CN109584425A - A kind of gate inhibition's method for managing security based on interim identity - Google Patents

A kind of gate inhibition's method for managing security based on interim identity Download PDF

Info

Publication number
CN109584425A
CN109584425A CN201811563593.7A CN201811563593A CN109584425A CN 109584425 A CN109584425 A CN 109584425A CN 201811563593 A CN201811563593 A CN 201811563593A CN 109584425 A CN109584425 A CN 109584425A
Authority
CN
China
Prior art keywords
gate inhibition
dimensional code
interim
user
entrance guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811563593.7A
Other languages
Chinese (zh)
Inventor
胡玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lingji Xi Ya Electronic Technology Co Ltd
Original Assignee
Hefei Lingji Xi Ya Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lingji Xi Ya Electronic Technology Co Ltd filed Critical Hefei Lingji Xi Ya Electronic Technology Co Ltd
Priority to CN201811563593.7A priority Critical patent/CN109584425A/en
Publication of CN109584425A publication Critical patent/CN109584425A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

The invention discloses a kind of gate inhibition's method for managing security based on interim identity, comprising: gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends;Gate inhibition's server verifies the first subscriber identity information, and when the first subscriber identity information is consistent with preset authorized user identities information, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment;Entrance guard management equipment receives the second two dimensional code of second user input;When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment access control is opened.

Description

A kind of gate inhibition's method for managing security based on interim identity
Technical field
The present invention relates to access control technical field more particularly to a kind of gate inhibition safety management sides based on interim identity Method.
Background technique
Access control system can play effective Intercepting effects to unauthorized personnel, and then obtain in places such as cell, office buildings Extensive use is arrived.And for unauthorized personnel, in its visit authorized person, authorized person can not remote opening gate inhibition In the case where, then authorized person scene opening gate is needed, it is extremely inconvenient, if gate inhibition's password is sent to unauthorized personnel, The leakage of gate inhibition's password will will affect the safety of authorized person.
On the other hand, due to the generation of two dimensional code, low manufacture cost, convenience is good, gradually obtains in access control system Compare and be widely applied, how to combine two dimensional code and access control system, not only allowed unauthorized personnel easily to pass through gate inhibition, but also do not influence The safety of authorized person is this field problem to be solved.
Summary of the invention
Technical problems based on background technology, the invention proposes a kind of gate inhibition's bursting tube based on interim identity Reason method;
A kind of gate inhibition's method for managing security based on interim identity proposed by the present invention, comprising:
Gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends;
Gate inhibition's server verifies the first subscriber identity information, uses in the first subscriber identity information and preset authorization When family identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment;
Entrance guard management equipment receives the second two dimensional code of second user input;
When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control Gate inhibition processed opens.
Preferably, described first interim gate inhibition's two dimensional code, including verification time section;
It is described when the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management is set Standby access control is opened, comprising:
Matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receive the second two dimensional code when Between in the verification time section when, determine that the second two dimensional code is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control Gate inhibition processed opens.
Preferably, it is matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receives the two or two When the time of dimension code is not in verification time section, reminder message is issued to second user, the reminder message is used to indicate Second two dimensional code of second user input is expired.
Preferably, first subscriber identity information includes the entrance guard management equipment with the first user identification relevancy;
Gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, comprising: door Prohibit server and sends first interim gate inhibition's two dimensional code to the first user and with the entrance guard management equipment of the first user identification relevancy.
Preferably, after the entrance guard management equipment access control is opened, first interim gate inhibition's two dimensional code is deleted.
Preferably, the entrance guard management equipment is being deleted in the preset time after first interim gate inhibition's two dimensional code, is received When the second two dimensional code of second user input, reminder message is issued to second user, the reminder message is used to indicate the second use Second two dimensional code of family input is expired.
In the present invention, gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first user identity that the first user sends Information, gate inhibition's server verify the first subscriber identity information, in the first subscriber identity information and preset authorized user When identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code, gate inhibition to the first user and entrance guard management equipment Management equipment receives the second two dimensional code of second user input, in the second two dimensional code of entrance guard management device authentication and the first interim door When taboo two dimensional code is consistent, entrance guard management equipment access control is opened, in this way, authorized user (owner) can be to gate inhibition's server application Interim gate inhibition's two dimensional code, after the authentication of authorized user passes through, gate inhibition's server is to authorized user and entrance guard management equipment Interim gate inhibition's two dimensional code is sent, then interim gate inhibition's two dimensional code can be transmitted to unauthorized user by authorized user, without authorization In the case that personnel accompany, unauthorized user is easily to pass through gate inhibition using interim gate inhibition's two dimensional code, saving authorized person, The time of unauthorized personnel and entrance guard management personnel, further, since interim gate inhibition's two dimensional code has timeliness, using primary or More than using the time that can ensure the safety of authorized person with regard to actual effect.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of gate inhibition's method for managing security based on interim identity proposed by the present invention.
Specific embodiment
Referring to Fig.1, a kind of gate inhibition's method for managing security based on interim identity proposed by the present invention, comprising:
Gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends.
Gate inhibition's server verifies the first subscriber identity information, uses in the first subscriber identity information and preset authorization When family identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment.
Entrance guard management equipment receives the second two dimensional code of second user input.
When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control Gate inhibition processed opens.
In concrete scheme, the first user sends interim gate inhibition's two dimensional code request, gate inhibition's server pair to gate inhibition's server The identity information of first user is verified, when verifying the first user is authorized user (owner), to the first user and gate inhibition Management equipment sends first interim gate inhibition's two dimensional code, and it is interim logical that first interim gate inhibition's two dimensional code can be transmitted to needs by the first user Unauthorized personnel's (second user) of gate inhibition is crossed, unauthorized personnel shows the second two dimensional code, entrance guard management to entrance guard management equipment Second two dimensional code is compared equipment with first interim gate inhibition's two dimensional code that gate inhibition's server is sent, in the second two dimensional code and When one interim gate inhibition's two dimensional code is consistent, opening gate allows unauthorized personnel by gate inhibition, the case where accompanying without the first user Under, unauthorized user can by gate inhibition, can not only save the first user, unauthorized personnel and entrance guard management personnel when Between, and can ensure the safety of the first user.
First interim gate inhibition's two dimensional code, including verification time section.
Matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receive the second two dimensional code when Between in the verification time section when, determine that the second two dimensional code is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control Gate inhibition processed opens.
Further, it is matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receives second When the time of two dimensional code is not in verification time section, reminder message is issued to second user, the reminder message is for referring to Show that the second two dimensional code of second user input is expired.
In concrete scheme, first interim gate inhibition's two dimensional code be interim two dimensional code, have verification time section, only second Two dimensional code is matched with first interim gate inhibition's two dimensional code, and gate inhibition's server receives time of the second two dimensional code and is in the verification time When in section, ability opening gate allows unauthorized personnel by gate inhibition, in this way, preventing unauthorized personnel from not learning in authorized person Time in by gate inhibition, bring security risk to the first user.
First subscriber identity information includes the entrance guard management equipment with the first user identification relevancy;
Gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, comprising: gate inhibition's clothes Business device sends first interim gate inhibition's two dimensional code to the first user and with the entrance guard management equipment of the first user identification relevancy;
In concrete scheme, each first user has fixed residence or workplace, thus by the first user with into The one or more entrance guard management equipment for entering its inhabitation or workplace are associated, in this way, each first user application First interim gate inhibition's two dimensional code can only turn on into one or more gate inhibitions of its inhabitation or workplace;
Such as: B cell has 10 residential buildings, and every residential building is equipped with a gate inhibition, and party A-subscriber lives in B cell two Room 201, then first interim gate inhibition's two dimensional code that party A-subscriber applies can only turn on into the gate inhibition of second residential building, can not Open the gate inhibition of other residential buildings.
After entrance guard management equipment access control is opened, first interim gate inhibition's two dimensional code is deleted;
Further, the entrance guard management equipment is being deleted in the preset time after first interim gate inhibition's two dimensional code, is received When the second two dimensional code inputted to second user, reminder message is issued to second user, the reminder message is used to indicate second Second two dimensional code of user's input is expired.
In concrete scheme, when the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, Entrance guard management equipment access control is opened, i.e., first interim gate inhibition's two dimensional code had been verified successfully and after using, and is deleted First interim gate inhibition's two dimensional code prevents second user from repeatedly passing in and out gate inhibition by first interim gate inhibition's two dimensional code.
In present embodiment, gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first user that the first user sends Identity information, gate inhibition's server verify the first subscriber identity information, in the first subscriber identity information and preset authorization When subscriber identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, Entrance guard management equipment receives the second two dimensional code of second user input, faces in the second two dimensional code of entrance guard management device authentication with first When gate inhibition's two dimensional code it is consistent when, entrance guard management equipment access control open, in this way, authorized user (owner) can be to gate inhibition's server Apply for interim gate inhibition's two dimensional code, after the authentication of authorized user passes through, gate inhibition's server is to authorized user and entrance guard management Equipment sends interim gate inhibition's two dimensional code, and then interim gate inhibition's two dimensional code can be transmitted to unauthorized user by authorized user, be not necessarily to In the case that authorized person accompanies, unauthorized user easily passes through gate inhibition using interim gate inhibition's two dimensional code, saves authorization The time of personnel, unauthorized personnel and entrance guard management personnel use further, since interim gate inhibition's two dimensional code has timeliness It once or is more than that can ensure the safety of authorized person with regard to actual effect using the time.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (6)

1. a kind of gate inhibition's method for managing security based on interim identity characterized by comprising
Gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends;
Gate inhibition's server verifies the first subscriber identity information, in the first subscriber identity information and preset authorized user's body When part information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment;
Entrance guard management equipment receives the second two dimensional code of second user input;
When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment controls door Prohibit and opens.
2. gate inhibition's method for managing security according to claim 1 based on interim identity, which is characterized in that described first Interim gate inhibition's two dimensional code, including verification time section;
It is described when the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control Gate inhibition processed opens, comprising:
It is matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server received at the time of the second two dimensional code When in verification time section, determine that the second two dimensional code is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment controls door Prohibit and opens.
3. gate inhibition's method for managing security according to claim 2 based on interim identity, which is characterized in that the two or two Dimension code is matched with first interim gate inhibition's two dimensional code, and gate inhibition's server receives time of the second two dimensional code and is not at the verification time When in section, reminder message is issued to second user, the reminder message is used to indicate the second two dimensional code of second user input It is expired.
4. gate inhibition's method for managing security according to claim 1 based on interim identity, which is characterized in that described first Subscriber identity information includes the entrance guard management equipment with the first user identification relevancy;
Gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, comprising: gate inhibition's clothes Business device sends first interim gate inhibition's two dimensional code to the first user and with the entrance guard management equipment of the first user identification relevancy.
5. gate inhibition's method for managing security according to claim 1 based on interim identity, which is characterized in that the gate inhibition After management equipment access control is opened, first interim gate inhibition's two dimensional code is deleted.
6. gate inhibition's method for managing security according to claim 5 based on interim identity, which is characterized in that the gate inhibition Management equipment is being deleted in the preset time after first interim gate inhibition's two dimensional code, and the second two dimensional code of second user input is received When, reminder message is issued to second user, the second two dimensional code that the reminder message is used to indicate second user input is expired.
CN201811563593.7A 2018-12-20 2018-12-20 A kind of gate inhibition's method for managing security based on interim identity Pending CN109584425A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811563593.7A CN109584425A (en) 2018-12-20 2018-12-20 A kind of gate inhibition's method for managing security based on interim identity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811563593.7A CN109584425A (en) 2018-12-20 2018-12-20 A kind of gate inhibition's method for managing security based on interim identity

Publications (1)

Publication Number Publication Date
CN109584425A true CN109584425A (en) 2019-04-05

Family

ID=65931190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811563593.7A Pending CN109584425A (en) 2018-12-20 2018-12-20 A kind of gate inhibition's method for managing security based on interim identity

Country Status (1)

Country Link
CN (1) CN109584425A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110634216A (en) * 2019-09-23 2019-12-31 广东交通职业技术学院 Temporary access control authorization method and access control system
CN111462367A (en) * 2020-04-08 2020-07-28 广东拓仕达保安服务有限公司 Security access control system based on owner authorization and management method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004197535A (en) * 2002-10-21 2004-07-15 Nomura Building Management Co Ltd Entry and exit security control system
WO2013121425A1 (en) * 2012-02-14 2013-08-22 Fst21 Ltd. System and method for entrance control to secured premises
CN103679884A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Casual user authorization device and method for internet door control
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105844744A (en) * 2016-03-21 2016-08-10 成都艾德沃传感技术有限公司 Password authentication method and password lock
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN106204867A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system and access control management method that visitor opens the door authority can be authorized
CN107730664A (en) * 2017-07-06 2018-02-23 西安艾润物联网技术服务有限责任公司 Internet of Things flap turnstile control method, platform, system and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004197535A (en) * 2002-10-21 2004-07-15 Nomura Building Management Co Ltd Entry and exit security control system
WO2013121425A1 (en) * 2012-02-14 2013-08-22 Fst21 Ltd. System and method for entrance control to secured premises
CN103679884A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Casual user authorization device and method for internet door control
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification
CN105844744A (en) * 2016-03-21 2016-08-10 成都艾德沃传感技术有限公司 Password authentication method and password lock
CN105913527A (en) * 2016-05-03 2016-08-31 武汉睿和智云科技有限公司 Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud
CN106204867A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system and access control management method that visitor opens the door authority can be authorized
CN107730664A (en) * 2017-07-06 2018-02-23 西安艾润物联网技术服务有限责任公司 Internet of Things flap turnstile control method, platform, system and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110634216A (en) * 2019-09-23 2019-12-31 广东交通职业技术学院 Temporary access control authorization method and access control system
CN110634216B (en) * 2019-09-23 2022-03-04 广东交通职业技术学院 Temporary access control authorization method and access control system
CN111462367A (en) * 2020-04-08 2020-07-28 广东拓仕达保安服务有限公司 Security access control system based on owner authorization and management method

Similar Documents

Publication Publication Date Title
CN109767534B (en) Access control access method, system, management terminal and access control terminal based on block chain
CN100533368C (en) Controlling access to an area
CN105976471B (en) A kind of access control equipment, caller management method and system
CN103679884A (en) Casual user authorization device and method for internet door control
CN109741498A (en) A method of intelligence registration community visitor
US20150235215A1 (en) System and Method for Mobile or Web-Based Payment/Credential Process
CN105844758A (en) Real estate resident user and visitor access management and implementation method
US20080168548A1 (en) Method For Automatically Controlling Access To Internet Chat Rooms
CN104851171A (en) Intelligent access control method, device and system
CN106558129B (en) The intelligent entrance guard and attendance checking system and control method of short-distance wireless communication
CN104566822A (en) Management system of air conditioning unit
JP5340752B2 (en) Security system
EP3811339A1 (en) Improved access control system and a method thereof controlling access of persons into restricted areas
CN108898705A (en) A kind of Household access control system and its authorization method shared with permission
WO2017166689A1 (en) Privacy protection method and device
US11928905B2 (en) Systems and methods of access validation using distributed ledger identity management
CN105574967A (en) Intelligent access control system and operation method thereof
CN109584425A (en) A kind of gate inhibition's method for managing security based on interim identity
JP2005032241A (en) Grant of permission to access resource
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
US11922747B2 (en) Access control for property management
CN106097500B (en) A kind of method and system for responding user and entering
CN110766850A (en) Visitor information management method, access control system, server and storage medium
CN101065789B (en) Logging access attempts to an area
CN207123882U (en) A kind of antitheft cloud service door-locking system of multiple intelligent

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190405

RJ01 Rejection of invention patent application after publication