CN109461233A - Caller management method, system, computer equipment and storage medium - Google Patents
Caller management method, system, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109461233A CN109461233A CN201811243976.6A CN201811243976A CN109461233A CN 109461233 A CN109461233 A CN 109461233A CN 201811243976 A CN201811243976 A CN 201811243976A CN 109461233 A CN109461233 A CN 109461233A
- Authority
- CN
- China
- Prior art keywords
- visitor
- access
- information
- mandate
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The present invention provides a kind of caller management method, system, computer equipment and storage medium, pass through the validity that verifying visitor attends to anything else when reserving access, visitor effective for identity, request the access mandate of interviewee, to which the identity to reservation visitor has carried out double verification, the safety of guest system is improved.When guest access, access and exit control is carried out to visitor by entering and leaving system, reaches the access control of visitor.
Description
Technical field
The present invention relates to managing caller technical field more particularly to a kind of caller management method, system, computer equipment and
Storage medium.
Background technique
Various nonnative personnel's mobility is increasingly frequent with the rapid development of social economy, and further increasing can not much neglect
Depending on security risk.The management of visitor's personnel safety and internal staff's management are even more the emphasis of the management of enterprises and institutions.
Intelligent visitor management system and entrance guard's registering apparatus can safely and reliably carry out visiting personnel management, not only may be used
To ensure the safety of each unit, electronic visitor's registration that enterprises and institutions more can be improved is horizontal and vivid.
There are some problems for the safety of existing guest system and efficiency, for example, authentication, nothing can not be carried out to visitor
Method realizes self-service reservation.
Summary of the invention
The object of the present invention is to provide a kind of caller management method, system, computer equipment and storage mediums, for solving
Problem of the existing technology.
To achieve the above object, the present invention provides a kind of caller management method, comprising the following steps:
Step 01, it is registered at client in visitor, obtains the authentication information of visitor;
Step 02, authentication is carried out to the visitor based on the authentication information;
Step 03, if the visitor sends access mandate request by above-mentioned authentication, to accessed object, wherein
The identity information of the visitor is carried in access mandate request;
Step 04, it in response to the operation of accessed object, generates access mandate and requests corresponding access mandate response,
In, access mandate response carries access mandate information, which indicates denied access or allow to access;
Step 05, the access mandate information is judged, if the access mandate information is designated as allowing to access, by the visitor's
Identity information and access mandate information are sent to input-output control system;
Step 06, at input-output control system, the authentication information of visitor is acquired;
Step 07, the identity information of visitor is determined based on collected authentication information;
Step 08, the corresponding access mandate information of identity information of the visitor is searched;
Step 09, if finding access mandate information corresponding with the identity information of the visitor, the visit based on the visitor
Ask that authorization message carries out access and exit control to the visitor.
Further, step 02 further includes when allowing to access, in response to the operation of the accessed object, in the visit
It asks and further indicates access authority information in authorization message, wherein when the access authority information includes access region and/or access
Between section;Correspondingly, step 09 further includes that the access authority information based on the visitor carries out access and exit control to the visitor.
Further, step 01 is included in visitor and registers at client, obtains the ID card No. of visitor, acquires the visit
The biological information of visitor;Correspondingly, step 02 includes the biological information that will be acquired and the identity card of acquisition
The biological information of number-associated carries out biometric matches, if matching is consistent, confirms that the visitor passes through authentication.
Further, if step 03 includes the visitor by the authentication, pass through interactive voice answering IVR
Call accessed object;Step 04 includes the response in response to the accessed object to IVR, generates the access mandate request
Corresponding access mandate response, wherein the access mandate response carries access mandate information, and the access mandate information refers to
Show denied access or allows to access.
Further, step 06 is included at input-output control system, acquires the biological information of visitor;Correspondingly, it walks
Rapid 07 includes that the biological information that will be acquired and pre-stored biological information carry out biometric matches, is obtained
The corresponding ID card No. of the biological information.
Further, the biological information includes at least one of fingerprint, iris or face or any combination.
Further, this method further includes the access record that step 10 records the visitor, and access record includes but not
It is limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
To achieve the above object, the present invention also provides a kind of visitor management systems comprising:
First obtains module, for registering at client in visitor, obtains the authentication information of visitor;
First authentication module, for carrying out authentication to the visitor based on the authentication information;
Request module, if sending access mandate request to accessed object for the visitor by authentication,
In, the identity information of visitor is carried in access mandate request;
Respond module generates access mandate and corresponding access mandate is requested to be rung for the operation in response to being accessed object
It answers, wherein access mandate response carries access mandate information, which indicates denied access or allow to visit
It asks;
Sending module, if being designated as allowing to access for the access mandate information, by the identity information of the visitor and visit
Ask that authorization message is sent to input-output control system;
Second obtains module, for acquiring the authentication information of visitor at input-output control system;
Second authentication module, for determining the identity information of the visitor based on the authentication information;
Searching module, the corresponding access mandate information of identity information for searching the visitor;
Control module, if being based on the visitor for finding access mandate information corresponding with the identity information of visitor
Access mandate information to visitor carry out access and exit control.
Further, respond module is also used to, in response to being accessed the operation of object, award in access when allowing to access
Access authority information is further indicated in power information, wherein the access authority information includes access region and/or access time
Section;Correspondingly, control module is also used to the access authority information based on the visitor and carries out access and exit control to the visitor.
Further, first module is obtained, for being registered at client in visitor, obtains the ID card No. of visitor, adopt
Collect the biological information of the visitor;Correspondingly, the first authentication module, biological information and acquisition for that will acquire
The associated biological information of ID card No. carries out biometric matches, if matching is consistent, confirms that the visitor passes through identity
Verifying.
Further, request module, if passing through interactive voice answering by the authentication for the visitor
IVR calls accessed object;Respond module, for generating access mandate request pair in response to being accessed response of the object to IVR
The access mandate response answered, wherein access mandate response carries access mandate information, access mandate information instruction refusal
It accesses or allows to access.
Further, second module is obtained, for acquiring the biological information of visitor at input-output control system;Phase
Ying Di, the second authentication module, for giving birth to the biological information of acquisition with pre-stored biological information
Object characteristic matching obtains the corresponding ID card No. of the biological information.
Further, above-mentioned biological information includes at least one of fingerprint, iris or face or any combination.
Further, further includes: logging modle, for record the visitor access record, the access record include but
It is not limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
To achieve the above object, it the present invention also provides a kind of computer equipment, including memory, processor and is stored in
On memory and the computer program that can run on a processor, the processor are realized above-mentioned when executing the computer program
The step of method.
To achieve the above object, the present invention also provides computer readable storage mediums, are stored thereon with computer program, institute
State the step of above method is realized when computer program is executed by processor.
Caller management method, system, computer equipment and storage medium provided by the invention, by being tested when reserving and accessing
The validity that card visitor attends to anything else, visitor effective for identity request the access mandate of interviewee, thus to reservation access
Visitor's identity of visitor has carried out double verification, improves the safety of guest system.When guest access, by entering and leaving system pair
Visitor carries out access and exit control, reaches the access control of visitor.
Detailed description of the invention
Fig. 1 is the flow chart of caller management method embodiment of the present invention;
Fig. 2 is the program module schematic diagram of visitor management system embodiment of the present invention;
Fig. 3 is the hardware structural diagram of visitor management system embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Caller management method, system, computer equipment and storage medium provided by the invention are suitable for managing caller and lead
Domain provides a kind of safe and reliable and efficient caller management method for accessed object.The present invention is by registering client in visitor
At end, the authentication information of visitor is obtained;Authentication is carried out to the visitor based on the authentication information;If the visitor
By above-mentioned authentication, access mandate request is sent to accessed object;In response to being accessed the operation of object, access is generated
The corresponding access mandate response of authorization requests;If the access mandate information is designated as allowing to access, the identity of the visitor is believed
Breath and access mandate information are sent to input-output control system;At input-output control system, the authentication information of visitor is acquired;Base
The identity information of visitor is determined in collected authentication information;Search the corresponding access mandate letter of identity information of the visitor
Breath;If finding access mandate information corresponding with the identity information of the visitor, the access mandate information pair based on the visitor
The visitor carries out access and exit control.
Referring to Fig. 1, in a kind of caller management method of the present embodiment, comprising the following steps:
Step 01, it is registered at client in visitor, obtains the authentication information of visitor.
In this step, it may include various types of terminals that visitor, which registers client, such as smart phone, individual calculus
Machine, special-purpose terminal etc., but not limited to this, the terminal for the authentication information that can obtain visitor by human-computer interaction all be can be with
It is utilized.
In this step, visitor can input the mark visitor such as identity card (ID), phone number, social security card number
The information of identity, in addition the information can also be directly read by terminal.In this step, the biological information of visitor can be obtained, with
Whether verifying visitor provides my identity information.Biological information may include but be not limited to fingerprint, face or iris etc.
The biological information that biometrics identification technology uses.Biological information can be adopted by camera, iris detection device, fingerprint
Storage etc. obtains, and is not repeated respectively every technology herein.
Step 02, authentication is carried out to the visitor based on the authentication information.
In this step, be prerecorded with mark visitor's identity information and biological information incidence relation, by mark
The corresponding biological information of information for knowing visitor's identity and the biological information got carry out biometrics identification technology
Matching, if the biological information got and the corresponding biometric information matches of the mark information of visitor's identity,
Visitor saves by point and verifies.
Optionally, it can also include the steps that typing access specification.It is alternatively possible to select accessed pair in step 01
As.Optionally, accessed object is selected before step 01 or after step 02.It is alternatively possible to not select to be interviewed
The step of asking object, such as accessed object is specific people.
Step 03, if the visitor sends access mandate request by above-mentioned authentication, to accessed object, wherein
The identity information of the visitor is carried in access mandate request.
Step 04, it in response to the operation of accessed object, generates access mandate and requests corresponding access mandate response,
In, access mandate response carries access mandate information, which indicates denied access or allow to access.
In step 03, accessed object can be notified by many modes, obtain accessed object and visitor is visited
Authorization.Correspondingly, in step 04 authorisation process can be carried out to visitor by corresponding mode.
As an example, it can know visitor's to accessed Object Push Multimedia Message to be accessed object
Information, and interactive interface is provided to accessed object, authorisation process is carried out to be accessed object to visitor.
As another example, can to accessed object send instant communication message, visitor by conversational interactive come
It completes to carry out authorisation process to visitor.
As another example, if visitor passes through accessed pair of interactive voice answering IVR calling by authentication
As;In response to being accessed response of the object to IVR, generates access mandate and request corresponding access mandate response, wherein the access
Authorization response carries access mandate information, which indicates denied access or allow to access.
Step 05, if the access mandate information is designated as allowing to access, by the identity information and access mandate of the visitor
Information is sent to input-output control system.
In this step, the identity information of visitor and authorization access information can be sent to input-output control system.Certain
In example, input-output control system includes access control system, and access control system can control the entrance guard device of multiple regions.Gate inhibition
Device may include such as gate, electronic lock.
In the present embodiment, if the access mandate information is designated as allowing to access, it can also notify that it is authorized to visitor
Access.
Step 06, at input-output control system, the authentication information of visitor is acquired.
In this step, the acquisition device of input-output control system can acquire the authentication information of visitor, such as biology
At least one of characteristic information, including but not limited to face, vocal print, iris, fingerprint or any combination.Acquisition device can have
But at least one of it is not limited to photographic device, vocal print acquisition device, fingerprint capturer, iris diagnostic device or any combination,
To acquire the authentication information of visitor.Acquisition device can have communication device, be believed the authentication of visitor by communication device
Breath is sent to authentication means and carries out authentication.
Step 07, the identity information of visitor is determined based on collected authentication information;
In this step, access control system can have database, and the body for the visitor being authorized to is stored in database
Corresponding relationship between part information (ID card No. etc.) and biological information.Authentication means can be by communication device
The authentication information (collected biological information) of the visitor of transmission is given birth to the biological information in database
The matching of object feature identification technique, with the collected biological information of determination, whether corresponding people is to be authorized in database
One of visitor.
ID card No. | Biological information (or combination) | Access mandate information |
Step 08, the corresponding access mandate information of identity information of the visitor is searched.
In this step, if being matched to biological information in aforementioned data library, the identity letter of visitor can be obtained
It ceases (ID card No., name etc.), the access mandate information of visitor can be obtained according to corresponding relationship.
Step 09, if finding access mandate information corresponding with the identity information of the visitor, the visit based on the visitor
Ask that authorization message carries out access and exit control to the visitor.
In some instances, step 02 further includes, in response to being accessed the operation of object, awarding in access when allowing to access
Access authority information is further indicated in power information, wherein the access authority information includes access region and/or access time
Section;Correspondingly, step 09 further includes that the access authority information based on the visitor carries out access and exit control to the visitor.
As an example, if being authorized visitor according to authentication information determination, when collecting visitor's identity
When the corresponding region of the acquisition device of verification information is the region of access authority information instruction, input-output control system, which generates, opens door
The signal for prohibiting device, to open entrance guard device, so that visitor is able to enter the region.Otherwise, when collecting visitor's authentication
When the corresponding region of the acquisition device of information is not the region of access authority information instruction, it is rejected for entry into the region.
As an example, if being authorized visitor according to authentication information determination, when collecting visitor's identity
When the time of verification information is within the period that access authority information indicates, input-output control system generates the letter for opening entrance guard device
Number, to open entrance guard device, so that visitor is able to enter the region.Otherwise, when the time for collecting visitor's authentication information
When within the period of access authority information instruction, it is rejected for entry into the region.
As an example, when the corresponding region of the acquisition device for collecting visitor's authentication information is access authority letter
When ceasing the region of instruction, and collecting the time of visitor's authentication information within the period that access authority information indicates, out
Enter control system and generate the signal for opening entrance guard device, to open entrance guard device, so that visitor is able to enter the region.Otherwise,
It is rejected for entry into the region.
In some instances, step 01 is included in visitor and registers at client, obtains the ID card No. of visitor, acquires institute
State the biological information of visitor;Correspondingly, step 02 includes the biological information that will be acquired and the body of acquisition
The biological information of part card number-associated carries out biometric matches, if matching is consistent, confirms that the visitor passes through identity
Verifying.
In some instances, step 06 is included at input-output control system, acquires the biological information of visitor;Accordingly
Ground, step 07 include that the biological information that will be acquired and pre-stored biological information carry out biological characteristic
Match, obtains the corresponding ID card No. of the biological information.
In some instances, this method further includes the access record of step 10 record visitor, and access record includes but not
It is limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
Please continue to refer to Fig. 2, a kind of visitor management system 10 is shown, in the present embodiment, managing caller device 10 can
To include or be divided into one or more program modules, one or more program module is stored in storage medium, and
As performed by one or more processors, to complete the present invention, and above-mentioned caller management method can be realized.The so-called journey of the present invention
Sequence module is the series of computation machine program instruction section for referring to complete specific function, than program itself more suitable for describing visitor
Implementation procedure of the management system 10 in storage medium.The function of each program module of the present embodiment will specifically be introduced by being described below:
First obtains module 11, for registering at client in visitor, obtains the authentication information of visitor;
First authentication module 12, for carrying out authentication to the visitor based on the authentication information;
Request module 13, if sending access mandate request to accessed object for the visitor by authentication,
In, the identity information of visitor is carried in access mandate request;
Respond module 14 generates access mandate and requests corresponding access mandate for the operation in response to being accessed object
Response, wherein access mandate response carries access mandate information, which indicates denied access or permission
Access;
Sending module 15, if being designated as allowing to access for the access mandate information, by the identity information of the visitor and
Access mandate information is sent to input-output control system;
Second obtains module 16, for acquiring the authentication information of visitor at input-output control system;
Second authentication module 17, for determining the identity information of the visitor based on the authentication information;
Searching module 18, the corresponding access mandate information of identity information for searching the visitor;
Control module 19, if being based on the visit for finding access mandate information corresponding with the identity information of visitor
The access mandate information of visitor carries out access and exit control to visitor.
Further, respond module 14 are also used to, in response to being accessed the operation of object, accessing when allowing to access
Access authority information is further indicated in authorization message, wherein the access authority information includes access region and/or access time
Section;Correspondingly, control module is also used to the access authority information based on the visitor and carries out access and exit control to the visitor.
Further, first module 11 is obtained, for obtaining the ID card No. of visitor at visitor's registration client,
Acquire the biological information of the visitor;Correspondingly, the first authentication module, biological information and acquisition for that will acquire
The associated biological information of ID card No. carry out biometric matches, if matching is consistent, confirm that the visitor passes through body
Part verifying.
Further, request module 13, if answered by the authentication by interactive voice for the visitor
It answers IVR and calls accessed object;Respond module, for generating access mandate request in response to being accessed response of the object to IVR
Corresponding access mandate response, wherein access mandate response carries access mandate information, and access mandate information instruction is refused
It accesses absolutely or allows to access.
Further, second module 16 is obtained, for acquiring the biological information of visitor at input-output control system;
Correspondingly, the second authentication module 17, the biological information for that will acquire and pre-stored biological information into
Row biometric matches obtain the corresponding ID card No. of the biological information.
Further, above-mentioned biological information includes at least one of fingerprint, iris or face or any combination.
Further, further includes: logging modle, for record the visitor access record, the access record include but
It is not limited at least one of visitor, access starting and end time, access region or accessed object or any combination.
To achieve the above object, it the present invention also provides a kind of computer equipment, including memory, processor and is stored in
On memory and the computer program that can run on a processor, the processor are realized above-mentioned when executing the computer program
The step of method.
To achieve the above object, the present invention also provides computer readable storage mediums, are stored thereon with computer program, institute
State the step of above method is realized when computer program is executed by processor.
Caller management method, system, computer equipment and storage medium provided by the invention, by being tested when reserving and accessing
The validity that card visitor attends to anything else, visitor effective for identity request the access mandate of interviewee, improve guest system
Safety.When guest access, access and exit control is carried out to visitor by entering and leaving system, reaches the access control of visitor.
The present embodiment also provides a kind of computer equipment, can such as execute the smart phone, tablet computer, notebook of program
Computer, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server are (including independent
Server cluster composed by server or multiple servers) etc..The computer equipment 20 of the present embodiment includes at least but not
It is limited to: memory 21, the processor 22 of connection can be in communication with each other by system bus, as shown in Figure 3.It is pointed out that Fig. 3
The computer equipment 20 with component 21-22 is illustrated only, it should be understood that being not required for implementing all groups shown
Part, the implementation that can be substituted is more or less component.
In the present embodiment, memory 21 (i.e. readable storage medium storing program for executing) includes flash memory, hard disk, multimedia card, card-type memory
(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic
Disk, CD etc..In some embodiments, memory 21 can be the internal storage unit of computer equipment 20, such as the calculating
The hard disk or memory of machine equipment 20.In further embodiments, memory 21 is also possible to the external storage of computer equipment 20
The plug-in type hard disk being equipped in equipment, such as the computer equipment 20, intelligent memory card (Smart Media Card, SMC), peace
Digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 can also both include meter
The internal storage unit for calculating machine equipment 20 also includes its External memory equipment.In the present embodiment, memory 21 is commonly used in storage
Be installed on the operating system and types of applications software of computer equipment 20, for example, embodiment one visitor management system 10 program
Code etc..In addition, memory 21 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control computer equipment
20 overall operation.In the present embodiment, program code or processing data of the processor 22 for being stored in run memory 21,
Such as operation visitor management system 10, to realize the caller management method of embodiment one.
The present embodiment also provides a kind of computer readable storage medium, such as flash memory, hard disk, multimedia card, card-type memory
(for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, magnetic
Disk, CD, server, App are stored thereon with computer program, phase are realized when program is executed by processor using store etc.
Answer function.The computer readable storage medium of the present embodiment is for storing visitor management system 10, realization when being executed by processor
The caller management method of embodiment.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of caller management method, which comprises the following steps:
Step 01, it is registered at client in visitor, obtains the authentication information of visitor;
Step 02, authentication is carried out to the visitor based on the authentication information;
Step 03, if the visitor sends access mandate request by the authentication, to accessed object, wherein institute
State the identity information that the visitor is carried in access mandate request;
Step 04, it in response to the operation of the accessed object, generates the access mandate and requests corresponding access mandate response,
Wherein, the access mandate response carries access mandate information, the access mandate information instruction denied access or permission
Access;
Step 05, the access mandate information is judged, if the access mandate information is designated as allowing to access, by the visit
The identity information and the access mandate information of visitor is sent to input-output control system;
Step 06, at input-output control system, the authentication information of visitor is acquired;
Step 07, the identity information of the visitor is determined based on the authentication information;
Step 08, the corresponding access mandate information of identity information of the visitor is searched;
Step 09, if finding access mandate information corresponding with the identity information of the visitor, the visit based on the visitor
Ask that authorization message carries out access and exit control to the visitor.
2. caller management method according to claim 1, it is characterised in that: step 02 further include: when allowing to access, ring
It is accessed the operation of object described in Ying Yu, further indicates access authority information in the access mandate information, wherein described
Access authority information includes access region and/or access time section;Correspondingly, step 09 further include: the visit based on the visitor
Ask that authority information carries out access and exit control to the visitor.
3. caller management method according to claim 1, it is characterised in that: step 01 includes: to register client in visitor
Place, obtains the ID card No. of visitor, acquires the biological information of the visitor;Correspondingly, step 02 includes: by acquisition
The biological information and the associated biological information of the ID card No. of acquisition carry out biometric matches, if
Matching is consistent, confirms that the visitor passes through authentication.
4. caller management method according to claim 1, it is characterised in that: if step 03 includes: that the visitor passes through
The authentication calls accessed object by interactive voice answering IVR;Step 04 includes: in response to described accessed
Response of the object to IVR generates the access mandate and requests corresponding access mandate response, wherein the access mandate response
Access mandate information is carried, the access mandate information indicates denied access or allows to access.
5. caller management method according to claim 1, it is characterised in that: step 06 include: at input-output control system,
Acquire the biological information of visitor;Correspondingly, step 07 include: by the biological information of acquisition with it is pre-stored
Biological information carries out biometric matches, obtains the corresponding ID card No. of the biological information.
6. the caller management method according to claim 3 or 5, it is characterised in that: the biological information include fingerprint,
At least one of iris or face or any combination.
7. caller management method according to claim 1, it is characterised in that: further include step: rapid 10 record the visitor
Access record, the access record include in visitor, access starting and end time, access region or accessed object
At least one or any combination.
8. a kind of visitor management system, characterized in that it comprises:
First obtains module, for registering at client in visitor, obtains the authentication information of visitor;
First authentication module, for carrying out authentication to the visitor based on the authentication information;
Request module, if sending access mandate request to accessed object for the visitor by the authentication,
In, the identity information of the visitor is carried in the access mandate request;
Respond module generates the corresponding access of the access mandate request and awards for the operation in response to the accessed object
Power response, wherein access mandate response carries access mandate information, the access mandate information instruction denied access or
Person allows to access;
Sending module, if being designated as allowing to access for the access mandate information, by the identity information of the visitor and institute
It states access mandate information and is sent to input-output control system;
Second obtains module, for acquiring the authentication information of visitor at input-output control system;
Second authentication module, for determining the identity information of the visitor based on the authentication information;
Searching module, the corresponding access mandate information of identity information for searching the visitor;
Control module, if being based on the visit for finding access mandate information corresponding with the identity information of the visitor
The access mandate information of visitor carries out access and exit control to the visitor.
9. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle
The computer program run on device, the processor are realized described in any one of claim 1 to 7 when executing the computer program
The step of method.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program
The step of any one of claim 1 to 7 the method is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811243976.6A CN109461233A (en) | 2018-10-24 | 2018-10-24 | Caller management method, system, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811243976.6A CN109461233A (en) | 2018-10-24 | 2018-10-24 | Caller management method, system, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109461233A true CN109461233A (en) | 2019-03-12 |
Family
ID=65608273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811243976.6A Pending CN109461233A (en) | 2018-10-24 | 2018-10-24 | Caller management method, system, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109461233A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110111460A (en) * | 2019-04-19 | 2019-08-09 | 广东中安金狮科创有限公司 | Visitor's method, apparatus and readable storage medium storing program for executing |
CN110211271A (en) * | 2019-06-17 | 2019-09-06 | 浙江居利威物联科技有限公司 | Net about room management method, management platform and system |
CN110610347A (en) * | 2019-08-13 | 2019-12-24 | 万翼科技有限公司 | Park visitor message notification method and device, computer equipment and storage medium |
CN110766850A (en) * | 2019-10-29 | 2020-02-07 | 深圳达闼科技控股有限公司 | Visitor information management method, access control system, server and storage medium |
CN111063082A (en) * | 2019-12-11 | 2020-04-24 | 浩云科技股份有限公司 | Visitor system for sending biological information by one key |
CN111754655A (en) * | 2019-03-27 | 2020-10-09 | 广州慧睿思通信息科技有限公司 | Regional access management method, system and computer readable storage medium |
CN111915789A (en) * | 2020-08-05 | 2020-11-10 | 中国建设银行股份有限公司 | Visitor reservation management method, device, equipment and storage medium |
CN112184184A (en) * | 2020-10-26 | 2021-01-05 | 财拓云计算(上海)有限公司 | Self-service certificate exchange method and device and electronic equipment |
CN112509197A (en) * | 2020-12-10 | 2021-03-16 | 深圳市天彦通信股份有限公司 | Visitor management method and related device |
CN112927408A (en) * | 2021-01-22 | 2021-06-08 | 中国工商银行股份有限公司 | Visitor visiting processing method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150363989A1 (en) * | 2013-07-26 | 2015-12-17 | Joseph Frank Scalisi | Remote identity verification of lodging guests |
CN106161468A (en) * | 2016-08-31 | 2016-11-23 | 广州云系信息科技有限公司 | Visitor information identification system and method |
CN106934889A (en) * | 2017-03-08 | 2017-07-07 | 深圳市至壹科技开发有限公司 | A kind of method and system of visitor's intelligent management |
CN107945321A (en) * | 2017-11-08 | 2018-04-20 | 平安科技(深圳)有限公司 | Safety inspection method, application server and computer-readable recording medium based on recognition of face |
CN108471517A (en) * | 2018-03-19 | 2018-08-31 | 广州启盟信息科技有限公司 | A kind of caller management method and device |
CN108520577A (en) * | 2018-03-12 | 2018-09-11 | 南京甄视智能科技有限公司 | Visitor's reservation management method based on recognition of face |
CN108682062A (en) * | 2018-05-11 | 2018-10-19 | 星络科技有限公司 | A kind of authentication system and method |
-
2018
- 2018-10-24 CN CN201811243976.6A patent/CN109461233A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150363989A1 (en) * | 2013-07-26 | 2015-12-17 | Joseph Frank Scalisi | Remote identity verification of lodging guests |
CN106161468A (en) * | 2016-08-31 | 2016-11-23 | 广州云系信息科技有限公司 | Visitor information identification system and method |
CN106934889A (en) * | 2017-03-08 | 2017-07-07 | 深圳市至壹科技开发有限公司 | A kind of method and system of visitor's intelligent management |
CN107945321A (en) * | 2017-11-08 | 2018-04-20 | 平安科技(深圳)有限公司 | Safety inspection method, application server and computer-readable recording medium based on recognition of face |
CN108520577A (en) * | 2018-03-12 | 2018-09-11 | 南京甄视智能科技有限公司 | Visitor's reservation management method based on recognition of face |
CN108471517A (en) * | 2018-03-19 | 2018-08-31 | 广州启盟信息科技有限公司 | A kind of caller management method and device |
CN108682062A (en) * | 2018-05-11 | 2018-10-19 | 星络科技有限公司 | A kind of authentication system and method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111754655A (en) * | 2019-03-27 | 2020-10-09 | 广州慧睿思通信息科技有限公司 | Regional access management method, system and computer readable storage medium |
CN110111460A (en) * | 2019-04-19 | 2019-08-09 | 广东中安金狮科创有限公司 | Visitor's method, apparatus and readable storage medium storing program for executing |
CN110211271A (en) * | 2019-06-17 | 2019-09-06 | 浙江居利威物联科技有限公司 | Net about room management method, management platform and system |
CN110610347A (en) * | 2019-08-13 | 2019-12-24 | 万翼科技有限公司 | Park visitor message notification method and device, computer equipment and storage medium |
CN110766850A (en) * | 2019-10-29 | 2020-02-07 | 深圳达闼科技控股有限公司 | Visitor information management method, access control system, server and storage medium |
CN111063082A (en) * | 2019-12-11 | 2020-04-24 | 浩云科技股份有限公司 | Visitor system for sending biological information by one key |
CN111915789A (en) * | 2020-08-05 | 2020-11-10 | 中国建设银行股份有限公司 | Visitor reservation management method, device, equipment and storage medium |
CN112184184A (en) * | 2020-10-26 | 2021-01-05 | 财拓云计算(上海)有限公司 | Self-service certificate exchange method and device and electronic equipment |
CN112509197A (en) * | 2020-12-10 | 2021-03-16 | 深圳市天彦通信股份有限公司 | Visitor management method and related device |
CN112927408A (en) * | 2021-01-22 | 2021-06-08 | 中国工商银行股份有限公司 | Visitor visiting processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109461233A (en) | Caller management method, system, computer equipment and storage medium | |
US11416602B2 (en) | Methods and systems for identity creation, verification and management | |
CN109389723B (en) | Visitor management method and device using face recognition and computer equipment | |
CN110148232B (en) | Visitor management system, method, device and storage medium | |
KR20100114110A (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
CN101657807A (en) | Be used for dynamically control to the method and system of the visit of network | |
US11997087B2 (en) | Mobile enrollment using a known biometric | |
CN110929816A (en) | Two-dimensional code validity control method and system | |
CN109377611A (en) | Caller management method, system, computer equipment and storage medium based on bio-identification | |
CN103971039B (en) | Access control system and method with GPS location verification | |
CN109447297A (en) | Reserve access method, system, computer equipment and storage medium | |
CN109409552A (en) | Reserve access method, system, computer equipment and storage medium | |
CN109285255A (en) | A kind of reservation access method, system, computer equipment and storage medium | |
US8074878B1 (en) | System and method of pre-approving applicants for visa processing using an emerging country's international travel approval control card | |
US10210684B2 (en) | System and method for identity verification in a detention environment | |
CN112825203B (en) | Method and apparatus for admission control for a particular area | |
US8826389B2 (en) | Multi-media identity management system | |
US20240007472A1 (en) | Authorization level unlock for matching authorization categories | |
CN116071860B (en) | Access control data management method and system | |
CN109447298A (en) | Visitor's batch reserving method, device, computer equipment and storage medium | |
CN114238908A (en) | Page repeated login method, device, equipment and storage medium | |
CN115188112A (en) | Self-service entry method, system, equipment and storage medium | |
CN117633755A (en) | Blacklist person identification method, blacklist person identification system, computing equipment and storage medium | |
CN117251860A (en) | Security control method and device for accessing object, electronic equipment and medium | |
CN112685715A (en) | Identity recognition method and device, electronic equipment and intelligent hotel system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190312 |