CN109461233A - Caller management method, system, computer equipment and storage medium - Google Patents

Caller management method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN109461233A
CN109461233A CN201811243976.6A CN201811243976A CN109461233A CN 109461233 A CN109461233 A CN 109461233A CN 201811243976 A CN201811243976 A CN 201811243976A CN 109461233 A CN109461233 A CN 109461233A
Authority
CN
China
Prior art keywords
visitor
access
information
mandate
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811243976.6A
Other languages
Chinese (zh)
Inventor
李长缤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811243976.6A priority Critical patent/CN109461233A/en
Publication of CN109461233A publication Critical patent/CN109461233A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The present invention provides a kind of caller management method, system, computer equipment and storage medium, pass through the validity that verifying visitor attends to anything else when reserving access, visitor effective for identity, request the access mandate of interviewee, to which the identity to reservation visitor has carried out double verification, the safety of guest system is improved.When guest access, access and exit control is carried out to visitor by entering and leaving system, reaches the access control of visitor.

Description

Caller management method, system, computer equipment and storage medium
Technical field
The present invention relates to managing caller technical field more particularly to a kind of caller management method, system, computer equipment and Storage medium.
Background technique
Various nonnative personnel's mobility is increasingly frequent with the rapid development of social economy, and further increasing can not much neglect Depending on security risk.The management of visitor's personnel safety and internal staff's management are even more the emphasis of the management of enterprises and institutions.
Intelligent visitor management system and entrance guard's registering apparatus can safely and reliably carry out visiting personnel management, not only may be used To ensure the safety of each unit, electronic visitor's registration that enterprises and institutions more can be improved is horizontal and vivid.
There are some problems for the safety of existing guest system and efficiency, for example, authentication, nothing can not be carried out to visitor Method realizes self-service reservation.
Summary of the invention
The object of the present invention is to provide a kind of caller management method, system, computer equipment and storage mediums, for solving Problem of the existing technology.
To achieve the above object, the present invention provides a kind of caller management method, comprising the following steps:
Step 01, it is registered at client in visitor, obtains the authentication information of visitor;
Step 02, authentication is carried out to the visitor based on the authentication information;
Step 03, if the visitor sends access mandate request by above-mentioned authentication, to accessed object, wherein The identity information of the visitor is carried in access mandate request;
Step 04, it in response to the operation of accessed object, generates access mandate and requests corresponding access mandate response, In, access mandate response carries access mandate information, which indicates denied access or allow to access;
Step 05, the access mandate information is judged, if the access mandate information is designated as allowing to access, by the visitor's Identity information and access mandate information are sent to input-output control system;
Step 06, at input-output control system, the authentication information of visitor is acquired;
Step 07, the identity information of visitor is determined based on collected authentication information;
Step 08, the corresponding access mandate information of identity information of the visitor is searched;
Step 09, if finding access mandate information corresponding with the identity information of the visitor, the visit based on the visitor Ask that authorization message carries out access and exit control to the visitor.
Further, step 02 further includes when allowing to access, in response to the operation of the accessed object, in the visit It asks and further indicates access authority information in authorization message, wherein when the access authority information includes access region and/or access Between section;Correspondingly, step 09 further includes that the access authority information based on the visitor carries out access and exit control to the visitor.
Further, step 01 is included in visitor and registers at client, obtains the ID card No. of visitor, acquires the visit The biological information of visitor;Correspondingly, step 02 includes the biological information that will be acquired and the identity card of acquisition The biological information of number-associated carries out biometric matches, if matching is consistent, confirms that the visitor passes through authentication.
Further, if step 03 includes the visitor by the authentication, pass through interactive voice answering IVR Call accessed object;Step 04 includes the response in response to the accessed object to IVR, generates the access mandate request Corresponding access mandate response, wherein the access mandate response carries access mandate information, and the access mandate information refers to Show denied access or allows to access.
Further, step 06 is included at input-output control system, acquires the biological information of visitor;Correspondingly, it walks Rapid 07 includes that the biological information that will be acquired and pre-stored biological information carry out biometric matches, is obtained The corresponding ID card No. of the biological information.
Further, the biological information includes at least one of fingerprint, iris or face or any combination.
Further, this method further includes the access record that step 10 records the visitor, and access record includes but not It is limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
To achieve the above object, the present invention also provides a kind of visitor management systems comprising:
First obtains module, for registering at client in visitor, obtains the authentication information of visitor;
First authentication module, for carrying out authentication to the visitor based on the authentication information;
Request module, if sending access mandate request to accessed object for the visitor by authentication, In, the identity information of visitor is carried in access mandate request;
Respond module generates access mandate and corresponding access mandate is requested to be rung for the operation in response to being accessed object It answers, wherein access mandate response carries access mandate information, which indicates denied access or allow to visit It asks;
Sending module, if being designated as allowing to access for the access mandate information, by the identity information of the visitor and visit Ask that authorization message is sent to input-output control system;
Second obtains module, for acquiring the authentication information of visitor at input-output control system;
Second authentication module, for determining the identity information of the visitor based on the authentication information;
Searching module, the corresponding access mandate information of identity information for searching the visitor;
Control module, if being based on the visitor for finding access mandate information corresponding with the identity information of visitor Access mandate information to visitor carry out access and exit control.
Further, respond module is also used to, in response to being accessed the operation of object, award in access when allowing to access Access authority information is further indicated in power information, wherein the access authority information includes access region and/or access time Section;Correspondingly, control module is also used to the access authority information based on the visitor and carries out access and exit control to the visitor.
Further, first module is obtained, for being registered at client in visitor, obtains the ID card No. of visitor, adopt Collect the biological information of the visitor;Correspondingly, the first authentication module, biological information and acquisition for that will acquire The associated biological information of ID card No. carries out biometric matches, if matching is consistent, confirms that the visitor passes through identity Verifying.
Further, request module, if passing through interactive voice answering by the authentication for the visitor IVR calls accessed object;Respond module, for generating access mandate request pair in response to being accessed response of the object to IVR The access mandate response answered, wherein access mandate response carries access mandate information, access mandate information instruction refusal It accesses or allows to access.
Further, second module is obtained, for acquiring the biological information of visitor at input-output control system;Phase Ying Di, the second authentication module, for giving birth to the biological information of acquisition with pre-stored biological information Object characteristic matching obtains the corresponding ID card No. of the biological information.
Further, above-mentioned biological information includes at least one of fingerprint, iris or face or any combination.
Further, further includes: logging modle, for record the visitor access record, the access record include but It is not limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
To achieve the above object, it the present invention also provides a kind of computer equipment, including memory, processor and is stored in On memory and the computer program that can run on a processor, the processor are realized above-mentioned when executing the computer program The step of method.
To achieve the above object, the present invention also provides computer readable storage mediums, are stored thereon with computer program, institute State the step of above method is realized when computer program is executed by processor.
Caller management method, system, computer equipment and storage medium provided by the invention, by being tested when reserving and accessing The validity that card visitor attends to anything else, visitor effective for identity request the access mandate of interviewee, thus to reservation access Visitor's identity of visitor has carried out double verification, improves the safety of guest system.When guest access, by entering and leaving system pair Visitor carries out access and exit control, reaches the access control of visitor.
Detailed description of the invention
Fig. 1 is the flow chart of caller management method embodiment of the present invention;
Fig. 2 is the program module schematic diagram of visitor management system embodiment of the present invention;
Fig. 3 is the hardware structural diagram of visitor management system embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Caller management method, system, computer equipment and storage medium provided by the invention are suitable for managing caller and lead Domain provides a kind of safe and reliable and efficient caller management method for accessed object.The present invention is by registering client in visitor At end, the authentication information of visitor is obtained;Authentication is carried out to the visitor based on the authentication information;If the visitor By above-mentioned authentication, access mandate request is sent to accessed object;In response to being accessed the operation of object, access is generated The corresponding access mandate response of authorization requests;If the access mandate information is designated as allowing to access, the identity of the visitor is believed Breath and access mandate information are sent to input-output control system;At input-output control system, the authentication information of visitor is acquired;Base The identity information of visitor is determined in collected authentication information;Search the corresponding access mandate letter of identity information of the visitor Breath;If finding access mandate information corresponding with the identity information of the visitor, the access mandate information pair based on the visitor The visitor carries out access and exit control.
Referring to Fig. 1, in a kind of caller management method of the present embodiment, comprising the following steps:
Step 01, it is registered at client in visitor, obtains the authentication information of visitor.
In this step, it may include various types of terminals that visitor, which registers client, such as smart phone, individual calculus Machine, special-purpose terminal etc., but not limited to this, the terminal for the authentication information that can obtain visitor by human-computer interaction all be can be with It is utilized.
In this step, visitor can input the mark visitor such as identity card (ID), phone number, social security card number The information of identity, in addition the information can also be directly read by terminal.In this step, the biological information of visitor can be obtained, with Whether verifying visitor provides my identity information.Biological information may include but be not limited to fingerprint, face or iris etc. The biological information that biometrics identification technology uses.Biological information can be adopted by camera, iris detection device, fingerprint Storage etc. obtains, and is not repeated respectively every technology herein.
Step 02, authentication is carried out to the visitor based on the authentication information.
In this step, be prerecorded with mark visitor's identity information and biological information incidence relation, by mark The corresponding biological information of information for knowing visitor's identity and the biological information got carry out biometrics identification technology Matching, if the biological information got and the corresponding biometric information matches of the mark information of visitor's identity, Visitor saves by point and verifies.
Optionally, it can also include the steps that typing access specification.It is alternatively possible to select accessed pair in step 01 As.Optionally, accessed object is selected before step 01 or after step 02.It is alternatively possible to not select to be interviewed The step of asking object, such as accessed object is specific people.
Step 03, if the visitor sends access mandate request by above-mentioned authentication, to accessed object, wherein The identity information of the visitor is carried in access mandate request.
Step 04, it in response to the operation of accessed object, generates access mandate and requests corresponding access mandate response, In, access mandate response carries access mandate information, which indicates denied access or allow to access.
In step 03, accessed object can be notified by many modes, obtain accessed object and visitor is visited Authorization.Correspondingly, in step 04 authorisation process can be carried out to visitor by corresponding mode.
As an example, it can know visitor's to accessed Object Push Multimedia Message to be accessed object Information, and interactive interface is provided to accessed object, authorisation process is carried out to be accessed object to visitor.
As another example, can to accessed object send instant communication message, visitor by conversational interactive come It completes to carry out authorisation process to visitor.
As another example, if visitor passes through accessed pair of interactive voice answering IVR calling by authentication As;In response to being accessed response of the object to IVR, generates access mandate and request corresponding access mandate response, wherein the access Authorization response carries access mandate information, which indicates denied access or allow to access.
Step 05, if the access mandate information is designated as allowing to access, by the identity information and access mandate of the visitor Information is sent to input-output control system.
In this step, the identity information of visitor and authorization access information can be sent to input-output control system.Certain In example, input-output control system includes access control system, and access control system can control the entrance guard device of multiple regions.Gate inhibition Device may include such as gate, electronic lock.
In the present embodiment, if the access mandate information is designated as allowing to access, it can also notify that it is authorized to visitor Access.
Step 06, at input-output control system, the authentication information of visitor is acquired.
In this step, the acquisition device of input-output control system can acquire the authentication information of visitor, such as biology At least one of characteristic information, including but not limited to face, vocal print, iris, fingerprint or any combination.Acquisition device can have But at least one of it is not limited to photographic device, vocal print acquisition device, fingerprint capturer, iris diagnostic device or any combination, To acquire the authentication information of visitor.Acquisition device can have communication device, be believed the authentication of visitor by communication device Breath is sent to authentication means and carries out authentication.
Step 07, the identity information of visitor is determined based on collected authentication information;
In this step, access control system can have database, and the body for the visitor being authorized to is stored in database Corresponding relationship between part information (ID card No. etc.) and biological information.Authentication means can be by communication device The authentication information (collected biological information) of the visitor of transmission is given birth to the biological information in database The matching of object feature identification technique, with the collected biological information of determination, whether corresponding people is to be authorized in database One of visitor.
ID card No. Biological information (or combination) Access mandate information
Step 08, the corresponding access mandate information of identity information of the visitor is searched.
In this step, if being matched to biological information in aforementioned data library, the identity letter of visitor can be obtained It ceases (ID card No., name etc.), the access mandate information of visitor can be obtained according to corresponding relationship.
Step 09, if finding access mandate information corresponding with the identity information of the visitor, the visit based on the visitor Ask that authorization message carries out access and exit control to the visitor.
In some instances, step 02 further includes, in response to being accessed the operation of object, awarding in access when allowing to access Access authority information is further indicated in power information, wherein the access authority information includes access region and/or access time Section;Correspondingly, step 09 further includes that the access authority information based on the visitor carries out access and exit control to the visitor.
As an example, if being authorized visitor according to authentication information determination, when collecting visitor's identity When the corresponding region of the acquisition device of verification information is the region of access authority information instruction, input-output control system, which generates, opens door The signal for prohibiting device, to open entrance guard device, so that visitor is able to enter the region.Otherwise, when collecting visitor's authentication When the corresponding region of the acquisition device of information is not the region of access authority information instruction, it is rejected for entry into the region.
As an example, if being authorized visitor according to authentication information determination, when collecting visitor's identity When the time of verification information is within the period that access authority information indicates, input-output control system generates the letter for opening entrance guard device Number, to open entrance guard device, so that visitor is able to enter the region.Otherwise, when the time for collecting visitor's authentication information When within the period of access authority information instruction, it is rejected for entry into the region.
As an example, when the corresponding region of the acquisition device for collecting visitor's authentication information is access authority letter When ceasing the region of instruction, and collecting the time of visitor's authentication information within the period that access authority information indicates, out Enter control system and generate the signal for opening entrance guard device, to open entrance guard device, so that visitor is able to enter the region.Otherwise, It is rejected for entry into the region.
In some instances, step 01 is included in visitor and registers at client, obtains the ID card No. of visitor, acquires institute State the biological information of visitor;Correspondingly, step 02 includes the biological information that will be acquired and the body of acquisition The biological information of part card number-associated carries out biometric matches, if matching is consistent, confirms that the visitor passes through identity Verifying.
In some instances, step 06 is included at input-output control system, acquires the biological information of visitor;Accordingly Ground, step 07 include that the biological information that will be acquired and pre-stored biological information carry out biological characteristic Match, obtains the corresponding ID card No. of the biological information.
In some instances, this method further includes the access record of step 10 record visitor, and access record includes but not It is limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
Please continue to refer to Fig. 2, a kind of visitor management system 10 is shown, in the present embodiment, managing caller device 10 can To include or be divided into one or more program modules, one or more program module is stored in storage medium, and As performed by one or more processors, to complete the present invention, and above-mentioned caller management method can be realized.The so-called journey of the present invention Sequence module is the series of computation machine program instruction section for referring to complete specific function, than program itself more suitable for describing visitor Implementation procedure of the management system 10 in storage medium.The function of each program module of the present embodiment will specifically be introduced by being described below:
First obtains module 11, for registering at client in visitor, obtains the authentication information of visitor;
First authentication module 12, for carrying out authentication to the visitor based on the authentication information;
Request module 13, if sending access mandate request to accessed object for the visitor by authentication, In, the identity information of visitor is carried in access mandate request;
Respond module 14 generates access mandate and requests corresponding access mandate for the operation in response to being accessed object Response, wherein access mandate response carries access mandate information, which indicates denied access or permission Access;
Sending module 15, if being designated as allowing to access for the access mandate information, by the identity information of the visitor and Access mandate information is sent to input-output control system;
Second obtains module 16, for acquiring the authentication information of visitor at input-output control system;
Second authentication module 17, for determining the identity information of the visitor based on the authentication information;
Searching module 18, the corresponding access mandate information of identity information for searching the visitor;
Control module 19, if being based on the visit for finding access mandate information corresponding with the identity information of visitor The access mandate information of visitor carries out access and exit control to visitor.
Further, respond module 14 are also used to, in response to being accessed the operation of object, accessing when allowing to access Access authority information is further indicated in authorization message, wherein the access authority information includes access region and/or access time Section;Correspondingly, control module is also used to the access authority information based on the visitor and carries out access and exit control to the visitor.
Further, first module 11 is obtained, for obtaining the ID card No. of visitor at visitor's registration client, Acquire the biological information of the visitor;Correspondingly, the first authentication module, biological information and acquisition for that will acquire The associated biological information of ID card No. carry out biometric matches, if matching is consistent, confirm that the visitor passes through body Part verifying.
Further, request module 13, if answered by the authentication by interactive voice for the visitor It answers IVR and calls accessed object;Respond module, for generating access mandate request in response to being accessed response of the object to IVR Corresponding access mandate response, wherein access mandate response carries access mandate information, and access mandate information instruction is refused It accesses absolutely or allows to access.
Further, second module 16 is obtained, for acquiring the biological information of visitor at input-output control system; Correspondingly, the second authentication module 17, the biological information for that will acquire and pre-stored biological information into Row biometric matches obtain the corresponding ID card No. of the biological information.
Further, above-mentioned biological information includes at least one of fingerprint, iris or face or any combination.
Further, further includes: logging modle, for record the visitor access record, the access record include but It is not limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
To achieve the above object, it the present invention also provides a kind of computer equipment, including memory, processor and is stored in On memory and the computer program that can run on a processor, the processor are realized above-mentioned when executing the computer program The step of method.
To achieve the above object, the present invention also provides computer readable storage mediums, are stored thereon with computer program, institute State the step of above method is realized when computer program is executed by processor.
Caller management method, system, computer equipment and storage medium provided by the invention, by being tested when reserving and accessing The validity that card visitor attends to anything else, visitor effective for identity request the access mandate of interviewee, improve guest system Safety.When guest access, access and exit control is carried out to visitor by entering and leaving system, reaches the access control of visitor.
The present embodiment also provides a kind of computer equipment, can such as execute the smart phone, tablet computer, notebook of program Computer, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server are (including independent Server cluster composed by server or multiple servers) etc..The computer equipment 20 of the present embodiment includes at least but not It is limited to: memory 21, the processor 22 of connection can be in communication with each other by system bus, as shown in Figure 3.It is pointed out that Fig. 3 The computer equipment 20 with component 21-22 is illustrated only, it should be understood that being not required for implementing all groups shown Part, the implementation that can be substituted is more or less component.
In the present embodiment, memory 21 (i.e. readable storage medium storing program for executing) includes flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic Disk, CD etc..In some embodiments, memory 21 can be the internal storage unit of computer equipment 20, such as the calculating The hard disk or memory of machine equipment 20.In further embodiments, memory 21 is also possible to the external storage of computer equipment 20 The plug-in type hard disk being equipped in equipment, such as the computer equipment 20, intelligent memory card (Smart Media Card, SMC), peace Digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 can also both include meter The internal storage unit for calculating machine equipment 20 also includes its External memory equipment.In the present embodiment, memory 21 is commonly used in storage Be installed on the operating system and types of applications software of computer equipment 20, for example, embodiment one visitor management system 10 program Code etc..In addition, memory 21 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU), Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control computer equipment 20 overall operation.In the present embodiment, program code or processing data of the processor 22 for being stored in run memory 21, Such as operation visitor management system 10, to realize the caller management method of embodiment one.
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc. Answer function.The computer readable storage medium of the present embodiment is for storing visitor management system 10, realization when being executed by processor The caller management method of embodiment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of caller management method, which comprises the following steps:
Step 01, it is registered at client in visitor, obtains the authentication information of visitor;
Step 02, authentication is carried out to the visitor based on the authentication information;
Step 03, if the visitor sends access mandate request by the authentication, to accessed object, wherein institute State the identity information that the visitor is carried in access mandate request;
Step 04, it in response to the operation of the accessed object, generates the access mandate and requests corresponding access mandate response, Wherein, the access mandate response carries access mandate information, the access mandate information instruction denied access or permission Access;
Step 05, the access mandate information is judged, if the access mandate information is designated as allowing to access, by the visit The identity information and the access mandate information of visitor is sent to input-output control system;
Step 06, at input-output control system, the authentication information of visitor is acquired;
Step 07, the identity information of the visitor is determined based on the authentication information;
Step 08, the corresponding access mandate information of identity information of the visitor is searched;
Step 09, if finding access mandate information corresponding with the identity information of the visitor, the visit based on the visitor Ask that authorization message carries out access and exit control to the visitor.
2. caller management method according to claim 1, it is characterised in that: step 02 further include: when allowing to access, ring It is accessed the operation of object described in Ying Yu, further indicates access authority information in the access mandate information, wherein described Access authority information includes access region and/or access time section;Correspondingly, step 09 further include: the visit based on the visitor Ask that authority information carries out access and exit control to the visitor.
3. caller management method according to claim 1, it is characterised in that: step 01 includes: to register client in visitor Place, obtains the ID card No. of visitor, acquires the biological information of the visitor;Correspondingly, step 02 includes: by acquisition The biological information and the associated biological information of the ID card No. of acquisition carry out biometric matches, if Matching is consistent, confirms that the visitor passes through authentication.
4. caller management method according to claim 1, it is characterised in that: if step 03 includes: that the visitor passes through The authentication calls accessed object by interactive voice answering IVR;Step 04 includes: in response to described accessed Response of the object to IVR generates the access mandate and requests corresponding access mandate response, wherein the access mandate response Access mandate information is carried, the access mandate information indicates denied access or allows to access.
5. caller management method according to claim 1, it is characterised in that: step 06 include: at input-output control system, Acquire the biological information of visitor;Correspondingly, step 07 include: by the biological information of acquisition with it is pre-stored Biological information carries out biometric matches, obtains the corresponding ID card No. of the biological information.
6. the caller management method according to claim 3 or 5, it is characterised in that: the biological information include fingerprint, At least one of iris or face or any combination.
7. caller management method according to claim 1, it is characterised in that: further include step: rapid 10 record the visitor Access record, the access record include in visitor, access starting and end time, access region or accessed object At least one or any combination.
8. a kind of visitor management system, characterized in that it comprises:
First obtains module, for registering at client in visitor, obtains the authentication information of visitor;
First authentication module, for carrying out authentication to the visitor based on the authentication information;
Request module, if sending access mandate request to accessed object for the visitor by the authentication, In, the identity information of the visitor is carried in the access mandate request;
Respond module generates the corresponding access of the access mandate request and awards for the operation in response to the accessed object Power response, wherein access mandate response carries access mandate information, the access mandate information instruction denied access or Person allows to access;
Sending module, if being designated as allowing to access for the access mandate information, by the identity information of the visitor and institute It states access mandate information and is sent to input-output control system;
Second obtains module, for acquiring the authentication information of visitor at input-output control system;
Second authentication module, for determining the identity information of the visitor based on the authentication information;
Searching module, the corresponding access mandate information of identity information for searching the visitor;
Control module, if being based on the visit for finding access mandate information corresponding with the identity information of the visitor The access mandate information of visitor carries out access and exit control to the visitor.
9. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle The computer program run on device, the processor are realized described in any one of claim 1 to 7 when executing the computer program The step of method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program The step of any one of claim 1 to 7 the method is realized when being executed by processor.
CN201811243976.6A 2018-10-24 2018-10-24 Caller management method, system, computer equipment and storage medium Pending CN109461233A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811243976.6A CN109461233A (en) 2018-10-24 2018-10-24 Caller management method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811243976.6A CN109461233A (en) 2018-10-24 2018-10-24 Caller management method, system, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109461233A true CN109461233A (en) 2019-03-12

Family

ID=65608273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811243976.6A Pending CN109461233A (en) 2018-10-24 2018-10-24 Caller management method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109461233A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110111460A (en) * 2019-04-19 2019-08-09 广东中安金狮科创有限公司 Visitor's method, apparatus and readable storage medium storing program for executing
CN110211271A (en) * 2019-06-17 2019-09-06 浙江居利威物联科技有限公司 Net about room management method, management platform and system
CN110610347A (en) * 2019-08-13 2019-12-24 万翼科技有限公司 Park visitor message notification method and device, computer equipment and storage medium
CN110766850A (en) * 2019-10-29 2020-02-07 深圳达闼科技控股有限公司 Visitor information management method, access control system, server and storage medium
CN111063082A (en) * 2019-12-11 2020-04-24 浩云科技股份有限公司 Visitor system for sending biological information by one key
CN111754655A (en) * 2019-03-27 2020-10-09 广州慧睿思通信息科技有限公司 Regional access management method, system and computer readable storage medium
CN111915789A (en) * 2020-08-05 2020-11-10 中国建设银行股份有限公司 Visitor reservation management method, device, equipment and storage medium
CN112184184A (en) * 2020-10-26 2021-01-05 财拓云计算(上海)有限公司 Self-service certificate exchange method and device and electronic equipment
CN112509197A (en) * 2020-12-10 2021-03-16 深圳市天彦通信股份有限公司 Visitor management method and related device
CN112927408A (en) * 2021-01-22 2021-06-08 中国工商银行股份有限公司 Visitor visiting processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363989A1 (en) * 2013-07-26 2015-12-17 Joseph Frank Scalisi Remote identity verification of lodging guests
CN106161468A (en) * 2016-08-31 2016-11-23 广州云系信息科技有限公司 Visitor information identification system and method
CN106934889A (en) * 2017-03-08 2017-07-07 深圳市至壹科技开发有限公司 A kind of method and system of visitor's intelligent management
CN107945321A (en) * 2017-11-08 2018-04-20 平安科技(深圳)有限公司 Safety inspection method, application server and computer-readable recording medium based on recognition of face
CN108471517A (en) * 2018-03-19 2018-08-31 广州启盟信息科技有限公司 A kind of caller management method and device
CN108520577A (en) * 2018-03-12 2018-09-11 南京甄视智能科技有限公司 Visitor's reservation management method based on recognition of face
CN108682062A (en) * 2018-05-11 2018-10-19 星络科技有限公司 A kind of authentication system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363989A1 (en) * 2013-07-26 2015-12-17 Joseph Frank Scalisi Remote identity verification of lodging guests
CN106161468A (en) * 2016-08-31 2016-11-23 广州云系信息科技有限公司 Visitor information identification system and method
CN106934889A (en) * 2017-03-08 2017-07-07 深圳市至壹科技开发有限公司 A kind of method and system of visitor's intelligent management
CN107945321A (en) * 2017-11-08 2018-04-20 平安科技(深圳)有限公司 Safety inspection method, application server and computer-readable recording medium based on recognition of face
CN108520577A (en) * 2018-03-12 2018-09-11 南京甄视智能科技有限公司 Visitor's reservation management method based on recognition of face
CN108471517A (en) * 2018-03-19 2018-08-31 广州启盟信息科技有限公司 A kind of caller management method and device
CN108682062A (en) * 2018-05-11 2018-10-19 星络科技有限公司 A kind of authentication system and method

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111754655A (en) * 2019-03-27 2020-10-09 广州慧睿思通信息科技有限公司 Regional access management method, system and computer readable storage medium
CN110111460A (en) * 2019-04-19 2019-08-09 广东中安金狮科创有限公司 Visitor's method, apparatus and readable storage medium storing program for executing
CN110211271A (en) * 2019-06-17 2019-09-06 浙江居利威物联科技有限公司 Net about room management method, management platform and system
CN110610347A (en) * 2019-08-13 2019-12-24 万翼科技有限公司 Park visitor message notification method and device, computer equipment and storage medium
CN110766850A (en) * 2019-10-29 2020-02-07 深圳达闼科技控股有限公司 Visitor information management method, access control system, server and storage medium
CN111063082A (en) * 2019-12-11 2020-04-24 浩云科技股份有限公司 Visitor system for sending biological information by one key
CN111915789A (en) * 2020-08-05 2020-11-10 中国建设银行股份有限公司 Visitor reservation management method, device, equipment and storage medium
CN112184184A (en) * 2020-10-26 2021-01-05 财拓云计算(上海)有限公司 Self-service certificate exchange method and device and electronic equipment
CN112509197A (en) * 2020-12-10 2021-03-16 深圳市天彦通信股份有限公司 Visitor management method and related device
CN112927408A (en) * 2021-01-22 2021-06-08 中国工商银行股份有限公司 Visitor visiting processing method and device

Similar Documents

Publication Publication Date Title
CN109461233A (en) Caller management method, system, computer equipment and storage medium
US11416602B2 (en) Methods and systems for identity creation, verification and management
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
CN110148232B (en) Visitor management system, method, device and storage medium
KR20100114110A (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
CN101657807A (en) Be used for dynamically control to the method and system of the visit of network
US11997087B2 (en) Mobile enrollment using a known biometric
CN110929816A (en) Two-dimensional code validity control method and system
CN109377611A (en) Caller management method, system, computer equipment and storage medium based on bio-identification
CN103971039B (en) Access control system and method with GPS location verification
CN109447297A (en) Reserve access method, system, computer equipment and storage medium
CN109409552A (en) Reserve access method, system, computer equipment and storage medium
US8074878B1 (en) System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card
US10210684B2 (en) System and method for identity verification in a detention environment
CN112825203B (en) Method and apparatus for admission control for a particular area
CN111324879A (en) Login state control method, device and equipment
US8826389B2 (en) Multi-media identity management system
US20240007472A1 (en) Authorization level unlock for matching authorization categories
CN116071860B (en) Access control data management method and system
CN109447298A (en) Visitor's batch reserving method, device, computer equipment and storage medium
CN114238908A (en) Page repeated login method, device, equipment and storage medium
CN115188112A (en) Self-service entry method, system, equipment and storage medium
CN117633755A (en) Blacklist person identification method, blacklist person identification system, computing equipment and storage medium
CN117251860A (en) Security control method and device for accessing object, electronic equipment and medium
CN112685715A (en) Identity recognition method and device, electronic equipment and intelligent hotel system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312