CN108877001B - Visitor information processing method and device and electronic equipment - Google Patents

Visitor information processing method and device and electronic equipment Download PDF

Info

Publication number
CN108877001B
CN108877001B CN201810628350.0A CN201810628350A CN108877001B CN 108877001 B CN108877001 B CN 108877001B CN 201810628350 A CN201810628350 A CN 201810628350A CN 108877001 B CN108877001 B CN 108877001B
Authority
CN
China
Prior art keywords
visitor
information
invitation
face
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810628350.0A
Other languages
Chinese (zh)
Other versions
CN108877001A (en
Inventor
刘艳云
范玉龙
何照照
陈龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201810628350.0A priority Critical patent/CN108877001B/en
Publication of CN108877001A publication Critical patent/CN108877001A/en
Application granted granted Critical
Publication of CN108877001B publication Critical patent/CN108877001B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The application provides a visitor information processing method, a visitor information processing device and electronic equipment, wherein the method comprises the following steps: acquiring an input invitation identifier; reading a target record corresponding to the invitation identifier in a pre-entered invitation record to obtain visitor type information in the target record; executing a corresponding visitor information input flow according to the visitor type information; generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record; and sending permission information to the access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor. The purchase cost of enterprises can be reduced, the visitor operation is simplified, and the time cost of visitors is effectively saved.

Description

Visitor information processing method and device and electronic equipment
Technical Field
The application relates to the technical field of electronic equipment, in particular to a visitor information processing method and device and electronic equipment.
Background
At present, the visitor system of enterprise needs to set up following equipment: the visitor registration system comprises a simplified version, a second-generation identity card reader, a camera device, a computer, a scanning gun, a printer and a card sender. The enterprise needs to purchase related equipment and then butt-joint with an internal system, an address is provided for newly creating an invitation, and an inviter sends a short message to the visitor through the invitation system.
When the visitor visits, in the visitor system, the exclusive invitation code is input, then the identity card is placed on the second-generation identity card reader for scanning, meanwhile, the image of the visitor is collected through the camera device, and after the face information in the image of the visitor is confirmed to be consistent with the face information on the identity card, the exclusive sticker of the visitor is printed. After the visitor takes out the exclusive sticker, the visitor needs to wait for the security assistant to swipe the card into the door when entering and exiting the gate of the entrance guard.
In this way, the enterprise purchases more equipment and has higher cost, and in addition, after the visitor successfully registers, the visitor needs to wait for others to swipe a card to enter the door, so that the operation is complicated, and the time cost of the visitor is wasted.
Disclosure of Invention
The application provides a visitor information processing method and device and electronic equipment, and the visitor information processing method and device are used for solving the technical problems that in the prior art, more equipment is purchased by an enterprise, the cost is high, in addition, after the visitor successfully registers, the visitor needs to wait for others to swipe a card to enter a door, the operation is complex, and the time cost of the visitor is wasted.
An embodiment of one aspect of the present application provides a method for processing visitor information, including:
acquiring an input invitation identifier;
reading a target record corresponding to the invitation identification in a pre-entered invitation record to obtain visitor type information in the target record;
executing a corresponding visitor information input flow according to the visitor type information;
generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record;
and sending the permission information to the access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor.
As a first possible implementation manner of the embodiment of the present application, before acquiring the input invitation identifier, the method further includes:
acquiring the target record from a first terminal;
generating an invitation identifier corresponding to the target record according to the access deadline recorded in the target record; the invitation identification corresponding to the target record is different from the invitation identifications corresponding to other invitation records with access deadlines in the same time window;
and sending the invitation identification to a second terminal corresponding to the visitor in the target record.
As a second possible implementation manner of the embodiment of the present application, after acquiring the input invitation identifier, the method further includes:
and sending a notification message that the visitor has visited to the first terminal.
As a third possible implementation manner of the embodiment of the application, executing a corresponding visitor information entry process according to the visitor type information includes:
if the acquired times of the invitation identification do not exceed the limited times corresponding to the visitor type information, carrying out visitor information input;
wherein the guest type information includes: community visitors and individual visitors;
the limited times corresponding to the group visitors are the total number of the group visitors;
the number of times of limiting corresponding to the personal visitor is one.
As a fourth possible implementation manner of the embodiment of the present application, the executing a corresponding visitor information entry flow according to the visitor type information further includes:
if the visitor type information is a personal visitor, inquiring the access purpose of the personal visitor;
in the visitor information input process, acquiring the face information of a visitor, and inputting a registry corresponding to the access purpose according to the access purpose.
As a fifth possible implementation manner of the embodiment of the present application, the executing a corresponding visitor information entry process according to the visitor type information further includes:
the visitor type information is group visitors, and the visitor face information is collected for each visitor in sequence in the visitor information input process;
and adding one to the acquired times of the invitation identification every time the face information of the visitor of one visitor is acquired.
As a sixth possible implementation manner of the embodiment of the present application, the method further includes:
shooting a visitor image in the process of executing the visitor information input flow;
performing image recognition on the visitor image, and determining whether the visitor image meets a preset standard;
if the visitor image meets the preset standards, inputting the face information of the visitor according to the visitor image;
the preset standard comprises the following steps:
the area ratio of the human face region in the visitor image meets a preset proportion range;
the imaging angle of the face in the visitor image accords with a preset angle range;
and the number of the key points of the human face obtained by the visitor image recognition is greater than the preset number.
As a seventh possible implementation manner of the embodiment of the application, entering the face information of the visitor according to the visitor image includes:
extracting the features of each face key point of the visitor image to obtain the face features of the visitor;
if the face features of the visitors are not matched with the face features of the staff, the face features of the visitors are input into the face information of the visitors.
According to the visitor information processing method, the input invitation identification is firstly obtained, then the target record corresponding to the invitation identification is read in the pre-input invitation record, visitor type information in the target record is obtained, then the corresponding visitor information input flow is executed according to the visitor type information, finally permission information is generated according to the visitor face information input in the visitor information and the access deadline recorded in the target record, and permission information is sent to the access control system, wherein the permission information is used for the access control system to verify the passing permission of the visitor. In the application, the visitor can complete the input of visitor information in the visitor system through the electronic equipment with higher popularization rate, and sends the permission information to the access control system, so that the acquisition cost of enterprises can be reduced. In addition, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
An embodiment of another aspect of the present application provides a visitor information processing apparatus, including:
the first acquisition module is used for acquiring the input invitation identification;
the reading module is used for reading a target record corresponding to the invitation identifier in a pre-entered invitation record to obtain visitor type information in the target record;
the execution module is used for executing a corresponding visitor information input flow according to the visitor type information;
the first generation module is used for generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record;
the first sending module is used for sending the permission information to the access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor.
As a first possible implementation manner of the embodiment of the present application, the apparatus further includes:
a second obtaining module, configured to obtain the target record from the first terminal before obtaining the input invitation identifier;
the second generation module is used for generating an invitation identifier corresponding to the target record according to the access deadline recorded in the target record; the invitation identification corresponding to the target record is different from the invitation identifications corresponding to other invitation records with access deadlines in the same time window;
and the second sending module is used for sending the invitation identifier to a second terminal corresponding to the visitor in the target record.
As a second possible implementation manner of the embodiment of the present application, the apparatus further includes:
and the third sending module is used for sending a notification message that the visitor has visited to the first terminal after the input invitation identification is obtained.
As a third possible implementation manner of the embodiment of the present application, the execution module is specifically configured to:
if the acquired times of the invitation identification do not exceed the limited times corresponding to the visitor type information, carrying out visitor information input;
wherein the guest type information includes: community visitors and individual visitors;
the limited times corresponding to the group visitors are the total number of the group visitors;
the number of times of limiting corresponding to the personal visitor is one.
As a fourth possible implementation manner of the embodiment of the present application, the execution module is further configured to:
if the visitor type information is a personal visitor, inquiring the access purpose of the personal visitor;
in the visitor information input process, acquiring the face information of a visitor, and inputting a registry corresponding to the access purpose according to the access purpose.
As a fifth possible implementation manner of the embodiment of the present application, the execution module is further configured to:
the visitor type information is group visitors, and the visitor face information is collected for each visitor in sequence in the visitor information input process;
and adding one to the acquired times of the invitation identification every time the face information of the visitor of one visitor is acquired.
As a sixth possible implementation manner of the embodiment of the present application, the apparatus further includes:
the shooting module is used for shooting a visitor image in the visitor information input process;
the identification module is used for carrying out image identification on the visitor image and determining whether the visitor image meets a preset standard or not;
the input module is used for inputting the face information of the visitor according to the visitor image if the preset standards are met;
the preset standard comprises the following steps:
the area ratio of the human face region in the visitor image meets a preset proportion range;
the imaging angle of the face in the visitor image accords with a preset angle range;
and the number of the key points of the human face obtained by the visitor image recognition is greater than the preset number.
As a seventh possible implementation manner of the embodiment of the present application, the entry module is specifically configured to:
extracting the features of each face key point of the visitor image to obtain the face features of the visitor;
if the face features of the visitors are not matched with the face features of the staff, the face features of the visitors are input into the face information of the visitors.
The visitor information processing device comprises a visitor information input module, a visitor type information input module, a visitor information input flow, a visitor information input module, a corresponding target record is read in the invitation record in advance, and finally, the visitor information input module generates a visitor information input module, generates authority information input module, and executes a visitor information input module, generates authority information input a visitor information input module, and generates authority information input module, and finally according to generate authority information, and finally, and generates authority information input by the visitor information, and finally, and generates authority information input by the visitor information, and finally, and generates authority information input by the visitor information, and generates authority information, and finally, and generates authority information input in the visitor information, and generates authority information in the visitor information, and generates authority information in the visitor information, and generates authority information in the visitor information, and finally, and generates authority information in the visitor information, and finally, and generates authority information in the. In the application, the visitor can complete the input of visitor information in the visitor system through the electronic equipment with higher popularization rate, and sends the permission information to the access control system, so that the acquisition cost of enterprises can be reduced. In addition, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
In another aspect of the present application, an embodiment provides an electronic device, where the electronic device runs a guest system, and the guest system interacts with a door control system, and the electronic device includes: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the program to perform the method for processing guest information as set forth in the foregoing embodiments of the present application.
Yet another embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method for processing guest information as set forth in the previous embodiment of the present application.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a flowchart illustrating a visitor information processing method according to an embodiment of the present disclosure;
fig. 2 is a flowchart illustrating a visitor information processing method according to a second embodiment of the present application;
FIG. 3a is a first schematic diagram of an input interface of an invitation identifier in an embodiment of the present application;
FIG. 3b is a schematic diagram of an input interface of an invitation identifier in an embodiment of the present application;
FIG. 4 is a schematic diagram of a display interface of a guest system in an embodiment of the present application;
fig. 5 is a flowchart illustrating a visitor information processing method according to a third embodiment of the present application;
FIG. 6a is a first diagram illustrating a poor quality visitor image in an embodiment of the present application;
FIG. 6b is a diagram of a visitor image with poor quality in an embodiment of the present application;
FIG. 6c is a third illustration of a visitor image of poor quality in an embodiment of the present application;
FIG. 6d is a fourth illustration of a poor quality visitor image in an embodiment of the present application;
fig. 7 is a flowchart illustrating a visitor information processing method according to a fourth embodiment of the present application;
fig. 8 is a flowchart illustrating a visitor information processing method according to a fifth embodiment of the present application;
fig. 9 is a schematic structural diagram of a visitor information processing apparatus according to a sixth embodiment of the present application;
fig. 10 is a schematic structural diagram of a visitor information processing apparatus according to a seventh embodiment of the present application;
fig. 11 is a schematic structural diagram of an electronic device according to an eighth embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
This application is mainly more to the equipment that the enterprise purchased among the prior art, and the cost is higher, in addition, after the visitor is registered successfully, need wait for other people to punch the card and enter, complex operation, and the technical problem of the time cost of extravagant visitor provides a visitor's information processing method.
According to the visitor information processing method, the input invitation identification is firstly obtained, then the target record corresponding to the invitation identification is read in the pre-input invitation record, visitor type information in the target record is obtained, then the corresponding visitor information input flow is executed according to the visitor type information, finally permission information is generated according to the visitor face information input in the visitor information and the access deadline recorded in the target record, and permission information is sent to the access control system, wherein the permission information is used for the access control system to verify the passing permission of the visitor. In the application, the visitor can complete the input of visitor information in the visitor system through the electronic equipment with higher popularization rate, and sends the permission information to the access control system, so that the acquisition cost of enterprises can be reduced. In addition, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
The visitor information processing method, device and electronic equipment according to the embodiments of the present application are described below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a visitor information processing method according to an embodiment of the present disclosure.
The visitor information processing method can be applied to electronic equipment, a visitor system runs on the electronic equipment, and the visitor system is interacted with an access control system.
The electronic device can be a hardware device with various operating systems, touch screens and/or display screens, such as a mobile phone, a tablet computer, a personal digital assistant, a wearable device, and the like.
As shown in fig. 1, the visitor information processing method includes the following steps:
step 101, acquiring an input invitation identification.
In the embodiment of the present application, the invitation identifier is used to uniquely identify the invitation, and the invitation identifier may be any character information uniquely identifying the invitation, such as an invitation code, for example, which is not limited herein.
In an embodiment of the present application, when an inviter wants to invite a visitor to visit, the inviter may initiate an offer in an offer system. Specifically, the inviter may record a target record in the invitation system, which may include the number of visitors, the contact information of the inviter and the visitors (e.g., mobile phone number, QQ number, micro signal, mailbox, etc.), the names of the inviter and the visitors, the work units of the inviter, the access destinations of the visitors (e.g., interview, meal delivery, express delivery, etc.), the access terms, and so on. The invitation system can interact with the visitor system, after the inviter records the target record, the invitation system can send the target record to the visitor system, and then the visitor system can generate an invitation identifier corresponding to the target record according to the access term recorded in the target record.
It is understood that a day may be divided by time period into: early morning (1:00-5:00), morning (5:00-8:00), morning (8:00-11:00), noon (11:00-13:00), afternoon (13:00-17:00), evening (17:00-19:00), midnight (19:00-20:00), and midnight (20:00-24: 00). Typically, since the internal employees of the enterprise are on-duty during the day, the inviter's expected visitor visit time may be in the morning or afternoon, and thus, the visit deadline may be in the morning and/or afternoon. It should be understood that, in the present application, only the access terms are taken as examples in the morning and/or afternoon, and in actual application, the inviter may set the access terms according to actual requirements, which is not limited. For example, for an inviter who is on-duty at night, it may set the access terms to be midnight, late night, and/or early morning.
In the embodiment of the application, after the invitation identifier is generated, the invitation identifier can be sent to the visitor according to the contact way corresponding to the visitor recorded in the target record, for example, the invitation identifier can be sent to the visitor in the ways of short message, mail, hotspot and the like, so that the visitor can enter a visitor system and input the invitation identifier when visiting.
Further, in order to avoid visiting by other uninvited visitors, in the embodiment of the present application, after obtaining the invitation identifier input by the visitor, it may be further determined whether the invitation identifier input by the visitor is consistent with the generated invitation identifier, if so, it indicates that the input invitation identifier is valid, at this time, step 102 may be performed, if not, it indicates that the input invitation identifier is invalid, at this time, the visitor may be prompted to re-input the invitation identifier, and step 102 may be performed until the invitation identifier input by the visitor is valid.
And 102, reading a target record corresponding to the invitation identifier in the pre-entered invitation record to obtain the visitor type information in the target record.
In the embodiment of the application, the visitor type information comprises individual visitors and community visitors.
In the embodiment of the application, after the guest system receives each invitation record sent by the invitation system, the corresponding relationship between the invitation identifier and the invitation record can be established, so that after the invitation identifier is obtained, the corresponding relationship can be inquired, and the target record corresponding to the invitation identifier is obtained. After determining the target record, the guest system may determine the guest type information by querying the target record. For example, the guest type information may be determined according to the number of guests in the target record, and when the number of guests is 1, the guest type information may be determined as an individual guest, and when the number of guests is not less than 2, the guest type information may be determined as a community guest.
And 103, executing a corresponding visitor information entry process according to the visitor type information.
In the embodiment of the application, the visitor information may include visitor face information, face features identified according to the visitor face information, and/or personal information filled by visitors, and the like.
In the embodiment of the application, when the visitor type information is different, the visitor information entry process is different. In the embodiment, according to visitor type information, the visitor inputting requirement is identified, and the most appropriate visitor information inputting flow is adopted according to different inputting requirements, so that the inputting efficiency is improved. Meanwhile, personalized visitor information entry links are added according to different entry requirements, and visitor information entry under various scenes is met.
Specifically, when the visitor type is a personal visitor, since the access purpose of each visitor can be different, in order to facilitate electronic visitor information management, the access purpose of the personal visitor can be inquired in the target record, and the face information of the visitor can be input into a registry corresponding to the access purpose.
When the visitor type is a group visitor, the face information of the visitor can be collected for each visitor in sequence in the process of executing the visitor information input flow. As a possible implementation manner, the display interface of the visitor system may provide a "register next" shortcut entry, and after the first visitor among the group visitors completes the registration of the visitor's face information, the second visitor may register the visitor's face information by clicking the "register next" shortcut entry of the visitor system interface. By analogy, the third position, the fourth position, …, and then the visitor can register the face information of the visitor by clicking the 'register next' shortcut entrance of the visitor system interface, thereby greatly facilitating the registration efficiency of group visitors.
Further, in order to avoid visiting other uninvited visitors, in the embodiment of the application, the obtained times of the invitation identifier cannot exceed the limit times corresponding to the visitor type information, wherein the limit times corresponding to the group visitors are the total number of the group visitors, and the limit times corresponding to the individual visitors are one time.
Specifically, the electronic device may be provided with a counter for counting the acquired number of times of the invitation identifier, and each time the visitor face information of a visitor is collected, the counter value is incremented by one. When the counter value exceeds the limit times corresponding to the visitor type information, the visitor information entry can be quitted, and when the counter value does not exceed the limit times corresponding to the visitor type information, the visitor information entry can be continued.
And 104, generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record.
In the embodiment of the application, after the visitor information is input, the authority information can be generated according to the visitor information and the target record, and the authority information is synchronized to the access control system so that the access control system can check the passing authority of the visitor.
Specifically, since the visitor needs to visit within the visit deadline, the authority information can be generated according to the face information of the visitor recorded in the visitor information and the visit deadline recorded in the target record, so that when the visitor enters the access control system, whether the face information of the visitor is consistent with the face information in the authority information can be identified, if yes, the visitor is indicated to have the passing authority, at the moment, the gate can be opened for passing, if not, the visitor is indicated not to have the passing authority, and at the moment, no processing can be performed. That is to say, only the visitor who is in the access deadline and meets the face information of the visitor entered in the visitor information can pass through the entrance guard.
As a possible implementation manner, the target record may further include an access address, and the visitor system may query the access control associated with the access address, and generate the permission information according to the access control associated with the access address, the visitor face information entered in the visitor information, and the access deadline recorded in the target record. That is to say, only in the access address associated entrance guard to in the access deadline, and the visitor who accords with visitor's face information of typeeing in the visitor information can pass through the entrance guard, avoid appearing the potential safety hazard.
And 105, sending permission information to the access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor.
In the embodiment of the application, the visitor system can send permission information to the access control system so that the access control system can check and process the passing permission of the visitor. Only in the access deadline, the visitor who accords with the face information of the visitor input in the visitor information can pass through the entrance guard. In this application, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
According to the visitor information processing method, the input invitation identification is firstly obtained, then the target record corresponding to the invitation identification is read in the pre-input invitation record, visitor type information in the target record is obtained, then the corresponding visitor information input flow is executed according to the visitor type information, finally permission information is generated according to the visitor face information input in the visitor information and the access deadline recorded in the target record, and permission information is sent to the access control system, wherein the permission information is used for the access control system to verify the passing permission of the visitor. In the application, the visitor can complete the input of visitor information in the visitor system through the electronic equipment with higher popularization rate, and sends the permission information to the access control system, so that the acquisition cost of enterprises can be reduced. In addition, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
To clearly illustrate the above embodiment, this embodiment provides another method for processing guest information, and fig. 2 is a flowchart illustrating the method for processing guest information provided in the second embodiment of the present application.
As shown in fig. 2, the guest information processing method may include the steps of:
step 201, a target record is obtained from a first terminal.
In this embodiment, the first terminal is a terminal device corresponding to the inviter, that is, the first terminal is a terminal device used by the inviter.
In the embodiment of the application, when the inviter wants to invite the visitor to visit, the inviter can enter the invitation system through the first terminal and initiate the invitation in the invitation system. Specifically, the inviter may record a target record in the invitation system, which may include the number of visitors, the contact information of the inviter and the visitors (e.g., mobile phone number, QQ number, micro signal, mailbox, etc.), the names of the inviter and the visitors, the work units of the inviter, the access destinations of the visitors (e.g., interview, meal delivery, express delivery, etc.), the access terms, and so on. Wherein, the invitation system can interact with the visitor system, and after the inviter records the target record, the invitation system can send the target record to the visitor system.
Step 202, generating an invitation identifier corresponding to the target record according to the access deadline recorded in the target record.
The target record corresponds to the invitation identification which is different from the invitation identifications corresponding to other invitation records with the access deadlines in the same time window.
Typically, the time window is in days, it being understood that the time window may be set differently when the application scenarios are different, for example, in hours when the inviter is very busy, provided that it is only available to receive the visitor for a certain period of time.
In the embodiment of the present application, since the invitation identifier is used for uniquely identifying the invitation, in order to ensure the validity of the invitation identifier and avoid repetition of the invitation identifier corresponding to other invitation records, in the embodiment of the present application, the invitation identifier corresponding to the target record may be different from the invitation identifier corresponding to other invitation records having access terms within the same time window. And in the access period, the invitation identification has uniqueness and can not repeatedly appear.
Specifically, after receiving the target record, the guest system may generate an invitation identifier corresponding to the target record according to an access deadline recorded in the target record.
Step 203, sending an invitation identifier to a second terminal corresponding to the visitor in the target record.
In the embodiment of the application, the second terminal is a terminal device corresponding to the visitor, that is, the second terminal is a terminal device used by the visitor.
Optionally, the invitation identifier may be sent to the second terminal corresponding to the visitor in the target record according to the contact information corresponding to the visitor recorded in the target record, for example, the invitation identifier may be sent to the second terminal corresponding to the visitor in the target record in a short message, a mail, a hotspot, or the like.
And step 204, acquiring the invitation identification input by the visitor.
As an example, when a visitor enters the visitor system, assuming that the invitation identifier is a 6-bit invitation code, the visitor may input the 6-bit invitation code on the display interface as shown in fig. 3a, and further, in order to prevent the visitor from forgetting the invitation code and improve the success rate of correctly inputting the invitation code, the visitor may be prompted in text on the display interface: please check your invitation code in the mobile phone short message. The visitor may then enter the invitation code by clicking on a number on the display interface, as shown in FIG. 3 b.
Step 205, determining whether the input invitation identifier is consistent with the generated invitation identifier, if so, executing step 207, otherwise, executing step 206.
Optionally, in order to avoid visiting by other uninvited visitors, in this embodiment of the application, after obtaining the invitation identifier input by the visitor, it may be determined whether the invitation identifier input by the visitor is consistent with the generated invitation identifier, if so, it indicates that the input invitation identifier is valid, at this time, step 207 may be executed, if not, it indicates that the input invitation identifier is invalid, at this time, the visitor may be prompted to re-input the invitation identifier, and step 207 may be executed until the invitation identifier input by the visitor is valid.
Step 206, prompting the visitor to re-enter the invitation identification.
Step 207, sending a notification message that the visitor has visited to the first terminal.
In the embodiment of the application, when the invitation identifier input by the visitor is valid, a notification message that the visitor has visited can be sent to the first terminal. Specifically, a notification message that the visitor has visited may be sent to the first terminal according to the contact information of the inviter recorded in the target record, for example, when the contact information is a mobile phone number, the notification message that the visitor has visited may be sent to the first terminal in a short message manner, so that the inviter may prepare for reception in advance.
And step 208, reading a target record corresponding to the invitation identifier in the pre-entered invitation record to obtain the visitor type information in the target record.
It should be noted that, in the present application, only step 208 is executed after step 207, but the present application is not limited thereto, and step 208 may also be executed in parallel with step 207, or step 207 may be executed after step 208, which is not limited thereto.
The process of executing step 208 may refer to the process of executing step 102 in the above embodiments, which is not described herein again.
Step 209, determine whether the acquired number of times of the invitation identifier exceeds the limit number of times corresponding to the guest type information, if yes, execute step 210, otherwise, execute step 211.
Optionally, in order to avoid visiting by other uninvited visitors, in the embodiment of the application, the obtained number of times of the invitation identifier cannot exceed the limit number of times corresponding to the visitor type information, where the limit number of times corresponding to the group visitor is the total number of the group visitor, and the limit number of times corresponding to the individual visitor is one.
Specifically, the electronic device may be provided with a counter for counting the acquired number of times of the invitation identifier, and each time the visitor face information of one visitor is collected, the counter value is incremented by one, that is, the acquired number of times of the invitation identifier is incremented by one. When the counter value exceeds the limit times corresponding to the visitor type information, the visitor information entry can be quitted, and when the counter value does not exceed the limit times corresponding to the visitor type information, the visitor information entry can be continued.
Step 210, exiting the guest information entry.
And step 211, entering visitor information.
Step 212, determining whether the visitor type information is a personal visitor, if yes, performing step 213 and 214, otherwise, performing step 215 and 216.
Step 213, the access purpose of the individual visitor is queried.
It is understood that the purpose of access may be different when the guests are different, for example, the purpose of access may be: interviewing, meal delivery, express delivery, and the like.
In particular, the access purpose of an individual visitor may be queried in the target record.
And 214, acquiring the face information of the visitor during the visitor information input process, and inputting a registry corresponding to the access purpose according to the access purpose.
Specifically, the visitor face information may be collected by a camera device in the electronic device, for example, the visitor face information may be collected by a front camera of the electronic device.
Further, since the access purposes of different visitors can be different, in order to facilitate electronic visitor information management, the visitor face information can be entered into a registry corresponding to the access purposes.
Step 215, in the process of executing the visitor information input process, sequentially collecting the face information of the visitors for each visitor.
As a possible implementation manner, the display interface of the visitor system may provide a "register next" shortcut entry, and after the first visitor among the group visitors completes the registration of the visitor's face information, the second visitor may register the visitor's face information by clicking the "register next" shortcut entry of the visitor system interface. By analogy, the third position, the fourth position, …, and then the visitor can register the face information of the visitor by clicking the 'register next' shortcut entrance of the visitor system interface, thereby greatly facilitating the registration efficiency of group visitors.
As an example, referring to fig. 4, the visitor may perform the visitor's face information registration by clicking a "register next" button of the interface.
And step 216, adding one to the acquired times of the invitation identifier when the face information of the visitor of one visitor is acquired.
In the embodiment of the application, when the visitor face information of one visitor is collected, the counter value is increased by one, namely the acquired times of the invitation identification is increased by one, so that whether the acquired times of the invitation identification exceeds the limit times corresponding to the visitor type information or not can be judged, when the acquired times of the invitation identification does not exceed the limit times, the next visitor information input process can be continued, namely the visitor face information registration process of the next visitor is carried out, and when the acquired times of the invitation identification exceeds the limit times, the visitor information input can be quitted.
And step 217, generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record.
And step 218, sending permission information to the access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor.
The process of steps 217 and 218 may refer to the process of steps 104 and 105 in the above embodiments, which is not described herein again.
According to the visitor information processing method, the input invitation identification is firstly obtained, then the target record corresponding to the invitation identification is read in the pre-input invitation record, visitor type information in the target record is obtained, then the corresponding visitor information input flow is executed according to the visitor type information, finally permission information is generated according to the visitor face information input in the visitor information and the access deadline recorded in the target record, and permission information is sent to the access control system, wherein the permission information is used for the access control system to verify the passing permission of the visitor. In the application, the visitor can complete the input of visitor information in the visitor system through the electronic equipment with higher popularization rate, and sends the permission information to the access control system, so that the acquisition cost of enterprises can be reduced. In addition, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
As a possible implementation manner, in the process of acquiring the face information of the visitor, in order to ensure the quality of images shot by the camera device and improve the accuracy of subsequent verification of the passing permission of the visitor, in the embodiment of the application, whether the face information of the visitor is input or not can be determined according to a preset standard. The above process is described in detail below with reference to fig. 5.
Fig. 5 is a flowchart illustrating a visitor information processing method according to a third embodiment of the present application.
As shown in fig. 5, on the basis of the embodiments shown in fig. 1 and fig. 2, the visitor information processing method may further include the following steps:
step 301, shooting a visitor image in the process of executing the visitor information entry process.
In the embodiment of the application, in the process of executing the visitor information entry process, the image of the visitor can be shot through the camera device in the electronic equipment, for example, the image of the visitor can be shot through the front camera of the electronic equipment.
Step 302, performing image recognition on the visitor image, determining whether the visitor image meets a preset standard, if so, executing step 303, otherwise, executing step 304.
It should be noted that, face looks up, overlooks, looks sideways at among the visitor's image, and perhaps, the face area is too big, and perhaps, when the face characteristic is not complete, the quality of visitor's image is all not good, consequently, in this application embodiment, in order to guarantee the quality of the visitor's image of shooing, predetermine the standard and can include: the area proportion of the human face region in the visitor image accords with a preset proportion range, the imaging angle of the human face in the visitor image accords with a preset angle range, and the number of human face key points obtained by visitor image recognition is larger than a preset number.
The preset ratio range, the preset angle range, and the preset number are all preset, and for example, the preset ratio range, the preset angle range, and the preset number may be preset by a built-in program of the electronic device, or may be set by a user, which is not limited thereto.
Alternatively, an image processing technique of deep learning may be employed to determine the area ratio of the face region in the guest image. Specifically, the image features of the face region in the visitor image can be recognized, and then the recognized image features are input into a pre-trained image feature recognition model to determine the area ratio of the face region in the visitor image. The method comprises the steps of selecting a sample image, labeling each object in the sample image and the area ratio of the object in the sample image based on the image characteristics of the sample image, and training an image characteristic recognition model by using the labeled sample image. And identifying the visitor image by using the trained model, and determining the area ratio of the face area in the visitor image.
Optionally, the face key points in the visitor image may be identified based on a face key point identification technology to obtain the face key points and the number of the face key points.
After the face key points are obtained, the imaging angle of the face in the visitor image can be determined according to the position information of each face key point. For example, regarding lips, assuming that only the key points corresponding to the right lips in the visitor image are present, and the key points corresponding to the left lips are absent, the imaging angle of the face in the visitor image may be determined as the right angle.
Further, the preset criteria may further include: the definition of the visitor image is larger than a preset threshold value, wherein the preset threshold value is preset and can be determined based on the image processing technology of deep learning.
And step 303, inputting the face information of the visitor according to the image of the visitor.
In the embodiment of the application, when the visitor image meets the preset standard, the image quality of the visitor is better, at the moment, the face information of the visitor can be input, so that when the visitor enters the access control system, the access control system can determine whether the visitor has the right of passage or not through face recognition, and when the visitor has the right of passage, the gate can be opened for releasing.
At step 304, the visitor is prompted to re-capture the image.
In the embodiment of the application, when the visitor image does not meet the preset standard, the visitor image quality is not good, and at the moment, the visitor can be prompted to shoot the image again. Alternatively, the visitor may be prompted to re-photograph the image in text. For example, the information may be presented in text on a shooting interface of the electronic device. Of course, the visitor may also be prompted to shoot the image again in a voice broadcast manner, which is not limited in the embodiment of the present application.
As an example, referring to fig. 6a, when the area of the face area in the image of the visitor is too small, the visitor may be prompted in the display interface text: if the distance is too far, the user needs to keep a short distance, so that the visitor can click a 'rephoto' button of the display interface according to the prompt message to shoot the image of the visitor again. Referring to fig. 6b, when the visitor is in a moving state, the definition of the visitor image is poor, and at this time, the visitor image is blurred, and the visitor can prompt: and (5) blurring, please stand still, and shooting again at the lens. Referring to fig. 6c, when the visitor image does not include a face region, it may be prompted to: if the face information is incomplete, please shoot the screen again. Referring to fig. 6d, when the area of the face region in the guest image is too large, it may be prompted to: too close, please be a little bit further from the screen.
According to the visitor information processing method, the visitor face information is input according to the visitor image when the visitor image meets the preset standard. Therefore, the accuracy of the subsequent verification of the passing permission of the visitor can be improved.
Further, after the access deadline is expired, the visitor information can be deleted, so that the situation that the visitor is a staff is mistaken by the system if the visitor visits again if the visitor does not delete the visitor information because the face features of the visitor are stored in the system can be avoided.
As a possible implementation manner, referring to fig. 7, on the basis of the embodiment shown in fig. 5, step 303 may specifically include the following sub-steps:
step 401, extracting features of each face key point of the visitor image to obtain face features of the visitor.
Optionally, feature extraction may be performed on each face key point of the image of the visitor based on a face key point recognition technology to obtain a face feature of the visitor.
Step 402, judging whether the human face features of the visitor are matched with the human face features of the staff, if so, executing step 403, otherwise, executing step 404.
In the embodiment of the application, whether the human face features of the visitors are matched with the human face features of the staff or not can be judged, if yes, the identity of the visitors is shown to be the staff, at the moment, the human face information of the visitors can not be input, and the visitors can normally punch a card when passing through an entrance guard. If not, the visitor identity is indicated as the visitor, at the moment, the face characteristics of the visitor can be input into the face information of the visitor, and the visitor can not be checked when the visitor passes through the entrance guard.
And step 403, not inputting the face characteristics of the visitor into the face information of the visitor.
And step 404, inputting the face characteristics of the visitor into the face information of the visitor.
As an example, referring to fig. 8, fig. 8 is a flowchart illustrating a visitor information processing method provided in a fifth embodiment of the present application. Wherein figure 8 takes the invitation identification as an invitation code example. When the visitor visits, the visitor can enter the visitor system, the invitation code is input, the system automatically judges whether the invitation code is valid, if not, the visitor can be prompted to input the invitation code again, and if so, the visitor continues to judge whether the visitor type is a personal visitor.
When the visitor type is a personal visitor, the face information of the visitor can be registered, at the moment, whether a face exists in the view-finding frame or not is judged, if yes, the visitor is prompted by voice to take a picture, and a countdown link is entered. After the visitor image is shot, whether the visitor image meets preset standards or not can be judged, if yes, feature extraction is carried out on each face key point of the visitor image, the face features of the visitor are obtained, the face features of the visitor are compared with the face features of the staff, and whether the visitor is an internal staff of an enterprise or not is judged. If the visitor is an internal employee of the enterprise, prompting that the visitor does not need to be registered, if the visitor is not an internal employee of the enterprise, inputting face information of the visitor, prompting that the registration is successful, and at the moment, returning to a homepage of a visitor system. The visitor is when access control system, and access control system can confirm whether this visitor has the right of passage through face identification, if, then opens the floodgate machine and let pass, and the visitor can brush the face promptly and pass through the floodgate machine, simplifies visitor's operating procedure.
When the visitor type is a group visitor, the face information registration of the visitor can be carried out, the face information registration process of the first visitor in the group visitor is similar to the face information registration process of the individual visitor, and the description is omitted here. After the first visitor in the group of visitors finishes the registration of the face information of the visitor, the second visitor can register the face information of the visitor by clicking the 'next registration' shortcut entrance of the visitor system interface, so that the registration efficiency of the group of visitors is greatly facilitated. After all visitors complete registration, at this point, the visitor system homepage may be returned. All visitors can brush faces and pass through the gate when passing through the access control system.
In order to implement the above embodiments, the present application further provides a device for processing visitor information.
Fig. 9 is a schematic structural diagram of a visitor information processing apparatus according to a sixth embodiment of the present application.
As shown in fig. 9, the guest information processing apparatus 100 includes: a first obtaining module 101, a reading module 102, an executing module 103, a first generating module 104, and a first sending module 105. Wherein the content of the first and second substances,
a first obtaining module 101, configured to obtain the input invitation identifier.
The reading module 102 is configured to read a target record corresponding to the invitation identifier in a pre-entered invitation record to obtain visitor type information in the target record.
And the execution module 103 is used for executing a corresponding visitor information entry process according to the visitor type information.
The first generating module 104 is configured to generate authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record.
The first sending module 105 is configured to send permission information to the access control system, where the permission information is used for the access control system to check the passing permission of the visitor.
Further, in a possible implementation manner of the embodiment of the present application, referring to fig. 10, on the basis of the embodiment shown in fig. 9, the visitor information processing apparatus 100 may further include:
a second obtaining module 106, configured to obtain the target record from the first terminal before obtaining the input invitation identifier.
A second generating module 107, configured to generate an invitation identifier corresponding to the target record according to the access deadline recorded in the target record; the target record corresponds to the invitation identification which is different from the invitation identifications corresponding to other invitation records with the access deadlines in the same time window.
And a second sending module 108, configured to send the invitation identifier to a second terminal corresponding to the visitor in the target record.
And a third sending module 109, configured to send a notification message that the visitor has visited to the first terminal after acquiring the input invitation identifier.
As a possible implementation manner, the execution module 103 is specifically configured to:
if the acquired times of the invitation identification do not exceed the limited times corresponding to the visitor type information, carrying out visitor information input;
wherein the visitor type information includes: community visitors and individual visitors;
the limited times corresponding to the group visitors are the total number of the group visitors;
the limited number of times corresponding to the personal visitor is one.
As another possible implementation manner, the execution module 103 is further configured to:
if the visitor type information is a personal visitor, inquiring the access purpose of the personal visitor;
in the visitor information input process, the face information of the visitor is collected, and a registration form corresponding to the access purpose is input according to the access purpose.
As another possible implementation manner, the execution module 103 is further configured to:
the visitor type information is group visitors, and the visitor face information is collected for each visitor in sequence in the process of executing the visitor information input flow;
and adding one to the acquired times of the invitation identifier every time the face information of the visitor of one visitor is acquired.
And the shooting module 110 is used for shooting a visitor image in the process of executing the visitor information entry process.
And the identification module 111 is used for performing image identification on the visitor image and determining whether the visitor image meets a preset standard.
And the input module 112 is used for inputting the face information of the visitor according to the image of the visitor if the preset standards are met.
Wherein, the preset standard comprises:
the area ratio of the human face region in the visitor image meets a preset proportion range;
the imaging angle of the face in the visitor image accords with a preset angle range;
the number of the face key points obtained by the visitor image recognition is larger than the preset number.
As a possible implementation manner, the entry module 112 is specifically configured to:
extracting the features of each face key point of the visitor image to obtain the face features of the visitor;
and if the face characteristics of the visitor are not matched with the face characteristics of the staff, inputting the face characteristics of the visitor into face information of the visitor.
It should be noted that the foregoing explanation of the embodiment of the method for processing guest information is also applicable to the guest information processing apparatus 100 of this embodiment, and is not repeated herein.
The visitor information processing device comprises a visitor information input module, a visitor type information input module, a visitor information input flow, a visitor information input module. In the application, the visitor can complete the input of visitor information in the visitor system through the electronic equipment with higher popularization rate, and sends the permission information to the access control system, so that the acquisition cost of enterprises can be reduced. In addition, visitor system and access control system are mutual, and access control system passes through face identification, can confirm whether the visitor has the right of passage, and from this, the visitor need not to rely on other people to punch the card and enter the door, simplifies visitor's operation, and has effectively saved the time cost of visitor.
In order to implement the above embodiments, the present application further provides an electronic device.
Fig. 11 is a schematic structural diagram of an electronic device according to an eighth embodiment of the present application.
The electronic equipment of the embodiment of the application runs with a visitor system, and the visitor system is interactive with an access control system.
As shown in fig. 11, the electronic apparatus includes: the memory 201, the processor 202 and the computer program stored on the memory 201 and capable of running on the processor 202, when the processor 202 executes the program, the method for processing the visitor information as proposed by the foregoing embodiments of the present application is executed.
In order to achieve the above embodiments, the present application also proposes a computer-readable storage medium on which a computer program is stored, characterized in that the program, when executed by a processor, implements a method of processing guest information as proposed by the foregoing embodiments of the present application.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (16)

1. A method for processing visitor information, the method comprising the steps of:
acquiring an invitation identifier input by a visitor;
reading a target record corresponding to the invitation identification in a pre-entered invitation record to obtain visitor type information in the target record;
executing a corresponding visitor information input flow according to the visitor type information; when the visitor type information is a personal visitor, inquiring the access purpose of the personal visitor, acquiring the face information of the visitor in the visitor information input process, and inputting a register table corresponding to the access purpose according to the access purpose; when the visitor type information is a group visitor, sequentially collecting the face information of the visitor to each visitor in the process of executing the visitor information input flow;
generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record;
and sending the permission information to an access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor.
2. The processing method according to claim 1, wherein before acquiring the input invitation identifier, the method further comprises:
acquiring the target record from a first terminal;
generating an invitation identifier corresponding to the target record according to the access deadline recorded in the target record; the invitation identification corresponding to the target record is different from the invitation identifications corresponding to other invitation records with access deadlines in the same time window;
and sending the invitation identification to a second terminal corresponding to the visitor in the target record.
3. The processing method according to claim 2, wherein after acquiring the input invitation identifier, the method further comprises:
and sending a notification message that the visitor has visited to the first terminal.
4. The processing method according to claim 1, wherein the performing a corresponding guest information entry procedure according to the guest type information comprises:
if the acquired times of the invitation identification do not exceed the limited times corresponding to the visitor type information, carrying out visitor information input;
wherein the guest type information includes: community visitors and individual visitors;
the limited times corresponding to the group visitors are the total number of the group visitors;
the number of times of limiting corresponding to the personal visitor is one.
5. The processing method of claim 1, wherein the performing a corresponding guest information entry procedure according to the guest type information further comprises:
the visitor type information is community visitors, and in the process of executing the visitor information entry process, the method further comprises the following steps:
and adding one to the acquired times of the invitation identification every time the face information of the visitor of one visitor is acquired.
6. The process of any one of claims 1 to 5, further comprising:
shooting a visitor image in the process of executing the visitor information input flow;
performing image recognition on the visitor image, and determining whether the visitor image meets a preset standard;
if the visitor image meets the preset standards, inputting the face information of the visitor according to the visitor image;
the preset standard comprises the following steps:
the area ratio of the human face region in the visitor image meets a preset proportion range;
the imaging angle of the face in the visitor image accords with a preset angle range;
and the number of the key points of the human face obtained by the visitor image recognition is greater than the preset number.
7. The processing method of claim 6, wherein entering guest face information according to the guest image comprises:
extracting the features of each face key point of the visitor image to obtain the face features of the visitor;
if the face features of the visitors are not matched with the face features of the staff, the face features of the visitors are input into the face information of the visitors.
8. An apparatus for processing visitor information, the apparatus comprising:
the first acquisition module is used for acquiring an invitation identifier input by a visitor;
the reading module is used for reading a target record corresponding to the invitation identifier in a pre-entered invitation record to obtain visitor type information in the target record;
the execution module is used for executing a corresponding visitor information input flow according to the visitor type information; when the visitor type information is a personal visitor, inquiring the access purpose of the personal visitor, acquiring the face information of the visitor in the visitor information input process, and inputting a register table corresponding to the access purpose according to the access purpose; when the visitor type information is a group visitor, sequentially collecting the face information of the visitor to each visitor in the process of executing the visitor information input flow;
the first generation module is used for generating authority information according to the visitor face information recorded in the visitor information and the access deadline recorded in the target record;
the first sending module is used for sending the permission information to the access control system, wherein the permission information is used for the access control system to check the passing permission of the visitor.
9. The processing apparatus as in claim 8, wherein the apparatus further comprises:
a second obtaining module, configured to obtain the target record from the first terminal before obtaining the input invitation identifier;
the second generation module is used for generating an invitation identifier corresponding to the target record according to the access deadline recorded in the target record; the invitation identification corresponding to the target record is different from the invitation identifications corresponding to other invitation records with access deadlines in the same time window;
and the second sending module is used for sending the invitation identifier to a second terminal corresponding to the visitor in the target record.
10. The processing apparatus as in claim 9, wherein the apparatus further comprises:
and the third sending module is used for sending a notification message that the visitor has visited to the first terminal after the input invitation identification is obtained.
11. The processing apparatus according to claim 8, wherein the execution module is specifically configured to:
if the acquired times of the invitation identification do not exceed the limited times corresponding to the visitor type information, carrying out visitor information input;
wherein the guest type information includes: community visitors and individual visitors;
the limited times corresponding to the group visitors are the total number of the group visitors;
the number of times of limiting corresponding to the personal visitor is one.
12. The processing apparatus as in claim 8, wherein the execution module is further configured to:
and the visitor type information is group visitors, and the acquired times of the invitation identifier is increased by one when the visitor face information of one visitor is acquired in the visitor information input process.
13. The processing apparatus according to any one of claims 8 to 12, wherein the apparatus further comprises:
the shooting module is used for shooting a visitor image in the visitor information input process;
the identification module is used for carrying out image identification on the visitor image and determining whether the visitor image meets a preset standard or not;
the input module is used for inputting the face information of the visitor according to the visitor image if the preset standards are met;
the preset standard comprises the following steps:
the area ratio of the human face region in the visitor image meets a preset proportion range;
the imaging angle of the face in the visitor image accords with a preset angle range;
and the number of the key points of the human face obtained by the visitor image recognition is greater than the preset number.
14. The processing device according to claim 13, wherein the logging module is specifically configured to:
extracting the features of each face key point of the visitor image to obtain the face features of the visitor;
if the face features of the visitors are not matched with the face features of the staff, the face features of the visitors are input into the face information of the visitors.
15. An electronic device, wherein the electronic device is operated with a guest system that interacts with a door entry system, the electronic device comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor executing the program, the method of processing guest information according to any one of claims 1 to 7.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of processing visitor information according to any one of claims 1-7.
CN201810628350.0A 2018-06-19 2018-06-19 Visitor information processing method and device and electronic equipment Active CN108877001B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810628350.0A CN108877001B (en) 2018-06-19 2018-06-19 Visitor information processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810628350.0A CN108877001B (en) 2018-06-19 2018-06-19 Visitor information processing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN108877001A CN108877001A (en) 2018-11-23
CN108877001B true CN108877001B (en) 2021-08-24

Family

ID=64339506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810628350.0A Active CN108877001B (en) 2018-06-19 2018-06-19 Visitor information processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN108877001B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109785476B (en) * 2018-12-07 2021-09-14 深圳云天励飞技术有限公司 Welcome management method and system, electronic device and storage medium
CN110135191A (en) * 2019-05-10 2019-08-16 四川合锐信息技术有限公司 A kind of visitor information processing system and method
CN110322602A (en) * 2019-06-18 2019-10-11 特斯联(北京)科技有限公司 A kind of visitor reserves passing method, system and equipment
CN111159677A (en) * 2019-12-23 2020-05-15 联想(北京)有限公司 Information processing method, electronic equipment and display equipment
CN112528266A (en) * 2020-12-09 2021-03-19 深圳市天彦通信股份有限公司 Visiting registration method and related device
CN112632308B (en) * 2020-12-28 2024-05-28 深圳集智数字科技有限公司 User first visit identification method and device, electronic equipment and storage medium
CN115100726A (en) * 2022-08-25 2022-09-23 中国中金财富证券有限公司 Intelligent one-way video witness method and related products

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202126714U (en) * 2011-06-01 2012-01-25 广东银旅通信息网络发展有限公司 Passing control system of electronic ticket automatic gate machine
CN105138954B (en) * 2015-07-12 2019-06-04 上海微桥电子科技有限公司 A kind of image automatic screening inquiry identifying system
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN207082145U (en) * 2016-12-20 2018-03-09 北京九山九日网络有限公司 A kind of optional recreation ground ticket checking equipment of ticket checking number
CN106803295A (en) * 2016-12-28 2017-06-06 福建星网锐捷安防科技有限公司 Gate inhibition's authentication control method and system based on Quick Response Code
CN107170079A (en) * 2017-04-27 2017-09-15 湖南以景带村网络科技有限公司 Entrance managing method, admission ticket booking method, system and service end
CN207268878U (en) * 2017-06-07 2018-04-24 马上游科技股份有限公司 A kind of scenic spot gate ticket-validating apparatus
CN107578502A (en) * 2017-08-24 2018-01-12 上海与德科技有限公司 A kind of cell caller management method and device
CN107945287A (en) * 2017-11-08 2018-04-20 中国银行股份有限公司 One kind digitlization Tickets Systems and data processing method
CN107862773A (en) * 2017-11-22 2018-03-30 上海亦源智能科技有限公司 Can reservation type recognition of face gate inhibition guest system and method
CN108010164A (en) * 2017-11-30 2018-05-08 汤建男 The visitor's active invitation method and system of a kind of visitor's Control management system

Also Published As

Publication number Publication date
CN108877001A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN108877001B (en) Visitor information processing method and device and electronic equipment
CN108734813B (en) Method and device for issuing temporary access control card
CN110148232B (en) Visitor management system, method, device and storage medium
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
CN106453605A (en) Hotel room reservation information transfer method and system
US20210398139A1 (en) Methods and devices for processing information
CN107093066A (en) Service implementation method and device
CN111275873B (en) Traffic control management method and device, electronic equipment and storage medium
CN103365957A (en) Photo sharing based on proximity and connection
CN110992562A (en) Access control method and device, electronic equipment and storage medium
CN109657823A (en) A kind of intelligent Community caller management method, system, terminal device and storage medium
CN1319821A (en) Method and system for positioning and accessing digital storage image
CN109064620A (en) A kind of scenic spot queuing strategy, system and readable storage medium storing program for executing
CN107818434B (en) Pickup verification method, server, pickup verification device and pickup verification system
CN107800765B (en) Information processing method, terminal and system
CN108734837A (en) A kind of rental house access control management method being managed with mobile terminal
US20170193493A1 (en) Methods and apparatuses for mailing items
CN111862424A (en) Attendance management system, method, equipment and storage medium
CN113053013A (en) Access control method and device based on face recognition, computer equipment and medium
CN104112188A (en) Self-serving and full-automatic type intelligent weighing management system
CN105957172A (en) Photograph attendance application system of intelligent photograph electrical screen
CN111260833A (en) Binding and management method and device for access control card
CN110245936A (en) The self-service contracting method of mobile payment, device and system
CN112561461A (en) Government affair approval method, system, device and storage medium based on machine learning
CN108765638B (en) Access control management method based on color codes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant