CN109727349A - Visitor sends terraced method, apparatus, computer equipment and storage medium - Google Patents
Visitor sends terraced method, apparatus, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109727349A CN109727349A CN201811509939.5A CN201811509939A CN109727349A CN 109727349 A CN109727349 A CN 109727349A CN 201811509939 A CN201811509939 A CN 201811509939A CN 109727349 A CN109727349 A CN 109727349A
- Authority
- CN
- China
- Prior art keywords
- visitor
- information
- card
- destination
- elevator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
This application involves a kind of visitors to send terraced method, apparatus, computer equipment and storage medium.The described method includes: obtaining visitor information;The visitor information is verified;When the authentication succeeds, there is the destination of access entitlements for visitor information configuration;To elevator send reach the destination send ladder instruct.The identity that can be registered, distinguish and be verified visitor using this method saves time and human resources etc., and improves the safety of guest access mansion.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of visitor send terraced method, apparatus, computer equipment and
Storage medium.
Background technique
Before visitor enters a mansion, need to show the identity card of oneself on foreground.The body of foreground personnel registration visitor
Part card information and phone number, and visitor is given to provide visitor's voucher.Visitor brushes after visitor's voucher enters building on gate inhibition and reaches
Lift port clicks button upward or downward, into elevator after select reach floor and by lower button.
However the terraced method of use of current visitor, there is a problem of that safety is not high.
Summary of the invention
Based on this, it is necessary to which, for the technical problem not high there are safety with terraced method of visitor, providing one kind can
It distinguishes visitor's identity and the visitor for improving the safety of guest access mansion sends terraced method, apparatus, computer equipment and storage
Medium.
A kind of terraced method of visitor group, this method comprises: obtaining visitor information;The visitor information is verified;Work as verifying
When success, there is the destination of access entitlements for visitor information configuration;The group's ladder for reaching the destination is sent to elevator
Instruction.
The visitor sends terraced method in one of the embodiments, further include: sends unlock instruction to access control equipment.
Visitor information includes visitor's ID card information and interviewee in one of the embodiments,;To the visitor information
It is verified, comprising: obtain interviewee;One-way video call is initiated to the interviewee;The interviewee is obtained according to this
One-way video call, to the verification result of visitor's ID card information in the visitor information;When the verification result be by when, should
Visitor information is proved to be successful.
The visitor information is verified in one of the embodiments, further includes: obtain visitor's body in visitor information
Part card information, verifies the authenticity of visitor's ID card information;When visitor's ID card information is real information, by visitor's body
Part card information is compared with the ID card information in blacklist;When visitor's ID card information is not present in the blacklist, determine
The visitor information is proved to be successful.
The visitor information is verified in one of the embodiments, further includes: obtain the face information and visit of visitor
The face information in visitor's ID card information in objective information;In vivo detection is carried out to the face information of the visitor;When the living body
When detection passes through, the face information of the visitor is compared with the face information in visitor's identity card;As the people of the visitor
When face information in face information and visitor's identity card matches, determine that the visitor information is proved to be successful.
In one of the embodiments, when the authentication succeeds, there is the target of access entitlements for visitor information configuration
After floor, further includes: with this there is the destination of access entitlements to generate two dimensional code according to the visitor information;The two dimensional code is used
In instruction access control equipment according to the validity for examining the two dimensional code using time or access times in the two dimensional code;When the two dimension
Within effective time or when access times are less than threshold value, determine that the two dimensional code is effective two dimensional code using the time in code, and
Indicate that the access control equipment unlocks.
In one of the embodiments, to elevator send reach the destination send ladder instruct, comprising: by identical mesh
The corresponding visitor information of mark floor is distributed to same portion's elevator, is sent to same portion's elevator and is reached the identical destination
Group's ladder instruction.
A kind of visitor sends ladder device, which is characterized in that the device includes: acquisition module, for obtaining visitor information;Verifying
Module, for being verified to the visitor information;Configuration module, for when the authentication succeeds, having for visitor information configuration
The destination of access entitlements;Sending module, for elevator send reach the destination send ladder instruct.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device performs the steps of acquisition visitor information when executing the computer program;The visitor information is verified;When verifying at
When function, there is the destination of access entitlements for visitor information configuration;It is sent to elevator and reaches the destination and send the ladder to refer to
It enables.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Acquisition visitor information is performed the steps of when row;The visitor information is verified;It when the authentication succeeds, is the visitor information
Configure the destination with access entitlements;To elevator send reach the destination send ladder instruct.
Above-mentioned visitor sends terraced method, apparatus, computer equipment and storage medium, by obtaining visitor information, and to visitor
Information is verified, and the identity of visitor can be registered, distinguishes and verify, and saves time and human resources etc.;Configuration has power
The destination of limit, and to elevator send reach the destination send ladder instruct, can will verify visitor information and group ladder
Step integration, and visitor is directly sent with charge free to the destination with access entitlements, save user time and simplified ladder
Operation, while other floors without access entitlements of guest access are prevented, improve the safety of guest access mansion.
Detailed description of the invention
Fig. 1 is the applied environment figure that visitor sends terraced method in one embodiment;
Fig. 2 is the flow diagram that visitor sends terraced method in one embodiment;
Fig. 3 is the flow diagram that visitor information is verified in one embodiment;
Fig. 4 is the flow diagram that visitor information is verified in another embodiment;
Fig. 5 is the flow diagram that visitor information is verified in another embodiment;
Fig. 6 is the structural block diagram that visitor sends ladder device in one embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
The visitor provided in the embodiment of the present application sends terraced method, can be applied in application environment as shown in Figure 1.Its
In, terminal 102 is communicated by network with elevator 104.Wherein, terminal 102 can be, but not limited to be various guest machines, individual
Computer, laptop, smart phone, tablet computer and portable wearable device.
In one embodiment, as shown in Fig. 2, providing a kind of terraced method of visitor group, it is applied in Fig. 1 in this way
It is illustrated for terminal, comprising the following steps:
Step 202, visitor information is obtained.
Wherein, visitor information includes visitor's ID card information, visitor's face information, visitor's finger print information, visitor's palmmprint letter
Breath, visitor visiting at least one of purpose and interviewee.
Specifically, terminal obtains the information of visitor's input, for example, visitor come to visit purpose and interviewee or terminal it is direct
The information of acquisition, such as visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palm print information.
In the present embodiment, terminal can obtain visitor information by guided bone interactive interface.Such as the interface of terminal passes through
The mode of guide gradually prompts and guides visitor to input relevant information or acquire the information of visitor.
In one embodiment, server can obtain visitor information from terminal.
Step 204, which is verified.
Specifically, terminal verifies the information of information or acquisition that user inputs.Such as terminal is visiting to visitor
In purpose, interviewee, visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palm print information at least
It is a kind of to be verified, and obtain verification result.
In one embodiment, the visitor information that server can obtain the terminal is verified.
In the present embodiment, which can also be sent to interviewee by terminal, and interviewee is to the visitor information
It is verified, the progress of verification process can be with Lag synchronization, can also be with real-time synchronization.
Step 206, when the authentication succeeds, there is the destination of access entitlements for visitor information configuration.
Specifically, when the visitor information is proved to be successful, terminal is the target that visitor information configuration has access entitlements
Floor.
In the present embodiment, when the visitor information is proved to be successful, server can have for visitor information configuration to be entered
The destination of permission.
In one embodiment, which includes visitor's ID card information and interviewee.Terminal or server obtain
Interviewee is taken, the floor where interviewee is obtained, the permission of floor, makes where configuring the interviewee for the visitor information
Visitor information carries the destination with access entitlements.
In the present embodiment, which can also include destination.After the visitor information is proved to be successful, terminal
By the authority configuration of the destination into the visitor information.
Step 208, to elevator send reach the destination send ladder instruct.
Specifically, terminal to elevator send reach the destination send ladder instruct.Ladder is sent to instruct when elevator receives this
Later, visitor is sent to destination.
In one embodiment, server to elevator send reach the destination send ladder instruct.When elevator receives
After this sends ladder to instruct, visitor is sent to destination.
In the present embodiment, when the destination with access entitlements is multiple destinations, terminal or server can be from
The destination of user's selection is obtained in the control panel of elevator, and the destination for reaching that the user selects is sent to elevator
Group's ladder instruction.
In one embodiment, when the visitor information that terminal or server obtain is that visitor's finger print information or visitor's palmmprint are believed
Breath and visitor's ID card information and when interviewee, by the visitor's finger print information or visitor's palm print information in visitor information, with
Visitor's finger print information or the matching of visitor's palm print information in visitor's ID card information.When successful match, visitor information verifying
Pass through, then terminal or server are that the visitor information configures the floor where the interviewee, i.e., with the target of access entitlements
Floor, and send ladder to instruct to floor where the elevator transmission arrival interviewee.
Above-mentioned visitor sends in terraced method, by obtaining visitor information, and verifies to visitor information, can register, distinguish
Not with the identity of verifying visitor, time and human resources etc. are saved;The destination with permission is configured, and is sent to elevator
Reach the destination sends ladder to instruct, the terminal that can link and elevator, will verify the step integration of visitor information and group's ladder,
And visitor is directly sent with charge free to the destination with access entitlements, the operation of user time and simplified ladder is saved, is prevented simultaneously
Only other floors without access entitlements of guest access, improve the safety of mansion.
In one embodiment, which sends terraced method further include: sends unlock instruction to access control equipment.
Wherein, access control equipment is the equipment for guard prevention on the door, such as gate, the gate inhibition that swipes the card, two dimensional code gate inhibition
With password access etc..
Specifically, when there are access control equipment, terminal can link with access control equipment and elevator simultaneously, send to access control equipment
Unlock instruction.The step of terminal sends unlock instruction to access control equipment can send the group of the arrival destination in terminal to elevator
Ladder instruction before, can also terminal to elevator send reach the destination send ladder instruct after.
In one embodiment, when there are access control equipment, server can link with access control equipment and elevator simultaneously, Xiang Men
Prohibit equipment and sends unlock instruction.
Above-mentioned visitor sends in terraced method, and terminal, access control equipment and elevator three link, can make to verify visitor information,
Unlock access control equipment and group ladder step integration, so that visitor is voluntarily entered and left mansion, be not necessarily to manual verification, save access time with
And it saves labour turnover.
In one embodiment, which includes visitor's ID card information and interviewee;Visitor information is carried out
Verifying, comprising:
Step 302, interviewee is obtained.
Wherein, interviewee can be enterprise, family and individual etc. but not limited to this.
Specifically, terminal obtains interviewee, such as some family name of certain company name, certain name or certain floor.
In one embodiment, the available interviewee of server, such as certain company name, certain name or certain floor
Some family name.
Step 304, one-way video call is initiated to the interviewee.
Wherein, one-way video, which refers to, wherein a side can only see another party when video, that is, be only able to display visitor or
The video of interviewee.
Specifically, terminal initiates one-way video call to the interviewee, such as initiates one-way video call to certain company,
The case where terminal of the said firm can show the video of visitor, but the terminal of visitor can not see the said firm.
In one embodiment, server can initiate one-way video call to the interviewee, and by the one-way video
The interface display of call is at the terminal.
In the present embodiment, terminal or server can also initiate to converse using common video mode to the interviewee,
I.e. visitor can see interviewee, and interviewee is it can be seen that visitor.
Step 306, it obtains interviewee to be conversed according to one-way video, to visitor's ID card information in the visitor information
Verification result.
Specifically, interviewee can obtain visitor's ID card information, in the voice that interviewee converses according to one-way video
Hold and whether picture material, the visitor's ID card information verified in the visitor information meet with visitor.Terminal, which obtains, visits
The person of asking converses according to one-way video, to the verification result of visitor's identity card in the visitor information.
In the present embodiment, interviewee can also obtain the other information of the visitor of terminal acquisition, such as visitor's is visiting
Purpose and phone number etc..The other content that interviewee converses according to the information combination one-way video verifies visitor information.
In one embodiment, the available interviewee of server is according to the one-way video call in terminal, to the visit
The result that visitor's ID card information in objective information is verified.
Step 308, when the verification result be by when, which is proved to be successful.
Specifically, when the verification result to visitor's ID card information in the visitor information be by when, terminal check should
Visitor information is proved to be successful.
In one embodiment, when the verification result to visitor's ID card information in the visitor information be by when, clothes
Business device can be confirmed that the visitor information is proved to be successful, and the related printed words such as " being proved to be successful " displayed on the terminals.
In the present embodiment, terminal or server can store the visitor information.When visitor accesses again, terminal passes through
Visitor's ID card information inquires the access record of visitor's ID card information.When there are the access of visitor's ID card information records
When, terminal without obtaining visitor information again.
Above-mentioned visitor sends in terraced method, by the communication between visitor and interviewee, can obtain interviewee to visitor
The verification result of ID card information determines to the verification result of visitor information according to verification result, can verify visit from many aspects
Objective information improves the safety of building management.
In one embodiment, which is verified, further includes:
Step 402, visitor's ID card information in the visitor information is obtained, the true of visitor's ID card information is verified
Property.
Wherein, visitor's ID card information refers to the information carried in visitor's identity card.
Specifically, terminal obtains visitor's ID card information in the visitor information, and verifies visitor's ID card information
Authenticity.Such as terminal is equipped with card reader of ID card, the card reader of ID card is in wireless transmission method and visitor's identity card
Special chip carry out data exchange, visitor's ID card information can be read, then by terminal communications interface, will be in this information
Terminal is reached, and verifies the authenticity of visitor's ID card information.
In one embodiment, server can obtain visitor's ID card information in the visitor information from terminal, and test
Demonstrate,prove the authenticity of visitor's ID card information.
It step 404, will be in visitor's ID card information and blacklist when visitor's ID card information is real information
ID card information compares.
Wherein, the ID card information in blacklist can be the preset ID card information of interviewee, or safety
The preset ID card information of administrative center.
Specifically, when visitor's ID card information is the ID card information of necessary being, terminal is by visitor's identity card
Information is made comparisons with the ID card information in blacklist.
In one embodiment, when visitor's ID card information is the ID card information of necessary being, server can be with
Visitor's ID card information is made comparisons with the ID card information in blacklist.
Step 406, when visitor's ID card information is not present in the blacklist, determine that the visitor information is proved to be successful.
Specifically, when visitor's ID card information can not be matched in blacklist, i.e., the visit is not present in the blacklist
When objective ID card information, terminal determines that the visitor information is proved to be successful.
In the present embodiment, when, there are when visitor's ID card information, which can not in the blacklist
It accesses.For example, then the visitor can not access when visitor's ID card information occurs in the preset blacklist of interviewee
Interviewee, but still accessible other regions in addition to the interviewee region.When visitor's ID card information is being pacified
Occur in the preset blacklist of full administrative center, then the visitor can not access any region of the mansion Zheng Dong.When this be present in it is black
When visitor in list repeatedly requires access, terminal can issue warning information to security management center.
In the present embodiment, there is also white lists in terminal.Terminal obtains visitor's ID card information in visitor information, verifying
Visitor's ID card information, and make comparisons with the ID card information in white list.When there are visitor's identity card letters in white list
When breath, visitor information is proved to be successful, without doing other verifyings.Terminal sends ladder to instruct to elevator transmission arrival destination.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think
It returns in elevator, then testing for ID card information can be carried out by terminal, the control panel of elevator or access control equipment etc. again
Card.After being proved to be successful again, terminal, the control panel of elevator or access control equipment, which send to reach to elevator, has access entitlements
Destination sends ladder to instruct.
Above-mentioned visitor sends in terraced method, passes through terminal or the authenticity of server authentication visitor's ID card information and the visitor
ID card information whether there is in blacklist, be not necessarily to manual intervention, while can prevent visitor's false registration, and save visitor
Enrollment time.
In one embodiment, visitor information is verified, further includes:
Step 502, the face information in visitor's ID card information in the face information and visitor information of visitor is obtained.
Specifically, there is camera in terminal, camera acquires the face information of visitor, and terminal obtains visitor by camera
Face information, and obtain the ID card information in visitor information and the face information in visitor's ID card information.
In one embodiment, server can be from visitor's identity in the face information and visitor information that terminal obtains visitor
Demonstrate,prove the face information in information.
Step 504, In vivo detection is carried out to the face information of visitor.
Wherein, In vivo detection refers to a kind of method of determining object real physiological feature, in face recognition application, living body
Detection, using technologies such as facial modeling and face trackings, can be tested by blinking, opening one's mouth, shaking the head, putting first-class combinative movement
Whether card user is true living body and I operates.In the present embodiment by taking binocular In vivo detection as an example.
Specifically, terminal carries out In vivo detection to the face information of the visitor of acquisition.
In one embodiment, server can carry out In vivo detection to the face information for the visitor that terminal obtains.
Step 506, when In vivo detection passes through, the face information in the face information of visitor and visitor's identity card is carried out
It compares.
Specifically, when In vivo detection passes through, terminal is described according to the gamma characteristic perspective view and feature of facial image
The method to match determines the position of face each section, then positions pupil position using sciagraphy and template matching method, and
Calculate the geometrical relationship between the facial characteristics such as eyes, nose and mouth, such as distance, area and angle.Terminal obtains visitor's
The characteristic point of face information, and be compared with the characteristic point of the face information in visitor's identity card.
In one embodiment, when In vivo detection passes through, server can will visitor face information and visitor's identity card in
Face information be compared.
Step 508, when the face information in the face information of visitor and visitor's identity card matches, determine that the visitor believes
Breath is proved to be successful.
Specifically, when the face information in the face information of visitor and visitor's identity card matches, terminal determines the visit
Objective Information Authentication success.
In one embodiment, when the face information in the face information of visitor and visitor's identity card matches, service
Device can determine that the visitor information is proved to be successful.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think
It returns in elevator, then can carry out the verifying of face again by terminal, the control panel of elevator or access control equipment etc..Again
After being proved to be successful, terminal, the control panel of elevator or access control equipment send the target building for reaching and having access entitlements to elevator
Layer sends ladder to instruct.
Above-mentioned visitor sends in terraced method, by visitor's face information carry out In vivo detection and with visitor's ID card information
In face information matched, when being not necessarily to manual intervention, while visitor's false registration can be prevented, and saving visitor's registration
Between.
In one embodiment, when the authentication succeeds, for visitor information configuration have access entitlements destination it
Afterwards, further includes: according to visitor information and the destination with access entitlements generates two dimensional code;The two dimensional code is used to indicate gate inhibition
Equipment is according to the validity for examining the two dimensional code using time or access times in two dimensional code;When the use in the two dimensional code
Between within effective time or when access times are less than threshold value, determine that the two dimensional code is effective two dimensional code, and indicate access control equipment
Unlock.
Wherein, two dimensional code can be the access time in visitor information using the time, or server be this two
Tie up the preset effective storage life of code.The access times of two dimensional code can be the access times in visitor information, or clothes
Business device is the preset access times of the two dimensional code.
Specifically, terminal is according to visitor information and the destination with access entitlements generates two dimensional code.Each visitor into
Row registration, can all obtain a two dimensional code, which is visitor's voucher, can be papery, or be shown in terminal
Two dimensional code.When the two dimensional code is papery two dimensional code, terminal can print ID card information, the face of the visitor on paper simultaneously
At least one of information, destination and visit purpose information.When any region in the mansion has access control equipment, gate inhibition
Equipment can be according to the validity for examining two dimensional code using time or access times in two dimensional code.Use in the two dimensional code
Time, access control equipment determined that the two dimensional code is effective two dimensional code, and solves within effective time or when access times are less than threshold value
Lock.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think
It returns in elevator, then can carry out the verifying of two dimensional code again by terminal, the control panel of elevator or access control equipment etc..Again
It is secondary be proved to be successful after, terminal, the control panel of elevator or access control equipment to elevator send reach have access entitlements target
Floor sends ladder to instruct.
Above-mentioned visitor sends in terraced method, by generating two dimensional code, can assign one visitor's voucher of visitor, confirm visitor's body
Part, prevent visitor's forged identity.
In one embodiment, ladder is sent to instruct to the elevator transmission arrival destination, comprising: by identical target
The corresponding visitor information of floor is distributed to same portion's elevator, and the group for reaching the identical destination is sent to same portion's elevator
Ladder instruction.
Specifically, when terminal whithin a period of time obtains the visitor information of multiple visitors, terminal is by identical target building
The corresponding visitor information of layer is distributed to same portion's elevator, and the group's ladder for reaching the identical destination is sent to same portion's elevator
Instruction.Terminal can also distribute remaining corresponding visitor information of different destinations to other elevators.
In one embodiment, the visitor information of multiple visitors, clothes are obtained from terminal when server whithin a period of time
Business device distributes the corresponding visitor information of identical destination to same portion's elevator, sends to same portion's elevator and reaches the phase
Same destination sends ladder to instruct.Server remaining corresponding visitor information of different destinations can also be distributed to
Other elevators.
Above-mentioned visitor sends in terraced method, and the corresponding visitor information of identical destination is distributed to same portion's elevator, and
It sends ladder to instruct to same portion's elevator arrival same target floor, the access time of visitor can be saved, also save elevator group
Pass through resource used in journey.
In one embodiment, visitor sends terraced method, comprising the following steps:
Step (a1) obtains visitor information, which includes visitor's ID card information and interviewee.
Step (a2) obtains interviewee.
Step (a3) initiates one-way video call to the interviewee.
Step (a4) obtains interviewee and is conversed according to one-way video, to visitor's ID card information in the visitor information
Verification result.
Step (a5) obtains visitor's ID card information in visitor information, verifies the authenticity of visitor's ID card information.
Step (a6) will be in visitor's ID card information and blacklist when visitor's ID card information is real information
ID card information compare.
Step (a7) determines that the visitor information is proved to be successful when visitor's ID card information is not present in blacklist.
Step (a8) has the destination of access entitlements for visitor information configuration when the authentication succeeds.
Step (a9), to elevator send reach the destination send ladder instruct.
Step (a10) sends unlock instruction to access control equipment.
In one embodiment, visitor sends terraced method, comprising the following steps:
Step (b1) obtains visitor information.
Step (b2) obtains interviewee.
Step (b3) initiates one-way video call to the interviewee.
Step (b4) obtains interviewee and is conversed according to one-way video, to visitor's ID card information in the visitor information
Verification result.
Step (b5) obtains the face information in visitor's ID card information in the face information and visitor information of visitor
Step (b6) carries out In vivo detection to the face information of visitor.
Step (b7), when In vivo detection passes through, by the face information in the face information of visitor and visitor's identity card into
Row compares.
Step (b8) determines the visitor when the face information in the face information of visitor and visitor's identity card matches
Information Authentication success.
Step (b9) has the destination of access entitlements for visitor information configuration when the authentication succeeds.
Step (b10), to elevator send reach the destination send ladder instruct.
Step (b11) sends unlock instruction to access control equipment.
Above-mentioned steps (a1)-(a10) and step (b1)-(b11) is not successively to execute according to the sequence of label, unless originally
It is expressly stated otherwise in text, there is no stringent sequences to limit for the execution of these steps, these steps can be in other order
It executes, and step (a10) and step (b11) are not necessary step.
It should be understood that although each step in Fig. 2-5 flow chart is successively shown according to the instruction of arrow, this
A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least one in Fig. 2-5
It step by step may include that perhaps these sub-steps of multiple stages or stage are held in synchronization to multiple sub-steps
Row is completed, but can be executed at different times, the execution sequence in these sub-steps or stage be also not necessarily successively into
Row, but can be held in turn or alternately at least part of the sub-step or stage of other steps or other steps
Row.
In one embodiment, as shown in fig. 6, providing a kind of visitor sends ladder device, comprising: obtain module 602, verifying
Module 604, configuration module 606 and equipment linkage module 608, in which:
Module 602 is obtained, for obtaining visitor information.
Specifically, the information that module 602 is used to obtain visitor's input, such as the visiting purpose of visitor and interviewee are obtained,
Or the information that terminal directly acquires, such as visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palmmprint
Information.
In the present embodiment, obtains module 602 and be used to obtain visitor information by guided bone interactive interface.Such as the boundary of terminal
Face is gradually prompted by way of guide and guides visitor to input relevant information or acquire the information of visitor.
Authentication module 604, for being verified to visitor information.
Specifically, the information of authentication module 604 is used to input user information or acquisition is verified.Such as terminal
To visitor come to visit purpose, interviewee, visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palmmprint letter
At least one of breath is verified, and obtains verification result.
In the present embodiment, authentication module 604 is used to the visitor information being sent to interviewee, and interviewee is to the visitor
Information is verified, and the progress of verification process can be with Lag synchronization, can also be with real-time synchronization.
Configuration module 606, for when the authentication succeeds, there is the destination of access entitlements for visitor information configuration.
Specifically, when the visitor information is proved to be successful, configuration module 606, which is used to have for visitor information configuration, to be entered
The destination of permission.
In the present embodiment, which includes visitor's ID card information and interviewee.Configuration module 606 is for obtaining
Interviewee obtains the floor where interviewee, and the permission of floor, makes to visit where configuring the interviewee for the visitor information
Objective information carries the destination with access entitlements.
In the present embodiment, which can also include destination.After the visitor information is proved to be successful, configuration
Module 606 is used for the authority configuration of the destination into the visitor information.
Equipment linkage module 608, for elevator send reach the destination send ladder instruct.
Specifically, equipment linkage module 608 be used for elevator send reach the destination send ladder instruct.When elevator connects
Receive this send ladder instruct after, visitor is sent to destination.
In the present embodiment, when the destination with access entitlements is multiple destinations, equipment linkage module 608 is used
The destination of user's selection is obtained in the control panel from elevator, and the target building for reaching the user and selecting is sent to elevator
Layer sends ladder to instruct.
In the present embodiment, equipment linkage module 608 is visitor's finger print information or visitor's palmmprint for the visitor information of acquisition
Information and visitor's ID card information and when interviewee, by the visitor's finger print information or visitor's palm print information in visitor information,
With in visitor's ID card information visitor's finger print information or visitor's palm print information match.When successful match, which is tested
Card passes through.Then equipment linkage module 608 is used to configure the floor where the interviewee for the visitor information, that is, has right of access
The destination of limit, and send ladder to instruct to floor where the elevator transmission arrival interviewee.
Above-mentioned visitor sends in ladder device, by obtaining visitor information, and verifies to visitor information, can register, distinguish
Not with the identity of verifying visitor, time and human resources etc. are saved;The destination with permission is configured, and is sent to elevator
Reach the destination sends ladder to instruct, the terminal that can link and elevator, will verify the step integration of visitor information and group's ladder,
And visitor is directly sent with charge free to the destination with access entitlements, other floors without access entitlements of guest access are prevented, are mentioned
The high safety of mansion.
In one embodiment, equipment linkage module 608 is also used to send unlock instruction to access control equipment.
Specifically, when there are access control equipment, equipment linkage module 608 is also used to link with access control equipment and elevator, to
Access control equipment sends unlock instruction.Equipment linkage module 608 is also used to the step of sending unlock instruction to access control equipment can be at end
Hold to elevator send reach the destination send ladder instruct before, can also terminal to elevator send reach the destination
Send ladder instruct after.
Above-mentioned visitor sends in ladder device, and terminal, access control equipment and elevator three link, can make verify visitor information,
Unlock access control equipment and group ladder step integration, so that visitor is voluntarily entered and left mansion, be not necessarily to manual verification, save access time with
And it saves labour turnover.
In one embodiment, which includes visitor's ID card information and interviewee;Authentication module 604 is also used
In acquisition interviewee;One-way video call is initiated to the interviewee;It obtains interviewee to be conversed according to one-way video, to this
The verification result of visitor's ID card information in visitor information;When the verification result be by when, which is proved to be successful.
Specifically, authentication module 604 is also used to initiate one-way video call to the interviewee, such as initiates to certain company
The case where one-way video call, the terminal of the said firm can show the video of visitor, but the terminal of visitor can not see the said firm.
Interviewee can obtain visitor's ID card information, the voice content and picture material that interviewee converses according to one-way video,
Whether the visitor's ID card information verified in the visitor information meets with visitor.Authentication module 604 is also used to obtain access
Person converses according to one-way video, to the verification result of visitor's identity card in the visitor information.When to the visit in the visitor information
The verification result of objective ID card information be by when, authentication module 604 is also used to confirm that the visitor information is proved to be successful.
In the present embodiment, authentication module 604 can also be used to initiate to converse to the interviewee using common video mode,
I.e. visitor can see interviewee, and interviewee is it can be seen that visitor.
In the present embodiment, authentication module 604 can also be used to store the visitor information.When visitor accesses again, test
Card module 604 is also used to inquire the access record of visitor's ID card information by visitor's ID card information.When there are the visitors
When the access record of ID card information, authentication module 604 without obtaining visitor information again.
Above-mentioned visitor sends in ladder device, by the communication between visitor and interviewee, can obtain interviewee to visitor
The verification result of ID card information determines to the verification result of visitor information according to verification result, can verify visit from many aspects
Objective information improves the safety of building management.
In one embodiment, authentication module 604 is also used to obtain visitor's ID card information in the visitor information, verifying
The authenticity of visitor's ID card information;When visitor's ID card information be real information when, by visitor's ID card information with
ID card information in blacklist compares;When visitor's ID card information is not present in the blacklist, the visitor information is determined
It is proved to be successful.
Specifically, authentication module 604 is also used to obtain visitor's ID card information in the visitor information, and verifies the visitor
The authenticity of ID card information.Such as authentication module 604 is also used to from card reader of ID card read visitor's ID card information,
And verify the authenticity of visitor's ID card information.When visitor's ID card information is the ID card information of necessary being, test
Card module 604 is also used to make comparisons visitor's ID card information with the ID card information in blacklist.When can not in blacklist
When visitor's ID card information being not present when being matched to visitor's ID card information, i.e., in the blacklist, authentication module 604 is also used
In determining that the visitor information is proved to be successful.
In the present embodiment, authentication module 604 is also used to verify white list visitor.Authentication module 604 is also used to obtain visitor
Visitor's ID card information in information verifies visitor's ID card information, and makes comparisons with the ID card information in white list.When
There are when visitor's ID card information in white list, visitor information is proved to be successful, without doing other verifyings.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think
It returns in elevator, then testing for ID card information can be carried out by terminal, the control panel of elevator or access control equipment etc. again
Card.After being proved to be successful again, authentication module 604 is also used to send the group's ladder for reaching the destination with access entitlements to elevator
Instruction.
Above-mentioned visitor sends in ladder device, passes through terminal or the authenticity of server authentication visitor's ID card information and the visitor
ID card information whether there is in blacklist, be not necessarily to manual intervention, while can prevent visitor's false registration, and save visitor
Enrollment time.
In one embodiment, authentication module 604 is also used to obtain the visitor in the face information and visitor information of visitor
Face information in ID card information;In vivo detection is carried out to the face information of visitor;When In vivo detection passes through, by visitor's
Face information is compared with the face information in visitor's identity card;Face in the face information of visitor and visitor's identity card
When information matches, determine that the visitor information is proved to be successful.
Specifically, authentication module 604 is also used to obtain the face information of visitor by camera, and obtains visitor information
In ID card information and visitor's ID card information in face information.Authentication module 604 is also used to the visitor's of acquisition
Face information carries out In vivo detection.When In vivo detection passes through, authentication module 604 is also used to first special according to the gray scale of facial image
Property the position of face each section is determined with perspective view and the method that matches of feature description, then utilize sciagraphy and template matching
Method positions pupil position, and calculates the geometrical relationship between the facial characteristics such as eyes, nose and mouth, such as distance, area and angle
Degree etc..Authentication module 604 is also used to obtain the characteristic point of the face information of visitor, and with the face information in visitor's identity card
Characteristic point is compared.When the face information in the face information and identity card of visitor matches, authentication module 604 is also used to
Determine that the visitor information is proved to be successful.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think
It returns in elevator, then can carry out the verifying of face again by terminal, the control panel of elevator or access control equipment etc..Again
After being proved to be successful, authentication module 604 is also used to send ladder to instruct to destination of the elevator transmission arrival with access entitlements.
Above-mentioned visitor sends in ladder device, by visitor's face information carry out In vivo detection and with visitor's ID card information
In face information matched, when being not necessarily to manual intervention, while visitor's false registration can be prevented, and saving visitor's registration
Between.
In one embodiment, configuration module 606 is also used to according to visitor information and with the destination of access entitlements
Generate two dimensional code;The two dimensional code is used to indicate access control equipment and examines the two dimension using time or access times according in two dimensional code
The validity of code;When using the time within effective time or when access times are less than threshold value, determine in the two dimensional code this two
Dimension code is effective two dimensional code, and indicates that access control equipment unlocks.
Specifically, configuration module 606 is also used to according to visitor information and the destination with access entitlements generates two dimension
Code.Each visitor registers, and can all obtain a two dimensional code, which is visitor's voucher, can be papery, can also be with
For the two dimensional code for being shown in terminal.When the two dimensional code is papery two dimensional code, terminal can print the body of the visitor on paper simultaneously
At least one of part card information, face information, destination and visit purpose information.When any region in the mansion has door
When prohibiting equipment, access control equipment can be according to the validity for examining two dimensional code using time or access times in two dimensional code.When this
Use the time within effective time or when access times are less than threshold value in two dimensional code, access control equipment determines that the two dimensional code is to have
Two dimensional code is imitated, and is unlocked.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think
It returns in elevator, then can carry out the verifying of two dimensional code again by terminal, the control panel of elevator or access control equipment etc..Again
It is secondary be proved to be successful after, configuration module 606 be also used to elevator send reach have access entitlements destination send ladder instruct.
Above-mentioned visitor sends in ladder device, by generating two dimensional code, can assign one visitor's voucher of visitor, confirm visitor's body
Part, prevent visitor's forged identity.
In one embodiment, equipment linkage module 608 is also used to the corresponding visitor information point of identical destination
It is assigned to same portion's elevator, sends ladder to instruct to same portion's elevator transmission arrival identical destination.
Specifically, when the visitor information for obtaining multiple visitors whithin a period of time, equipment linkage module 608 be also used to by
The corresponding visitor information of identical destination is distributed to same portion's elevator, is sent to same portion's elevator and is reached the identical mesh
Mark floor sends ladder to instruct.Equipment linkage module 608 is also used to the corresponding visitor information point of remaining different destination
It is assigned to other elevators.
Above-mentioned visitor sends in ladder device, and the corresponding visitor information of identical destination is distributed to same portion's elevator, and
It sends ladder to instruct to same portion's elevator arrival same target floor, the access time of visitor can be saved, also save elevator group
Pass through resource used in journey.
The specific of ladder device is sent to limit the restriction that may refer to send terraced method above for visitor about visitor, herein not
It repeats again.Above-mentioned visitor sends the modules in ladder device that can realize fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure
Figure can be as shown in Figure 7.The computer equipment includes processor, the memory, network interface, display connected by system bus
Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited
Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey
Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The network interface of machine equipment is used to communicate with external terminal by network connection.When the computer program is executed by processor with
Realize that a kind of visitor sends terraced method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen,
The input unit of the computer equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell
Key, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory
Computer program, the processor perform the steps of acquisition visitor information when executing computer program;The visitor information is carried out
Verifying;When the authentication succeeds, there is the destination of access entitlements for visitor information configuration;It is sent to elevator and reaches the target
Floor sends ladder to instruct.
In one embodiment, it also performs the steps of to send to access control equipment when processor executes computer program and solve
Lock instruction.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains interviewee;To this
Interviewee initiates one-way video call;It obtains the interviewee to be conversed according to the one-way video, to the visit in the visitor information
The verification result of objective ID card information;When the verification result be by when, which is proved to be successful.
In one embodiment, it also performs the steps of and is obtained in visitor information when processor executes computer program
Visitor's ID card information verifies the authenticity of visitor's ID card information;When visitor's ID card information is real information, by this
Visitor's ID card information is compared with the ID card information in blacklist;When there is no visitor's ID card informations in the blacklist
When, determine that the visitor information is proved to be successful.
In one embodiment, the face letter for obtaining visitor is also performed the steps of when processor executes computer program
The face information in visitor's ID card information in breath and visitor information;In vivo detection is carried out to the face information of the visitor;When
When the In vivo detection passes through, the face information of the visitor is compared with the face information in visitor's identity card;When the visit
When the face information and the face information in visitor's identity card of visitor match, determine that the visitor information is proved to be successful.
In one embodiment, also perform the steps of when processor executes computer program according to the visitor information and
The destination with access entitlements generates two dimensional code;The two dimensional code is used to indicate access control equipment to be made according in the two dimensional code
The validity of the two dimensional code is examined with time or access times;When within effective time or being used using the time in the two dimensional code
When number is less than threshold value, determine that the two dimensional code is effective two dimensional code, and indicate that the access control equipment unlocks.
In one embodiment, it also performs the steps of when processor executes computer program by identical destination
Corresponding visitor information is distributed to same portion's elevator, sends ladder to refer to same portion's elevator transmission arrival identical destination
It enables.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of acquisition visitor information when being executed by processor;The visitor information is verified;When being proved to be successful
When, there is the destination of access entitlements for visitor information configuration;To elevator send reach the destination send ladder instruct.
In one embodiment, it also performs the steps of when computer program is executed by processor and is sent to access control equipment
Unlock instruction.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains interviewee;To
The interviewee initiates one-way video call;It obtains the interviewee to be conversed according to the one-way video, in the visitor information
The verification result of visitor's ID card information;When the verification result be by when, which is proved to be successful.
In one embodiment, it also performs the steps of and is obtained in visitor information when computer program is executed by processor
Visitor's ID card information, verify the authenticity of visitor's ID card information;It, will when visitor's ID card information is real information
Visitor's ID card information is compared with the ID card information in blacklist;When there is no visitor's ID card informations in the blacklist
When, determine that the visitor information is proved to be successful.
In one embodiment, the face for obtaining visitor is also performed the steps of when computer program is executed by processor
The face information in visitor's ID card information in information and visitor information;In vivo detection is carried out to the face information of the visitor;
When the In vivo detection passes through, the face information of the visitor is compared with the face information in visitor's identity card;When this
When face information in the face information of visitor and visitor's identity card matches, determine that the visitor information is proved to be successful.
In one embodiment, it also performs the steps of when computer program is executed by processor according to the visitor information
Two dimensional code is generated with the destination with access entitlements;The two dimensional code is used to indicate access control equipment according in the two dimensional code
The validity of the two dimensional code is examined using time or access times;When within effective time or being made in the two dimensional code using the time
When being less than threshold value with number, determine that the two dimensional code is effective two dimensional code, and indicate that the access control equipment unlocks.
In one embodiment, it is also performed the steps of when computer program is executed by processor by identical target building
The corresponding visitor information of layer is distributed to same portion's elevator, and the group's ladder for reaching the identical destination is sent to same portion's elevator
Instruction.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of visitor sends terraced method, which comprises
Obtain visitor information;
The visitor information is verified;
When the authentication succeeds, there is the destination of access entitlements for visitor information configuration;
Ladder is sent to instruct to the elevator transmission arrival destination.
2. the method according to claim 1, wherein the method also includes:
Unlock instruction is sent to access control equipment.
3. the method according to claim 1, wherein the visitor information includes visitor's ID card information and is interviewed
The person of asking;
It is described that the visitor information is verified, comprising:
Obtain interviewee;
One-way video call is initiated to the interviewee;
It obtains the interviewee to be conversed according to the one-way video, to testing for visitor's ID card information in the visitor information
Demonstrate,prove result;
When the verification result be by when, the visitor information is proved to be successful.
4. according to claim 1 to method described in 3 any one, which is characterized in that described to test the visitor information
Card, further includes:
Visitor's ID card information in visitor information is obtained, the authenticity of visitor's ID card information is verified;
When visitor's ID card information is real information, the identity card in visitor's ID card information and blacklist is believed
Breath compares;
When visitor's ID card information is not present in the blacklist, determine that the visitor information is proved to be successful.
5. according to claim 1 to method described in 3 any one, which is characterized in that described to test the visitor information
Card, further includes:
Obtain the face information in visitor's ID card information in the face information and visitor information of visitor;
In vivo detection is carried out to the face information of the visitor;
When the In vivo detection passes through, the face information in the face information of the visitor and visitor's identity card is carried out
It compares;
When the face information in the face information of the visitor and visitor's identity card matches, the visitor information is determined
It is proved to be successful.
6. the method according to claim 1, wherein it is described when the authentication succeeds, match for the visitor information
After setting the destination with access entitlements, further includes:
Two dimensional code is generated according to the visitor information and the destination with access entitlements;
The two dimensional code is used to indicate access control equipment and examines described two using time or access times according in the two dimensional code
Tie up the validity of code;
When using the time within effective time or when access times are less than threshold value in the two dimensional code, the two dimensional code is determined
For effective two dimensional code, and indicate the access control equipment unlock.
7. method according to claim 1 or 2, which is characterized in that described send to elevator reaches the destination
Group's ladder instruction, comprising:
The corresponding visitor information of identical destination is distributed to same portion's elevator, is sent to same portion's elevator and reaches institute
That states identical destination sends ladder to instruct.
8. a kind of visitor sends ladder device, which is characterized in that described device includes:
Module is obtained, for obtaining visitor information;
Authentication module, for being verified to the visitor information;
Configuration module, for when the authentication succeeds, there is the destination of access entitlements for visitor information configuration;
Equipment linkage module, for sending ladder to instruct to the elevator transmission arrival destination.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811509939.5A CN109727349A (en) | 2018-12-11 | 2018-12-11 | Visitor sends terraced method, apparatus, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811509939.5A CN109727349A (en) | 2018-12-11 | 2018-12-11 | Visitor sends terraced method, apparatus, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109727349A true CN109727349A (en) | 2019-05-07 |
Family
ID=66295886
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811509939.5A Pending CN109727349A (en) | 2018-12-11 | 2018-12-11 | Visitor sends terraced method, apparatus, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109727349A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110386516A (en) * | 2019-07-01 | 2019-10-29 | 创新奇智(重庆)科技有限公司 | A kind of inter-linked controlling method, system and the electronic equipment of gate inhibition and elevator |
CN110992559A (en) * | 2019-12-06 | 2020-04-10 | 苏宁智能终端有限公司 | Intelligent elevator control method and system |
CN111186730A (en) * | 2020-01-20 | 2020-05-22 | 耀灵人工智能(浙江)有限公司 | Elevator control method and elevator control system based on human body tracking and automatic allocation |
CN111192394A (en) * | 2019-10-29 | 2020-05-22 | 腾讯云计算(北京)有限责任公司 | Visitor permission management method, platform, system and computer storage medium |
CN111202861A (en) * | 2020-02-17 | 2020-05-29 | 佛山市锐诚云智能照明科技有限公司 | Automatic epidemic prevention and disinfection method and system for elevator car, storage medium and terminal equipment |
CN114789949A (en) * | 2022-04-22 | 2022-07-26 | 创视未来科技(深圳)有限公司 | Elevator control method and device |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1569595A (en) * | 2004-04-21 | 2005-01-26 | 深圳市旺龙智能科技有限公司 | Intelligent connection control device and method for elevator floor key set |
CN103569816A (en) * | 2012-08-03 | 2014-02-12 | 三菱电机上海机电电梯有限公司 | Safety protection method for elevator |
CN204038794U (en) * | 2014-06-04 | 2014-12-24 | 深圳市安泰讯达科技有限公司 | A kind of elevator floor control system |
CN206162705U (en) * | 2016-08-11 | 2017-05-10 | 温州市易天信息科技有限公司 | Protect linked system in policeman based on cloud platform |
CN106698118A (en) * | 2016-12-09 | 2017-05-24 | 成都焦点合安物联网有限公司 | Elevator control method and system based on face recognition |
CN107103662A (en) * | 2016-02-19 | 2017-08-29 | 胡飞虎 | Visitor's authentication method and system |
CN107176506A (en) * | 2017-04-20 | 2017-09-19 | 安徽瑞隆机电设备有限公司 | The elevator control method and system of a kind of default visit person |
CN107945315A (en) * | 2016-10-13 | 2018-04-20 | 深圳市康悦合科技开发有限公司 | Entrance guard controlling method and system |
CN108052925A (en) * | 2017-12-28 | 2018-05-18 | 江西高创保安服务技术有限公司 | A kind of cell personnel archives intelligent management |
CN108154583A (en) * | 2017-12-25 | 2018-06-12 | 温州神思电子科技有限公司 | A kind of caller management method |
CN108537304A (en) * | 2018-03-30 | 2018-09-14 | 深圳市华安高新技术有限公司 | A kind of method and system that the testimony of a witness is veritified |
US20180282114A1 (en) * | 2017-03-31 | 2018-10-04 | Otis Elevator Company | User management of door and elevator access control |
CN108639875A (en) * | 2018-07-13 | 2018-10-12 | 安徽灵图壹智能科技有限公司 | A kind of block chain Intelligent recognition elevator safeguard management method and its system |
CN108877012A (en) * | 2018-07-06 | 2018-11-23 | 江苏腾武信息技术有限公司 | Intelligent caller method and system |
-
2018
- 2018-12-11 CN CN201811509939.5A patent/CN109727349A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1569595A (en) * | 2004-04-21 | 2005-01-26 | 深圳市旺龙智能科技有限公司 | Intelligent connection control device and method for elevator floor key set |
CN103569816A (en) * | 2012-08-03 | 2014-02-12 | 三菱电机上海机电电梯有限公司 | Safety protection method for elevator |
CN204038794U (en) * | 2014-06-04 | 2014-12-24 | 深圳市安泰讯达科技有限公司 | A kind of elevator floor control system |
CN107103662A (en) * | 2016-02-19 | 2017-08-29 | 胡飞虎 | Visitor's authentication method and system |
CN206162705U (en) * | 2016-08-11 | 2017-05-10 | 温州市易天信息科技有限公司 | Protect linked system in policeman based on cloud platform |
CN107945315A (en) * | 2016-10-13 | 2018-04-20 | 深圳市康悦合科技开发有限公司 | Entrance guard controlling method and system |
CN106698118A (en) * | 2016-12-09 | 2017-05-24 | 成都焦点合安物联网有限公司 | Elevator control method and system based on face recognition |
US20180282114A1 (en) * | 2017-03-31 | 2018-10-04 | Otis Elevator Company | User management of door and elevator access control |
CN107176506A (en) * | 2017-04-20 | 2017-09-19 | 安徽瑞隆机电设备有限公司 | The elevator control method and system of a kind of default visit person |
CN108154583A (en) * | 2017-12-25 | 2018-06-12 | 温州神思电子科技有限公司 | A kind of caller management method |
CN108052925A (en) * | 2017-12-28 | 2018-05-18 | 江西高创保安服务技术有限公司 | A kind of cell personnel archives intelligent management |
CN108537304A (en) * | 2018-03-30 | 2018-09-14 | 深圳市华安高新技术有限公司 | A kind of method and system that the testimony of a witness is veritified |
CN108877012A (en) * | 2018-07-06 | 2018-11-23 | 江苏腾武信息技术有限公司 | Intelligent caller method and system |
CN108639875A (en) * | 2018-07-13 | 2018-10-12 | 安徽灵图壹智能科技有限公司 | A kind of block chain Intelligent recognition elevator safeguard management method and its system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110386516A (en) * | 2019-07-01 | 2019-10-29 | 创新奇智(重庆)科技有限公司 | A kind of inter-linked controlling method, system and the electronic equipment of gate inhibition and elevator |
CN111192394A (en) * | 2019-10-29 | 2020-05-22 | 腾讯云计算(北京)有限责任公司 | Visitor permission management method, platform, system and computer storage medium |
CN110992559A (en) * | 2019-12-06 | 2020-04-10 | 苏宁智能终端有限公司 | Intelligent elevator control method and system |
CN111186730A (en) * | 2020-01-20 | 2020-05-22 | 耀灵人工智能(浙江)有限公司 | Elevator control method and elevator control system based on human body tracking and automatic allocation |
CN111202861A (en) * | 2020-02-17 | 2020-05-29 | 佛山市锐诚云智能照明科技有限公司 | Automatic epidemic prevention and disinfection method and system for elevator car, storage medium and terminal equipment |
CN114789949A (en) * | 2022-04-22 | 2022-07-26 | 创视未来科技(深圳)有限公司 | Elevator control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109727349A (en) | Visitor sends terraced method, apparatus, computer equipment and storage medium | |
KR100597152B1 (en) | User authentication method and user authentication device | |
EP2240912B1 (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
CN106803295A (en) | Gate inhibition's authentication control method and system based on Quick Response Code | |
CN109626148A (en) | Send terraced method, apparatus, computer equipment and storage medium | |
CN109118616A (en) | access control method and access control device | |
US20110185402A1 (en) | Access control system | |
CN108806041A (en) | Building access control method, Cloud Server and computer readable storage medium | |
US11496471B2 (en) | Mobile enrollment using a known biometric | |
CN104169933A (en) | Method, apparatus, and computer-readable recording medium for authenticating a user | |
CN109472269A (en) | Characteristics of image configuration and method of calibration, device, computer equipment and medium | |
JP2011164675A (en) | Visitor access control system | |
CN108900536B (en) | Authentication method, authentication device, computer equipment and storage medium | |
CN108773743A (en) | Authorization method, device, equipment and the storage medium of building hoist | |
CN112991599A (en) | Passage control method of multifunctional access control machine | |
CN108241999A (en) | A kind of generation method of invoice information, apparatus and system | |
CN109635021A (en) | A kind of data information input method, device and equipment based on human testing | |
JP2021135975A (en) | Composite system, biometric authentication system, method for controlling composite system, and program | |
KR20180125729A (en) | Vehicle access control system and method through code display | |
CN115758398A (en) | Access control data processing method and device, access control system and storage medium | |
CN111540083A (en) | Unlocking method and system based on Bluetooth connection, computer equipment and storage medium | |
JP2003067744A (en) | Device and method for authenticating individual person | |
CN111047750A (en) | Method, device and system for controlling offline access control device | |
JP2024019251A (en) | Information processing system, method, device, and program | |
CN109960920A (en) | Information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190507 |
|
RJ01 | Rejection of invention patent application after publication |