CN108734813B - Method and device for issuing temporary access control card - Google Patents

Method and device for issuing temporary access control card Download PDF

Info

Publication number
CN108734813B
CN108734813B CN201710255812.4A CN201710255812A CN108734813B CN 108734813 B CN108734813 B CN 108734813B CN 201710255812 A CN201710255812 A CN 201710255812A CN 108734813 B CN108734813 B CN 108734813B
Authority
CN
China
Prior art keywords
user
attribute information
access control
information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710255812.4A
Other languages
Chinese (zh)
Other versions
CN108734813A (en
Inventor
卓松
李俊聪
朱佳
范铭
彭诗辉
贾镕企
罗挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710255812.4A priority Critical patent/CN108734813B/en
Publication of CN108734813A publication Critical patent/CN108734813A/en
Application granted granted Critical
Publication of CN108734813B publication Critical patent/CN108734813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Abstract

The invention provides a method and a device for issuing a temporary access control card, wherein the method comprises the following steps: acquiring and verifying verification information for verifying the identity of a user; acquiring attribute information of the user after the verification is passed; issuing a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions. Therefore, after the verification information for verifying the user identity passes verification, temporary cards with different access control authorities are issued to different users, the operation is simple and convenient, the accuracy is high, and the issuing safety of the temporary access control cards is improved.

Description

Method and device for issuing temporary access control card
Technical Field
The invention relates to the technical field of information processing, in particular to a method and a device for issuing a temporary access control card.
Background
In an enterprise scene, the condition that an employee forgets an access card occurs every day, and when the employee applies for getting a temporary access card, basic information is manually registered at a foreground, and then the identity of the employee is verified by the personnel at the foreground and then the temporary access card is issued.
The prior art that temporary access control cards are manually issued to employees by a foreground is prone to frequent occurrence of situations that the identities of the employees are difficult to identify correctly or identification errors occur, and therefore the temporary access control cards are issued with great potential safety hazards.
Disclosure of Invention
The invention provides a temporary access control card issuing method and a temporary access control card issuing device, which are used for solving the problem that the temporary access control card issuing has great potential safety hazard due to the fact that the temporary access control card is issued to an employee manually by a foreground and the condition that the identity of the employee is difficult to correctly identify or the identification is wrong sometimes occurs.
The embodiment of the first aspect of the invention provides a method for issuing a temporary access control card, which comprises the following steps: acquiring verification information for verifying the identity of a user and verifying the verification information; acquiring attribute information of the user after the verification is passed; issuing a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions.
An embodiment of a second aspect of the present invention provides a method for issuing a temporary access control card, including: the server sends the two-dimensional code used for verifying the identity of the user to the first terminal; the first terminal displays the two-dimensional code to a user through a screen so that the user can scan the two-dimensional code through a second terminal; the second terminal sends the scanned two-dimensional code to the server for verification; the server acquires the attribute information of the user after passing the verification and sends the attribute information to the first terminal; the first terminal issues a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions.
An embodiment of a third aspect of the present invention provides a first terminal, including: the verification module is used for acquiring verification information for verifying the identity of the user and verifying the information; the acquisition module is used for acquiring the attribute information of the user after the verification is passed; the issuing module is used for issuing a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions.
An embodiment of a fourth aspect of the present invention provides an access card issuing system, including: the server is used for sending the two-dimensional code used for verifying the identity of the user to the first terminal, receiving and verifying the two-dimensional code sent by the second terminal used by the user, and acquiring the attribute information of the user after the verification is passed and sending the attribute information to the first terminal; the first terminal is used for receiving the two-dimension code, displaying the two-dimension code to a user through a screen so that the user can scan the two-dimension code through a second terminal, receiving attribute information of the user issued by the server after the user passes the verification, and issuing a temporary access control card to the user according to the attribute information of the user; the second terminal is used for scanning the two-dimensional code and sending the two-dimensional code to the server for verification; the temporary access control cards acquired by the users with different attributes have different access control permissions.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
after the verification information for verifying the user identity passes verification, temporary cards with different access control authorities are issued to different users, the operation is simple and convenient, the accuracy is high, and therefore the issuing safety of the temporary access control cards is improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart illustrating a method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating a second method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 3 is a schematic diagram of obtaining a face image according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a process of uploading an image according to an embodiment of the present invention;
fig. 5 is a schematic flow chart illustrating a third method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a two-dimensional code display mode according to an embodiment of the present invention;
fig. 7 is a schematic flowchart of a fourth method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 8 is a schematic flow chart illustrating a fifth method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 9 is a schematic flow chart illustrating a method for acquiring a current access permission according to an embodiment of the present invention;
fig. 10 is a schematic flowchart of a sixth method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 11 is a schematic diagram of selecting different processes for authentication according to an embodiment of the present invention;
fig. 12 is a schematic flow chart illustrating a seventh method for issuing a temporary access control card according to an embodiment of the present invention;
fig. 13 is a schematic flow chart illustrating a method for identifying a temporary access control card according to an embodiment of the present invention;
fig. 14 is a schematic flow chart illustrating another method for identifying a temporary access card according to an embodiment of the present invention;
fig. 15 is a flowchart illustrating a temporary access card processing procedure according to an embodiment of the present invention;
FIG. 16(a) is a schematic diagram of information confirmation according to an embodiment of the present invention;
FIG. 16(b) is a schematic diagram of inputting the extension number according to the embodiment of the present invention;
FIG. 16(c) is a schematic diagram of a notification message according to an embodiment of the present invention;
fig. 17 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 18 is a schematic structural diagram of an access card issuing system according to an embodiment of the present invention;
fig. 19 is a schematic structural diagram of an access identification apparatus according to an embodiment of the present invention;
fig. 20 is a schematic structural view of another entrance guard identification apparatus provided in the embodiment of the present invention;
fig. 21 is a schematic structural diagram of a first terminal according to an embodiment of the present invention;
fig. 22 is a schematic structural diagram of an access card issuing system according to an embodiment of the present invention;
fig. 23 is a schematic structural diagram of an access control identifying apparatus according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The method and apparatus for issuing a temporary access card according to the embodiments of the present invention are described below with reference to the accompanying drawings.
Specifically, no matter in a life scene, an owner forgets to take an access card, basic information needs to be manually registered at a guard, the guard verifies the identity of the owner and then issues a temporary access card, and the owner can enter a residential unit building and take an elevator to a corresponding floor through the temporary access card; in the enterprise scene, the employee forgets the access control card, needs to issue a temporary access control card after verifying the identity of the employee through the personnel on the foreground, and the employee can enter the office building and the corresponding office through the temporary access control card.
Therefore, in order to facilitate a user who forgets to take the access card, a temporary access card needs to be issued to the user. The invention provides a temporary access control card issuing method, which needs to be noted that compared with the temporary access control card issuing method in the prior art, the method does not need to verify the identity of a user manually, has higher accuracy, issues temporary cards with different access control authorities for different users, and has high safety.
For convenience of description, the following description focuses on a terminal side (e.g., a self-service side) to describe a method for issuing a temporary access card according to an embodiment of the present invention.
It should be noted that the terminal in this embodiment may be laid in an office building of an enterprise, a residential building, or the like.
Specifically, fig. 1 is a schematic flow chart of a first method for issuing a temporary access control card according to an embodiment of the present invention. As shown in fig. 1, the method for issuing the temporary access control card includes the following steps:
s101, obtaining and verifying verification information used for verifying the identity of the user.
Specifically, when the user identity is verified, verification information for verifying the user identity needs to be acquired and verified. It should be noted that, different manners may be adopted according to different specific application scenarios to obtain and verify the verification information used for verifying the user identity, which is described as follows:
in the first example, a face image of a user is acquired by a camera device as verification information, the face image of the user is matched with a face image in a face database, and if a first matching degree between the face image of the user and the face image of a first user in the face database exceeds a preset first value, the identity of the user is verified.
In a second example, a two-dimensional code is generated by a server of an installed application program, and the two-dimensional code is displayed to a user through a screen, so that the user scans the two-dimensional code through the application program on a mobile terminal, and generates verification information by combining with an identifier of the mobile terminal, and sends the verification information to the server for verification.
In a third example, voice information of a user is collected by the sound pickup device to serve as verification information, the voice information of the user is matched with the voice information in the voice database, and if a second matching degree of the voice information of the user and the voice information of a second user in the voice database exceeds a preset second value, the identity of the user is verified.
In a fourth example, the scanning device scans and acquires the identity card information of the user as verification information, queries whether the identity card information exists in the database, and if the identity card information exists, verifies the identity of the user.
In a fifth example, the virtual keyboard provided on the terminal screen is used to input the identity information related to the user, such as an identity card, a mobile phone number, etc., as the verification information, and then query the database, if the verification information exists, the user identity is verified. For example, when the user is a visitor, a reservation code may be output as the authentication information through the virtual keyboard. When the user is a person, the user can input own identity card information or mobile phone number as verification information together with the virtual keyboard.
It should be noted that, the above method for obtaining the verification information for verifying the user identity and verifying the user identity is only an example, and may be selected and adjusted according to the actual application needs.
And S102, acquiring the attribute information of the user after the verification is passed.
Specifically, after the verification is passed, in order to accurately issue the temporary access card to the user, attribute information of the user needs to be acquired. Different verification modes can be selected according to the requirements of the actual application scene, different verification modes are adopted, and the obtained attribute information of the user is different, for example, the following steps are performed:
in a first example, a face image is used as the verification information, and the obtaining of the attribute information of the user includes obtaining the attribute information of the first user from a face database, and using the attribute information of the first user as the attribute information of the user.
In a second example, the application scans the two-dimensional code for verification and generates verification information in combination with the identifier of the mobile terminal, and the obtaining of the attribute information of the user includes receiving the attribute information of the user sent by the server after the verification is passed, where the attribute information of the user is obtained by the server according to the identifier of the mobile terminal.
In a third example, the voice information is used as the verification information, and the obtaining of the attribute information of the user includes obtaining the attribute information of the second user from a voice database, and using the attribute information of the second user as the attribute information of the user.
In a fourth example, the identification card information is used as the verification information, and the obtaining of the attribute information of the user includes obtaining attribute information of a third user corresponding to the identification card information, and using the attribute information of the third user as the attribute information of the user.
It should be noted that the above manner is merely an illustration of obtaining the attribute information of the user after the verification is passed, and other manners may be selected or set according to actual application needs.
S103, issuing temporary access control cards to the users according to the attribute information of the users, wherein the temporary access control cards acquired by the users with different attributes have different access control permissions.
Specifically, after the attribute information of the user is acquired, a temporary access control card needs to be issued to the user according to the attribute information of the user. After the access control authority corresponding to the user is determined according to the attribute information, the temporary access control card with the corresponding authority is sent to the user. Therefore, the safety of sending the temporary access control card is further improved.
It should be noted that, according to the needs of the actual application scenario, different manners may be adopted to issue the temporary access control card to the user according to the attribute information of the user, which is described as follows:
in the first example, the corresponding relationship between the attribute and the access control permission is preset, and then the corresponding relationship is inquired according to the attribute information of the user to obtain the corresponding target access control permission. Further, a temporary access control card is generated for the user according to the target access control authority, and the temporary access control card is issued to the user in the form of an entity card or a virtual card (which can be displayed in a portable device such as a mobile terminal).
The second example is to pre-store a processing algorithm related to the attribute information, obtain parameters related to the pre-stored processing algorithm for calculation after determining the attribute information of the user, determine a target access right corresponding to the attribute information, generate a temporary access card for the user according to the target access right, and issue the temporary access card to the user in the form of an entity card or a virtual card (which can be displayed in a portable device such as a mobile terminal).
It should be noted that the above manner is merely an example of issuing the temporary access control card to the user according to the attribute information of the user, and other manners may be selected or set according to actual application needs.
In summary, in the method for issuing the temporary access control card according to the embodiment of the present invention, after the verification information for verifying the user identity passes, the temporary cards with different access control authorities are issued for different users, so that the operation is simple and convenient, the accuracy is high, and the security of issuing the temporary access control cards is improved.
Based on the above embodiments, in order to describe more clearly how to obtain and verify the verification information for verifying the identity of the user, when the verification is passed, the attribute information of the user is obtained, which is specifically described as follows through the embodiments shown in fig. 2 to fig. 6:
fig. 2 is a schematic flowchart of a second method for issuing a temporary access control card according to an embodiment of the present invention.
In this embodiment, after matching and verifying the face image and the face image in the face database according to the face image as verification information, the attribute information of the first user is acquired from the face database as the attribute information of the user.
As shown in fig. 2, that is, step S101 in the above embodiment includes: S201-S203; the step S102 includes: S204-S205.
S201, acquiring a face image of a user as verification information through a camera device.
And S202, matching the face image of the user with the face image in the face database.
S203, when the first matching degree of the face image of the user and the face image of the first user in the face database exceeds a preset first numerical value, the user identity is verified.
Specifically, the self-service machine is provided with a camera device, and a user can trigger the camera device to start working in a manual mode, a voice mode and the like and acquire a face image of the user as verification information. The modes of the camera device for acquiring the face image are various, and the modes can be selected and set according to actual application requirements.
As an implementation form, as shown in fig. 3, when it is detected that the face of the current user reaches a preset region, the camera device triggers the positioning lamp to light up, prompts the eyes of the current user to look directly at the positioning lamp within a preset time, and collects a corresponding face image in the process of looking directly at the positioning lamp by the eyes of the current user. The preset area is a preset area capable of carrying out face recognition, namely, when the face of the current user enters the preset area, the face recognition module is indicated to start collecting work.
And further matching the acquired face image with the face image in the face database. Wherein, the face database is constructed and stored in advance. In this embodiment, a face database is pre-constructed according to a preset first database construction strategy.
It should be noted that the face database at least stores the face image of the first user, the attribute information of the first user, and the corresponding relationship between the face image of the first user and the attribute information of the first user.
It should be noted that, according to different application scenarios, the first data construction policy is different to ensure information security and identification efficiency. Taking an enterprise scene as an example, a policy can be constructed in the form of organization structure grouping, firstly, a human resource department interface is accessed to obtain attribute information such as names, organization structures and head portraits of employees and store the attribute information, then, the organization structures of the employees are deduplicated (for example, the employee A belongs to both the organization structure B and the organization structure C, and the employee A belongs to the organization structure C is deleted), a face database is created according to the organization structures, and finally, the employee information is traversed, and the names and the head portraits of the employees are created into the face database corresponding to the organization structures according to the organization structures.
In practical applications, for example, in the enterprise scenario, the staff changes, and the face database needs to be updated regularly to ensure the security of issuing the temporary access card. Taking an enterprise scene as an example, acquiring all employees recorded in the previous day from a related database, acquiring a current employee record through an interface of a human resource department, comparing whether the organizational structure of the employee is changed, updating employee information when the change is caused, comparing states of the employees, deleting the employees from a face database, and updating the employees just entered into the face database.
Wherein, the regular period can be one day, two days, etc., and the setting is selected according to the actual application requirement.
Specifically, during face recognition, a face image of a user is matched with a face image in a face database, that is, feature data of the face image of the user is matched with feature data of the face image in the face database, and if a matching result obtained through comparison exceeds a preset first value, it is determined that the identity of the current user is legal, for example, the first value may be 95%.
Further, the face database at least stores attribute information of the first user, and may further include other information of the first user, for example, basic information such as a mobile phone number, identification card information, an extension number, an age, and a gender. The mobile phone number, the identity card information, the extension number and the like of the user can be used as identification information of the user.
When the first matching degree between the face image of the user and the face image of the first user in the face database does not exceed a preset first numerical value, the method specifically comprises the following steps through the verification of the user identity:
and acquiring identification information of the user. For example, in the enterprise scenario, the user may be further required to input other identification information, which may be a fixed-line extension number or a mobile phone number of the user, so as to determine the first user corresponding to the user.
After the identification information of the user is obtained, the obtained identification information can be compared with the identification information of the first user in the face database, and when the identification information of the first user is consistent with the identification information of the second user, the identity of the user can be verified.
For example, the user may be prompted to input a mobile phone number, in order to further improve the accuracy of the identity verification, when the identification information of the two is consistent, a WeChat is further sent to the mobile phone of the user according to the mobile phone number input by the user, the user performs secondary confirmation through a link in the WeChat, and after the confirmation is passed, the user is determined to be the user himself, and then the identity of the user is verified. In the embodiment, secondary verification of the mobile phone number is introduced on the basis of face recognition, the traditional single recognition mode is changed, richer application scenes are provided for recognition, and the safety is higher.
It should be noted that, when the user fails to perform face verification, after the user further selects another verification method to pass verification, the user may actively push information (not limited to short message or WeChat form) to remind the user to upload the latest avatar, and the user may directly perform avatar uploading operation through a link in the pushed information, thereby increasing the next face verification recognition rate.
Fig. 4 is a schematic diagram of an image uploading process provided by an embodiment of the present invention, as shown in fig. 4:
specifically, after the user opens the push information link by clicking, the left interface in fig. 4 is displayed in front of the user, so that the user is reminded to upload pictures meeting the requirements of crown exemption, no ink marks, clearness, uniform light and the like by clicking the 'upload picture' in order to improve the accuracy of face recognition of the self-service machine, namely, to avoid the occurrence of the next recognition failure. After the user clicks 'upload photo', the user can select a proper photo to upload, the uploading result is shown in the middle interface of fig. 4, the user finishes uploading the photo by clicking 'confirm uploading', and an uploading success interface is displayed, as shown in the right interface of fig. 4. It can be understood that, as shown in the intermediate interface of fig. 4, the user may also click "to take a picture again" to obtain a picture of the user in real time for uploading, so as to further improve the accuracy of face recognition.
In the embodiment, a closed loop can be formed in the face recognition process, active notification can be performed after the face recognition, and a user can be reminded to upload a nearest user face image, so that the whole recognition process forms the closed loop, and the recognition efficiency is improved.
When the identification information of the two is not identical, it is determined that the user is not the user himself.
In practical application, when two first users with similar appearances exist in the face database, when the face images of the users are matched with the face images in the face database, a situation that the first matching degree between the face images of the users and the face images of the two first users exceeds a preset first numerical value can occur, and at this time, in order to improve the accuracy of issuing the temporary access control card, other information of the users needs to be further verified, for example, the last four digits of the mobile phone numbers of the users, extension numbers and the like, so that the first user corresponding to the user is determined from the two first users. For example, if the user X has two first users a and B, the extension number input by the user X is 4567, the extension number of the first user a in the face database is 0123, and the extension number of the first user B is 4567, it may be determined that the user X corresponds to the first user B, that is, the attribute information of the first user B is used as the attribute information of the user X.
And S204, acquiring the attribute information of the first user from the face database.
And S205, taking the attribute information of the first user as the attribute information of the user.
Specifically, after the verification is passed, it is determined that the face image matches the face image of the user X in the face database, and the attribute information of the user X is acquired from the face database. And acquiring the attribute information of the first user and taking the attribute information as the attribute information of the user.
In this embodiment, taking an enterprise scenario as an example, the attribute information may be a post type of the user, or may also be an employee type of the user. In this embodiment, can set up different grades for the post of difference, different grades can correspond different entrance guard authorities. The different stations may include personnel stations, administrative stations, etc. Alternatively, different levels may be set for different employee types, which may include: sales personnel, management personnel, etc. For another example, the user may be classified as an employee, a staff in practice, or a visitor, and the related information and image of the visitor may be stored in the face database in advance.
As an example, a corresponding access right is set according to a post level, for example, a common worker has a right to open an office door; the department manager has the authority to open all office doors of the department. In addition, corresponding access control authorities are set for different departments, for example, employees in an administrative department have the authority to open a conference room door; the research and development department has the authority to open the laboratory door. And for visitors, the authorities of entering a company gate and an elevator can be set.
Fig. 5 is a schematic flow chart of a third method for issuing a temporary access control card according to an embodiment of the present invention.
In this embodiment, the two-dimensional code is scanned according to the application program, verification information is generated by combining the identifier of the mobile terminal, the verification information is sent to the server for verification, and the server acquires the attribute information of the user according to the identifier of the mobile terminal after the verification is passed.
Specifically, as shown in fig. 5, that is, step S101 in the above embodiment includes: S301-S302; the step S102 includes: and S303.
S301, a two-dimensional code is generated by the server of the installed application program.
S302, displaying the two-dimensional code to a user through a screen, so that the user scans the two-dimensional code through an application program on the mobile terminal, generates verification information by combining the identification of the mobile terminal, and sends the verification information to a server for verification.
Specifically, the self-service machine provides information such as the affiliated position, the name of the self-service machine, a random number and the like to a server of an installed application program, the server encodes the information, and a two-dimensional code with a link address is generated and displayed to a user through a screen, as shown in fig. 6.
Furthermore, the user may scan the two-dimensional code through an application (e.g., a WeChat or a QQ shown in FIG. 6) of the second terminal (e.g., a mobile phone shown in FIG. 6, or a tablet computer, a smart watch, etc.), and generate verification information in combination with an identifier of the mobile terminal (e.g., the uniqueness of the user can be determined by the different identifiers of the mobile terminals corresponding to different users) to send the verification information to the server for verification.
Specifically, the server can verify the authority of the mobile terminal, namely whether the user has the access authority or not according to the verification information.
S303, receiving the attribute information of the user sent by the server after the authentication is passed; the attribute information of the user is obtained by the server according to the identification of the mobile terminal.
Specifically, after the server passes the verification, the attribute information of the user sent by the server can be received, that is, the service searches for the user corresponding to the mobile terminal according to the identifier of the mobile terminal, and acquires the attribute information of the user.
In this embodiment, the server may collect basic information of the user in advance, for example, the attribute information of the user, the mobile phone number, the identification code of the mobile terminal, the id card information, the extension number, the age, the gender, and the like. Taking an enterprise scene as an example, an enterprise can register a public number in a server, and an employee can pay attention to the public number and then fill in own basic information, so that the information acquisition of the employee is completed. Further, the user of the visitor class may pay attention to the public number and then select a reservation under the public number and fill in relevant basic information.
Fig. 7 is a schematic flow chart illustrating a fourth method for issuing a temporary access control card according to an embodiment of the present invention.
In this embodiment, the voice information is used as the verification information, and after the matching verification between the voice information and the voice information in the voice database is passed, the attribute information of the second user is acquired from the voice database as the attribute information of the user.
As shown in fig. 7, that is, step S101 in the above embodiment includes: S401-S203; step S402 includes: S404-S405.
S401, voice information of a user is collected through a sound pickup device to serve as verification information.
S402, matching the voice information of the user with the voice information in the voice database.
And S403, when the second matching degree between the voice information of the user and the voice information of the second user in the voice database exceeds a preset second value, the user identity is verified.
Specifically, the self-service machine is provided with a sound pickup device, and a user can trigger the sound pickup device to start working in a manual mode or the like and collect voice information of the user (for example, the user provides text for reading a talk or randomly speaking a talk) as verification information.
And further matching the acquired voice information with the voice information in the voice information base. More specifically, processing is performed through voice information, then voiceprint features are extracted, relevant voiceprint models are built, and finally voiceprint comparison is performed to determine whether matching is performed. And passing the verification of the user identity when a second matching degree of the voice information of the user and the voice information of the second user in the voice database exceeds a preset second numerical value.
Wherein, the voice database is constructed and stored in advance. In this embodiment, the voice database is pre-constructed according to a preset second database construction policy.
It should be noted that the voice database at least stores the voice information of the second user, the attribute information of the second user, and the correspondence between the voice information of the second user and the attribute information of the second user.
It should be noted that, according to different application scenarios, the second data construction policy is different to ensure information security and identification efficiency. The second data construction strategy may be the same as the first data construction strategy, and the speech database may be constructed according to the organization structure, and the construction process of the speech database may refer to the construction process of the face database, which is not described herein again.
Further, the voice database at least stores attribute information of the second user, and may further include other information of the second user, for example, basic information such as a mobile phone number, identification card information, an extension number, an age, a gender, and the like. The mobile phone number, the identity card information, the extension number and the like of the user can be used as identification information of the user.
When the second matching degree between the voice information of the user and the voice information of the second user in the voice database exceeds a preset second value, the method specifically comprises the following steps of:
and acquiring identification information of the user. For example, in the enterprise scenario, the user may be further required to input other identification information, which may be the number of the fixed-line telephone extension of the user or the last four digits of the mobile phone number, so as to determine the second user corresponding to the user.
After the identification information of the user is obtained, the obtained identification information can be compared with the identification information of the second user in the voice database, and when the identification information of the second user is consistent with the identification information of the second user, the user identity can be verified.
In practical application, two second users with similar voices exist, when the voice information of the user is matched with the voice information in the voice database, the situation that the second matching degree of the face images of the user and the face images of the two second users exceeds a preset second numerical value can occur, at this time, in order to improve the accuracy of issuing the temporary access control card, other information of the user needs to be further verified, such as the four last digits of the mobile phone number of the user, the extension number and the like, so that the second user corresponding to the user is determined from the two second users. For example, if the user X has two second users C and D, the extension number input by the user X is 4567, the extension number of the second user C in the face database is 0123, and the extension number of the second user D is 4567, it may be determined that the user X corresponds to the second user D, that is, the attribute information of the second user D is used as the attribute information of the user X.
It is understood that the user identity is not verified if the second matching degree between the voice information of the user and the voice information of the second user in the voice database does not exceed the preset second value.
S404, acquiring the attribute information of the second user from the voice database.
S405, the attribute information of the second user is used as the attribute information of the user.
Specifically, after the verification is passed, it is determined that the face image matches the voice information of the user Y in the voice database, and the attribute information of the user Y is obtained from the voice database and is used as the attribute information of the user. For the description of the attribute information, reference may be made to the descriptions of the relevant contents in the embodiments described above, and details are not described here.
In summary, according to the method for issuing the temporary access control card of the embodiment of the invention, after the verification information for verifying the user identity in different manners passes verification, the temporary cards with different access control authorities are issued for different users, so that the operation is simple and convenient, the accuracy is high, the efficiency and the safety of issuing the temporary access control card are improved, and the labor cost is reduced.
Fig. 8 is a flowchart illustrating a fifth method for issuing a temporary access control card according to an embodiment of the present invention, where after step S102, the method for issuing a temporary access control card further includes:
s501, inquiring the corresponding relation between the attribute and the access control authority according to the attribute information of the user, and acquiring the target access control authority corresponding to the attribute information of the user.
Specifically, different attribute identifiers are set for different attributes in advance, different authority identifiers are set for different access permissions, and the attribute identifiers and the authority identifiers are used for constructing the corresponding relation between the attributes and the authorities. Further, the corresponding relationship also includes a storage address of the right, that is, the specific content of the right is stored in the storage space corresponding to the storage address. That is to say, the mapping relationship between the attribute identifier, the authority identifier and the storage address is included in the corresponding relationship.
Fig. 9 is a schematic flowchart of a process of querying a correspondence between an attribute and an access permission according to attribute information of a user and acquiring a target access permission corresponding to the attribute information of the user, which specifically includes the following steps:
and S5011, inquiring the corresponding relation according to the attribute identification of the user, and acquiring the authority identification of the target access control authority corresponding to the attribute identification.
Specifically, the attribute information of the user may be obtained according to the method described in the above embodiment, where the attribute information of the user is an attribute identifier.
And S5012, inquiring the storage address corresponding to the authority identification from the corresponding relation.
And S5013, positioning the storage space according to the storage address, and reading the target access control permission from the storage space.
In this embodiment, different storage spaces are set for different access rights in advance, each storage space has one storage address, and specific contents of the access rights are stored in the storage space. After the storage address of the authority identifier of the target access control authority can be obtained from the corresponding relation according to the authority identifier of the target access control authority, the storage space corresponding to the storage address can be located, and then specific content of the target access control authority is read from the storage space.
And S502, generating a temporary access control card for the user according to the target access control authority.
Specifically, a corresponding relation between the attribute and the access control authority is stored in advance, the corresponding relation is inquired according to the acquired user information attribute, a target access control authority corresponding to the attribute information of the user is acquired, and a temporary access control card is generated for the user according to the target access control authority. The temporary access control card can have different authorities for different users.
After the temporary access card is generated, the temporary access card is issued to the user in the form of a physical card or a virtual card (which may be displayed on a portable device such as a mobile terminal).
After the temporary access control card is issued to the user, the valid period of the temporary access control card can be monitored, and after the user acquires the temporary access control card, the long-term access control card owned by the user is set to be in an invalid state within the valid period of the temporary access control card, so that the condition that one user can only use one access control card to enter a company at the same time is guaranteed, and the safety can be improved.
And S503, sending the identifier of the temporary access control card and the target access control authority to an access control system, so that the access control system performs associated registration on the identifier of the temporary access control card and the target access control authority.
In this embodiment, can send the sign of entrance guard card and the target entrance guard permission that has for access control system, access control system receives the sign of interim entrance guard card after, carries out the associated registration with the sign of interim entrance guard card and the target entrance guard permission that has.
In practical application, when the user uses the temporary access control card, the access control system can correspondingly process the temporary access control card, specifically, an access control card identifier is read, whether the temporary access control card identifier has the permission of allowing access or not is judged, and if the temporary access control card identifier has the permission of allowing access, if the temporary access control card identifier does not have the permission, prompt can be carried out in modes of voice, whistle and the like. The temporary access control card identification means that a unique access control card can be determined, and the temporary access control card identification is unique.
In order to further improve the safety, the temporary access card has a valid period, specifically, 8 hours, 24 hours, or the like.
S504, the validity period of the temporary access control card is sent to the access control system, so that the access control system monitors the validity of the temporary access control card.
In particular, different temporary access cards may have different expiration dates. Therefore, the validity period of the temporary access control card needs to be sent to the access control system, and the access control system can allow the temporary access control card with the authority in the validity period to enter; and forbidding access to all temporary access cards which are not in the valid period. For example, the validity period of the temporary access control card is 24 hours, and after the validity period exceeds 24 hours, the access control card does not have the authority, so that the issuing safety of the temporary access control card is effectively improved. The access control system can retrieve the access control permission of the temporary access control card according to the valid time limit, and after the valid time limit of the temporary access control card is expired, the access control system can eliminate the access control permission of the temporary access control card or the temporary access control card is in an invalid state.
Fig. 10 is a schematic flow chart illustrating a sixth method for issuing a temporary access control card according to an embodiment of the present invention. As shown in fig. 10, the method for issuing the temporary access control card includes the following steps:
s601, the server sends the two-dimensional code for verifying the identity of the user to the first terminal, the first terminal displays the two-dimensional code to the user through a screen, so that the user scans the two-dimensional code through the second terminal, and the second terminal sends the scanned two-dimensional code to the server for verification.
Specifically, the user may select different processes for authentication according to their own identity, as shown in fig. 11, in an enterprise scenario, if the user is a visitor identity, the user may select to click the left "contracted visitor" to start the authentication process; if the user is employee identity, the user may choose to click on "employee Start" on the right to begin the authentication process.
Furthermore, when the user starts to select according to actual needs (for example, clicking "employee start" in fig. 11 according to the identity of his/her employee), the two-dimensional code for verifying the identity of the user is sent to the first terminal, and the first terminal is displayed to the user through the screen (as shown in fig. 6 in the above embodiment). It will be appreciated that the generated two-dimensional code can only be displayed, and thus, the two-dimensional code generated and transmitted by the server receiving the application program is required before the two-dimensional code is displayed to the user through the screen.
Furthermore, the user can scan the two-dimensional code through an application program (not limited to one or more of WeChat, QQ, microblog and the like) on the second terminal (not limited to one or more of a mobile phone, a tablet computer, a smart wearable device and the like) and send the two-dimensional code to a server of the application program for verification.
Specifically, the second terminal sends the scanned two-dimensional code and the identifier of the second terminal to the server; the server carries out identity verification according to the two-dimensional code, acquires the attribute information of the user after the server passes the verification and sends the attribute information to the first terminal, and the identity verification method comprises the following steps: and the server acquires the attribute information of the user according to the identifier of the second terminal after the authentication is passed, and the server sends the attribute information of the user to the first terminal.
It can be understood that the server stores the attribute information of the user in advance, and as an implementation manner, the server receives the basic information sent by the user to form a user database, where the basic information includes the attribute information of the user and the identifier of the second terminal. Therefore, after the server passes the verification, the attribute information of the user is acquired according to the identifier of the second terminal, and the method comprises the following steps: and after the verification is passed, the server queries the user database according to the identifier of the second terminal to obtain the attribute information of the user.
S602, the server acquires the attribute information of the user after passing the verification and sends the attribute information to the first terminal.
Specifically, the server returns the attribute information to the first terminal user after the authentication is passed.
And S603, the first terminal issues temporary access control cards to the users according to the attribute information of the users, wherein the temporary access control cards acquired by the users with different attributes have different access control permissions.
Specifically, after the attribute information of the user is acquired, a temporary access control card needs to be issued to the user according to the attribute information of the user. After the access control authority corresponding to the user is determined according to the attribute information, the temporary access control card with the corresponding authority is sent to the user. Therefore, the safety of sending the temporary access control card is further improved.
It should be noted that, according to the needs of the actual application scenario, the first terminal issues the temporary access card to the user in different manners according to the attribute information of the user, which is illustrated as follows:
in a first example, a first terminal queries a corresponding relationship between an attribute and an access right according to preset attribute information of a user, further queries the corresponding relationship according to the attribute information of the user to obtain a corresponding target access right, generates a temporary access card for the user according to the target access right, and issues the temporary access card to the user in the form of an entity card or a virtual card (which can be displayed in a portable device such as a mobile terminal).
In a second example, after determining attribute information of a user according to a processing algorithm pre-stored in association with the attribute information, a first terminal obtains parameters associated with the pre-stored processing algorithm for calculation, determines a target access right corresponding to the attribute information, generates a temporary access card for the user according to the target access right, and issues the temporary access card to the user in the form of an entity card or a virtual card (which can be displayed in a portable device such as a mobile terminal).
It should be noted that the above manner is merely an example of issuing the temporary access control card to the user according to the attribute information of the user, and other manners may be selected or set according to actual application needs.
Taking the first example as an example, a temporary access control card is issued to a user, and the identifier of the access control card and the target access control authority are sent to an access control system (after the access control system receives the identifier of the temporary access control card, the identifier of the temporary access control card and the target access control authority are subjected to associated registration). From this, when the user used the temporary card of entrance guard, access control system can carry out the correspondence to it (reading entrance guard's card sign promptly, judging whether it has the authority of allowwing to enter, if have the permission to enter, if do not, can indicate through modes such as pronunciation, whistle). The temporary access control card identification means that a unique access control card can be determined, and the temporary access control card identification is unique.
In order to further improve the safety, the temporary access card has a valid period, specifically, 8 hours, 24 hours, or the like.
In particular, different temporary access cards may have different expiration dates. Therefore, the validity period of the temporary access control card needs to be sent to the access control system, and the access control system can allow the temporary access control card with the authority in the validity period to enter; and forbidding all temporary access cards which are not in the validity period. For example, the validity period of the temporary access control card is 24 hours, and after the validity period exceeds 24 hours, the access control card does not have the authority, so that the issuing safety of the temporary access control card is effectively improved.
In summary, in the method for issuing the temporary access control card according to the embodiment of the present invention, the server sends the two-dimensional code for verifying the identity of the user to the first terminal, and then the first terminal displays the two-dimensional code to the user through the screen, so that the user scans the two-dimensional code through the second terminal and sends the two-dimensional code to the server of the application program for verification, and obtains the attribute information of the user after the verification is passed and sends the attribute information to the first terminal, and finally the first terminal issues the temporary access control card to the user according to the attribute information of the user, where the temporary access control cards obtained by the users with different attributes have different access permissions, the operation is simple and convenient, and the accuracy is high, thereby improving the security of issuing the temporary access control card.
In order to more fully describe the method for issuing the temporary access control card according to the embodiment of the present invention, the method for issuing the temporary access control card according to the embodiment of the present invention is described below by focusing on an application (such as WeChat, QQ, etc.) server side.
Fig. 12 is a schematic flow chart of a seventh method for issuing a temporary access control card according to an embodiment of the present invention. As shown in fig. 12, the method for issuing the temporary access control card includes the following steps:
and S701, receiving verification information sent by a mobile terminal of a user and used for verifying the identity of the user, wherein the verification information comprises the two-dimensional code and the identification of the mobile terminal.
And S702, performing identity verification according to the two-dimension code in the verification information.
Specifically, the application server needs to encode information such as an address to which a specific terminal (such as a self-service machine) belongs, a terminal identifier, a random number, and the like in advance to generate a two-dimensional code, and send the two-dimensional code to the terminal for display.
Further, the authentication information (including the two-dimensional code and the identification of the mobile terminal) transmitted by the user by scanning the two-dimensional code can be received. Thus, identity authentication is performed according to the two-dimensional code in the authentication information. Namely, after the two-dimensional code is scanned, the authority of the mobile terminal is verified through a related interface (such as openid of WeChat) of an application program, so that identity verification is completed.
And S703, acquiring the attribute information of the user according to the identification of the mobile terminal after the verification is passed.
And S704, sending the attribute information of the user to the terminal so that the terminal can issue the temporary access control card to the user according to the attribute information, wherein the temporary access control cards acquired by the users with different attributes have different access control authorities.
It should be noted that, the application server receives basic information (including attribute information of the user and the identifier of the mobile terminal) sent by the user in advance and forms a user database.
And after the verification is passed, inquiring a user database according to the identification of the mobile terminal, acquiring the attribute information of the user and sending the attribute information to the terminal so as to ensure that the issuing card of the user with different attributes has temporary access control cards with different access control authorities.
In summary, in the method for issuing the temporary access control card according to the embodiment of the present invention, the verification information including the two-dimensional code and the identifier of the mobile terminal, which is used for verifying the identity of the user, is sent by the mobile terminal of the receiving user, the identity is verified according to the two-dimensional code in the verification information, and then the attribute information of the user is obtained according to the identifier of the mobile terminal after the verification is passed, and the obtained attribute information is sent to the terminal, so that the temporary access control cards having different access control permissions are issued for the users with different attributes. From this, easy operation is convenient, the accuracy is high to improve the security and the reduction cost of labor that interim entrance guard's card was provided.
Based on the above embodiment, in order to describe more clearly how the access control device performs different operation controls on temporary access cards with different permissions after sending the temporary access cards to the user, a method for identifying the temporary access cards is described below in a centralized manner on the side of the access control device.
Fig. 13 is a schematic flow chart illustrating a method for identifying a temporary access card according to an embodiment of the present invention. As shown in fig. 13, the method for identifying the temporary access card includes the following steps:
and S801, acquiring the access authority of the temporary access card.
Specifically, when the temporary access control card has the permission to open the target door, the access control permission of the temporary access control card needs to be acquired. It should be noted that different ways can be adopted to obtain the access right of the temporary access card according to different specific application scenarios, for example, the following steps are described:
the first example is that the identification of the temporary access control card sent by the target door is received, the incidence relation between the identification of the temporary access control card and the access control authority is inquired according to the identification of the temporary access control card, and the access control authority of the temporary access control card is obtained. As a scenario illustrating how a target door acquires a temporary access card identifier: the user makes the target door obtain the identification of the temporary access control card by a card swiping mode (the temporary access control card is a physical card). As another scenario, how the target door obtains the temporary access card identifier is illustrated: the user establishes connection with the target door through the mobile terminal to send the temporary access control card identification, so that the target door obtains the identification of the temporary access control card (aiming at the condition that the temporary access control card is a virtual card).
In a second example, the user directly sends the identifier of the temporary access control card to the access control device through the mobile terminal, and then the access control device queries the association relationship between the identifier of the temporary access control card and the access control authority of the temporary access control card according to the identifier of the temporary access control card, and acquires the access control authority of the temporary access control card.
It should be noted that the above access permission method for obtaining the temporary access card is only an example, and may be selected and adjusted according to actual application requirements.
It can be understood that the access permission that the temporary access card has can be obtained according to the identifier of the temporary access card only by pre-storing the identifier of each temporary access card and the association relationship of the access permission that the temporary access card has. Specifically, in this embodiment, the identifier of each temporary access control card and the access control authority that the terminal sends may be received, and an association relationship may be established according to the identifier of each temporary access control card and the access control authority that the terminal has.
S802, judging whether the temporary access control card has the authority of opening the target door according to the access control authority.
And S803, when the temporary access control card is judged to have the authority of opening the target door, opening the target door.
Specifically, whether the temporary access control card has the authority of opening the target door or not can be judged according to the acquired access control authority, and the target door is opened when the temporary access control card has the authority of opening the target door. It is understood that the closed state of the target door is maintained when the temporary access card does not have the authority to open the target door.
Note that the temporary access card has a valid period. The validity period of the temporary access control card needs to be received, and the validity of the temporary access control card is monitored according to the validity period.
As an example, when the temporary access control card is judged to have the authority to open the target door, whether the temporary access control card has validity is further judged according to the validity period, and the target door is opened when the temporary access control card has validity; and when the temporary access card is not valid, keeping the closing state of the target door.
In summary, in the identification method of the temporary access control card according to the embodiment of the present invention, the access permission of the temporary access control card is obtained, and whether the temporary access control card has the permission to open the target door is determined according to the access permission, and finally the target door is opened when the temporary access control card has the permission to open the target door. From this, through improving identification efficiency, convenience of customers uses to effectively monitor according to interim entrance guard's card validity period, further improve the security.
Fig. 14 is a schematic flowchart of another method for identifying a temporary access card according to an embodiment of the present invention, where after step S803, the method for identifying a temporary access card further includes:
and S901, after the user acquires the temporary access control card, setting the long-term access control card of the user into a failure state within the validity period of the temporary access control card.
And S902, recovering the temporary access control card and deleting the access control authority in the temporary access control card.
Specifically, after the temporary access card is issued, other access cards (such as a long-term access card) of the user need to be set to a disabled state within the validity period of the temporary access card. So as to ensure that a user can only enter the corresponding target place through one card, and improve the safety.
Specifically, the temporary access control card may be recovered for different situations according to a specific application scenario, for example, as follows:
in a first example, when the user returns the temporary access card, the access right in the temporary access card is deleted.
In a second example, the temporary access control card deletes the access control authority in the temporary access control card when the temporary access control card exceeds the valid period.
It should be noted that, the above recycling of the temporary access card for different situations is only an example, and can be selected and adjusted according to actual application needs.
Therefore, after the user acquires the temporary access control card, the long-term access control card of the user is set to be in an invalid state in the valid period of the temporary access control card, the temporary access control card is recycled, the access control authority in the temporary access control card is deleted, and the safety is further improved.
Fig. 15 is a flowchart illustrating a temporary access card processing procedure according to an embodiment of the present invention.
Referring to fig. 15, taking an enterprise scenario as an example for explanation, the embodiment includes: staff, self-service machine, WeChat, visitor system, face system, access control system and pass the floodgate. The embodiment describes a specific application scenario of the process of issuing and identifying the temporary access control card provided by the embodiment by way of example through information interaction between devices, and the specific description is as follows:
it should be noted that the self-service machine can perform operations such as generating a wechat verification two-dimensional code, capturing a face image, issuing a temporary work card, returning a card and the like. WeChat public numbers are mainly directed at employee identity authentication. The visitor system mainly verifies the identity of the employee. The face system mainly verifies the identity of the employee through face detection. The access control system mainly performs operations of registering access control authority, verifying access control authority, recovering access control authority and the like.
Specifically, when the employee enters the company and finds that the employee forgets to carry the access control card, the employee can perform identity verification by triggering the self-service machine to generate the two-dimensional code and by triggering the camera device on the self-service machine to take a picture so as to issue the temporary access control card. The following describes the specific authentication procedures in the above two ways in two examples.
In an example I, after the two-dimensional code is generated, an employee can perform two-dimensional code scanning operation through WeChat installed on a mobile terminal, the identity of the employee is verified through the WeChat, and a temporary access control card is issued after the verification is passed.
In order to make clear to those skilled in the art how to verify the identity of the employee by using the WeChat, the following specific description is provided in conjunction with FIG. 16 (a):
specifically, after the two-dimensional code (as shown in fig. 6 in the foregoing embodiment) is scanned by using the WeChat, as shown in fig. 16(a), the employee enters a mobile phone identity confirmation page, the access system verifies the mobile phone permission by using the openid of the WeChat, that is, the employee does not allow access by using the mobile phone number, the employee confirms the identity on the mobile phone, and the visitor system stores the confirmation to the cache and sets the expiration time (for example, 1 minute and two minutes).
It should be noted that the self-service machine sends information such as an address, an identifier (such as a name, a serial number, etc.), a random number, etc. to the guest system in advance, and the guest system encodes the information to generate a two-dimensional code with a link address. Therefore, the staff can enter the relevant verification interface after scanning the two-dimensional code.
Specifically, in order to further ensure the security, the self-service machine sends the information such as the address, the identifier (such as a name, a serial number, and the like) and the random number to the guest system again every preset time (such as 3 seconds) to perform a cycle, the guest system queries a result from the cache, notifies the self-service machine of the confirmation result after confirming the identity of the employee, and the self-service machine prints the temporary access card (that is, issues the temporary access card in the above embodiment) after receiving the confirmation result.
In the second example, after the camera device is started to shoot, the face system detects the identity of the employee through the face image, an input extension number interface is displayed on the self-service machine, and the temporary access control card is issued after the extension number is correctly input.
In order to make clear to those skilled in the art how to verify the identity of the employee by using the face image, the following specific description is provided:
specifically, the employee may select the corresponding organizational structure, the kiosk starts the camera device by calling the system (for example, avicap32.dll), the employee aligns the face with the camera (as shown in fig. 3 in the above embodiment), and the kiosk intercepts the image of the face in the shooting area by the screen capturing function of the system.
And then, the self-service machine sends the face image to the visitor system, the visitor system calls the face system to detect the face image, after the face is confirmed, the corresponding face image is found in a preset face database through the staff organization structure, matching is carried out, and a result that the matching degree exceeds a preset threshold value is returned to the self-service machine.
Furthermore, after the identity of the employee is detected through the face image, an input extension number interface is displayed on the self-service machine, for example, as shown in fig. 16(b), "please input an extension number with five digits", and a temporary access card is issued after the input of the extension number is correct.
Specifically, after the temporary access control card is issued, the employee may be notified in a WeChat information manner (which may be a preset automatic reply manner) that the temporary access control card has been received to further ensure security. The display interface may be as shown in fig. 16 (c).
It can be understood that before the temporary access control card is issued, the access control authority of the employee needs to be determined, that is, the access control authority can be sent to the visitor system as the identification of the employee through the employee card number of the employee and the like, and the visitor system verifies the authority of the employee card number through the interface provided by the access control device and returns the result to the self-service machine. The temporary access control cards with different access control authorities are issued for different employees.
It should be noted that the new card has no specific authority, and different authorities need to be given to the new card through modes such as registration authorization and the like of the card reader to the access control device, so that the new card becomes a temporary access control card and is stored in the self-service machine.
And then, when the self-service machine receives the authority corresponding to the employee's work card number, the corresponding temporary access control card is printed by calling the printer interface. It is understood that the temporary access card in this embodiment is in the form of a physical card.
It should be noted that, in the printing process, if the temporary access card is found to be unauthorized, the temporary access card is recovered, and the printing is stopped.
It should be noted that the visitor system queries the issued temporary access card in a preset period (for example, every day), and actively recovers the authority of the temporary access card that the employee does not return (exceeds the valid period).
From this, can improve the efficiency that the staff received interim entrance guard card greatly, alleviated working pressure of working peak period proscenium staff, reduce the cost of labor, and can automatic accurate granting interim entrance guard card, realize that the automation of entrance guard's permission is transferred and is retrieved, improved the security greatly.
In order to implement the above embodiment, the present invention further provides a first terminal.
Fig. 17 is a schematic structural diagram of a first terminal according to an embodiment of the present invention. The first terminal includes: an authentication module 11, an acquisition module 12 and a sending module 13.
The verification module 11 is configured to obtain verification information for verifying the identity of the user and verify the user identity.
And the obtaining module 12 is used for obtaining the attribute information of the user after the verification is passed.
The issuing module 13 is used for issuing a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions.
It should be noted that the foregoing explanation of the embodiment of the temporary access control card issuing method is also applicable to the terminal of this embodiment, and details are not described here.
In summary, the first terminal in the embodiment of the present invention issues temporary cards with different access control authorities for different users after passing verification of verification information for verifying user identities, so that the operation is simple and convenient, and the accuracy is high, thereby improving the security of issuing temporary access control cards.
Fig. 18 is a schematic structural diagram of an access card issuing system according to an embodiment of the present invention. This access control card issuing system includes: a first terminal 1, a server 2 and a second terminal 3.
The server 2 is configured to send the two-dimensional code used for verifying the identity of the user to the first terminal 1, receive and verify the two-dimensional code sent by the second terminal 3 used by the user, and obtain the attribute information of the user after the verification is passed and send the attribute information to the first terminal 1.
The first terminal 1 is used for receiving the two-dimensional code and displaying the two-dimensional code to a user through a screen so that the user can scan the two-dimensional code through the second terminal 3, receiving the attribute information of the user issued by the server 2 after the user passes the verification, and issuing a temporary access control card to the user according to the attribute information of the user.
And the second terminal 3 is used for scanning the two-dimensional code and sending the two-dimensional code to the server 2 for verification.
The temporary access control cards acquired by the users with different attributes have different access control permissions.
It should be noted that the first terminal may have both the face recognition function and the language recognition function, that is, a face database construction module, a language database construction module, and respective update modules are provided, and a user may select whether to perform face image verification or language information verification according to a need of the user, or perform verification in a two-dimensional code manner.
It should be noted that the foregoing explanation on the embodiment of the temporary access control card issuing method is also applicable to the access control card issuing system of this embodiment, and is not described herein again.
In summary, in the access card issuing system according to the embodiment of the present invention, the server sends the two-dimensional code for verifying the identity of the user to the first terminal, and then the first terminal displays the two-dimensional code to the user through the screen, so that the user scans the two-dimensional code through the second terminal and sends the two-dimensional code to the server of the application program for verification, and obtains the attribute information of the user after the verification is passed and sends the attribute information to the first terminal, and finally the first terminal issues the temporary access card to the user according to the attribute information of the user, where the temporary access cards obtained by the users with different attributes have different access rights, the operation is simple and convenient, the accuracy is high, and thus the safety of issuing the temporary access card is improved.
Fig. 19 is a schematic structural diagram of an access control identifying apparatus according to an embodiment of the present invention. This entrance guard recognition device is used for the user to use interim entrance guard card to try to open the target door, includes: an acquisition module 41, a judgment module 42 and a starting module 43.
The obtaining module 41 is configured to obtain an access right of the temporary access card.
And the judging module 42 is used for judging whether the temporary access control card has the authority of opening the target door according to the access control authority.
And the opening module 43 is used for opening the target door when the temporary access control card is judged to have the authority of opening the target door.
Further, the obtaining module 41 is specifically configured to receive an identifier of the temporary access control card sent by the target door, query an association relationship between the identifier of the temporary access control card and the access control authority that the temporary access control card has according to the identifier of the temporary access control card, and obtain the access control authority of the temporary access control card.
Further, as a possible implementation manner, fig. 20 is a schematic structural diagram of another access control identification device provided in an embodiment of the present invention, and as shown in fig. 20, on the basis of fig. 19, the access control identification device further includes: an association establishment module 44, a monitoring module 45 and a failure setting module 46.
The association establishing module 41 is configured to receive, before obtaining the access right of the temporary access card, the identifier of each temporary access card and the access right that the temporary access card has sent from the terminal, and establish an association relationship according to the identifier of each temporary access card and the access right that the temporary access card has.
In an embodiment of the present invention, the temporary access control card has a valid period, and the monitoring module 45 is configured to receive the valid period of the temporary access control card and monitor the validity of the temporary access control card according to the valid period.
Further, the opening module 43 is specifically configured to determine whether the temporary access control card has validity according to the validity period when it is determined that the temporary access control card has the authority to open the target door, and open the target door if the temporary access control card has validity.
Further, the failure setting module 46 is configured to set the long-term access control card of the user into a failure state within the validity period of the temporary access control card after the user acquires the temporary access control card.
It should be noted that the foregoing explanation of the embodiment of the temporary access control card identification method is also applicable to the access control identification device of this embodiment, and details are not repeated here.
In summary, the access identification device according to the embodiment of the present invention obtains the access right of the temporary access card, determines whether the temporary access card has the right to open the target door according to the access right, and finally opens the target door when the temporary access card has the right to open the target door. From this, through improving identification efficiency, convenience of customers uses to effectively monitor according to interim entrance guard's card validity period, further improve the security.
In order to implement the above embodiments, the present invention further provides a terminal, including: the temporary entrance guard card issuing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and is characterized in that the processor executes the program to realize the first to fifth temporary entrance guard card issuing methods in the implementation.
In order to implement the above embodiment, the present invention further provides a first terminal.
Fig. 21 is a schematic structural diagram of a first terminal according to an embodiment of the present invention.
Note that fig. 21 exemplifies a first terminal side. As shown in fig. 20, the first terminal may include: a processor 11; a memory 12 for storing processor-executable instructions. Wherein the processor 11 is configured to: acquiring verification information for verifying the identity of a user and verifying the verification information; acquiring attribute information of the user after the verification is passed; issuing a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions.
Fig. 22 is a schematic structural diagram of an access card issuing system according to an embodiment of the present invention.
It should be noted that, as shown in fig. 22, the gate card issuing system may include: a processor 11; a memory 12 for storing processor-executable instructions. Wherein the processor 11 is configured to: the server sends the two-dimensional code used for verifying the identity of the user to the first terminal; the first terminal displays the two-dimensional code to a user through a screen so that the user can scan the two-dimensional code through the second terminal; the second terminal sends the scanned two-dimensional code to a server for verification; the server acquires the attribute information of the user after passing the verification and sends the attribute information to the first terminal; the first terminal issues a temporary access control card to the user according to the attribute information of the user; the temporary access control cards acquired by the users with different attributes have different access control permissions.
Fig. 23 is a schematic structural diagram of an access control identifying apparatus according to an embodiment of the present invention.
It should be noted that, as shown in fig. 23, the access control identification device may include: a processor 11; a memory 12 for storing processor-executable instructions. Wherein the processor 11 is configured to: acquiring the access authority of a temporary access card; judging whether the temporary access control card has the authority of opening the target door or not according to the access control authority; and when the temporary access control card is judged to have the authority of opening the target door, opening the target door.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless explicitly specified otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (13)

1. A temporary access control card issuing method is characterized by comprising the following steps:
under the condition that a user forgets to carry a long-term access card, acquiring verification information for verifying the identity of the user and verifying the user;
and acquiring the attribute information of the user after the verification is passed, wherein the attribute information acquisition mode specifically comprises the following steps:
the face image is used as verification information, the attribute information of the user is obtained, the attribute information of the first user is obtained from a face database, and the attribute information of the first user is used as the attribute information of the user;
or the application program scans the two-dimensional code for verification and generates verification information by combining the identification of the mobile terminal, and the acquired attribute information of the user comprises the attribute information of the user sent by the receiving server after the verification is passed, wherein the attribute information of the user is acquired by the server according to the identification of the mobile terminal;
or, the voice information is used as verification information, the attribute information of the user is obtained, and the attribute information of the second user is used as the attribute information of the user;
or the identity card information is used as verification information, the attribute information of the user is obtained, and the attribute information of the third user is used as attribute information of the user;
issuing a temporary access control card to the user according to the attribute information of the user; setting different attribute identifications for different attributes in advance, setting different authority identifications for different access permissions, constructing a corresponding relation between the attributes and the authorities by using the attribute identifications and the authority identifications, inquiring the corresponding relation between the attributes and the access permissions according to attribute information of users or acquiring target access permissions corresponding to the attribute information of the users according to a pre-stored processing algorithm related to the attribute information, wherein temporary access cards with different attributes have different access permissions;
generating the temporary access control card for the user according to the target access control authority;
and after the user acquires the temporary access control card, setting the long-term access control card of the user into a failure state within the validity period of the temporary access control card.
2. The method for issuing the temporary access control card according to claim 1, wherein the obtaining and verifying the verification information for verifying the user identity includes:
acquiring a face image of the user as the verification information through a camera device;
matching the face image of the user with a face image in a face database;
if the first matching degree of the face image of the user and the face image of the first user in the face database exceeds a preset first numerical value, the user identity is verified;
the obtaining of the attribute information of the user after the verification is passed includes:
acquiring attribute information of the first user from the face database;
and taking the attribute information of the first user as the attribute information of the user.
3. A method for issuing a temporary access control card according to claim 2, further comprising:
the method comprises the steps of constructing a face database in advance according to a preset first database construction strategy, wherein the face database at least stores a face image of a first user, attribute information of the first user and a corresponding relation between the face image of the first user and the attribute information of the first user;
and updating the face database regularly.
4. The method for issuing the temporary access control card according to claim 1, wherein the obtaining and verifying the verification information for verifying the user identity comprises:
generating a two-dimensional code by a server of the installed application program;
displaying the two-dimensional code to the user through a screen, so that the user scans the two-dimensional code through the application program on the mobile terminal, generates verification information by combining with the identifier of the mobile terminal, and sends the verification information to the server for verification;
the obtaining of the attribute information of the user after the verification is passed includes:
receiving attribute information of the user, which is sent by the server after the authentication is passed; and the attribute information of the user is acquired by the server according to the identification of the mobile terminal.
5. The method for issuing the temporary access control card according to claim 1, wherein the obtaining and verifying the verification information for verifying the user identity comprises:
collecting voice information of the user as the verification information through a pickup device;
matching the voice information of the user with the voice information in a voice database;
if the second matching degree of the voice information of the user and the voice information of the second user in the voice database exceeds a preset second value, the user identity is verified;
the obtaining of the attribute information of the user after the verification is passed includes:
acquiring attribute information of the second user from the voice database;
and taking the attribute information of the second user as the attribute information of the user.
6. A temporary access card issuing method according to claim 5, further comprising:
the method comprises the steps that a voice database is built in advance according to a preset second database building strategy, wherein at least voice information of a second user, attribute information of the second user and a corresponding relation between the voice information of the second user and the attribute information of the second user are stored in the voice database;
the voice database is updated periodically.
7. A temporary access card issuance method according to claim 6, further comprising:
and monitoring the valid period of the temporary access control card.
8. A method for issuing a temporary access control card is characterized by comprising the following steps:
under the condition that the user forgets to carry the long-term access card, the server sends the two-dimensional code for verifying the identity of the user to the first terminal;
the first terminal displays the two-dimensional code to a user through a screen so that the user can scan the two-dimensional code through a second terminal;
the second terminal sends the scanned two-dimensional code to the server for verification;
the server acquires the attribute information of the user after passing the verification and sends the attribute information to the first terminal; setting different attribute identifications for different attributes in advance, setting different authority identifications for different access authorities, constructing a corresponding relation between attributes and authorities by using the attribute identifications and the authority identifications, inquiring the corresponding relation between the attributes and the access authorities according to attribute information of users or acquiring target access authorities corresponding to the attribute information of the users according to a processing algorithm which is stored in advance and is related to the attribute information, wherein temporary access cards with different attributes have different access authorities; generating the temporary access control card for the user according to the target access control authority; setting the long-term access control card of the user into a failure state within the validity period of the temporary access control card after the user acquires the temporary access control card;
and the first terminal issues the temporary access control card to the user according to the attribute information of the user.
9. The method for issuing the temporary access control card according to claim 8, wherein the second terminal sends the scanned two-dimensional code to the server for verification, and the method comprises the following steps:
the second terminal sends the scanned two-dimensional code and the identifier of the second terminal to the server; the server carries out identity verification according to the two-dimensional code;
the server acquires the attribute information of the user after passing the verification and sends the attribute information to the first terminal, and the method comprises the following steps:
the server acquires the attribute information of the user according to the identifier of the second terminal after the verification is passed;
and the server sends the attribute information of the user to the first terminal.
10. A method for issuing a temporary access control card according to claim 9, further comprising:
the server receives basic information sent by a user to form a user database, wherein the basic information comprises attribute information of the user and an identifier of the second terminal;
the server acquires the attribute information of the user according to the identifier of the second terminal after the authentication is passed, and the method comprises the following steps:
and after the verification is passed, the server queries the user database according to the identifier of the second terminal to obtain the attribute information of the user.
11. A first terminal, comprising:
the verification module is used for acquiring verification information for verifying the identity of the user and verifying the verification information under the condition that the user forgets to take the long-term access control card;
an obtaining module, configured to obtain attribute information of the user after the verification passes, where the attribute information obtaining manner specifically is:
the face image is used as verification information, the attribute information of the user is obtained, and the attribute information of the first user is used as the attribute information of the user;
or the application program scans the two-dimensional code for verification and generates verification information by combining the identification of the mobile terminal, and the acquired attribute information of the user comprises the attribute information of the user sent by the receiving server after the verification is passed, wherein the attribute information of the user is acquired by the server according to the identification of the mobile terminal;
or, the voice information is used as verification information, the attribute information of the user is obtained, and the attribute information of the second user is used as the attribute information of the user;
or the identity card information is used as verification information, the attribute information of the user is acquired, the attribute information of a third user corresponding to the identity card information is acquired, and the attribute information of the third user is used as the attribute information of the user;
the issuing module is used for issuing a temporary access control card to the user according to the attribute information of the user;
the method comprises the steps that different attribute identifications are set for different attributes in advance, different permission identifications are set for different access permissions, the corresponding relation between the attributes and the permissions is built by utilizing the attribute identifications and the permission identifications, temporary access cards obtained by users with different attributes have different access permissions, the corresponding relation between the attributes and the access permissions is inquired according to the attribute information of the users or a processing algorithm related to the attribute information which is stored in advance is used for obtaining target access permissions corresponding to the attribute information of the users;
generating the temporary access control card for the user according to the target access control authority;
and after the user acquires the temporary access control card, setting the long-term access control card of the user into a failure state within the valid period of the temporary access control card.
12. An access card issuing system, comprising:
the server is used for sending a two-dimensional code for verifying the identity of a user to a first terminal, receiving and verifying the two-dimensional code sent by a second terminal used by the user, and acquiring attribute information of the user after the verification is passed and sending the attribute information to the first terminal under the condition that the user forgets a long-term access control card;
the first terminal is used for receiving the two-dimensional code, displaying the two-dimensional code to a user through a screen so that the user can scan the two-dimensional code through a second terminal, receiving attribute information of the user issued by the server after the user passes verification, and issuing a temporary access control card to the user according to the attribute information of the user;
the second terminal is used for scanning the two-dimensional code and sending the two-dimensional code to the server for verification;
setting different attribute identifications for different attributes in advance, setting different authority identifications for different access permissions, constructing a corresponding relation between the attributes and the authorities by using the attribute identifications and the authority identifications, inquiring the corresponding relation between the attributes and the access permissions according to attribute information of users or acquiring target access permissions corresponding to the attribute information of the users according to a pre-stored processing algorithm related to the attribute information, wherein temporary access cards with different attributes have different access permissions;
generating the temporary access control card for the user according to the target access control authority;
and after the user acquires the temporary access control card, setting the long-term access control card of the user into a failure state within the valid period of the temporary access control card.
13. A computer readable storage medium comprising computer instructions which, when executed by a processor, implement a method of issuing a temporary access control card according to any one of claims 1 to 7 or any one of claims 8 to 10.
CN201710255812.4A 2017-04-19 2017-04-19 Method and device for issuing temporary access control card Active CN108734813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710255812.4A CN108734813B (en) 2017-04-19 2017-04-19 Method and device for issuing temporary access control card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710255812.4A CN108734813B (en) 2017-04-19 2017-04-19 Method and device for issuing temporary access control card

Publications (2)

Publication Number Publication Date
CN108734813A CN108734813A (en) 2018-11-02
CN108734813B true CN108734813B (en) 2022-08-23

Family

ID=63924269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710255812.4A Active CN108734813B (en) 2017-04-19 2017-04-19 Method and device for issuing temporary access control card

Country Status (1)

Country Link
CN (1) CN108734813B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110021088B (en) * 2018-10-29 2021-06-29 深圳市微开互联科技有限公司 Page control door opening system and method of distributed authorization architecture
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN109859356A (en) * 2019-01-24 2019-06-07 广州市天河区保安服务公司 A kind of access control management method and system
CN109615757B (en) * 2019-02-27 2021-08-03 西安艾润物联网技术服务有限责任公司 Visitor access control management method, system and storage medium
CN110164009B (en) * 2019-05-29 2021-08-20 华翔翔能科技股份有限公司 Two-dimensional code access control system
CN110136315A (en) * 2019-06-27 2019-08-16 广东电网有限责任公司 A kind of substation safety region prevention and control system based on Internet of Things and recognition of face
CN110321835A (en) * 2019-07-01 2019-10-11 杭州创匠信息科技有限公司 Face guard method, system and equipment
CN112435386A (en) * 2019-08-06 2021-03-02 南京理工大学 Identity authentication and card issuing all-in-one machine and working method thereof
CN112053485A (en) * 2020-09-08 2020-12-08 上海善一智能科技有限公司 Department intelligent authority distribution system
CN114596656B (en) * 2020-12-03 2023-09-19 中移互联网有限公司 Electronic pass processing method, device and equipment
CN112634501A (en) * 2021-01-04 2021-04-09 深圳市法本信息技术股份有限公司 Visitor authorization method for property management
CN113689603A (en) * 2021-08-20 2021-11-23 青岛海信智慧生活科技股份有限公司 Access control authority management method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102881064A (en) * 2012-10-08 2013-01-16 无锡天授信息科技有限公司 Visitor management system and method based on face identification
CN103023917B (en) * 2012-12-26 2016-03-16 百度在线网络技术(北京)有限公司 The mthods, systems and devices of authorizing are carried out for intelligent appliance
CN104065652B (en) * 2014-06-09 2015-10-14 北京石盾科技有限公司 A kind of auth method, device, system and relevant device
CN205334578U (en) * 2015-12-22 2016-06-22 深圳市施德朗电气有限公司 Self -service visitor system
CN105678872B (en) * 2015-12-30 2019-06-14 福建星网锐捷通讯股份有限公司 A kind of access control system and its authorization method and access control terminal equipment

Also Published As

Publication number Publication date
CN108734813A (en) 2018-11-02

Similar Documents

Publication Publication Date Title
CN108734813B (en) Method and device for issuing temporary access control card
CN105913527B (en) Visitor's two dimensional code intelligent verification system and verification method based on cell cloud
CN106097223B (en) Certificate declaration management system and certificate declaration management method
JP7038293B2 (en) Gate open / close control device and gate open / close control method
JP2024038422A (en) Face recognition management server and face recognition management method
US11893844B2 (en) Face authentication machine and face authentication method
JP6998568B2 (en) Face recognition system and face recognition method
US20230421997A1 (en) Evacuation tracking
CN114565997A (en) Intelligent construction site personnel health management system and method
JP2023157932A (en) Face authentication registration device, and a face authentication registration method
US10339174B2 (en) Automated location visit verification for officer monitoring systems
US20070067330A1 (en) Security method for verifying and tracking service personnel
CN107993174A (en) A kind of Multi-functional convenience service system
CN116881890B (en) User identity identification management method and system for self-service list printer
JP7296607B2 (en) Face recognition machine and face recognition method
JP7266185B2 (en) Face authentication system and face authentication method
JP2022084586A (en) Entrance control apparatus and entrance control method
JP2023111936A (en) Face authentication apparatus and face authentication method
JP2023101822A (en) Face authentication machine and face authentication method
KR20150067558A (en) System for registrating one or more certification photos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant