CN109242424A - Method, apparatus and system are managed on a kind of visitor information line - Google Patents

Method, apparatus and system are managed on a kind of visitor information line Download PDF

Info

Publication number
CN109242424A
CN109242424A CN201810980086.7A CN201810980086A CN109242424A CN 109242424 A CN109242424 A CN 109242424A CN 201810980086 A CN201810980086 A CN 201810980086A CN 109242424 A CN109242424 A CN 109242424A
Authority
CN
China
Prior art keywords
visitor
information
data
verification information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810980086.7A
Other languages
Chinese (zh)
Inventor
王洪东
林丽娜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qian Lin Hengxing Polytron Technologies Inc
Original Assignee
Beijing Qian Lin Hengxing Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qian Lin Hengxing Polytron Technologies Inc filed Critical Beijing Qian Lin Hengxing Polytron Technologies Inc
Publication of CN109242424A publication Critical patent/CN109242424A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

Method, apparatus and system are managed on a kind of visitor information line provided by the invention, this method is applied to local visitor's host, comprising: receive visitor's data information of visitor, and according to visitor's data information, generate the first verification information;First verification information is sent to visitor's platform, so that first verification information is pushed to the first client positioned at the visitor side by visitor's platform, so that the visitor obtains first verification information;It receives the visitor and addressing machine or the identity data of the first client typing is passed through according to first verification information;According to visitor's data information, the guest levels of the visitor are determined;It is that the identity data is distributed for the access authority by access control equipment according to the guest levels.The present invention is confirmed by the access level to visitor and is distributed with different access authority to distinguish the visitor of management different stage, while improving enterprise security manager level.

Description

Method, apparatus and system are managed on a kind of visitor information line
Technical field
The present invention relates to current security technology area, in particular to managing method, apparatus on a kind of visitor information line And system.
Background technique
With the rapid development of social economy, the information interchange between enterprise and enterprise and business associate are also increasingly frequent, And it would generally be carried out during cooperation and exchange in the form visited.But at present since there is corresponding gate inhibition in each enterprise Specification, to prevent any entrance of nonnative personnel.And the method for passing through gate inhibition is usually all to carry out visitor's letter by the security personnel on doorway Then the registration of breath is confirmed by phone and interviewed people, then provides corresponding access card or number plate.Visiting for part is advanced VIP visitor also needs Security Personnel to carry out accompanying entrance in certain nucleus of Entry Firm, and very influence visitor's is visiting Impression.
Current managing caller mode is required to the third party under the line except respondent and audits and guide, and cannot be distinguished Different guest levels cause advanced visitor in visiting enterprise by larger limitation.
Summary of the invention
In view of this, a kind of being designed to provide on visitor information line for the embodiment of the present invention manages method, apparatus and is System is solved by receiving visitor's data information on line, and to visitor's allocation of access rights to distinguish the different visitors of management Advanced visitor in visiting enterprise by larger limitation the problem of.
The embodiment of the present invention is achieved in that
Management method on a kind of visitor information line is applied to local visitor's host, comprising: receive visitor's data of visitor Information, and according to visitor's data information, generate the first verification information;First verification information is sent to visitor to put down Platform, so that first verification information is pushed to the first client positioned at the visitor side by visitor's platform, so that The visitor obtains first verification information;Receive the visitor according to first verification information by addressing machine or The identity data of the first client typing;According to visitor's data information, the guest levels of the visitor are determined;Root It is that the identity data is distributed for the access authority by access control equipment according to the guest levels.
Preferably, the identity data includes below one or more: identity card data;Finger print data;Human face data.
Preferably, when including default access time in visitor's data information, the first verifying letter is generated described After breath, further includes: receive the second verification information that the access control equipment is sent, wherein second verification information is described The verification information that visitor is inputted by the access control equipment;Judge to receive second verification information time whether with it is described Default access time matches and whether second verification information matches with first verification information, obtains one and sentences Disconnected result;According to the judging result, the control instruction for controlling the access control equipment switch is generated.
Preferably, after the control instruction generated for controlling the access control equipment switch, further includes: according to institute State the access result that control instruction obtains the visitor;The access result is synchronized to visitor's platform.
Preferably, the visitor's data information for receiving visitor includes: that reception is external by local visitor's host Input equipment input visitor's data information.
Preferably, the visitor's data information for receiving visitor, and according to visitor's data information, it generates first and tests The step of demonstrate,proving information, comprising: receive visitor's data information that first client is sent;Visitor's data information is sent To visitor's platform, so that visitor's data information is pushed to the second client of respondent side by visitor's platform; Wherein, second client is for generating for the access confirmation information for whether agreeing to the Accessor Access to be characterized;When connecing Receive that visitor's platform issues by second client generate for characterizing the access for agreeing to the Accessor Access When confirmation message, according to visitor's data information, first verification information is generated.
Preferably, the visitor's data information for receiving visitor includes: the second client transmission for receiving respondent side Visitor's data information.
Preferably, visitor's platform is wechat public platform.
Managing device on a kind of visitor information line, comprising: the first verification information generation module, for receiving the visit of visitor Objective data information, and according to visitor's data information, generate the first verification information;First verification information sending module, is used for First verification information is sent to visitor's platform, is located at so that first verification information is pushed to by visitor's platform First client of the visitor side, so that the visitor obtains first verification information;Identity data receiving module, Addressing machine or the identity number of the first client typing are passed through according to first verification information for receiving the visitor According to;Guest levels confirmation module, for determining the guest levels of the visitor according to visitor's data information;Access right Distribution module is limited, for being that the identity data is distributed for the access authority by access control equipment according to the guest levels.
Management system on a kind of visitor information line the system comprises local visitor's host, visitor's platform, is located at visitor The first client and addressing machine of side;Local visitor's host is used to receive visitor's data information of visitor, and according to institute Visitor's data information is stated, the first verification information is generated;Local visitor's host is also used to send first verification information Give visitor's platform;First verification information is pushed to institute for receiving first verification information by visitor's platform The first client is stated, so that the visitor obtains first verification information;First client is for receiving the visit The identity data received is sent to local visitor master according to the identity data of the first verification information typing by the person of asking Machine;The addressing machine will be received for receiving the visitor according to the identity data of the first verification information typing Identity data be sent to local visitor's host;Local visitor's host is also used to receive first client or the visit Ask the identity data that machine is sent;Local visitor's host is also used to determine the visitor according to visitor's data information Guest levels;Local visitor's host is also used to be that the identity data is distributed for passing through door according to the guest levels Prohibit the access authority of equipment.
Compared with prior art, method, apparatus and system are managed on a kind of visitor information line of the embodiment of the present invention, wherein This method generates the first verification information by receiving visitor's data information of visitor.Then first verification information is sent out Visitor's platform is given, the first verification information is pushed to by the first client by visitor's platform, to inform visitor, is realized on line Interaction;Then, then the identity data that visitor tests information by guest machine or the first client typing according to first is received, guaranteed First verification information and identity data correspond, and identity is avoided to falsely use.Finally by visitor's data information to visitor's Guest levels are confirmed, and are distributed for the identity data for the access authority by access control equipment according to guest levels, Different visitor's data (i.e. different guest levels) can be achieved and match different access authority, reach the mesh for distinguishing different visitors 's.Therefore, the present invention solves the third party under the line that managing caller mode is required to except respondent in the prior art and examines The problem of core and guidance, cannot be distinguished different guest levels, cause advanced visitor in visiting enterprise by larger limitation.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the access control system using management method and system on visitor information line that present pre-ferred embodiments provide Structural schematic diagram.
The method flow diagram of management method on the visitor information line that Fig. 2 provides for first embodiment of the invention.
Fig. 3 is the specific steps flow chart of step S10 in Fig. 2.
The functional block diagram of managing device on the visitor information line that Fig. 4 provides for second embodiment of the invention.
Icon: 100- access control system;The local 11- visitor's host;12- visitor's platform;13- guest machine;The first client of 14- End;The second client of 15-;16- access control equipment;Managing device on 300- visitor information line;The first verification information of 301- generates mould Block;302- the first verification information sending module;303- identity data receiving module;304- guest levels confirmation module;305- is visited Ask authority distribution module.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
The present invention provides a kind of application scenarios, is not construed as limiting to protection scope of the present invention, specific as follows:
As shown in Figure 1, being a kind of access control system 100 that present pre-ferred embodiments provide.Wherein, visitor of the invention letter Management method and system can be applied in local visitor's host 11 of the access control system 100 on breath line.
Specifically, the access control system 100 includes: local visitor's host 11, visitor's platform 12, the 13, first visitor of guest machine Family end 14, the second client 15, access control equipment 16.The local visitor host 11 simultaneously with the access control equipment 16, the visit Passenger plane 13, wechat public platform communication connection.First client 14, second client 15 with the wechat Public platform communication connection.Communication connection indicates that data communication or interaction can be carried out between the two.
Wherein, local visitor's host 11 is network server, database server etc..It can be wrapped in local visitor's host 11 It includes: memory, storage control, processor, Peripheral Interface, input-output unit, audio unit, display unit etc..It is described to deposit Each element of reservoir, storage control, processor, Peripheral Interface, input-output unit, audio unit, display unit is mutual It is directly or indirectly electrically connected, to realize the transmission or interaction of data.For example, these elements between each other can by one or A plurality of communication bus or signal wire, which are realized, to be electrically connected.It includes at least one that method/system is managed on the visitor information line Described local visitor's host 11 can be stored in the memory or is solidificated in the form of software or firmware (firmware) Operating system (operating system, OS) in software function module.The processor is deposited for executing in memory The executable module of storage.
Visitor's platform 12, visitor's platform 12 is not limited to wechat public platform, nail nail open platform, the QQ public in the present invention Platform, mail service platform etc., with no restrictions.By above-mentioned management platform can by the dependency number of local visitor's host 11 it is believed that It ceases and is pushed to the first client 14 or the second client 15, while the data of above-mentioned management platform and local visitor's host 11 Between can carry out data interaction or synchronization.
Access control equipment 16 can be the entrance guard device with coded lock, the entrance guard device with Fingerprint Lock, Vehicle License Plate Recognition System etc..
First embodiment
As shown in Fig. 2, being a kind of visitor's letter that can be applied to above-mentioned access control system that present pre-ferred embodiments provide Management method on line is ceased, detailed process shown in Fig. 2 will be described in detail below.
Step S10: receiving visitor's data information of visitor, and according to visitor's data information, generates the first verifying Information.
Step S20: being sent to visitor's platform for first verification information, so that visitor's platform is tested described first Card information is pushed to the first client positioned at the visitor side, so that the visitor obtains first verification information.
Step S30: the visitor is received according to first verification information and passes through addressing machine or first client The identity data of typing.
Step S40: according to visitor's data information, the guest levels of the visitor are determined.
Step S50: being that the identity data is distributed for the access authority by access control equipment according to the guest levels.
In the present embodiment, the first client in above steps can be the terminal of correspondingly received software is installed, such as Mobile phone.Visitor's platform be wechat public platform or nail nail open platform, wherein the wechat public platform can by wechat gateway with It is synchronous with data that local visitor's host carries out data interaction.
In step slo, visitor's data information of visitor includes but is not limited to the name of visitor, phone number, visit Time, ID card information, driver's license information, passport that the person of asking comes to visit etc., the duration that visitor comes to visit, visitor come to visit purpose Deng but it should at least information, such as ID card information, name of visitor's identity etc. can be characterized containing one kind.In this implementation The mode of three kinds of reception visitor's data informations is provided in example.
The first embodiment is to receive visitor's input, visitor's data information that first client is sent, the One client is the terminal that visitor holds, and carries out the input of visitor's data information on the terminal by visitor, and by being somebody's turn to do Terminal (the first client) carries out being sent to corresponding wechat public platform, and passes through wechat public platform for visitor's data information It is synchronized to local visitor's host, i.e., local visitor's host receives visitor's data information, that is, realizes the active of visitor Reserve access request.
For the first embodiment, as shown in figure 3, further, step S10 is specifically included:
Step S11: visitor's data information that first client is sent is received.
Step S12: being sent to visitor's platform for visitor's data information, so that visitor's platform is by the visit Objective data information is pushed to the second client of respondent side.Wherein, whether second client is used for characterization for generating Agree to the access confirmation information of the Accessor Access.
In this step S12, visitor's data information is pushed to the second client of respondent side in visitor's platform Later, also prompting message or reminding short message can be generated by visitor's platform, is sent to the first client and informs visitor's processing progress, It is sent to the second client and informs respondent's backlog.
The access confirmation information that second client generates (can indicate respondent grant access person's for approval information Reserve access request), it is also possible to refuse information (indicating that respondent disagrees the reservation access request of visitor).It, can with this Suitable access time is efficiently reserved, process of reserving by phone under interminable line is avoided.
Step S13: when receive that visitor's platform issues is agreed to by what second client generated for characterizing When the access confirmation information of the Accessor Access, according to visitor's data information, first verification information is generated.
In this step S13, after the access confirmation information that the second client generates is received by local visitor's host, Local visitor's host can generate the first verification information according to visitor visitor's data information, ensure that the first verifying letter of generation The case where validity of breath, exclusion respondent's denied access, (receives the Accessor Access of characterization refusal in local visitor's host Access confirmation information when do not generate the first verification information), avoid the waste of local visitor's host calculating resource.
Second of embodiment is the visitor's data received through the external input equipment input of local visitor's host Information.Specifically, administrator's (being also possible to arbitrarily not invite person) of local visitor's host can be external by local visitor's host Input equipment, such as keyboard, mouse, touch tablet etc., visitor's data letter of the visitor invited to the input of local visitor's host Breath is realized and actively invites access.
The third embodiment receives visitor's data information that second client is sent.Second client is by being interviewed Person holds, and can also be realized by the second client input visitor's data information and be invited the active of visitor.
In the present invention, it if visitor is team more people, is being sent in a manner of above-mentioned three kinds to local visitor's host It can be a plurality of information input of batch when visitor's data information.So that local visitor's host receives visitor's data of batch Information is uniformly processed.When sending visitor's data information if the first client, also second can be sent to by visitor's platform Client, so that the second client disposably generates the access confirmation letter whether characterization agrees to the Accessor Access to team Breath, avoids repeatedly generating.
In step slo, first verification information can generate for local visitor's host according to visitor's data information Two dimensional code, identifying code, bar code etc. any one or more.First verification information can also be the cell-phone number of visitor.
In step S20, visitor can be made to obtain the first verification information, the first verification information can be used for verifying respondent institute The typing of identity data is carried out in the guest machine of enterprise.
In the case where gate inhibition is not stringent, the first verification information also can be used, directly access control equipment is verified with logical Cross gate inhibition.I.e. visitor is lower for the requirements for access permission of general visitor or visitor, can be straight after step S20 It connects and executes gate inhibition's verifying, specifically include:
Receive the second verification information that the access control equipment is sent, wherein second verification information is the visitor The verification information inputted by the access control equipment.The verification information can be verifying strip, access card, two dimensional code, password etc. The information for being included.Second verification information should match or unique corresponding with the first verification information.
Judge whether the time for receiving second verification information matches and described with the default access time Whether two verification informations match with first verification information, obtain a judging result.Wherein, judging result is concretely: The time and the default access time for receiving second verification information match, that is, receive second verification information when It waits within the scope of subscription time, or within a period of time before subscription time range;Default access time can be visitor The access time reserved between respondent, or (can be the period, can be sent by the first client with the access time of reservation To visitor's platform and it is synchronized to local visitor's host) it differs no more than 15 minutes (such as being advanced by 15 minutes);Described second tests Card information matches (identical, or corresponding) with first verification information.In the case of this kind, just generate for controlling the door Prohibit the control instruction of opening of device, so that access control equipment is opened.Not not generating for controlling in the case of remaining judging result volume The control instruction that the access control equipment is opened, or generate the control instruction closed for controlling the access control equipment.
In step s 30.Guest machine may be disposed near first of gate inhibition of enterprise, be mainly used for acquiring the body of visitor Part data, wherein identity data may include identity card data, finger print data, human face data, iris data, license plate number, passport, name Piece etc..Guest machine, which is attended class, is arranged corresponding module, such as scanner, video camera, Vehicle License Plate Recognition System, identity card reader etc.. The gate inhibition that specifically acquisition type can be arranged according to enterprises verifies classification correlation, and acquisition is one or more, such as identity card Data;The combination of identity card data and human face data;Identity card data and the combination of finger print data etc..The identity card data of acquisition Can also be used in authentication-access with human face data, whether person is that registered visitor's data information is corresponding in person.It is adopted by guest machine Collect identity data, by then passing through the collection in worksite of the first verification information confirmation, and passes through identity card data and biological characteristic The matching of data (finger print data, human face data, iris data) acquires, the fraud that can prevent data from acquiring.
After identity data, which acquires, to be completed, guest machine will be uploaded to data collected in local visitor's host.
Another acquisition mode, the hardware devices such as camera, the fingerprint module of the first client with captured identity data, The acquisition of identity data can also then be carried out to visitor according to the first verification information by the first client.
In step s 40, local visitor's host distributes guest levels to visitor to visitor's data information, such as can basis Visitor's position, respondent, visitor's name in visitor's data etc. are distributed automatically, can also be carried out by administrator default or direct manually Guest levels are set.Then step S50 is executed, local visitor's host is that the identity data is distributed for leading to according to guest levels Cross the access authority of access control equipment.It may also set up the adjustment interface to access authority, under special circumstances flexibly to handle.
In step s 50, different identity datas can be used when through different access control equipments, such as passes through fingerprint Fingerprint authentication will be used when gate inhibition, by the way that face verification will be used when face gate inhibition.Wherein, access authority refer specifically to visitor can With the limitation opened or pass through the different access control equipments in accessed enterprise.For example, local visitor's host can will be received The access authority that finger print data is set as the first fingerprint access control equipment is to pass through, then sets when the visitor reaches the first fingerprint access control When standby gate inhibition, i.e. openable first fingerprint access control is passed through after carrying out fingerprint authentication;If received finger print data is set The access authority of the second fingerprint access control equipment is set to as refusal, then will be unable to pass through when visitor encounters the second fingerprint access control;If The human face data received is set as using recognition of face as the gate inhibition of verification information being to pass through, then when the visitor enters should be with It, then can opening gate (another embodiment, when the electronics prison of enterprises installation when recognition of face is the gate inhibition of verification information Control will generate alarm sounds information after the human face data that the region of non-gain access grabs visitor).
A kind of embodiment is also provided to the distribution of access authority in the present embodiment, receives identity in local visitor's host After data, which is synchronized to visitor's platform, visitor's platform generates rights option and is sent to the second client, and by The respondent of second client is configured the guest levels of visitor, finally according to guest levels to the identity number of visitor According to the setting (can complete in the second client, also be completed in local guest machine) for the permission that accesses, then can will also incite somebody to action The identity data that access authority is arranged is synchronized in local visitor's host issue each gate inhibition of control or monitor terminal.
In embodiment provided by the invention, control instruction is generated in local visitor's host so that the access control equipment is opened Later, the access of the visitor can be also obtained according to the control instruction as a result, being again synchronized to the access result described Visitor's platform.Wherein access result can characterize the access state of visitor.For example, when control instruction is that a certain gate inhibition opens, Obtain access result are as follows: in the time that the gate inhibition opens, visitor be arrived at the gate inhibition, while can be synchronous by the access result It to visitor's platform or saves, so that the second client is inquired, it may be appreciated that the visiting state of visitor, it is local to visit The administrator of objective host can also carry out searching and managing.Avoid telephone interview person and the multiple telephonic communication confirmation institute of respondent in place It sets.
In addition, the identity data as the visitor is assigned more advanced access authority, while the enterprise where respondent The terminals such as multiple access control equipments or monitoring device are provided in industry.Visitor is by these access control equipments by obtaining after verifying To access as a result, and after while passing through monitoring device is crawled human face data, local visitor's host can be fed back to by terminal, Local visitor's host records the terminal position of feedback information, while recording the time, later the visitor of synchrodata Platform.For example, whether can have by the video acquisitions Tool validation personnel such as camera when having served as channel, elevator by power Limit, at the same prompt person whether have by permission;After someone's brush finger line, local visitor's host will receive fingerprint recording, from And judge it is fingerprint where that people brushes in section at what time, i.e., it can get an access after verifying each time and tie Fruit.In the case where visitor's real-time access information can be controlled, substantially increase using management method on the visitor information line The safety of access control system improves enterprise security manager level.
In addition, display device can be arranged at relevant gate inhibition according to demand, local visitor's host is monitoring gate inhibition's dress When setting unlatching (or when receiving the second verification information, and when being verified;Or when generating the instruction that access control device is opened), Welcome access information is generated simultaneously, and is sent to display device.Such as generation be welcome access information be " welcome visiting ", " welcoming xxx visiting ", " xxx is welcome to arrive our company visited exchange " etc., which can be configured, more in advance Change.
When visitor leaves the last one access control equipment, the access result of acquisition can have been left labeled as visitor, this Ground visitor's host is synchronous with visitor's platform data.To facilitate administrator or the respondent of local visitor's host to supervise visitor Control understands visitor in the active state of enterprises, while also avoiding manual examination and verification or manually setting card reduction visitor's Access impression, realizes the complete lifecycle management of on-line off-line whole process, access.The access data of storage can at any time into Row history is called, and is not easy to lose, is easily facilitated statistics.In addition, local visitor's host also produces and sees information off, it is sent to display Device.
It after typing identity data in the embodiment of the present invention, can be saved, when next visitor is visiting, with regard to nothing Need typing again.
Second embodiment
Referring to Fig. 4, being that can apply management method on the visitor information line of first embodiment the present invention also provides a kind of Managing device 300 on visitor information line.The device includes: the first verification information generation module 301, the first verification information transmission mould Block 302, identity data receiving module 303, guest levels confirmation module 304 and access authority distribution module 305.Wherein:
First verification information generation module 301 is provided for receiving visitor's data information of visitor, and according to the visitor Expect information, generates the first verification information.
First verification information sending module 302, for first verification information to be sent to visitor's platform, so that described First verification information is pushed to the first client positioned at the visitor side by visitor's platform, so that the visitor obtains Obtain first verification information.
Identity data receiving module 303 passes through addressing machine according to first verification information for receiving the visitor Or the identity data of the first client typing.
Guest levels confirmation module 304, for determining the guest level of the visitor according to visitor's data information Not.
Access authority distribution module 305, for being that the identity data is distributed for passing through door according to the guest levels Prohibit the access authority of equipment.
3rd embodiment
The present invention also provides management system on a kind of visitor information line, which includes: local visitor's host, Fang Keping Platform, the first client and addressing machine positioned at visitor side.It is specific:
Local visitor's host is used to receive visitor's data information of visitor, and according to visitor's data information, Generate the first verification information.
Local visitor's host is also used to first verification information being sent to visitor's platform.
Visitor's platform is pushed to described for receiving first verification information, and by first verification information One client, so that the visitor obtains first verification information.
First client is used to receive the visitor according to the identity data of the first verification information typing, and The identity data received is sent to local visitor's host.
The addressing machine will connect for receiving the visitor according to the identity data of the first verification information typing The identity data received is sent to local visitor's host.
The identity data that local visitor's host is also used to receive first client or the addressing machine is sent.
Local visitor's host is also used to determine the guest levels of the visitor according to visitor's data information.
Local visitor's host is also used to be that the identity data is distributed for passing through gate inhibition according to the guest levels The access authority of equipment.
Local visitor's host in the present embodiment, visitor's platform, the first client and addressing machine positioned at visitor side Specific effect and performed step process can be found in each step described in first embodiment, it is no longer superfluous in the present embodiment It states.
In summary:
Method, apparatus and system are managed on a kind of visitor information line of the embodiment of the present invention, by the visit for receiving visitor Objective data information, and generate the first verification information.Then first verification information is sent to visitor's platform, passes through visitor's platform First verification information is pushed to the first client, to inform visitor, realizes interaction on line;Then, then visitor's root is received Information is tested by guest machine or the identity data of the first client typing according to first, ensure that the first verification information and identity data It corresponds, identity is avoided to falsely use.Confirm finally by guest levels of visitor's data information to visitor, and according to visit Objective rank be identity data distribution for by the access authority of access control equipment, it can be achieved that different visitor's data (i.e. not Same guest levels) the different access authority of matching, achieve the purpose that distinguish different visitors.Therefore, the present invention solves existing Managing caller mode is required to the third party under the line except respondent and audits and guide in technology, and different visits cannot be distinguished Objective rank, the problem of causing advanced visitor in visiting enterprise by larger limitation, while also improving the safety management of enterprise It is horizontal.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. management method on a kind of visitor information line is applied to local visitor's host characterized by comprising
Visitor's data information of visitor is received, and according to visitor's data information, generates the first verification information;
First verification information is sent to visitor's platform, so that first verification information is pushed to by visitor's platform The first client positioned at the visitor side, so that the visitor obtains first verification information;
It receives the visitor and addressing machine or the identity number of the first client typing is passed through according to first verification information According to;
According to visitor's data information, the guest levels of the visitor are determined;
It is that the identity data is distributed for the access authority by access control equipment according to the guest levels.
2. the method according to claim 1, wherein the identity data includes below one or more:
Identity card data;
Finger print data;
Human face data.
3. the method according to claim 1, wherein when in visitor's data information including default access Between when, after the first verification information of the generation, further includes:
Receive the second verification information that the access control equipment is sent, wherein second verification information is that the visitor passes through The verification information of the access control equipment input;
Judge whether the time for receiving second verification information matches with the default access time and described second tests Whether card information matches with first verification information, obtains a judging result;
According to the judging result, the control instruction for controlling the access control equipment switch is generated.
4. according to the method described in claim 3, it is characterized in that, generating described for controlling the access control equipment switch After control instruction, further includes:
The access result of the visitor is obtained according to the control instruction;
The access result is synchronized to visitor's platform.
5. the method according to claim 1, wherein the visitor's data information for receiving visitor includes:
Receive visitor's data information by the external input equipment input of local visitor's host.
6. the method according to claim 1, wherein it is described receive visitor visitor's data information, and according to The step of visitor's data information, the first verification information of generation, comprising:
Receive visitor's data information that first client is sent;
Visitor's data information is sent to visitor's platform, so that visitor's platform pushes away visitor's data information Give the second client of respondent side;Wherein, second client is for generating for characterizing whether agree to the access The access confirmation information of person's access;
When receive that visitor's platform issues agrees to that the visitor visits for characterizing by what second client generated When the access confirmation information asked, according to visitor's data information, first verification information is generated.
7. the method according to claim 1, wherein the visitor's data information for receiving visitor includes:
Receive visitor's data information that the second client of respondent side is sent.
8. the method according to claim 1, wherein visitor's platform is wechat public platform.
9. managing device on a kind of visitor information line characterized by comprising
First verification information generation module, for receiving visitor's data information of visitor, and according to visitor's data information, Generate the first verification information;
First verification information sending module, for first verification information to be sent to visitor's platform, so that the visitor is flat First verification information is pushed to the first client positioned at the visitor side by platform, so that described in visitor acquisition First verification information;
Identity data receiving module passes through addressing machine or described the according to first verification information for receiving the visitor The identity data of one client typing;
Guest levels confirmation module, for determining the guest levels of the visitor according to visitor's data information;
Access authority distribution module, for being identity data distribution for by access control equipment according to the guest levels Access authority.
10. management system on a kind of visitor information line, which is characterized in that the system comprises local visitor's host, visitor's platform, The first client and addressing machine positioned at visitor side;
Local visitor's host is used to receive visitor's data information of visitor, and according to visitor's data information, generates First verification information;
Local visitor's host is also used to first verification information being sent to visitor's platform;
Visitor's platform is pushed to first visitor for receiving first verification information, and by first verification information Family end, so that the visitor obtains first verification information;
First client will connect for receiving the visitor according to the identity data of the first verification information typing The identity data received is sent to local visitor's host;
The addressing machine will be received for receiving the visitor according to the identity data of the first verification information typing Identity data be sent to local visitor's host;
The identity data that local visitor's host is also used to receive first client or the addressing machine is sent;
Local visitor's host is also used to determine the guest levels of the visitor according to visitor's data information;
Local visitor's host is also used to be that the identity data is distributed for passing through access control equipment according to the guest levels Access authority.
CN201810980086.7A 2018-08-16 2018-08-27 Method, apparatus and system are managed on a kind of visitor information line Pending CN109242424A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2018109354141 2018-08-16
CN201810935414 2018-08-16

Publications (1)

Publication Number Publication Date
CN109242424A true CN109242424A (en) 2019-01-18

Family

ID=65068286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810980086.7A Pending CN109242424A (en) 2018-08-16 2018-08-27 Method, apparatus and system are managed on a kind of visitor information line

Country Status (1)

Country Link
CN (1) CN109242424A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767536A (en) * 2019-03-01 2019-05-17 深圳市万睿智能科技有限公司 A kind of self-service access method of entrance gate inhibition and system
CN110070651A (en) * 2019-04-25 2019-07-30 华翔翔能电气股份有限公司 Visitor's passing method, access control system, terminal and the storage medium of access control system
CN110084936A (en) * 2019-04-28 2019-08-02 广州佳都数据服务有限公司 Caller management method and device
CN110322602A (en) * 2019-06-18 2019-10-11 特斯联(北京)科技有限公司 A kind of visitor reserves passing method, system and equipment
CN111831633A (en) * 2020-06-23 2020-10-27 武汉菲奥达物联科技有限公司 Automatic community visitor platform extension method and device based on visitor data
CN111915789A (en) * 2020-08-05 2020-11-10 中国建设银行股份有限公司 Visitor reservation management method, device, equipment and storage medium
CN112598560A (en) * 2020-12-24 2021-04-02 四川众望安全环保技术咨询有限公司 Intelligent park public service platform and implementation method thereof
CN113658364A (en) * 2020-04-07 2021-11-16 西安艾润物联网技术服务有限责任公司 Visitor management method, device, system and computer readable storage medium
CN114333128A (en) * 2021-12-30 2022-04-12 北京华能新锐控制技术有限公司 Diversified application system of access control data
CN114424260A (en) * 2019-09-30 2022-04-29 亚萨合莱有限公司 Enabling remote unlocking of a lock

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330946A (en) * 2016-08-31 2017-01-11 广州云系信息科技有限公司 Interactive visitor management method
CN106408703A (en) * 2016-08-31 2017-02-15 广州云系信息科技有限公司 Identification method of visitor information
CN107274516A (en) * 2017-04-19 2017-10-20 捷开通讯(深圳)有限公司 The method and server of access registrar, intelligent terminal and storage device
CN108269330A (en) * 2016-12-31 2018-07-10 中国移动通信集团辽宁有限公司 A kind of access control method, apparatus and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330946A (en) * 2016-08-31 2017-01-11 广州云系信息科技有限公司 Interactive visitor management method
CN106408703A (en) * 2016-08-31 2017-02-15 广州云系信息科技有限公司 Identification method of visitor information
CN108269330A (en) * 2016-12-31 2018-07-10 中国移动通信集团辽宁有限公司 A kind of access control method, apparatus and system
CN107274516A (en) * 2017-04-19 2017-10-20 捷开通讯(深圳)有限公司 The method and server of access registrar, intelligent terminal and storage device

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767536A (en) * 2019-03-01 2019-05-17 深圳市万睿智能科技有限公司 A kind of self-service access method of entrance gate inhibition and system
CN110070651A (en) * 2019-04-25 2019-07-30 华翔翔能电气股份有限公司 Visitor's passing method, access control system, terminal and the storage medium of access control system
CN110084936A (en) * 2019-04-28 2019-08-02 广州佳都数据服务有限公司 Caller management method and device
CN110322602A (en) * 2019-06-18 2019-10-11 特斯联(北京)科技有限公司 A kind of visitor reserves passing method, system and equipment
CN114424260A (en) * 2019-09-30 2022-04-29 亚萨合莱有限公司 Enabling remote unlocking of a lock
CN113658364A (en) * 2020-04-07 2021-11-16 西安艾润物联网技术服务有限责任公司 Visitor management method, device, system and computer readable storage medium
CN111831633A (en) * 2020-06-23 2020-10-27 武汉菲奥达物联科技有限公司 Automatic community visitor platform extension method and device based on visitor data
CN111915789A (en) * 2020-08-05 2020-11-10 中国建设银行股份有限公司 Visitor reservation management method, device, equipment and storage medium
CN112598560A (en) * 2020-12-24 2021-04-02 四川众望安全环保技术咨询有限公司 Intelligent park public service platform and implementation method thereof
CN112598560B (en) * 2020-12-24 2024-02-13 四川众望安全环保技术咨询有限公司 Intelligent park public service platform and implementation method thereof
CN114333128A (en) * 2021-12-30 2022-04-12 北京华能新锐控制技术有限公司 Diversified application system of access control data

Similar Documents

Publication Publication Date Title
CN109242424A (en) Method, apparatus and system are managed on a kind of visitor information line
CN104240013B (en) A kind of access control method and access control platform
CN103248484B (en) Access control system and method
CN109657823A (en) A kind of intelligent Community caller management method, system, terminal device and storage medium
CN101996430B (en) Method, system and device for swiping entrance guard card through short message service reservation
CN109003362A (en) A kind of visitor invites passing method, device, system and storage medium
CN103839318B (en) The gate control system of a kind of remote centralized certification and method
RU2622883C2 (en) System and method for managing access to personal data
CN106850794A (en) Method and apparatus, server and terminal for operating group
CN110148232A (en) Visitor management system, method, equipment and storage medium
CN112466026A (en) Digital visitor system and management method thereof
CN106981120A (en) A kind of wechat Quick Response Code guest system and its application method
CN109461017A (en) Method, system, the equipment, storage medium of equity are provided based on specific user
CN104751545A (en) System, method and device for processing permissions of door lock
CN111242248B (en) Personnel information monitoring method, device and computer storage medium
CN107578502A (en) A kind of cell caller management method and device
CN104240014A (en) Door access control method and door access control platform
CN110930561B (en) Control method and device of intelligent lock
CN110491008A (en) A kind of community-based managing caller side and system, storage medium
CN110728388A (en) Appointment management system for shared meeting room
CN104392723A (en) Sharing instrument platform management method based on voiceprint recognition technology
CN103327019A (en) Face recognition cloud authentication service method and system
CN107038509A (en) Self-service registration-management system
CN110634214A (en) Intelligent door lock control method and device based on Internet of things operating system
CN109887134A (en) A kind of cell legal power safety control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication