CN109584425A - A kind of gate inhibition's method for managing security based on interim identity - Google Patents
A kind of gate inhibition's method for managing security based on interim identity Download PDFInfo
- Publication number
- CN109584425A CN109584425A CN201811563593.7A CN201811563593A CN109584425A CN 109584425 A CN109584425 A CN 109584425A CN 201811563593 A CN201811563593 A CN 201811563593A CN 109584425 A CN109584425 A CN 109584425A
- Authority
- CN
- China
- Prior art keywords
- gate inhibition
- dimensional code
- interim
- user
- entrance guard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Abstract
The invention discloses a kind of gate inhibition's method for managing security based on interim identity, comprising: gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends;Gate inhibition's server verifies the first subscriber identity information, and when the first subscriber identity information is consistent with preset authorized user identities information, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment;Entrance guard management equipment receives the second two dimensional code of second user input;When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment access control is opened.
Description
Technical field
The present invention relates to access control technical field more particularly to a kind of gate inhibition safety management sides based on interim identity
Method.
Background technique
Access control system can play effective Intercepting effects to unauthorized personnel, and then obtain in places such as cell, office buildings
Extensive use is arrived.And for unauthorized personnel, in its visit authorized person, authorized person can not remote opening gate inhibition
In the case where, then authorized person scene opening gate is needed, it is extremely inconvenient, if gate inhibition's password is sent to unauthorized personnel,
The leakage of gate inhibition's password will will affect the safety of authorized person.
On the other hand, due to the generation of two dimensional code, low manufacture cost, convenience is good, gradually obtains in access control system
Compare and be widely applied, how to combine two dimensional code and access control system, not only allowed unauthorized personnel easily to pass through gate inhibition, but also do not influence
The safety of authorized person is this field problem to be solved.
Summary of the invention
Technical problems based on background technology, the invention proposes a kind of gate inhibition's bursting tube based on interim identity
Reason method;
A kind of gate inhibition's method for managing security based on interim identity proposed by the present invention, comprising:
Gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends;
Gate inhibition's server verifies the first subscriber identity information, uses in the first subscriber identity information and preset authorization
When family identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment;
Entrance guard management equipment receives the second two dimensional code of second user input;
When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control
Gate inhibition processed opens.
Preferably, described first interim gate inhibition's two dimensional code, including verification time section;
It is described when the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management is set
Standby access control is opened, comprising:
Matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receive the second two dimensional code when
Between in the verification time section when, determine that the second two dimensional code is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control
Gate inhibition processed opens.
Preferably, it is matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receives the two or two
When the time of dimension code is not in verification time section, reminder message is issued to second user, the reminder message is used to indicate
Second two dimensional code of second user input is expired.
Preferably, first subscriber identity information includes the entrance guard management equipment with the first user identification relevancy;
Gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, comprising: door
Prohibit server and sends first interim gate inhibition's two dimensional code to the first user and with the entrance guard management equipment of the first user identification relevancy.
Preferably, after the entrance guard management equipment access control is opened, first interim gate inhibition's two dimensional code is deleted.
Preferably, the entrance guard management equipment is being deleted in the preset time after first interim gate inhibition's two dimensional code, is received
When the second two dimensional code of second user input, reminder message is issued to second user, the reminder message is used to indicate the second use
Second two dimensional code of family input is expired.
In the present invention, gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first user identity that the first user sends
Information, gate inhibition's server verify the first subscriber identity information, in the first subscriber identity information and preset authorized user
When identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code, gate inhibition to the first user and entrance guard management equipment
Management equipment receives the second two dimensional code of second user input, in the second two dimensional code of entrance guard management device authentication and the first interim door
When taboo two dimensional code is consistent, entrance guard management equipment access control is opened, in this way, authorized user (owner) can be to gate inhibition's server application
Interim gate inhibition's two dimensional code, after the authentication of authorized user passes through, gate inhibition's server is to authorized user and entrance guard management equipment
Interim gate inhibition's two dimensional code is sent, then interim gate inhibition's two dimensional code can be transmitted to unauthorized user by authorized user, without authorization
In the case that personnel accompany, unauthorized user is easily to pass through gate inhibition using interim gate inhibition's two dimensional code, saving authorized person,
The time of unauthorized personnel and entrance guard management personnel, further, since interim gate inhibition's two dimensional code has timeliness, using primary or
More than using the time that can ensure the safety of authorized person with regard to actual effect.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of gate inhibition's method for managing security based on interim identity proposed by the present invention.
Specific embodiment
Referring to Fig.1, a kind of gate inhibition's method for managing security based on interim identity proposed by the present invention, comprising:
Gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends.
Gate inhibition's server verifies the first subscriber identity information, uses in the first subscriber identity information and preset authorization
When family identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment.
Entrance guard management equipment receives the second two dimensional code of second user input.
When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control
Gate inhibition processed opens.
In concrete scheme, the first user sends interim gate inhibition's two dimensional code request, gate inhibition's server pair to gate inhibition's server
The identity information of first user is verified, when verifying the first user is authorized user (owner), to the first user and gate inhibition
Management equipment sends first interim gate inhibition's two dimensional code, and it is interim logical that first interim gate inhibition's two dimensional code can be transmitted to needs by the first user
Unauthorized personnel's (second user) of gate inhibition is crossed, unauthorized personnel shows the second two dimensional code, entrance guard management to entrance guard management equipment
Second two dimensional code is compared equipment with first interim gate inhibition's two dimensional code that gate inhibition's server is sent, in the second two dimensional code and
When one interim gate inhibition's two dimensional code is consistent, opening gate allows unauthorized personnel by gate inhibition, the case where accompanying without the first user
Under, unauthorized user can by gate inhibition, can not only save the first user, unauthorized personnel and entrance guard management personnel when
Between, and can ensure the safety of the first user.
First interim gate inhibition's two dimensional code, including verification time section.
Matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receive the second two dimensional code when
Between in the verification time section when, determine that the second two dimensional code is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control
Gate inhibition processed opens.
Further, it is matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server receives second
When the time of two dimensional code is not in verification time section, reminder message is issued to second user, the reminder message is for referring to
Show that the second two dimensional code of second user input is expired.
In concrete scheme, first interim gate inhibition's two dimensional code be interim two dimensional code, have verification time section, only second
Two dimensional code is matched with first interim gate inhibition's two dimensional code, and gate inhibition's server receives time of the second two dimensional code and is in the verification time
When in section, ability opening gate allows unauthorized personnel by gate inhibition, in this way, preventing unauthorized personnel from not learning in authorized person
Time in by gate inhibition, bring security risk to the first user.
First subscriber identity information includes the entrance guard management equipment with the first user identification relevancy;
Gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, comprising: gate inhibition's clothes
Business device sends first interim gate inhibition's two dimensional code to the first user and with the entrance guard management equipment of the first user identification relevancy;
In concrete scheme, each first user has fixed residence or workplace, thus by the first user with into
The one or more entrance guard management equipment for entering its inhabitation or workplace are associated, in this way, each first user application
First interim gate inhibition's two dimensional code can only turn on into one or more gate inhibitions of its inhabitation or workplace;
Such as: B cell has 10 residential buildings, and every residential building is equipped with a gate inhibition, and party A-subscriber lives in B cell two
Room 201, then first interim gate inhibition's two dimensional code that party A-subscriber applies can only turn on into the gate inhibition of second residential building, can not
Open the gate inhibition of other residential buildings.
After entrance guard management equipment access control is opened, first interim gate inhibition's two dimensional code is deleted;
Further, the entrance guard management equipment is being deleted in the preset time after first interim gate inhibition's two dimensional code, is received
When the second two dimensional code inputted to second user, reminder message is issued to second user, the reminder message is used to indicate second
Second two dimensional code of user's input is expired.
In concrete scheme, when the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code,
Entrance guard management equipment access control is opened, i.e., first interim gate inhibition's two dimensional code had been verified successfully and after using, and is deleted
First interim gate inhibition's two dimensional code prevents second user from repeatedly passing in and out gate inhibition by first interim gate inhibition's two dimensional code.
In present embodiment, gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first user that the first user sends
Identity information, gate inhibition's server verify the first subscriber identity information, in the first subscriber identity information and preset authorization
When subscriber identity information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment,
Entrance guard management equipment receives the second two dimensional code of second user input, faces in the second two dimensional code of entrance guard management device authentication with first
When gate inhibition's two dimensional code it is consistent when, entrance guard management equipment access control open, in this way, authorized user (owner) can be to gate inhibition's server
Apply for interim gate inhibition's two dimensional code, after the authentication of authorized user passes through, gate inhibition's server is to authorized user and entrance guard management
Equipment sends interim gate inhibition's two dimensional code, and then interim gate inhibition's two dimensional code can be transmitted to unauthorized user by authorized user, be not necessarily to
In the case that authorized person accompanies, unauthorized user easily passes through gate inhibition using interim gate inhibition's two dimensional code, saves authorization
The time of personnel, unauthorized personnel and entrance guard management personnel use further, since interim gate inhibition's two dimensional code has timeliness
It once or is more than that can ensure the safety of authorized person with regard to actual effect using the time.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (6)
1. a kind of gate inhibition's method for managing security based on interim identity characterized by comprising
Gate inhibition's server receives the request of interim gate inhibition's two dimensional code and the first subscriber identity information that the first user sends;
Gate inhibition's server verifies the first subscriber identity information, in the first subscriber identity information and preset authorized user's body
When part information is consistent, gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment;
Entrance guard management equipment receives the second two dimensional code of second user input;
When the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment controls door
Prohibit and opens.
2. gate inhibition's method for managing security according to claim 1 based on interim identity, which is characterized in that described first
Interim gate inhibition's two dimensional code, including verification time section;
It is described when the second two dimensional code of entrance guard management device authentication is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment control
Gate inhibition processed opens, comprising:
It is matched in the second two dimensional code with first interim gate inhibition's two dimensional code, and gate inhibition's server received at the time of the second two dimensional code
When in verification time section, determine that the second two dimensional code is consistent with first interim gate inhibition's two dimensional code, entrance guard management equipment controls door
Prohibit and opens.
3. gate inhibition's method for managing security according to claim 2 based on interim identity, which is characterized in that the two or two
Dimension code is matched with first interim gate inhibition's two dimensional code, and gate inhibition's server receives time of the second two dimensional code and is not at the verification time
When in section, reminder message is issued to second user, the reminder message is used to indicate the second two dimensional code of second user input
It is expired.
4. gate inhibition's method for managing security according to claim 1 based on interim identity, which is characterized in that described first
Subscriber identity information includes the entrance guard management equipment with the first user identification relevancy;
Gate inhibition's server sends first interim gate inhibition's two dimensional code to the first user and entrance guard management equipment, comprising: gate inhibition's clothes
Business device sends first interim gate inhibition's two dimensional code to the first user and with the entrance guard management equipment of the first user identification relevancy.
5. gate inhibition's method for managing security according to claim 1 based on interim identity, which is characterized in that the gate inhibition
After management equipment access control is opened, first interim gate inhibition's two dimensional code is deleted.
6. gate inhibition's method for managing security according to claim 5 based on interim identity, which is characterized in that the gate inhibition
Management equipment is being deleted in the preset time after first interim gate inhibition's two dimensional code, and the second two dimensional code of second user input is received
When, reminder message is issued to second user, the second two dimensional code that the reminder message is used to indicate second user input is expired.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563593.7A CN109584425A (en) | 2018-12-20 | 2018-12-20 | A kind of gate inhibition's method for managing security based on interim identity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811563593.7A CN109584425A (en) | 2018-12-20 | 2018-12-20 | A kind of gate inhibition's method for managing security based on interim identity |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109584425A true CN109584425A (en) | 2019-04-05 |
Family
ID=65931190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811563593.7A Pending CN109584425A (en) | 2018-12-20 | 2018-12-20 | A kind of gate inhibition's method for managing security based on interim identity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109584425A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110634216A (en) * | 2019-09-23 | 2019-12-31 | 广东交通职业技术学院 | Temporary access control authorization method and access control system |
CN111462367A (en) * | 2020-04-08 | 2020-07-28 | 广东拓仕达保安服务有限公司 | Security access control system based on owner authorization and management method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004197535A (en) * | 2002-10-21 | 2004-07-15 | Nomura Building Management Co Ltd | Entry and exit security control system |
WO2013121425A1 (en) * | 2012-02-14 | 2013-08-22 | Fst21 Ltd. | System and method for entrance control to secured premises |
CN103679884A (en) * | 2013-12-02 | 2014-03-26 | 大连智慧城科技有限公司 | Casual user authorization device and method for internet door control |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN105844744A (en) * | 2016-03-21 | 2016-08-10 | 成都艾德沃传感技术有限公司 | Password authentication method and password lock |
CN105913527A (en) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud |
CN106204867A (en) * | 2016-08-31 | 2016-12-07 | 北京厚文知识产权顾问有限公司 | Gate control system and access control management method that visitor opens the door authority can be authorized |
CN107730664A (en) * | 2017-07-06 | 2018-02-23 | 西安艾润物联网技术服务有限责任公司 | Internet of Things flap turnstile control method, platform, system and storage medium |
-
2018
- 2018-12-20 CN CN201811563593.7A patent/CN109584425A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004197535A (en) * | 2002-10-21 | 2004-07-15 | Nomura Building Management Co Ltd | Entry and exit security control system |
WO2013121425A1 (en) * | 2012-02-14 | 2013-08-22 | Fst21 Ltd. | System and method for entrance control to secured premises |
CN103679884A (en) * | 2013-12-02 | 2014-03-26 | 大连智慧城科技有限公司 | Casual user authorization device and method for internet door control |
CN105741395A (en) * | 2016-02-03 | 2016-07-06 | 慧锐通智能科技股份有限公司 | Entrance guard access method and system based on two-dimension code and face identification |
CN105844744A (en) * | 2016-03-21 | 2016-08-10 | 成都艾德沃传感技术有限公司 | Password authentication method and password lock |
CN105913527A (en) * | 2016-05-03 | 2016-08-31 | 武汉睿和智云科技有限公司 | Intelligent visitor two-dimensional code verification system and intelligent visitor two-dimensional code verification method based on community cloud |
CN106204867A (en) * | 2016-08-31 | 2016-12-07 | 北京厚文知识产权顾问有限公司 | Gate control system and access control management method that visitor opens the door authority can be authorized |
CN107730664A (en) * | 2017-07-06 | 2018-02-23 | 西安艾润物联网技术服务有限责任公司 | Internet of Things flap turnstile control method, platform, system and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110634216A (en) * | 2019-09-23 | 2019-12-31 | 广东交通职业技术学院 | Temporary access control authorization method and access control system |
CN110634216B (en) * | 2019-09-23 | 2022-03-04 | 广东交通职业技术学院 | Temporary access control authorization method and access control system |
CN111462367A (en) * | 2020-04-08 | 2020-07-28 | 广东拓仕达保安服务有限公司 | Security access control system based on owner authorization and management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109767534B (en) | Access control access method, system, management terminal and access control terminal based on block chain | |
CN100533368C (en) | Controlling access to an area | |
CN105976471B (en) | A kind of access control equipment, caller management method and system | |
CN103679884A (en) | Casual user authorization device and method for internet door control | |
CN109741498A (en) | A method of intelligence registration community visitor | |
US20150235215A1 (en) | System and Method for Mobile or Web-Based Payment/Credential Process | |
CN105844758A (en) | Real estate resident user and visitor access management and implementation method | |
US20080168548A1 (en) | Method For Automatically Controlling Access To Internet Chat Rooms | |
CN104851171A (en) | Intelligent access control method, device and system | |
CN106558129B (en) | The intelligent entrance guard and attendance checking system and control method of short-distance wireless communication | |
CN104566822A (en) | Management system of air conditioning unit | |
JP5340752B2 (en) | Security system | |
EP3811339A1 (en) | Improved access control system and a method thereof controlling access of persons into restricted areas | |
CN108898705A (en) | A kind of Household access control system and its authorization method shared with permission | |
WO2017166689A1 (en) | Privacy protection method and device | |
US11928905B2 (en) | Systems and methods of access validation using distributed ledger identity management | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN109584425A (en) | A kind of gate inhibition's method for managing security based on interim identity | |
JP2005032241A (en) | Grant of permission to access resource | |
CN105915544A (en) | Intelligent entrance guard management method and intelligent entrance guard system | |
US11922747B2 (en) | Access control for property management | |
CN106097500B (en) | A kind of method and system for responding user and entering | |
CN110766850A (en) | Visitor information management method, access control system, server and storage medium | |
CN101065789B (en) | Logging access attempts to an area | |
CN207123882U (en) | A kind of antitheft cloud service door-locking system of multiple intelligent |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190405 |
|
RJ01 | Rejection of invention patent application after publication |