one day, two days etc., selection setting according to the actual application.
Specifically, in recognition of face, the facial image of user is matched with the facial image in face database,
The facial image characteristic of user is matched with the facial image characteristic in face database, is known if comparing
Matching result is more than preset first numerical value, it is determined that the identity of active user has legitimacy, such as first numerical value can be with
It is 95%.
Further, it is at least stored with the attribute information of the first user in face database, can also include the first user
Other information, for example, the essential informations such as phone number, ID card information, extension number, age, gender.Wherein, the hand of user
Machine number, ID card information, extension number etc. can be as the identification informations of user.
When the first matching degree of the facial image of the first user in the facial image and face database of user is no more than in advance
If the first numerical value when, then by specifically including following steps to the verification of user identity:
Obtain the identification information of user.For example in above-mentioned enterprise's scene, further user can be required to input other
Identification information, can be user base extension number or phone number, to determine corresponding first user of the user.
After getting the identification information of user, the identification information that can will be got is used in face database first
The identification information at family is compared, and when the identification information of the two is consistent, then can pass through the verification to user identity.
For example, user's input handset number can be prompted, in order to further increase the accuracy of authentication, upper
When the identification information both stated is consistent, further according to the phone number of the input of user, send a wechat to user hand
On machine, user carries out secondary-confirmation by the link in wechat, after being determined as user after being identified through, then by user
The verification of identity.In the present embodiment, the secondary verification of phone number is introduced on the basis of recognition of face, is changed traditional single
Recognition mode provides more rich application scenarios, safety higher for identification.
It should be noted that when user is in the case of recognition of face failure, further other manner is selected to be verified
By rear, user can be reminded to upload newest head portrait, user actively to user's pushed information (being not limited to short message, wechat form)
Head portrait upload operation can be directly carried out by the link in pushed information, promotes face verification discrimination next time.
Fig. 4 is the process schematic that an image provided in an embodiment of the present invention uploads, as shown in Figure 4:
Specifically, it after user opens pushed information link by point, shows as shown in left side interface in Fig. 4 in front of the user,
Remind user in order to occur the case where promoting self-service machine recognition of face accuracy, that is, avoid recognition failures next time, user can be with
It clicks " upload pictures " and uploads and meet pictures without a hat on, without requirements such as ink marks, clear and uniform lights.It clicks and " uploads in user
After photo ", suitable photo upload can be selected, the result of upload is as shown in Fig. 4 intermediate interfaces, and user is by click " in confirmation
Pass " photo upload is completed, display uploads successfully interface, on the right of Fig. 4 shown in interface.It is understood that interface between in Fig. 4
Shown, user can also click on " taking pictures again ", and the photo of user in real is uploaded, and further promotes face and knows
Other accuracy.
In the present embodiment, a closed loop can be formed during recognition of face, after recognition can with proactive notification, and
And may remind the user that and upload nearest user's facial image, it allows entire identification process to form closed loop, improves recognition efficiency.
It should be noted that when the two identification information is inconsistent, it is determined as non-user.
In practical application as two the first users similar there are two looks in face database, when by the people of user
When face image is matched with the facial image in face database, so that it may the facial image of user and two first can occur
First matching degree of the facial image of user exceeds the case where preset first numerical value, at this point, in order to improve Temporary Access Control Card hair
The accuracy put needs the other information for further verifying user, such as can be four, extension set after the phone number of user
Number etc., to determine the first user corresponding to the user in two the first users.For example, there are two the first user A by user X
And B, then the extension of user X inputs is 4567, and the extension of the first user A is 0123 in face database, and
The extension of first user B is 4567, then can determine that user X is corresponding with the first user B, i.e., by the category of the first user B
Attribute information of the property information as user X.
S204 obtains the attribute information of the first user from face database.
S205, using the attribute information of the first user as the attribute information of user.
Specifically, after being verified, that is, the facial image of facial image and the user X in face database is determined
Match, the attribute information of user X is obtained from face database.Getting the attribute information of the first user and as user
Attribute information.
In the present embodiment, by taking enterprise's scene as an example, attribute information can be the post type of user, or user's
Employee's type etc..Can be the different rank of different post settings, different ranks can correspond to different in the present embodiment
Access permission.Different posies may include occurrences in human life post, administrative post etc..Alternatively, can be that different employee's types is arranged
Different ranks, employee's type may include:Sales force, administrative staff etc..For another example user is further divided into office worker
Work carries out employee or visitor etc., and the relevant information and image of visitor can also be prestored in face database.
As an example, corresponding access permission is arranged according to position level, for example common staff has unlatching
The permission of place office door;Line manager has the permission for opening all office doors of department.In addition also directed to difference
The corresponding access permission of Department formation, such as the employee of administrative department have the permission for opening meeting room door;Research and development department has
Open the permission of laboratory door.And it can be arranged with the permission etc. into company's gate and elevator for visitor.
Fig. 5 is the flow diagram of the distribution method of the third Temporary Access Control Card provided in an embodiment of the present invention.
The present embodiment is according to application scan Quick Response Code and the mark generation verification information of mobile terminal to be combined to issue
Server authentication, and server gets the attribute information of user according to the mark of mobile terminal after being verified.
It illustrates as shown in figure 5, the step S101 i.e. in above-described embodiment includes:S301-S302;Step S102 packets
It includes:S303.
S301 generates Quick Response Code by the server for the application program installed.
S302, by Quick Response Code by screen display to user, so that user passes through the application scan on mobile terminal
The mark generation verification information of Quick Response Code and combination mobile terminal is issued server and is verified.
Specifically, the information such as belonging positions, itself title and a random number are supplied to the application of installation by self-service machine
The server of program, server encode above- mentioned information, generate the Quick Response Code with chained address by screen display to use
Family, as shown in Figure 6.
In turn, user can (mobile phone as shown in Figure 6 can also be tablet computer, smartwatch by second terminal
Deng) application program (wechat as shown in FIG. 6 can also be QQ etc.) scan the two-dimensional code, and combine mobile terminal mark (no
With the corresponding mobile terminal of user mark it is different, so can determine that the uniqueness of user) generate verification information and issue clothes
Business device is verified.
Specifically, server is able to verify that whether the permission of mobile terminal, i.e. user have access rights according to verification information.
S303 receives the attribute information for the user that server is sent after being verified;The attribute information of wherein user is
It is got according to the mark of mobile terminal by server.
Specifically, after server authentication passes through, the attribute information of the user of server transmission can be received, that is, is serviced
According to the corresponding user of the identifier lookup of mobile terminal, and obtain its attribute information.
In the present embodiment, server can in advance be acquired the essential information of user, such as the attribute information of user,
The essential informations such as phone number, the identification code of mobile terminal, ID card information, extension number, age, gender are acquired.With enterprise
For industry scene, enterprise can register a public platform in the server, and employee can pay close attention to the public platform, then fill out
It is written from oneself essential information, this completes the information collections to employee.Further, the user of visitor's class can also be to this
Public platform is paid close attention to, and then selection preengages and fills in relevant essential information under public platform.
Fig. 7 is the flow diagram of the distribution method of the 4th kind of Temporary Access Control Card provided in an embodiment of the present invention.
The present embodiment be using voice messaging as verification information, by the voice messaging in voice messaging and speech database into
After row matching is verified, attribute information of the attribute information of second user as user is obtained from speech database.
It illustrates as shown in fig. 7, the step S101 i.e. in above-described embodiment includes:S401-S203;Step S402 packets
It includes:S404-S405.
S401, the voice messaging that user is acquired by sound pick up equipment are used as verification information.
S402 matches the voice messaging of user with the voice messaging in speech database.
S403, when the second matching degree of the voice messaging of second user in the voice messaging and speech database of user is more than
When preset second value, pass through the verification to user identity.
Specifically, sound pick up equipment is provided on self-service machine, user can trigger sound pick up equipment by the modes such as manual and start
Work, and acquire user voice messaging (such as user according to interface provide text read aloud one section words or be at will to say one section
Words) it is used as verification information.
In turn, the voice messaging of acquisition is matched with the voice messaging in voice messaging library.More specifically, passing through language
Message breath is handled, and vocal print feature is then extracted, and establishes related sound-groove model, and last vocal print is compared to determine whether to match.
And the second matching degree of the voice messaging of second user is more than preset second in the voice messaging and speech database of user
Pass through the verification to user identity when numerical value.
Wherein, speech database builds and stores in advance.In the present embodiment, according to preset second database
Construction strategy builds speech database in advance.
It should be noted that be at least stored in speech database the voice messaging of second user, second user attribute
Correspondence between the attribute information of the voice messaging and second user of information and second user.
It should be noted that according to different application scenarios, the second data construction strategy difference is to ensure information security
And recognition efficiency.Second data construction strategy can be identical as the first data construction strategy, can be built according to institutional framework
Speech database, the building process about speech database can be found in the building process of face database, and details are not described herein again.
Further, it is at least stored with the attribute information of second user in speech database, can also include second user
Other information, for example, the essential informations such as phone number, ID card information, extension number, age, gender.Wherein, the hand of user
Machine number, ID card information, extension number etc. can be as the identification informations of user.
When the second matching degree of the voice messaging of second user in the voice messaging and speech database of user is more than default
Second value when, then by specifically including following steps to the verification of user identity:
Obtain the identification information of user.For example in above-mentioned enterprise's scene, further user can be required to input other
Identification information, can be user base extension number or latter four of phone number, to determine the user corresponding the
Two users.
After getting the identification information of user, the identification information that can will be got is used in speech database second
The identification information at family is compared, and when the identification information of the two is consistent, then can pass through the verification to user identity.
There are similar two second users of two voices in practical application, when by the voice messaging and voice data of user
When voice messaging in library is matched, so that it may the facial image of the facial image of user and two second users can occur
Second matching degree exceeds the case where preset second value, at this point, in order to improve the accuracy of Temporary Access Control Card granting, need into
It verifies to one step the other information of user, such as can be four after the phone number of user, extension etc., to two the
Second user corresponding to the user is determined in two users.For example, user X is there are two second user C and D, then user X inputs
Extension is 4567, and the extension of second user C is 0123 in face database, and the extension number of second user D
Code is 4567, then can determine that user X is corresponding with second user D, i.e., using the attribute information of second user D as user X's
Attribute information.
It is understood that if in the voice messaging and speech database of user the voice messaging of second user second
When matching degree is no more than preset second value, do not pass through the verification to user identity.
S404 obtains the attribute information of second user from speech database.
S405, using the attribute information of second user as the attribute information of user.
Specifically, after being verified, that is, the voice messaging of facial image and the user Y in speech database is determined
Match, the attribute information of user Y is obtained from speech database, and as the attribute information of user.About attribute information
The record that can be found in related content in embodiment in above-described embodiment is introduced, details are not described herein again.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, by different modes to user identity
After the verification information verified is verified, there is the temporary card of different access permissions, behaviour for different user granting
Make simple and convenient, accuracy height, to the efficiency for improving Temporary Access Control Card granting, safe, reduction cost of labor.
Fig. 8 is the flow diagram of the distribution method of the 5th kind of Temporary Access Control Card provided in an embodiment of the present invention, in step
After S102, the distribution method of the Temporary Access Control Card further includes:
S501 is obtained according to the correspondence between the attribute information querying attributes and access permission of user with user's
The corresponding target access permission of attribute information.
Specifically, different attribute-bits is set for different attributes in advance, and not for different access permission settings
Same capability identification utilizes the correspondence between attribute-bit and capability identification structure attribute and permission.Further, this is right
Further include the storage address of permission in should being related to, i.e., stored in the corresponding memory space of storage address have permission it is specific in
Hold.That is, correspondence includes the mapping relations between attribute-bit, capability identification and storage address.
Fig. 9 is to be obtained with user's according to the correspondence between the attribute information querying attributes and access permission of user
The flow diagram of the corresponding target access permission of attribute information, specifically includes following steps:
S5011 inquires correspondence according to the attribute-bit of user, obtains target gate inhibition power corresponding with attribute-bit
The capability identification of limit.
Specifically, the method that can be recorded according to above-described embodiment obtains the attribute information of user, the attribute letter of the user
Breath is attribute-bit.
S5012 inquires storage address corresponding with capability identification from the correspondence.
S5013 positions memory space according to storage address, target access permission is read from memory space.
In the present embodiment, different memory spaces is set in advance for different access permissions, each memory space has one
A storage address is stored with the particular content of access permission in the memory space.In the permission mark according to target access permission
Know, after the storage address of capability identification that can get the target access permission in correspondence, so as to navigate to
The corresponding memory space of the storage address, then reads the particular content of target access permission from the memory space.
Temporary Access Control Card is generated for user according to target access permission in S502.
Specifically, the correspondence between attribute and access permission is prestored, is looked into according to the user information attribute of acquisition
The correspondence is ask, target access permission corresponding with the attribute information of user is obtained, and is user according to target access permission
Generate Temporary Access Control Card.I.e. Temporary Access Control Card, which can be directed to different user, has different permissions.
It, (can be with entity card or virtual card by access card it should be noted that after generating gate inhibition's temporary card
Shown in the portable equipments such as mobile terminal) form to user provide Temporary Access Control Card.
After Temporary Access Control Card is issued to user, the term of validity of Temporary Access Control Card can be monitored, and
After user gets Temporary Access Control Card, the long-term access card which is possessed is arranged within the term of validity of Temporary Access Control Card
At failure state safety can be improved to ensure that company can only be entered using an access card in one user of synchronization
Property.
The mark of Temporary Access Control Card and possessed target access permission are sent to access control system, so that door by S503
Access control system is associated registration to the mark of Temporary Access Control Card with possessed target access permission.
In the present embodiment, the mark of access card and possessed target access permission can be sent to access control system,
After access control system receives the mark of Temporary Access Control Card, the mark of Temporary Access Control Card and possessed target access permission are closed
Connection registration.
In practical application, when user uses gate inhibition's temporary card, access control system can carry out respective handling to it, specifically
Ground reads access card mark, judges whether it has the permission allowed access into, if there is allowing access into, if not provided, can lead to
The modes such as voice, whistle are crossed to be prompted.Wherein, the mark of Temporary Access Control Card refers to that can determine unique access card, is had only
One property.
It should be noted that in order to further improve the security, Temporary Access Control Card has term of validity, such as specially 8
Hour, 24 hours etc..
The term of validity of Temporary Access Control Card is issued access control system, so that access control system has Temporary Access Control Card by S504
Effect property is monitored.
Specifically, different Temporary Access Control Cards may have different term of validity.Thus, it is desirable to by Temporary Access Control Card
The term of validity issues access control system, and access control system can allow access into the Temporary Access Control Card with permission in the term of validity;To not
All Temporary Access Control Cards before the deadline are all prohibited from entering.For example, the term of validity of Temporary Access Control Card is 24 hours, it is small more than 24
Shi Hou, the access card no longer have permission, effectively promote the safety of Temporary Access Control Card granting.Access control system can have according to this
The effect time limit recycles the access permission of Temporary Access Control Card, and after expiring the term of validity of Temporary Access Control Card, access control system can
The elimination of the access permission of Temporary Access Control Card or the Temporary Access Control Card are in failure state.
Figure 10 is the flow diagram of the distribution method of the 6th kind of Temporary Access Control Card provided in an embodiment of the present invention.Such as Figure 10
Shown, the distribution method of the Temporary Access Control Card includes the following steps:
S601, for server by for being sent to first terminal to the Quick Response Code that user identity is verified, first terminal is logical
It crosses screen and Quick Response Code is shown to user, so that user is scanned the two-dimensional code by second terminal, second terminal is by two after scanning
Dimension code is sent to server and is verified.
Specifically, user can by selecting different flow to carry out authentication according to oneself identity, as shown in figure 11,
In enterprise's scene, the click left side " about visitor " can be selected to start to verify flow if user is visitor's identity;
If user is worker, " the employee's startup " of clicking the right can be selected to start to verify flow.
In turn, (for example " member in Figure 11 is clicked according to oneself worker after user starts selection according to actual needs
Work starts "), by for being sent to first terminal to the Quick Response Code that user identity is verified, first terminal passes through screen display
Give user (as shown in Fig. 6 in above-described embodiment).It is understood that generating Quick Response Code can show, as a result, by two
Tie up code by screen display to user before, need the Quick Response Code that generates and sends of server for receiving application program.
In turn, user (can be not limited to one kind in mobile phone, tablet computer and intelligent wearable device etc. by second terminal
Or it is a variety of) on application program (being not limited to one or more of wechat, QQ and microblogging etc.) scan the two-dimensional code and issue
The server of application program is verified.
Specifically, the mark of Quick Response Code and second terminal after scanning is sent to server by second terminal;Server root
Authentication is carried out according to Quick Response Code, the attribute information that server obtains user after being verified issues first terminal, including:Clothes
Business device obtains the attribute information of user after being verified according to the mark of second terminal, and server sends out the attribute information of user
Give first terminal.
It is understood that server is previously stored with the attribute information of user, as a kind of realization method, server connects
It receives the essential information that user sends and forms customer data base, wherein essential information includes attribute information and the second end of user
The mark at end.Obtain the attribute information of user according to the mark of second terminal after server authentication passes through as a result, including:Clothes
Business device inquires customer data base after being verified according to the mark of second terminal, obtains the attribute information of user.
S602, the attribute information that server obtains user after being verified issue first terminal.
Specifically, server returns to the attribute information of first terminal user after being verified.
S603, first terminal provide Temporary Access Control Card according to the attribute information of user to user, wherein the use of different attribute
The Temporary Access Control Card that family is got has different access permissions.
Specifically, it after the attribute information for obtaining user, needs to provide interim door to user according to the attribute information of user
Prohibit card.After determining the corresponding access permission of user according to attribute information, the interim gate inhibition of corresponding permission is sent to user
Card.The safety of Temporary Access Control Card transmission is further increased as a result,.
It should be noted that can be according to practical application scene needs, first terminal is in different ways according to user
Attribute information to user provide Temporary Access Control Card, be illustrated below:
The first example, first terminal is according to pre-setting between the attribute information querying attributes of user and access permission
Correspondence, and then according to the attribute information of user, inquire the correspondence and obtain corresponding target access permission, with according to mesh
Temporary Access Control Card is generated for user in mark access permission, (can be in mobile terminal with entity card or virtual card by access card
Being shown in equal portable equipments) form provides Temporary Access Control Card to user.
Second of example, first terminal according to prestore with the relevant Processing Algorithm of attribute information, determining user's
After attribute information, the relevant parameter of Processing Algorithm for obtaining and prestoring is calculated, and determines target corresponding with the attribute information
Access permission, and Temporary Access Control Card is generated for user according to target access permission, by access card with entity card or virtually
Card (can show) that form provides Temporary Access Control Card to user in the portable equipments such as mobile terminal.
It should be noted that being only the citing for providing Temporary Access Control Card to user according to the attribute information of user with upper type
Illustrate, can select or be arranged other modes according to the actual application.
By taking the first example as an example, Temporary Access Control Card is provided to user and by the mark of access card and possessed
Target access permission is sent to access control system (after access control system receives the mark of Temporary Access Control Card, by the mark of Temporary Access Control Card
It is associated registration with possessed target access permission).As a result, when user uses gate inhibition's temporary card, access control system can
It is carried out accordingly (to read access card mark, judge whether it has the permission allowed access into, if there is allowing access into, such as
Fruit does not have, and can be prompted by modes such as voice, whistles).Wherein, the mark of Temporary Access Control Card refers to that can determine uniquely
Access card has uniqueness.
It should be noted that in order to further improve the security, Temporary Access Control Card has term of validity, such as specially 8
Hour, 24 hours etc..
Specifically, different Temporary Access Control Cards may have different term of validity.Thus, it is desirable to by Temporary Access Control Card
The term of validity issues access control system, and access control system can allow access into the Temporary Access Control Card with permission in the term of validity;To not
All Temporary Access Control Cards before the deadline are all prohibited from entering.For example, the term of validity of Temporary Access Control Card is 24 hours, it is small more than 24
Shi Hou, the access card no longer have permission, effectively promote the safety of Temporary Access Control Card granting.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, will be used for by server to user's body
The Quick Response Code verified of part is sent to first terminal, then first terminal by screen display to user so that user passes through
Second terminal scans the two-dimensional code and issues the server of application program and verified, and the attribute of user is obtained after being verified
Information issues first terminal, and last first terminal provides Temporary Access Control Card according to the attribute information of user to user, wherein different
The Temporary Access Control Card that the user of attribute gets has different access permissions, simple and convenient, and accuracy is high, to improve
The safety of Temporary Access Control Card granting.
In order to more comprehensively illustrate the embodiment of the present invention Temporary Access Control Card distribution method, below concentrate to apply journey
Sequence (such as wechat, QQ etc.) server side describes the distribution method of the Temporary Access Control Card of the embodiment of the present invention.
Figure 12 is the flow diagram of the distribution method of the 7th kind of Temporary Access Control Card provided in an embodiment of the present invention.Such as Figure 12
Shown, the distribution method of the Temporary Access Control Card includes the following steps:
S701 receives verification information of the mobile terminal transmission of user for being verified to user identity, verification information
It include the mark of Quick Response Code and mobile terminal.
S702 carries out authentication according to the Quick Response Code in verification information.
Specifically, apps server is needed to address, terminal iidentification belonging to specific terminal (such as self-service machine) in advance
And the information such as random number encode generating Quick Response Code and being sent to terminal and be shown.
In turn, verification information that user sends by way of scanning the two-dimensional code (including Quick Response Code and movement can be received
The mark of terminal).Authentication is carried out according to the Quick Response Code in verification information as a result,.After scanning the two-dimensional code, by applying journey
The permission of relevant interface (such as openid of wechat) the verification mobile terminal of sequence completes authentication.
S703 obtains the attribute information of user after being verified according to the mark of mobile terminal.
The attribute information of user is sent to terminal by S704, so that terminal provides interim door according to attribute information to user
Prohibit card, wherein the Temporary Access Control Card that the user of different attribute gets has different access permissions.
It should be noted that the essential information that apps server receives user's transmission in advance (includes the attribute of user
The mark of information and mobile terminal) and form customer data base.
In turn, after being verified, customer data base is inquired according to the mark of mobile terminal, obtains the attribute information of user
It is sent to terminal, so that the user for different attribute provides Temporary Access Control Card of the card with different access permissions.
In conclusion the distribution method of the Temporary Access Control Card of the embodiment of the present invention, the mobile terminal by receiving user is sent out
The verification information of the mark including Quick Response Code and mobile terminal for being verified to user identity is sent, and according to verification information
In Quick Response Code carry out authentication, then after being verified according to mobile terminal mark obtain user attribute information send out
Terminal is given, so that the user for different attribute provides Temporary Access Control Card of the card with different access permissions.It operates as a result,
It is simple and convenient, accuracy is high, to improve Temporary Access Control Card granting safety and reduce cost of labor.
Based on above-described embodiment, in order to more clearly describe after sending Temporary Access Control Card to user, entrance guard device is such as
What carries out different operation and controls for the Temporary Access Control Card of different rights, below with a kind of interim described in the collection of entrance guard device side
The recognition methods of access card.
Figure 13 is a kind of flow diagram of the recognition methods of Temporary Access Control Card provided in an embodiment of the present invention.Such as Figure 13 institutes
Show, the recognition methods of the Temporary Access Control Card includes the following steps:
S801 obtains the access permission of Temporary Access Control Card.
Specifically, it when there is the permission for opening target door to judge Temporary Access Control Card, needs to obtain interim gate inhibition
The access permission of card.It should be noted that according to concrete application scene difference interim gate inhibition can be obtained in different ways
The access permission of card, is illustrated below:
The first example receives the mark for the Temporary Access Control Card that target door is sent, and is inquired according to the mark of Temporary Access Control Card
Incidence relation between the mark of Temporary Access Control Card and possessed access permission, gets the access permission of Temporary Access Control Card.
Illustrate how target door obtains Temporary Access Control Card mark as a kind of scene:(gate inhibition is interim by way of swiping the card by user
Card is entity card) so that target door obtains the mark of Temporary Access Control Card.How target door is illustrated as another scene
Obtain Temporary Access Control Card mark:User establishes connection by mobile terminal and target door and sends Temporary Access Control Card mark so that mesh
Mark the mark (the case where Temporary Access Control Card is virtual card can be directed to) that door obtains Temporary Access Control Card.
The mark of Temporary Access Control Card is directly sent to entrance guard device by second of example, user by mobile terminal, in turn,
Mark of the entrance guard device according to the mark inquiry Temporary Access Control Card of Temporary Access Control Card and being associated between possessed access permission
Relationship gets the access permission of Temporary Access Control Card.
It should be noted that the above access permission mode to obtaining Temporary Access Control Card is by way of example only, it can basis
Practical application is selected and is adjusted.
It is understood that the association for pre-saving the mark and possessed access permission of each Temporary Access Control Card is closed
System can obtain its access permission having according to the mark of Temporary Access Control Card.Specifically, in the present embodiment, it can receive
The mark and possessed access permission for each Temporary Access Control Card that terminal is sent, and according to the mark of each Temporary Access Control Card and institute
The access permission having, establishes incidence relation.
S802 judges whether that Temporary Access Control Card has the permission for opening target door according to access permission.
S803 then opens target door when judging that Temporary Access Control Card has the permission for opening target door.
Specifically, it may determine that whether Temporary Access Control Card has the permission for opening target door according to the access permission of acquisition,
When Temporary Access Control Card has the permission for opening target door, target door is opened.It is understood that not having in Temporary Access Control Card
When opening the permission of target door, target door closure state is kept.
It should be noted that Temporary Access Control Card has term of validity.Need the term of validity of reception Temporary Access Control Card, and root
The validity of Temporary Access Control Card is monitored according to term of validity.
As an example, when judging that Temporary Access Control Card has the permission for opening target door, further basis is needed
Term of validity judges whether Temporary Access Control Card has validity, and target door is opened when Temporary Access Control Card has validity;?
When Temporary Access Control Card does not have validity, target door closure state is kept.
In conclusion the recognition methods of the Temporary Access Control Card of the embodiment of the present invention, by the gate inhibition for obtaining Temporary Access Control Card
Permission, and judge whether that Temporary Access Control Card has the permission for opening target door according to access permission, finally when judging interim door
Prohibit card and opens target door when there is the permission for opening target door.It is user-friendly as a result, by improving recognition efficiency, and root
Effective monitoring is carried out according to the Temporary Access Control Card term of validity, further increases safety.
Figure 14 is the flow diagram of the recognition methods of another Temporary Access Control Card provided in an embodiment of the present invention, in step
After S803, the recognition methods of the Temporary Access Control Card further includes:
S901, after user gets Temporary Access Control Card, by the long-term access card of user Temporary Access Control Card the term of validity
It is arranged to failure state in limit.
S902 recycles Temporary Access Control Card, deletes the access permission in Temporary Access Control Card.
Specifically, it after providing Temporary Access Control Card, needs facing the other access cards of the user (such as long-term access card)
When access card term of validity in be arranged to failure state.To ensure that a user can only be by a card with entering corresponding target
Point improves safety.
Specifically, Temporary Access Control Card can be recycled for different situations according to concrete application scene, be illustrated below:
The first example deletes the access permission in the Temporary Access Control Card when user gives back Temporary Access Control Card.
Second of example, Temporary Access Control Card delete the access permission in the Temporary Access Control Card when exceeding term of validity.
It should be noted that by way of example only above in relation to different situation recycling Temporary Access Control Cards, it can be according to reality
Border application is selected and is adjusted.
As a result, by after user gets Temporary Access Control Card, by long-term access card the having in Temporary Access Control Card of user
It is arranged to failure state and recycling Temporary Access Control Card in the effect time limit, deletes the access permission in Temporary Access Control Card, further increase
Safety.
Figure 15 is the flow interaction figure that a Temporary Access Control Card of the embodiment of the present invention is handled.
Referring to Figure 15, illustrate by taking enterprise's scene as an example, the present embodiment includes:Employee, self-service machine, wechat, guest system, people
Face system, access control system and pass gate.The present embodiment is provided in this embodiment by the information exchange citing description between equipment
The concrete application scene of the flow of Temporary Access Control Card granting, identification, is described as follows:
It should be noted that self-service machine can carry out generating wechat verification Quick Response Code, crawl facial image, provide casual labour
Card, the also operations such as card.Wechat public platform is authenticated mainly for worker.Guest system mainly verifies worker.Face system
System mainly verifies worker by Face datection.Access control system be substantially carried out registration access permission, verification access permission,
Recycle the operations such as access permission.
Specifically, employee enter company find leave behind access card, can by trigger self-service machine generate Quick Response Code and
Photographic device on self-service machine takes pictures two ways progress authentication to provide Temporary Access Control Card.It is divided to two kinds of examples below, point
The specific verification process of above two mode is not described.
Example one, after generating Quick Response Code, employee can be scanned the two-dimensional code by the wechat execution installed on mobile terminal
Operation verifies worker by wechat, and provides Temporary Access Control Card after being verified.
In order to which those skilled in the art are more clear how to verify the detailed process of worker by wechat, with reference to Figure 16
(a) it is described as follows:
Specifically, after being scanned (as shown in Fig. 6 in above-described embodiment) to Quick Response Code by wechat, such as Figure 16 (a)
Shown, employee enters handset identities and confirms the page, accesses system and verifies mobile phone permission, i.e., non-employee's hand by the openid of wechat
Machine number does not allow access for, and employee confirms that this confirmation is saved in caching while is arranged by identity, guest system on mobile phone
Out-of-service time (such as 1 minute, two minutes).
It should be noted that self-service machine is in advance by letters such as affiliated address, mark (such as title, sequence number etc.) and random numbers
Breath is sent to guest system, and guest system encodes above- mentioned information, generates the Quick Response Code with chained address.Employee is scanned as a result,
Associated verification interface can be entered after Quick Response Code.
Specifically, in order to further ensure safety, self-service machine per preset time (such as 3 seconds), again by affiliated address,
The mark information such as (such as title, sequence number etc.) and random number are sent to guest system and are recycled, and guest system is from caching
Query result after confirming worker, will confirm that result notice to self-service machine, self-service machine carries out interim door after receiving confirmation result
Prohibit card printing (the Temporary Access Control Card granting i.e. in above-described embodiment).
Example two, after starting photographic device and being taken pictures, after face system detects worker by facial image,
Input extension number interface is shown on self-service machine, and provides Temporary Access Control Card after extension number input is correct.
In order to which those skilled in the art are more clear how to verify the detailed process of worker by facial image, illustrate
It is as follows:
Specifically, employee can select oneself corresponding institutional framework, self-service machine by calling system (such as
Avicap32.dll) start photographic device, employee is self-service by facial alignment camera (as shown in Fig. 3 in above-described embodiment)
Machine intercepts shooting area facial image by the screenshotss function of system.
In turn, facial image is sent to guest system by self-service machine, guest system call face system on human face image into
Row detection, after being confirmed as face, corresponding facial image is found by employee's institutional framework in preset face database, and
It is matched, matching degree is returned into self-service machine more than predetermined threshold value, that is, successful result.
In turn, after detecting worker by facial image, input extension number interface, such as Figure 16 are shown on self-service machine
(b) shown in, " five figure extension number please be input ", and provide Temporary Access Control Card after extension number input is correct.
Specifically, can (can pre-set by way of wechat information after providing Temporary Access Control Card
Automatically reply mode) notify employee to get Temporary Access Control Card to further ensure that safety.Display interface can be such as figure
Shown in 16 (c).
It is understood that before providing Temporary Access Control Card, it is also necessary to determine the access permission of employee, you can to pass through
The modes such as the work card number of employee are sent to guest system, the interface that guest system is provided by entrance guard device as the mark of employee
The permission of work card number is verified, and result is returned into self-service machine.It is directed to the interim gate inhibition that different employees provide different access permissions
Card.
It should be noted that neocaine is not no concrete power limit, need to carry out registration to entrance guard device by card reader to award
The modes such as power assign different permissions to neocaine and are stored in self-service machine as Temporary Access Control Card.
In turn, when self-service machine receives the work card number corresponding permission of employee, pass through and printer interface printing is called to correspond to
Temporary Access Control Card.It is understood that the Temporary Access Control Card in the present embodiment is entity card form.
It should be noted that during printing, if it find that Temporary Access Control Card unauthorized, is recycled, stop
Only print.
It should be noted that guest system predetermined period (such as daily) Temporary Access Control Card provided is looked into
It askes, the Temporary Access Control Card for not given back (being more than term of validity) to employee actively recycles permission.
The efficiency that Temporary Access Control Card is got thereby, it is possible to greatly improve employee alleviates working peak period foreground people
Member operating pressure, reduce cost of labor, and can automatic accurate granting Temporary Access Control Card, realize the automatic decentralization of access permission
And recycling, substantially increase safety.
In order to realize that above-described embodiment, the present invention also propose a kind of first terminal.
Figure 17 is the structural schematic diagram of the first first terminal provided in an embodiment of the present invention.The first terminal includes:It tests
Demonstrate,prove module 11, acquisition module 12 and sending module 13.
Wherein, authentication module 11, for obtaining verification information and verification for being verified to user identity.
Acquisition module 12, the attribute information for obtaining user after being verified.
Module 13 is provided, for providing Temporary Access Control Card to user according to the attribute information of user;Wherein, different attribute
The Temporary Access Control Card that user gets has different access permissions.
It should be noted that the aforementioned explanation to Temporary Access Control Card distribution method embodiment is also applied for the present embodiment
Terminal, details are not described herein again.
In conclusion the first terminal of the embodiment of the present invention, is carried out by the verification information verified to user identity
After being verified, there is the temporary card of different access permissions for different user granting, simple and convenient, accuracy is high, from
And improve the safety of Temporary Access Control Card granting.
Figure 18 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention.The access card granting system
System includes:First terminal 1, server 2 and second terminal 3.
Wherein, server 2 are received for will be used to be sent to first terminal 1 to the Quick Response Code that user identity is verified
The Quick Response Code of the transmission of second terminal 3 used by a user is simultaneously verified, under the attribute information that user is obtained after being verified
Issue first terminal 1.
First terminal 1, for receiving Quick Response Code and Quick Response Code being shown to user by screen so that user is by second
Terminal 3 scans the two-dimensional code, and receives the attribute information for the user that server 2 issues after to being verified of user, and root
According to the attribute information of user Temporary Access Control Card is provided to user.
Second terminal 3 is verified for scanning the two-dimensional code and being sent to server 2.
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
It should be noted that first terminal can be provided simultaneously with the function of recognition of face and language identification, that is, someone is set
Face database sharing module and language database structure module and respective update module, user can be according to the demands of oneself
Selection is verified using facial image or is verified by language message, or is verified by way of Quick Response Code.
It should be noted that the aforementioned explanation to Temporary Access Control Card distribution method embodiment is also applied for the present embodiment
Access card delivery system, details are not described herein again.
In conclusion the access card delivery system of the embodiment of the present invention, will be used to carry out user identity by server
The Quick Response Code of verification is sent to first terminal, then first terminal by screen display to user so that user passes through second eventually
It holds the server for scanning the two-dimensional code and issuing application program to be verified, and obtains the attribute information hair of user after being verified
To first terminal, last first terminal provides Temporary Access Control Card according to the attribute information of user to user, wherein different attribute
The Temporary Access Control Card that user gets has different access permissions, simple and convenient, and accuracy is high, interim to improve
The safety of access card granting.
Figure 19 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention.The entrance guard recognition device is used
Attempt unlatching target door using Temporary Access Control Card in user, including:Acquisition module 41, judgment module 42, opening module 43.
Wherein, acquisition module 41, the access permission for obtaining Temporary Access Control Card.
Judgment module 42, for judging whether that Temporary Access Control Card has the permission for opening target door according to access permission.
Opening module 43, for when judging that Temporary Access Control Card has the permission for opening target door, then opening target door.
Further, acquisition module 41 are specifically used for receiving the mark for the Temporary Access Control Card that target door is sent, according to interim
Incidence relation between the mark and possessed access permission of the mark inquiry Temporary Access Control Card of access card, gets interim door
Prohibit the access permission of card.
Further, as a kind of possible realization method, Figure 20 is that another gate inhibition provided in an embodiment of the present invention knows
The structural schematic diagram of other device, as shown in figure 20, on the basis of Figure 19, which further includes:Mould is established in association
Block 44, monitoring module 45 and failure setup module 46.
Wherein, module 41 is established in association, for before the access permission for obtaining Temporary Access Control Card, receiving what terminal was sent
The mark of each Temporary Access Control Card and possessed access permission, and the mark according to each Temporary Access Control Card and possessed door
Prohibit permission, establishes incidence relation.
In one embodiment of the invention, Temporary Access Control Card has term of validity, monitoring module 45 interim for receiving
The term of validity of access card is monitored the validity of Temporary Access Control Card according to term of validity.
Further, opening module 43, specifically for when judge Temporary Access Control Card have open target door permission when,
Judge whether Temporary Access Control Card has validity according to term of validity, if Temporary Access Control Card has validity, opens target
Door.
Further, fail setup module 46, for after user gets Temporary Access Control Card, by the long-term gate inhibition of user
It is stuck in the term of validity of Temporary Access Control Card and is arranged to failure state.
It should be noted that the aforementioned explanation to Temporary Access Control Card recognition methods embodiment is also applied for the present embodiment
Entrance guard recognition device, details are not described herein again.
In conclusion the entrance guard recognition device of the embodiment of the present invention, by obtaining the access permission of Temporary Access Control Card, and root
According to access permission judge whether Temporary Access Control Card have open target door permission, finally when judge Temporary Access Control Card have open
Target door is opened when the permission for opening target door.It is user-friendly as a result, by improving recognition efficiency, and according to interim gate inhibition
The card term of validity carries out effective monitoring, further increases safety.
In order to realize that above-described embodiment, the present invention also propose a kind of terminal, including:It memory, processor and is stored in
On reservoir and the computer program that can run on a processor, which is characterized in that processor realizes above-mentioned implementation when executing program
In the first to the 5th kind of Temporary Access Control Card distribution method.
In order to realize that above-described embodiment, the present invention also propose a kind of first terminal.
Figure 21 is a kind of structural schematic diagram of first terminal provided in an embodiment of the present invention.
Wherein, it should be noted that Figure 21 is by taking first terminal side as an example.As shown in figure 20, which may include:
Processor 11;Memory 12 for storing processor-executable instruction.Wherein, processor 11 is configured as:Obtain for pair
Verification information that user identity is verified and verification;The attribute information of user is obtained after being verified;According to the category of user
Property information to user provide Temporary Access Control Card;Wherein, the Temporary Access Control Card that the user of different attribute gets has different doors
Prohibit permission.
Figure 22 is a kind of structural schematic diagram of access card delivery system provided in an embodiment of the present invention.
Wherein, it should be noted that as shown in figure 22, which may include:Processor 11;For depositing
Store up the memory 12 of processor-executable instruction.Wherein, processor 11 is configured as:Server will be used to carry out user identity
The Quick Response Code of verification is sent to first terminal;Quick Response Code is shown to user so that user is by second by first terminal by screen
Terminal scans the two-dimensional code;Quick Response Code after scanning is sent to server and verified by second terminal;Server is being verified
The attribute information for obtaining user afterwards issues first terminal;First terminal provides interim gate inhibition according to the attribute information of user to user
Card;Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
Figure 23 is a kind of structural schematic diagram of entrance guard recognition device provided in an embodiment of the present invention.
Wherein, it should be noted that as shown in figure 23, which may include:Processor 11;For storing
The memory 12 of processor-executable instruction.Wherein, processor 11 is configured as:Obtain the access permission of Temporary Access Control Card;Root
Judge whether that Temporary Access Control Card has the permission for opening target door according to access permission;Mesh is opened when judging that Temporary Access Control Card has
When marking the permission of door, then target door is opened.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (system of such as computer based system including processor or other can be held from instruction
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicating, propagating or passing
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring
Interconnecting piece (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage
Or firmware is realized.Such as, if realized in another embodiment with hardware, following skill well known in the art can be used
Any one of art or their combination are realized:With for data-signal realize logic function logic gates from
Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile
Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also
That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the present invention
System, those skilled in the art can be changed above-described embodiment, change, replace and become within the scope of the invention
Type.
Claims (14)
1. a kind of distribution method of Temporary Access Control Card, which is characterized in that including:
Obtain the verification information for being verified to user identity and verification;
The attribute information of the user is obtained after being verified;
According to the attribute information of the user Temporary Access Control Card is provided to the user;Wherein, the user of different attribute gets
Temporary Access Control Card have different access permissions.
2. the distribution method of Temporary Access Control Card according to claim 1, which is characterized in that the acquisition is for user's body
The verification information verified of part and verification, including:
The facial image that the user is acquired by photographic device is used as the verification information;
The facial image of the user is matched with the facial image in face database;
If the facial image of the user and the first matching degree of the facial image of the first user in the face database are super
When crossing preset first numerical value, then pass through the verification to the user identity;
The attribute information that the user is obtained after being verified, including:
The attribute information of first user is obtained from the face database;
Using the attribute information of first user as the attribute information of the user.
3. the distribution method of Temporary Access Control Card according to claim 2, which is characterized in that further include:
According to preset first database construction strategy, the face database is built in advance, wherein in the face database
At least it is stored with the facial image of the facial image of the first user, the attribute information of first user and first user
Correspondence between the attribute information of first user;
Periodically the face database is updated.
4. the distribution method of Temporary Access Control Card according to claim 1, which is characterized in that the acquisition is for user's body
The verification information verified of part and verification, including:
Quick Response Code is generated by the server for the application program installed;
By the Quick Response Code by screen display give the user so that the user pass through on mobile terminal it is described apply journey
Sequence, which scans the Quick Response Code and issues the server in conjunction with the mark of the mobile terminal generation verification information, to be tested
Card;
The attribute information that the user is obtained after being verified, including:
Receive the attribute information for the user that the server is sent after being verified;The attribute information of the wherein described user
It is to be got according to the mark of the mobile terminal by the server.
5. the distribution method of Temporary Access Control Card according to claim 1, which is characterized in that the acquisition is for user's body
The verification information verified of part and verification, including:
The voice messaging that the user is acquired by sound pick up equipment is used as the verification information;
The voice messaging of the user is matched with the voice messaging in speech database;
If the voice messaging of the user and the second matching degree of the voice messaging of second user in the speech database are super
When crossing preset second value, pass through the verification to the user identity;
The attribute information that the user is obtained after being verified, including:
The attribute information of the second user is obtained from the speech database;
Using the attribute information of the second user as the attribute information of the user.
6. the distribution method of Temporary Access Control Card according to claim 5, which is characterized in that further include:
According to preset second database sharing strategy, the speech database is built in advance, wherein in the speech database
At least it is stored with the voice messaging of the voice messaging of second user, the attribute information of the second user and the second user
Correspondence between the attribute information of the second user;
Periodically the speech database is updated.
7. according to the distribution method of claim 1-6 any one of them Temporary Access Control Cards, which is characterized in that described in the basis
The attribute information of user provides Temporary Access Control Card to the user, including:
According to the correspondence between the attribute information querying attributes and access permission of the user, the category with the user is obtained
The property corresponding target access permission of information;
It is that the user generates the Temporary Access Control Card according to the target access permission.
8. the distribution method of Temporary Access Control Card according to claim 7, which is characterized in that further include:
The term of validity of the Temporary Access Control Card is monitored;
After the user gets the Temporary Access Control Card, by the long-term access card of the user in the Temporary Access Control Card
It is arranged to failure state in term of validity.
9. a kind of distribution method of Temporary Access Control Card, which is characterized in that including:
Server will be for being sent to first terminal to the Quick Response Code that user identity is verified;
The Quick Response Code is shown to user so that the user scans institute by second terminal by the first terminal by screen
State Quick Response Code;
The Quick Response Code after scanning is sent to the server and verified by the second terminal;
The attribute information that the server obtains the user after being verified issues the first terminal;
The first terminal provides Temporary Access Control Card according to the attribute information of the user to the user;
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
10. the distribution method of Temporary Access Control Card according to claim 9, which is characterized in that the first terminal is according to institute
The attribute information for stating user provides Temporary Access Control Card to the user, including:
The first terminal according to the correspondence between the attribute information querying attributes and access permission of the user, obtain with
The corresponding target access permission of attribute information of the user;
The first terminal is that the user generates the Temporary Access Control Card according to the target access permission.
11. the distribution method of Temporary Access Control Card according to claim 9, which is characterized in that the second terminal will scan
The Quick Response Code afterwards is sent to the server and is verified, including:
The mark of the Quick Response Code and the second terminal after scanning is sent to the server by the second terminal;It is described
Server carries out authentication according to the Quick Response Code;
The attribute information that the server obtains the user after being verified issues the first terminal, including:
The server obtains the attribute information of the user after being verified according to the mark of the second terminal;
The attribute information of the user is sent to the first terminal by the server.
12. the distribution method of Temporary Access Control Card according to claim 11, which is characterized in that further include:
The server receives the essential information that user sends and forms customer data base, wherein the essential information includes institute
State the mark of the attribute information and the second terminal of user;
The attribute information for obtaining the user according to the mark of the second terminal after server authentication passes through, including:
The server inquires the customer data base after being verified according to the mark of the second terminal, obtains the use
The attribute information at family.
13. a kind of first terminal, which is characterized in that including:
Authentication module, for obtaining verification information and verification for being verified to user identity;
Acquisition module, the attribute information for obtaining the user after being verified;
Module is provided, for providing Temporary Access Control Card to the user according to the attribute information of the user;
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
14. a kind of access card delivery system, which is characterized in that including:
Server receives user and is used for will be used to be sent to first terminal to the Quick Response Code that user identity is verified
Second terminal send the Quick Response Code and verified, the attribute information that the user is obtained after being verified is handed down to
The first terminal;
The first terminal, for receiving the Quick Response Code and the Quick Response Code being shown to user so that the use by screen
The Quick Response Code is scanned in family by second terminal, and receives what the server issued after to being verified of the user
The attribute information of the user, and Temporary Access Control Card is provided to the user according to the attribute information of the user;
The second terminal is verified for scanning the Quick Response Code and being sent to the server;
Wherein, the Temporary Access Control Card that the user of different attribute gets has different access permissions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710255812.4A CN108734813B (en) | 2017-04-19 | 2017-04-19 | Method and device for issuing temporary access control card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710255812.4A CN108734813B (en) | 2017-04-19 | 2017-04-19 | Method and device for issuing temporary access control card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108734813A true CN108734813A (en) | 2018-11-02 |
CN108734813B CN108734813B (en) | 2022-08-23 |
Family
ID=63924269
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710255812.4A Active CN108734813B (en) | 2017-04-19 | 2017-04-19 | Method and device for issuing temporary access control card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108734813B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109410413A (en) * | 2018-12-28 | 2019-03-01 | 北京百佑科技有限公司 | A kind of entrance guard management system and method |
CN109615757A (en) * | 2019-02-27 | 2019-04-12 | 西安艾润物联网技术服务有限责任公司 | Visitor's access control management method, system and storage medium |
CN109859356A (en) * | 2019-01-24 | 2019-06-07 | 广州市天河区保安服务公司 | A kind of access control management method and system |
CN110021088A (en) * | 2018-10-29 | 2019-07-16 | 深圳市微开互联科技有限公司 | It is distributed the page control open-door system and method for authorization architecture |
CN110136315A (en) * | 2019-06-27 | 2019-08-16 | 广东电网有限责任公司 | A kind of substation safety region prevention and control system based on Internet of Things and recognition of face |
CN110164009A (en) * | 2019-05-29 | 2019-08-23 | 华翔翔能电气股份有限公司 | A kind of two dimensional code access control system |
CN110321835A (en) * | 2019-07-01 | 2019-10-11 | 杭州创匠信息科技有限公司 | Face guard method, system and equipment |
CN112053485A (en) * | 2020-09-08 | 2020-12-08 | 上海善一智能科技有限公司 | Department intelligent authority distribution system |
CN112435386A (en) * | 2019-08-06 | 2021-03-02 | 南京理工大学 | Identity authentication and card issuing all-in-one machine and working method thereof |
CN112634501A (en) * | 2021-01-04 | 2021-04-09 | 深圳市法本信息技术股份有限公司 | Visitor authorization method for property management |
CN113689603A (en) * | 2021-08-20 | 2021-11-23 | 青岛海信智慧生活科技股份有限公司 | Access control authority management method and device |
CN114596656A (en) * | 2020-12-03 | 2022-06-07 | 中移互联网有限公司 | Electronic pass processing method, device and equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102881064A (en) * | 2012-10-08 | 2013-01-16 | 无锡天授信息科技有限公司 | Visitor management system and method based on face identification |
CN103023917A (en) * | 2012-12-26 | 2013-04-03 | 百度在线网络技术(北京)有限公司 | Method, system and device for authorization aiming at intelligent household electrical appliance |
CN104065652A (en) * | 2014-06-09 | 2014-09-24 | 韩晟 | Method, device and system for identity verification and related device |
CN105678872A (en) * | 2015-12-30 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | Entrance guard manage system, authorization method thereof and entrance guard terminal device |
CN205334578U (en) * | 2015-12-22 | 2016-06-22 | 深圳市施德朗电气有限公司 | Self -service visitor system |
-
2017
- 2017-04-19 CN CN201710255812.4A patent/CN108734813B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102881064A (en) * | 2012-10-08 | 2013-01-16 | 无锡天授信息科技有限公司 | Visitor management system and method based on face identification |
CN103023917A (en) * | 2012-12-26 | 2013-04-03 | 百度在线网络技术(北京)有限公司 | Method, system and device for authorization aiming at intelligent household electrical appliance |
CN104065652A (en) * | 2014-06-09 | 2014-09-24 | 韩晟 | Method, device and system for identity verification and related device |
CN205334578U (en) * | 2015-12-22 | 2016-06-22 | 深圳市施德朗电气有限公司 | Self -service visitor system |
CN105678872A (en) * | 2015-12-30 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | Entrance guard manage system, authorization method thereof and entrance guard terminal device |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110021088A (en) * | 2018-10-29 | 2019-07-16 | 深圳市微开互联科技有限公司 | It is distributed the page control open-door system and method for authorization architecture |
CN109410413A (en) * | 2018-12-28 | 2019-03-01 | 北京百佑科技有限公司 | A kind of entrance guard management system and method |
CN109859356A (en) * | 2019-01-24 | 2019-06-07 | 广州市天河区保安服务公司 | A kind of access control management method and system |
CN109615757B (en) * | 2019-02-27 | 2021-08-03 | 西安艾润物联网技术服务有限责任公司 | Visitor access control management method, system and storage medium |
CN109615757A (en) * | 2019-02-27 | 2019-04-12 | 西安艾润物联网技术服务有限责任公司 | Visitor's access control management method, system and storage medium |
CN110164009A (en) * | 2019-05-29 | 2019-08-23 | 华翔翔能电气股份有限公司 | A kind of two dimensional code access control system |
CN110136315A (en) * | 2019-06-27 | 2019-08-16 | 广东电网有限责任公司 | A kind of substation safety region prevention and control system based on Internet of Things and recognition of face |
CN110321835A (en) * | 2019-07-01 | 2019-10-11 | 杭州创匠信息科技有限公司 | Face guard method, system and equipment |
CN112435386A (en) * | 2019-08-06 | 2021-03-02 | 南京理工大学 | Identity authentication and card issuing all-in-one machine and working method thereof |
CN112053485A (en) * | 2020-09-08 | 2020-12-08 | 上海善一智能科技有限公司 | Department intelligent authority distribution system |
CN114596656A (en) * | 2020-12-03 | 2022-06-07 | 中移互联网有限公司 | Electronic pass processing method, device and equipment |
CN114596656B (en) * | 2020-12-03 | 2023-09-19 | 中移互联网有限公司 | Electronic pass processing method, device and equipment |
CN112634501A (en) * | 2021-01-04 | 2021-04-09 | 深圳市法本信息技术股份有限公司 | Visitor authorization method for property management |
CN113689603A (en) * | 2021-08-20 | 2021-11-23 | 青岛海信智慧生活科技股份有限公司 | Access control authority management method and device |
Also Published As
Publication number | Publication date |
---|---|
CN108734813B (en) | 2022-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108734813A (en) | The distribution method and device of Temporary Access Control Card | |
US11276131B2 (en) | Property management system utilizing a blockchain network | |
CN105913527B (en) | Visitor's two dimensional code intelligent verification system and verification method based on cell cloud | |
CN104240342B (en) | Access control method and device based on identity authentication | |
CN110148232B (en) | Visitor management system, method, device and storage medium | |
JP7038293B2 (en) | Gate open / close control device and gate open / close control method | |
CN103827878B (en) | Automate Password Management | |
WO2020179334A1 (en) | Facial authentication management server and facial authentication management method | |
JP7026341B2 (en) | Face recognition machine and face recognition method | |
JP6998568B2 (en) | Face recognition system and face recognition method | |
CN105872104A (en) | Method and system for managing intelligent entrance guard by combining mobile terminal | |
JP2013196349A (en) | Employee information management system, information processing apparatus, employee information management system generation method, employee information management system generation program and information acquisition method | |
JP2023157932A (en) | Face authentication registration device, and a face authentication registration method | |
CN109840403A (en) | Using login method, device, computer readable storage medium and computer equipment | |
JP7296607B2 (en) | Face recognition machine and face recognition method | |
JP7266185B2 (en) | Face authentication system and face authentication method | |
JP2022084586A (en) | Entrance control apparatus and entrance control method | |
JP2023111936A (en) | Face authentication apparatus and face authentication method | |
JP2023101822A (en) | Face authentication machine and face authentication method | |
CN116777019A (en) | Pass evidence verification device and pass evidence verification method | |
CN114926927A (en) | Method, system, electronic device and medium for checking and passing personnel entrance and exit identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |