CN109727349A - Visitor sends terraced method, apparatus, computer equipment and storage medium - Google Patents

Visitor sends terraced method, apparatus, computer equipment and storage medium Download PDF

Info

Publication number
CN109727349A
CN109727349A CN201811509939.5A CN201811509939A CN109727349A CN 109727349 A CN109727349 A CN 109727349A CN 201811509939 A CN201811509939 A CN 201811509939A CN 109727349 A CN109727349 A CN 109727349A
Authority
CN
China
Prior art keywords
visitor
information
card
destination
elevator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811509939.5A
Other languages
Chinese (zh)
Inventor
陈虹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongzheng Information Technology Co Ltd
Original Assignee
Shenzhen Zhongzheng Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongzheng Information Technology Co Ltd filed Critical Shenzhen Zhongzheng Information Technology Co Ltd
Priority to CN201811509939.5A priority Critical patent/CN109727349A/en
Publication of CN109727349A publication Critical patent/CN109727349A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

This application involves a kind of visitors to send terraced method, apparatus, computer equipment and storage medium.The described method includes: obtaining visitor information;The visitor information is verified;When the authentication succeeds, there is the destination of access entitlements for visitor information configuration;To elevator send reach the destination send ladder instruct.The identity that can be registered, distinguish and be verified visitor using this method saves time and human resources etc., and improves the safety of guest access mansion.

Description

Visitor sends terraced method, apparatus, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of visitor send terraced method, apparatus, computer equipment and Storage medium.
Background technique
Before visitor enters a mansion, need to show the identity card of oneself on foreground.The body of foreground personnel registration visitor Part card information and phone number, and visitor is given to provide visitor's voucher.Visitor brushes after visitor's voucher enters building on gate inhibition and reaches Lift port clicks button upward or downward, into elevator after select reach floor and by lower button.
However the terraced method of use of current visitor, there is a problem of that safety is not high.
Summary of the invention
Based on this, it is necessary to which, for the technical problem not high there are safety with terraced method of visitor, providing one kind can It distinguishes visitor's identity and the visitor for improving the safety of guest access mansion sends terraced method, apparatus, computer equipment and storage Medium.
A kind of terraced method of visitor group, this method comprises: obtaining visitor information;The visitor information is verified;Work as verifying When success, there is the destination of access entitlements for visitor information configuration;The group's ladder for reaching the destination is sent to elevator Instruction.
The visitor sends terraced method in one of the embodiments, further include: sends unlock instruction to access control equipment.
Visitor information includes visitor's ID card information and interviewee in one of the embodiments,;To the visitor information It is verified, comprising: obtain interviewee;One-way video call is initiated to the interviewee;The interviewee is obtained according to this One-way video call, to the verification result of visitor's ID card information in the visitor information;When the verification result be by when, should Visitor information is proved to be successful.
The visitor information is verified in one of the embodiments, further includes: obtain visitor's body in visitor information Part card information, verifies the authenticity of visitor's ID card information;When visitor's ID card information is real information, by visitor's body Part card information is compared with the ID card information in blacklist;When visitor's ID card information is not present in the blacklist, determine The visitor information is proved to be successful.
The visitor information is verified in one of the embodiments, further includes: obtain the face information and visit of visitor The face information in visitor's ID card information in objective information;In vivo detection is carried out to the face information of the visitor;When the living body When detection passes through, the face information of the visitor is compared with the face information in visitor's identity card;As the people of the visitor When face information in face information and visitor's identity card matches, determine that the visitor information is proved to be successful.
In one of the embodiments, when the authentication succeeds, there is the target of access entitlements for visitor information configuration After floor, further includes: with this there is the destination of access entitlements to generate two dimensional code according to the visitor information;The two dimensional code is used In instruction access control equipment according to the validity for examining the two dimensional code using time or access times in the two dimensional code;When the two dimension Within effective time or when access times are less than threshold value, determine that the two dimensional code is effective two dimensional code using the time in code, and Indicate that the access control equipment unlocks.
In one of the embodiments, to elevator send reach the destination send ladder instruct, comprising: by identical mesh The corresponding visitor information of mark floor is distributed to same portion's elevator, is sent to same portion's elevator and is reached the identical destination Group's ladder instruction.
A kind of visitor sends ladder device, which is characterized in that the device includes: acquisition module, for obtaining visitor information;Verifying Module, for being verified to the visitor information;Configuration module, for when the authentication succeeds, having for visitor information configuration The destination of access entitlements;Sending module, for elevator send reach the destination send ladder instruct.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of acquisition visitor information when executing the computer program;The visitor information is verified;When verifying at When function, there is the destination of access entitlements for visitor information configuration;It is sent to elevator and reaches the destination and send the ladder to refer to It enables.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Acquisition visitor information is performed the steps of when row;The visitor information is verified;It when the authentication succeeds, is the visitor information Configure the destination with access entitlements;To elevator send reach the destination send ladder instruct.
Above-mentioned visitor sends terraced method, apparatus, computer equipment and storage medium, by obtaining visitor information, and to visitor Information is verified, and the identity of visitor can be registered, distinguishes and verify, and saves time and human resources etc.;Configuration has power The destination of limit, and to elevator send reach the destination send ladder instruct, can will verify visitor information and group ladder Step integration, and visitor is directly sent with charge free to the destination with access entitlements, save user time and simplified ladder Operation, while other floors without access entitlements of guest access are prevented, improve the safety of guest access mansion.
Detailed description of the invention
Fig. 1 is the applied environment figure that visitor sends terraced method in one embodiment;
Fig. 2 is the flow diagram that visitor sends terraced method in one embodiment;
Fig. 3 is the flow diagram that visitor information is verified in one embodiment;
Fig. 4 is the flow diagram that visitor information is verified in another embodiment;
Fig. 5 is the flow diagram that visitor information is verified in another embodiment;
Fig. 6 is the structural block diagram that visitor sends ladder device in one embodiment;
Fig. 7 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
The visitor provided in the embodiment of the present application sends terraced method, can be applied in application environment as shown in Figure 1.Its In, terminal 102 is communicated by network with elevator 104.Wherein, terminal 102 can be, but not limited to be various guest machines, individual Computer, laptop, smart phone, tablet computer and portable wearable device.
In one embodiment, as shown in Fig. 2, providing a kind of terraced method of visitor group, it is applied in Fig. 1 in this way It is illustrated for terminal, comprising the following steps:
Step 202, visitor information is obtained.
Wherein, visitor information includes visitor's ID card information, visitor's face information, visitor's finger print information, visitor's palmmprint letter Breath, visitor visiting at least one of purpose and interviewee.
Specifically, terminal obtains the information of visitor's input, for example, visitor come to visit purpose and interviewee or terminal it is direct The information of acquisition, such as visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palm print information.
In the present embodiment, terminal can obtain visitor information by guided bone interactive interface.Such as the interface of terminal passes through The mode of guide gradually prompts and guides visitor to input relevant information or acquire the information of visitor.
In one embodiment, server can obtain visitor information from terminal.
Step 204, which is verified.
Specifically, terminal verifies the information of information or acquisition that user inputs.Such as terminal is visiting to visitor In purpose, interviewee, visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palm print information at least It is a kind of to be verified, and obtain verification result.
In one embodiment, the visitor information that server can obtain the terminal is verified.
In the present embodiment, which can also be sent to interviewee by terminal, and interviewee is to the visitor information It is verified, the progress of verification process can be with Lag synchronization, can also be with real-time synchronization.
Step 206, when the authentication succeeds, there is the destination of access entitlements for visitor information configuration.
Specifically, when the visitor information is proved to be successful, terminal is the target that visitor information configuration has access entitlements Floor.
In the present embodiment, when the visitor information is proved to be successful, server can have for visitor information configuration to be entered The destination of permission.
In one embodiment, which includes visitor's ID card information and interviewee.Terminal or server obtain Interviewee is taken, the floor where interviewee is obtained, the permission of floor, makes where configuring the interviewee for the visitor information Visitor information carries the destination with access entitlements.
In the present embodiment, which can also include destination.After the visitor information is proved to be successful, terminal By the authority configuration of the destination into the visitor information.
Step 208, to elevator send reach the destination send ladder instruct.
Specifically, terminal to elevator send reach the destination send ladder instruct.Ladder is sent to instruct when elevator receives this Later, visitor is sent to destination.
In one embodiment, server to elevator send reach the destination send ladder instruct.When elevator receives After this sends ladder to instruct, visitor is sent to destination.
In the present embodiment, when the destination with access entitlements is multiple destinations, terminal or server can be from The destination of user's selection is obtained in the control panel of elevator, and the destination for reaching that the user selects is sent to elevator Group's ladder instruction.
In one embodiment, when the visitor information that terminal or server obtain is that visitor's finger print information or visitor's palmmprint are believed Breath and visitor's ID card information and when interviewee, by the visitor's finger print information or visitor's palm print information in visitor information, with Visitor's finger print information or the matching of visitor's palm print information in visitor's ID card information.When successful match, visitor information verifying Pass through, then terminal or server are that the visitor information configures the floor where the interviewee, i.e., with the target of access entitlements Floor, and send ladder to instruct to floor where the elevator transmission arrival interviewee.
Above-mentioned visitor sends in terraced method, by obtaining visitor information, and verifies to visitor information, can register, distinguish Not with the identity of verifying visitor, time and human resources etc. are saved;The destination with permission is configured, and is sent to elevator Reach the destination sends ladder to instruct, the terminal that can link and elevator, will verify the step integration of visitor information and group's ladder, And visitor is directly sent with charge free to the destination with access entitlements, the operation of user time and simplified ladder is saved, is prevented simultaneously Only other floors without access entitlements of guest access, improve the safety of mansion.
In one embodiment, which sends terraced method further include: sends unlock instruction to access control equipment.
Wherein, access control equipment is the equipment for guard prevention on the door, such as gate, the gate inhibition that swipes the card, two dimensional code gate inhibition With password access etc..
Specifically, when there are access control equipment, terminal can link with access control equipment and elevator simultaneously, send to access control equipment Unlock instruction.The step of terminal sends unlock instruction to access control equipment can send the group of the arrival destination in terminal to elevator Ladder instruction before, can also terminal to elevator send reach the destination send ladder instruct after.
In one embodiment, when there are access control equipment, server can link with access control equipment and elevator simultaneously, Xiang Men Prohibit equipment and sends unlock instruction.
Above-mentioned visitor sends in terraced method, and terminal, access control equipment and elevator three link, can make to verify visitor information, Unlock access control equipment and group ladder step integration, so that visitor is voluntarily entered and left mansion, be not necessarily to manual verification, save access time with And it saves labour turnover.
In one embodiment, which includes visitor's ID card information and interviewee;Visitor information is carried out Verifying, comprising:
Step 302, interviewee is obtained.
Wherein, interviewee can be enterprise, family and individual etc. but not limited to this.
Specifically, terminal obtains interviewee, such as some family name of certain company name, certain name or certain floor.
In one embodiment, the available interviewee of server, such as certain company name, certain name or certain floor Some family name.
Step 304, one-way video call is initiated to the interviewee.
Wherein, one-way video, which refers to, wherein a side can only see another party when video, that is, be only able to display visitor or The video of interviewee.
Specifically, terminal initiates one-way video call to the interviewee, such as initiates one-way video call to certain company, The case where terminal of the said firm can show the video of visitor, but the terminal of visitor can not see the said firm.
In one embodiment, server can initiate one-way video call to the interviewee, and by the one-way video The interface display of call is at the terminal.
In the present embodiment, terminal or server can also initiate to converse using common video mode to the interviewee, I.e. visitor can see interviewee, and interviewee is it can be seen that visitor.
Step 306, it obtains interviewee to be conversed according to one-way video, to visitor's ID card information in the visitor information Verification result.
Specifically, interviewee can obtain visitor's ID card information, in the voice that interviewee converses according to one-way video Hold and whether picture material, the visitor's ID card information verified in the visitor information meet with visitor.Terminal, which obtains, visits The person of asking converses according to one-way video, to the verification result of visitor's identity card in the visitor information.
In the present embodiment, interviewee can also obtain the other information of the visitor of terminal acquisition, such as visitor's is visiting Purpose and phone number etc..The other content that interviewee converses according to the information combination one-way video verifies visitor information.
In one embodiment, the available interviewee of server is according to the one-way video call in terminal, to the visit The result that visitor's ID card information in objective information is verified.
Step 308, when the verification result be by when, which is proved to be successful.
Specifically, when the verification result to visitor's ID card information in the visitor information be by when, terminal check should Visitor information is proved to be successful.
In one embodiment, when the verification result to visitor's ID card information in the visitor information be by when, clothes Business device can be confirmed that the visitor information is proved to be successful, and the related printed words such as " being proved to be successful " displayed on the terminals.
In the present embodiment, terminal or server can store the visitor information.When visitor accesses again, terminal passes through Visitor's ID card information inquires the access record of visitor's ID card information.When there are the access of visitor's ID card information records When, terminal without obtaining visitor information again.
Above-mentioned visitor sends in terraced method, by the communication between visitor and interviewee, can obtain interviewee to visitor The verification result of ID card information determines to the verification result of visitor information according to verification result, can verify visit from many aspects Objective information improves the safety of building management.
In one embodiment, which is verified, further includes:
Step 402, visitor's ID card information in the visitor information is obtained, the true of visitor's ID card information is verified Property.
Wherein, visitor's ID card information refers to the information carried in visitor's identity card.
Specifically, terminal obtains visitor's ID card information in the visitor information, and verifies visitor's ID card information Authenticity.Such as terminal is equipped with card reader of ID card, the card reader of ID card is in wireless transmission method and visitor's identity card Special chip carry out data exchange, visitor's ID card information can be read, then by terminal communications interface, will be in this information Terminal is reached, and verifies the authenticity of visitor's ID card information.
In one embodiment, server can obtain visitor's ID card information in the visitor information from terminal, and test Demonstrate,prove the authenticity of visitor's ID card information.
It step 404, will be in visitor's ID card information and blacklist when visitor's ID card information is real information ID card information compares.
Wherein, the ID card information in blacklist can be the preset ID card information of interviewee, or safety The preset ID card information of administrative center.
Specifically, when visitor's ID card information is the ID card information of necessary being, terminal is by visitor's identity card Information is made comparisons with the ID card information in blacklist.
In one embodiment, when visitor's ID card information is the ID card information of necessary being, server can be with Visitor's ID card information is made comparisons with the ID card information in blacklist.
Step 406, when visitor's ID card information is not present in the blacklist, determine that the visitor information is proved to be successful.
Specifically, when visitor's ID card information can not be matched in blacklist, i.e., the visit is not present in the blacklist When objective ID card information, terminal determines that the visitor information is proved to be successful.
In the present embodiment, when, there are when visitor's ID card information, which can not in the blacklist It accesses.For example, then the visitor can not access when visitor's ID card information occurs in the preset blacklist of interviewee Interviewee, but still accessible other regions in addition to the interviewee region.When visitor's ID card information is being pacified Occur in the preset blacklist of full administrative center, then the visitor can not access any region of the mansion Zheng Dong.When this be present in it is black When visitor in list repeatedly requires access, terminal can issue warning information to security management center.
In the present embodiment, there is also white lists in terminal.Terminal obtains visitor's ID card information in visitor information, verifying Visitor's ID card information, and make comparisons with the ID card information in white list.When there are visitor's identity card letters in white list When breath, visitor information is proved to be successful, without doing other verifyings.Terminal sends ladder to instruct to elevator transmission arrival destination.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think It returns in elevator, then testing for ID card information can be carried out by terminal, the control panel of elevator or access control equipment etc. again Card.After being proved to be successful again, terminal, the control panel of elevator or access control equipment, which send to reach to elevator, has access entitlements Destination sends ladder to instruct.
Above-mentioned visitor sends in terraced method, passes through terminal or the authenticity of server authentication visitor's ID card information and the visitor ID card information whether there is in blacklist, be not necessarily to manual intervention, while can prevent visitor's false registration, and save visitor Enrollment time.
In one embodiment, visitor information is verified, further includes:
Step 502, the face information in visitor's ID card information in the face information and visitor information of visitor is obtained.
Specifically, there is camera in terminal, camera acquires the face information of visitor, and terminal obtains visitor by camera Face information, and obtain the ID card information in visitor information and the face information in visitor's ID card information.
In one embodiment, server can be from visitor's identity in the face information and visitor information that terminal obtains visitor Demonstrate,prove the face information in information.
Step 504, In vivo detection is carried out to the face information of visitor.
Wherein, In vivo detection refers to a kind of method of determining object real physiological feature, in face recognition application, living body Detection, using technologies such as facial modeling and face trackings, can be tested by blinking, opening one's mouth, shaking the head, putting first-class combinative movement Whether card user is true living body and I operates.In the present embodiment by taking binocular In vivo detection as an example.
Specifically, terminal carries out In vivo detection to the face information of the visitor of acquisition.
In one embodiment, server can carry out In vivo detection to the face information for the visitor that terminal obtains.
Step 506, when In vivo detection passes through, the face information in the face information of visitor and visitor's identity card is carried out It compares.
Specifically, when In vivo detection passes through, terminal is described according to the gamma characteristic perspective view and feature of facial image The method to match determines the position of face each section, then positions pupil position using sciagraphy and template matching method, and Calculate the geometrical relationship between the facial characteristics such as eyes, nose and mouth, such as distance, area and angle.Terminal obtains visitor's The characteristic point of face information, and be compared with the characteristic point of the face information in visitor's identity card.
In one embodiment, when In vivo detection passes through, server can will visitor face information and visitor's identity card in Face information be compared.
Step 508, when the face information in the face information of visitor and visitor's identity card matches, determine that the visitor believes Breath is proved to be successful.
Specifically, when the face information in the face information of visitor and visitor's identity card matches, terminal determines the visit Objective Information Authentication success.
In one embodiment, when the face information in the face information of visitor and visitor's identity card matches, service Device can determine that the visitor information is proved to be successful.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think It returns in elevator, then can carry out the verifying of face again by terminal, the control panel of elevator or access control equipment etc..Again After being proved to be successful, terminal, the control panel of elevator or access control equipment send the target building for reaching and having access entitlements to elevator Layer sends ladder to instruct.
Above-mentioned visitor sends in terraced method, by visitor's face information carry out In vivo detection and with visitor's ID card information In face information matched, when being not necessarily to manual intervention, while visitor's false registration can be prevented, and saving visitor's registration Between.
In one embodiment, when the authentication succeeds, for visitor information configuration have access entitlements destination it Afterwards, further includes: according to visitor information and the destination with access entitlements generates two dimensional code;The two dimensional code is used to indicate gate inhibition Equipment is according to the validity for examining the two dimensional code using time or access times in two dimensional code;When the use in the two dimensional code Between within effective time or when access times are less than threshold value, determine that the two dimensional code is effective two dimensional code, and indicate access control equipment Unlock.
Wherein, two dimensional code can be the access time in visitor information using the time, or server be this two Tie up the preset effective storage life of code.The access times of two dimensional code can be the access times in visitor information, or clothes Business device is the preset access times of the two dimensional code.
Specifically, terminal is according to visitor information and the destination with access entitlements generates two dimensional code.Each visitor into Row registration, can all obtain a two dimensional code, which is visitor's voucher, can be papery, or be shown in terminal Two dimensional code.When the two dimensional code is papery two dimensional code, terminal can print ID card information, the face of the visitor on paper simultaneously At least one of information, destination and visit purpose information.When any region in the mansion has access control equipment, gate inhibition Equipment can be according to the validity for examining two dimensional code using time or access times in two dimensional code.Use in the two dimensional code Time, access control equipment determined that the two dimensional code is effective two dimensional code, and solves within effective time or when access times are less than threshold value Lock.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think It returns in elevator, then can carry out the verifying of two dimensional code again by terminal, the control panel of elevator or access control equipment etc..Again It is secondary be proved to be successful after, terminal, the control panel of elevator or access control equipment to elevator send reach have access entitlements target Floor sends ladder to instruct.
Above-mentioned visitor sends in terraced method, by generating two dimensional code, can assign one visitor's voucher of visitor, confirm visitor's body Part, prevent visitor's forged identity.
In one embodiment, ladder is sent to instruct to the elevator transmission arrival destination, comprising: by identical target The corresponding visitor information of floor is distributed to same portion's elevator, and the group for reaching the identical destination is sent to same portion's elevator Ladder instruction.
Specifically, when terminal whithin a period of time obtains the visitor information of multiple visitors, terminal is by identical target building The corresponding visitor information of layer is distributed to same portion's elevator, and the group's ladder for reaching the identical destination is sent to same portion's elevator Instruction.Terminal can also distribute remaining corresponding visitor information of different destinations to other elevators.
In one embodiment, the visitor information of multiple visitors, clothes are obtained from terminal when server whithin a period of time Business device distributes the corresponding visitor information of identical destination to same portion's elevator, sends to same portion's elevator and reaches the phase Same destination sends ladder to instruct.Server remaining corresponding visitor information of different destinations can also be distributed to Other elevators.
Above-mentioned visitor sends in terraced method, and the corresponding visitor information of identical destination is distributed to same portion's elevator, and It sends ladder to instruct to same portion's elevator arrival same target floor, the access time of visitor can be saved, also save elevator group Pass through resource used in journey.
In one embodiment, visitor sends terraced method, comprising the following steps:
Step (a1) obtains visitor information, which includes visitor's ID card information and interviewee.
Step (a2) obtains interviewee.
Step (a3) initiates one-way video call to the interviewee.
Step (a4) obtains interviewee and is conversed according to one-way video, to visitor's ID card information in the visitor information Verification result.
Step (a5) obtains visitor's ID card information in visitor information, verifies the authenticity of visitor's ID card information.
Step (a6) will be in visitor's ID card information and blacklist when visitor's ID card information is real information ID card information compare.
Step (a7) determines that the visitor information is proved to be successful when visitor's ID card information is not present in blacklist.
Step (a8) has the destination of access entitlements for visitor information configuration when the authentication succeeds.
Step (a9), to elevator send reach the destination send ladder instruct.
Step (a10) sends unlock instruction to access control equipment.
In one embodiment, visitor sends terraced method, comprising the following steps:
Step (b1) obtains visitor information.
Step (b2) obtains interviewee.
Step (b3) initiates one-way video call to the interviewee.
Step (b4) obtains interviewee and is conversed according to one-way video, to visitor's ID card information in the visitor information Verification result.
Step (b5) obtains the face information in visitor's ID card information in the face information and visitor information of visitor
Step (b6) carries out In vivo detection to the face information of visitor.
Step (b7), when In vivo detection passes through, by the face information in the face information of visitor and visitor's identity card into Row compares.
Step (b8) determines the visitor when the face information in the face information of visitor and visitor's identity card matches Information Authentication success.
Step (b9) has the destination of access entitlements for visitor information configuration when the authentication succeeds.
Step (b10), to elevator send reach the destination send ladder instruct.
Step (b11) sends unlock instruction to access control equipment.
Above-mentioned steps (a1)-(a10) and step (b1)-(b11) is not successively to execute according to the sequence of label, unless originally It is expressly stated otherwise in text, there is no stringent sequences to limit for the execution of these steps, these steps can be in other order It executes, and step (a10) and step (b11) are not necessary step.
It should be understood that although each step in Fig. 2-5 flow chart is successively shown according to the instruction of arrow, this A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least one in Fig. 2-5 It step by step may include that perhaps these sub-steps of multiple stages or stage are held in synchronization to multiple sub-steps Row is completed, but can be executed at different times, the execution sequence in these sub-steps or stage be also not necessarily successively into Row, but can be held in turn or alternately at least part of the sub-step or stage of other steps or other steps Row.
In one embodiment, as shown in fig. 6, providing a kind of visitor sends ladder device, comprising: obtain module 602, verifying Module 604, configuration module 606 and equipment linkage module 608, in which:
Module 602 is obtained, for obtaining visitor information.
Specifically, the information that module 602 is used to obtain visitor's input, such as the visiting purpose of visitor and interviewee are obtained, Or the information that terminal directly acquires, such as visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palmmprint Information.
In the present embodiment, obtains module 602 and be used to obtain visitor information by guided bone interactive interface.Such as the boundary of terminal Face is gradually prompted by way of guide and guides visitor to input relevant information or acquire the information of visitor.
Authentication module 604, for being verified to visitor information.
Specifically, the information of authentication module 604 is used to input user information or acquisition is verified.Such as terminal To visitor come to visit purpose, interviewee, visitor's ID card information, visitor's face information, visitor's finger print information and visitor's palmmprint letter At least one of breath is verified, and obtains verification result.
In the present embodiment, authentication module 604 is used to the visitor information being sent to interviewee, and interviewee is to the visitor Information is verified, and the progress of verification process can be with Lag synchronization, can also be with real-time synchronization.
Configuration module 606, for when the authentication succeeds, there is the destination of access entitlements for visitor information configuration.
Specifically, when the visitor information is proved to be successful, configuration module 606, which is used to have for visitor information configuration, to be entered The destination of permission.
In the present embodiment, which includes visitor's ID card information and interviewee.Configuration module 606 is for obtaining Interviewee obtains the floor where interviewee, and the permission of floor, makes to visit where configuring the interviewee for the visitor information Objective information carries the destination with access entitlements.
In the present embodiment, which can also include destination.After the visitor information is proved to be successful, configuration Module 606 is used for the authority configuration of the destination into the visitor information.
Equipment linkage module 608, for elevator send reach the destination send ladder instruct.
Specifically, equipment linkage module 608 be used for elevator send reach the destination send ladder instruct.When elevator connects Receive this send ladder instruct after, visitor is sent to destination.
In the present embodiment, when the destination with access entitlements is multiple destinations, equipment linkage module 608 is used The destination of user's selection is obtained in the control panel from elevator, and the target building for reaching the user and selecting is sent to elevator Layer sends ladder to instruct.
In the present embodiment, equipment linkage module 608 is visitor's finger print information or visitor's palmmprint for the visitor information of acquisition Information and visitor's ID card information and when interviewee, by the visitor's finger print information or visitor's palm print information in visitor information, With in visitor's ID card information visitor's finger print information or visitor's palm print information match.When successful match, which is tested Card passes through.Then equipment linkage module 608 is used to configure the floor where the interviewee for the visitor information, that is, has right of access The destination of limit, and send ladder to instruct to floor where the elevator transmission arrival interviewee.
Above-mentioned visitor sends in ladder device, by obtaining visitor information, and verifies to visitor information, can register, distinguish Not with the identity of verifying visitor, time and human resources etc. are saved;The destination with permission is configured, and is sent to elevator Reach the destination sends ladder to instruct, the terminal that can link and elevator, will verify the step integration of visitor information and group's ladder, And visitor is directly sent with charge free to the destination with access entitlements, other floors without access entitlements of guest access are prevented, are mentioned The high safety of mansion.
In one embodiment, equipment linkage module 608 is also used to send unlock instruction to access control equipment.
Specifically, when there are access control equipment, equipment linkage module 608 is also used to link with access control equipment and elevator, to Access control equipment sends unlock instruction.Equipment linkage module 608 is also used to the step of sending unlock instruction to access control equipment can be at end Hold to elevator send reach the destination send ladder instruct before, can also terminal to elevator send reach the destination Send ladder instruct after.
Above-mentioned visitor sends in ladder device, and terminal, access control equipment and elevator three link, can make verify visitor information, Unlock access control equipment and group ladder step integration, so that visitor is voluntarily entered and left mansion, be not necessarily to manual verification, save access time with And it saves labour turnover.
In one embodiment, which includes visitor's ID card information and interviewee;Authentication module 604 is also used In acquisition interviewee;One-way video call is initiated to the interviewee;It obtains interviewee to be conversed according to one-way video, to this The verification result of visitor's ID card information in visitor information;When the verification result be by when, which is proved to be successful.
Specifically, authentication module 604 is also used to initiate one-way video call to the interviewee, such as initiates to certain company The case where one-way video call, the terminal of the said firm can show the video of visitor, but the terminal of visitor can not see the said firm. Interviewee can obtain visitor's ID card information, the voice content and picture material that interviewee converses according to one-way video, Whether the visitor's ID card information verified in the visitor information meets with visitor.Authentication module 604 is also used to obtain access Person converses according to one-way video, to the verification result of visitor's identity card in the visitor information.When to the visit in the visitor information The verification result of objective ID card information be by when, authentication module 604 is also used to confirm that the visitor information is proved to be successful.
In the present embodiment, authentication module 604 can also be used to initiate to converse to the interviewee using common video mode, I.e. visitor can see interviewee, and interviewee is it can be seen that visitor.
In the present embodiment, authentication module 604 can also be used to store the visitor information.When visitor accesses again, test Card module 604 is also used to inquire the access record of visitor's ID card information by visitor's ID card information.When there are the visitors When the access record of ID card information, authentication module 604 without obtaining visitor information again.
Above-mentioned visitor sends in ladder device, by the communication between visitor and interviewee, can obtain interviewee to visitor The verification result of ID card information determines to the verification result of visitor information according to verification result, can verify visit from many aspects Objective information improves the safety of building management.
In one embodiment, authentication module 604 is also used to obtain visitor's ID card information in the visitor information, verifying The authenticity of visitor's ID card information;When visitor's ID card information be real information when, by visitor's ID card information with ID card information in blacklist compares;When visitor's ID card information is not present in the blacklist, the visitor information is determined It is proved to be successful.
Specifically, authentication module 604 is also used to obtain visitor's ID card information in the visitor information, and verifies the visitor The authenticity of ID card information.Such as authentication module 604 is also used to from card reader of ID card read visitor's ID card information, And verify the authenticity of visitor's ID card information.When visitor's ID card information is the ID card information of necessary being, test Card module 604 is also used to make comparisons visitor's ID card information with the ID card information in blacklist.When can not in blacklist When visitor's ID card information being not present when being matched to visitor's ID card information, i.e., in the blacklist, authentication module 604 is also used In determining that the visitor information is proved to be successful.
In the present embodiment, authentication module 604 is also used to verify white list visitor.Authentication module 604 is also used to obtain visitor Visitor's ID card information in information verifies visitor's ID card information, and makes comparisons with the ID card information in white list.When There are when visitor's ID card information in white list, visitor information is proved to be successful, without doing other verifyings.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think It returns in elevator, then testing for ID card information can be carried out by terminal, the control panel of elevator or access control equipment etc. again Card.After being proved to be successful again, authentication module 604 is also used to send the group's ladder for reaching the destination with access entitlements to elevator Instruction.
Above-mentioned visitor sends in ladder device, passes through terminal or the authenticity of server authentication visitor's ID card information and the visitor ID card information whether there is in blacklist, be not necessarily to manual intervention, while can prevent visitor's false registration, and save visitor Enrollment time.
In one embodiment, authentication module 604 is also used to obtain the visitor in the face information and visitor information of visitor Face information in ID card information;In vivo detection is carried out to the face information of visitor;When In vivo detection passes through, by visitor's Face information is compared with the face information in visitor's identity card;Face in the face information of visitor and visitor's identity card When information matches, determine that the visitor information is proved to be successful.
Specifically, authentication module 604 is also used to obtain the face information of visitor by camera, and obtains visitor information In ID card information and visitor's ID card information in face information.Authentication module 604 is also used to the visitor's of acquisition Face information carries out In vivo detection.When In vivo detection passes through, authentication module 604 is also used to first special according to the gray scale of facial image Property the position of face each section is determined with perspective view and the method that matches of feature description, then utilize sciagraphy and template matching Method positions pupil position, and calculates the geometrical relationship between the facial characteristics such as eyes, nose and mouth, such as distance, area and angle Degree etc..Authentication module 604 is also used to obtain the characteristic point of the face information of visitor, and with the face information in visitor's identity card Characteristic point is compared.When the face information in the face information and identity card of visitor matches, authentication module 604 is also used to Determine that the visitor information is proved to be successful.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think It returns in elevator, then can carry out the verifying of face again by terminal, the control panel of elevator or access control equipment etc..Again After being proved to be successful, authentication module 604 is also used to send ladder to instruct to destination of the elevator transmission arrival with access entitlements.
Above-mentioned visitor sends in ladder device, by visitor's face information carry out In vivo detection and with visitor's ID card information In face information matched, when being not necessarily to manual intervention, while visitor's false registration can be prevented, and saving visitor's registration Between.
In one embodiment, configuration module 606 is also used to according to visitor information and with the destination of access entitlements Generate two dimensional code;The two dimensional code is used to indicate access control equipment and examines the two dimension using time or access times according in two dimensional code The validity of code;When using the time within effective time or when access times are less than threshold value, determine in the two dimensional code this two Dimension code is effective two dimensional code, and indicates that access control equipment unlocks.
Specifically, configuration module 606 is also used to according to visitor information and the destination with access entitlements generates two dimension Code.Each visitor registers, and can all obtain a two dimensional code, which is visitor's voucher, can be papery, can also be with For the two dimensional code for being shown in terminal.When the two dimensional code is papery two dimensional code, terminal can print the body of the visitor on paper simultaneously At least one of part card information, face information, destination and visit purpose information.When any region in the mansion has door When prohibiting equipment, access control equipment can be according to the validity for examining two dimensional code using time or access times in two dimensional code.When this Use the time within effective time or when access times are less than threshold value in two dimensional code, access control equipment determines that the two dimensional code is to have Two dimensional code is imitated, and is unlocked.
In the present embodiment, in the case where visitor information is proved to be successful, when visitor walks out elevator whithin a period of time, and think It returns in elevator, then can carry out the verifying of two dimensional code again by terminal, the control panel of elevator or access control equipment etc..Again It is secondary be proved to be successful after, configuration module 606 be also used to elevator send reach have access entitlements destination send ladder instruct.
Above-mentioned visitor sends in ladder device, by generating two dimensional code, can assign one visitor's voucher of visitor, confirm visitor's body Part, prevent visitor's forged identity.
In one embodiment, equipment linkage module 608 is also used to the corresponding visitor information point of identical destination It is assigned to same portion's elevator, sends ladder to instruct to same portion's elevator transmission arrival identical destination.
Specifically, when the visitor information for obtaining multiple visitors whithin a period of time, equipment linkage module 608 be also used to by The corresponding visitor information of identical destination is distributed to same portion's elevator, is sent to same portion's elevator and is reached the identical mesh Mark floor sends ladder to instruct.Equipment linkage module 608 is also used to the corresponding visitor information point of remaining different destination It is assigned to other elevators.
Above-mentioned visitor sends in ladder device, and the corresponding visitor information of identical destination is distributed to same portion's elevator, and It sends ladder to instruct to same portion's elevator arrival same target floor, the access time of visitor can be saved, also save elevator group Pass through resource used in journey.
The specific of ladder device is sent to limit the restriction that may refer to send terraced method above for visitor about visitor, herein not It repeats again.Above-mentioned visitor sends the modules in ladder device that can realize fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be terminal, internal structure Figure can be as shown in Figure 7.The computer equipment includes processor, the memory, network interface, display connected by system bus Screen and input unit.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment is deposited Reservoir includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer journey Sequence.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The network interface of machine equipment is used to communicate with external terminal by network connection.When the computer program is executed by processor with Realize that a kind of visitor sends terraced method.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, The input unit of the computer equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell Key, trace ball or Trackpad, can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 7, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is stored in memory Computer program, the processor perform the steps of acquisition visitor information when executing computer program;The visitor information is carried out Verifying;When the authentication succeeds, there is the destination of access entitlements for visitor information configuration;It is sent to elevator and reaches the target Floor sends ladder to instruct.
In one embodiment, it also performs the steps of to send to access control equipment when processor executes computer program and solve Lock instruction.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains interviewee;To this Interviewee initiates one-way video call;It obtains the interviewee to be conversed according to the one-way video, to the visit in the visitor information The verification result of objective ID card information;When the verification result be by when, which is proved to be successful.
In one embodiment, it also performs the steps of and is obtained in visitor information when processor executes computer program Visitor's ID card information verifies the authenticity of visitor's ID card information;When visitor's ID card information is real information, by this Visitor's ID card information is compared with the ID card information in blacklist;When there is no visitor's ID card informations in the blacklist When, determine that the visitor information is proved to be successful.
In one embodiment, the face letter for obtaining visitor is also performed the steps of when processor executes computer program The face information in visitor's ID card information in breath and visitor information;In vivo detection is carried out to the face information of the visitor;When When the In vivo detection passes through, the face information of the visitor is compared with the face information in visitor's identity card;When the visit When the face information and the face information in visitor's identity card of visitor match, determine that the visitor information is proved to be successful.
In one embodiment, also perform the steps of when processor executes computer program according to the visitor information and The destination with access entitlements generates two dimensional code;The two dimensional code is used to indicate access control equipment to be made according in the two dimensional code The validity of the two dimensional code is examined with time or access times;When within effective time or being used using the time in the two dimensional code When number is less than threshold value, determine that the two dimensional code is effective two dimensional code, and indicate that the access control equipment unlocks.
In one embodiment, it also performs the steps of when processor executes computer program by identical destination Corresponding visitor information is distributed to same portion's elevator, sends ladder to refer to same portion's elevator transmission arrival identical destination It enables.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of acquisition visitor information when being executed by processor;The visitor information is verified;When being proved to be successful When, there is the destination of access entitlements for visitor information configuration;To elevator send reach the destination send ladder instruct.
In one embodiment, it also performs the steps of when computer program is executed by processor and is sent to access control equipment Unlock instruction.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains interviewee;To The interviewee initiates one-way video call;It obtains the interviewee to be conversed according to the one-way video, in the visitor information The verification result of visitor's ID card information;When the verification result be by when, which is proved to be successful.
In one embodiment, it also performs the steps of and is obtained in visitor information when computer program is executed by processor Visitor's ID card information, verify the authenticity of visitor's ID card information;It, will when visitor's ID card information is real information Visitor's ID card information is compared with the ID card information in blacklist;When there is no visitor's ID card informations in the blacklist When, determine that the visitor information is proved to be successful.
In one embodiment, the face for obtaining visitor is also performed the steps of when computer program is executed by processor The face information in visitor's ID card information in information and visitor information;In vivo detection is carried out to the face information of the visitor; When the In vivo detection passes through, the face information of the visitor is compared with the face information in visitor's identity card;When this When face information in the face information of visitor and visitor's identity card matches, determine that the visitor information is proved to be successful.
In one embodiment, it also performs the steps of when computer program is executed by processor according to the visitor information Two dimensional code is generated with the destination with access entitlements;The two dimensional code is used to indicate access control equipment according in the two dimensional code The validity of the two dimensional code is examined using time or access times;When within effective time or being made in the two dimensional code using the time When being less than threshold value with number, determine that the two dimensional code is effective two dimensional code, and indicate that the access control equipment unlocks.
In one embodiment, it is also performed the steps of when computer program is executed by processor by identical target building The corresponding visitor information of layer is distributed to same portion's elevator, and the group's ladder for reaching the identical destination is sent to same portion's elevator Instruction.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of visitor sends terraced method, which comprises
Obtain visitor information;
The visitor information is verified;
When the authentication succeeds, there is the destination of access entitlements for visitor information configuration;
Ladder is sent to instruct to the elevator transmission arrival destination.
2. the method according to claim 1, wherein the method also includes:
Unlock instruction is sent to access control equipment.
3. the method according to claim 1, wherein the visitor information includes visitor's ID card information and is interviewed The person of asking;
It is described that the visitor information is verified, comprising:
Obtain interviewee;
One-way video call is initiated to the interviewee;
It obtains the interviewee to be conversed according to the one-way video, to testing for visitor's ID card information in the visitor information Demonstrate,prove result;
When the verification result be by when, the visitor information is proved to be successful.
4. according to claim 1 to method described in 3 any one, which is characterized in that described to test the visitor information Card, further includes:
Visitor's ID card information in visitor information is obtained, the authenticity of visitor's ID card information is verified;
When visitor's ID card information is real information, the identity card in visitor's ID card information and blacklist is believed Breath compares;
When visitor's ID card information is not present in the blacklist, determine that the visitor information is proved to be successful.
5. according to claim 1 to method described in 3 any one, which is characterized in that described to test the visitor information Card, further includes:
Obtain the face information in visitor's ID card information in the face information and visitor information of visitor;
In vivo detection is carried out to the face information of the visitor;
When the In vivo detection passes through, the face information in the face information of the visitor and visitor's identity card is carried out It compares;
When the face information in the face information of the visitor and visitor's identity card matches, the visitor information is determined It is proved to be successful.
6. the method according to claim 1, wherein it is described when the authentication succeeds, match for the visitor information After setting the destination with access entitlements, further includes:
Two dimensional code is generated according to the visitor information and the destination with access entitlements;
The two dimensional code is used to indicate access control equipment and examines described two using time or access times according in the two dimensional code Tie up the validity of code;
When using the time within effective time or when access times are less than threshold value in the two dimensional code, the two dimensional code is determined For effective two dimensional code, and indicate the access control equipment unlock.
7. method according to claim 1 or 2, which is characterized in that described send to elevator reaches the destination Group's ladder instruction, comprising:
The corresponding visitor information of identical destination is distributed to same portion's elevator, is sent to same portion's elevator and reaches institute That states identical destination sends ladder to instruct.
8. a kind of visitor sends ladder device, which is characterized in that described device includes:
Module is obtained, for obtaining visitor information;
Authentication module, for being verified to the visitor information;
Configuration module, for when the authentication succeeds, there is the destination of access entitlements for visitor information configuration;
Equipment linkage module, for sending ladder to instruct to the elevator transmission arrival destination.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201811509939.5A 2018-12-11 2018-12-11 Visitor sends terraced method, apparatus, computer equipment and storage medium Pending CN109727349A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811509939.5A CN109727349A (en) 2018-12-11 2018-12-11 Visitor sends terraced method, apparatus, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811509939.5A CN109727349A (en) 2018-12-11 2018-12-11 Visitor sends terraced method, apparatus, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109727349A true CN109727349A (en) 2019-05-07

Family

ID=66295886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811509939.5A Pending CN109727349A (en) 2018-12-11 2018-12-11 Visitor sends terraced method, apparatus, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109727349A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110386516A (en) * 2019-07-01 2019-10-29 创新奇智(重庆)科技有限公司 A kind of inter-linked controlling method, system and the electronic equipment of gate inhibition and elevator
CN110992559A (en) * 2019-12-06 2020-04-10 苏宁智能终端有限公司 Intelligent elevator control method and system
CN111186730A (en) * 2020-01-20 2020-05-22 耀灵人工智能(浙江)有限公司 Elevator control method and elevator control system based on human body tracking and automatic allocation
CN111192394A (en) * 2019-10-29 2020-05-22 腾讯云计算(北京)有限责任公司 Visitor permission management method, platform, system and computer storage medium
CN111202861A (en) * 2020-02-17 2020-05-29 佛山市锐诚云智能照明科技有限公司 Automatic epidemic prevention and disinfection method and system for elevator car, storage medium and terminal equipment
CN114789949A (en) * 2022-04-22 2022-07-26 创视未来科技(深圳)有限公司 Elevator control method and device

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1569595A (en) * 2004-04-21 2005-01-26 深圳市旺龙智能科技有限公司 Intelligent connection control device and method for elevator floor key set
CN103569816A (en) * 2012-08-03 2014-02-12 三菱电机上海机电电梯有限公司 Safety protection method for elevator
CN204038794U (en) * 2014-06-04 2014-12-24 深圳市安泰讯达科技有限公司 A kind of elevator floor control system
CN206162705U (en) * 2016-08-11 2017-05-10 温州市易天信息科技有限公司 Protect linked system in policeman based on cloud platform
CN106698118A (en) * 2016-12-09 2017-05-24 成都焦点合安物联网有限公司 Elevator control method and system based on face recognition
CN107103662A (en) * 2016-02-19 2017-08-29 胡飞虎 Visitor's authentication method and system
CN107176506A (en) * 2017-04-20 2017-09-19 安徽瑞隆机电设备有限公司 The elevator control method and system of a kind of default visit person
CN107945315A (en) * 2016-10-13 2018-04-20 深圳市康悦合科技开发有限公司 Entrance guard controlling method and system
CN108052925A (en) * 2017-12-28 2018-05-18 江西高创保安服务技术有限公司 A kind of cell personnel archives intelligent management
CN108154583A (en) * 2017-12-25 2018-06-12 温州神思电子科技有限公司 A kind of caller management method
CN108537304A (en) * 2018-03-30 2018-09-14 深圳市华安高新技术有限公司 A kind of method and system that the testimony of a witness is veritified
US20180282114A1 (en) * 2017-03-31 2018-10-04 Otis Elevator Company User management of door and elevator access control
CN108639875A (en) * 2018-07-13 2018-10-12 安徽灵图壹智能科技有限公司 A kind of block chain Intelligent recognition elevator safeguard management method and its system
CN108877012A (en) * 2018-07-06 2018-11-23 江苏腾武信息技术有限公司 Intelligent caller method and system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1569595A (en) * 2004-04-21 2005-01-26 深圳市旺龙智能科技有限公司 Intelligent connection control device and method for elevator floor key set
CN103569816A (en) * 2012-08-03 2014-02-12 三菱电机上海机电电梯有限公司 Safety protection method for elevator
CN204038794U (en) * 2014-06-04 2014-12-24 深圳市安泰讯达科技有限公司 A kind of elevator floor control system
CN107103662A (en) * 2016-02-19 2017-08-29 胡飞虎 Visitor's authentication method and system
CN206162705U (en) * 2016-08-11 2017-05-10 温州市易天信息科技有限公司 Protect linked system in policeman based on cloud platform
CN107945315A (en) * 2016-10-13 2018-04-20 深圳市康悦合科技开发有限公司 Entrance guard controlling method and system
CN106698118A (en) * 2016-12-09 2017-05-24 成都焦点合安物联网有限公司 Elevator control method and system based on face recognition
US20180282114A1 (en) * 2017-03-31 2018-10-04 Otis Elevator Company User management of door and elevator access control
CN107176506A (en) * 2017-04-20 2017-09-19 安徽瑞隆机电设备有限公司 The elevator control method and system of a kind of default visit person
CN108154583A (en) * 2017-12-25 2018-06-12 温州神思电子科技有限公司 A kind of caller management method
CN108052925A (en) * 2017-12-28 2018-05-18 江西高创保安服务技术有限公司 A kind of cell personnel archives intelligent management
CN108537304A (en) * 2018-03-30 2018-09-14 深圳市华安高新技术有限公司 A kind of method and system that the testimony of a witness is veritified
CN108877012A (en) * 2018-07-06 2018-11-23 江苏腾武信息技术有限公司 Intelligent caller method and system
CN108639875A (en) * 2018-07-13 2018-10-12 安徽灵图壹智能科技有限公司 A kind of block chain Intelligent recognition elevator safeguard management method and its system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110386516A (en) * 2019-07-01 2019-10-29 创新奇智(重庆)科技有限公司 A kind of inter-linked controlling method, system and the electronic equipment of gate inhibition and elevator
CN111192394A (en) * 2019-10-29 2020-05-22 腾讯云计算(北京)有限责任公司 Visitor permission management method, platform, system and computer storage medium
CN110992559A (en) * 2019-12-06 2020-04-10 苏宁智能终端有限公司 Intelligent elevator control method and system
CN111186730A (en) * 2020-01-20 2020-05-22 耀灵人工智能(浙江)有限公司 Elevator control method and elevator control system based on human body tracking and automatic allocation
CN111202861A (en) * 2020-02-17 2020-05-29 佛山市锐诚云智能照明科技有限公司 Automatic epidemic prevention and disinfection method and system for elevator car, storage medium and terminal equipment
CN114789949A (en) * 2022-04-22 2022-07-26 创视未来科技(深圳)有限公司 Elevator control method and device

Similar Documents

Publication Publication Date Title
CN109727349A (en) Visitor sends terraced method, apparatus, computer equipment and storage medium
KR100597152B1 (en) User authentication method and user authentication device
EP2240912B1 (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
CN106803295A (en) Gate inhibition's authentication control method and system based on Quick Response Code
CN109626148A (en) Send terraced method, apparatus, computer equipment and storage medium
CN109118616A (en) access control method and access control device
US20110185402A1 (en) Access control system
CN108806041A (en) Building access control method, Cloud Server and computer readable storage medium
US11496471B2 (en) Mobile enrollment using a known biometric
CN104169933A (en) Method, apparatus, and computer-readable recording medium for authenticating a user
CN109472269A (en) Characteristics of image configuration and method of calibration, device, computer equipment and medium
JP2011164675A (en) Visitor access control system
CN108900536B (en) Authentication method, authentication device, computer equipment and storage medium
CN108773743A (en) Authorization method, device, equipment and the storage medium of building hoist
CN112991599A (en) Passage control method of multifunctional access control machine
CN108241999A (en) A kind of generation method of invoice information, apparatus and system
CN109635021A (en) A kind of data information input method, device and equipment based on human testing
JP2021135975A (en) Composite system, biometric authentication system, method for controlling composite system, and program
KR20180125729A (en) Vehicle access control system and method through code display
CN115758398A (en) Access control data processing method and device, access control system and storage medium
CN111540083A (en) Unlocking method and system based on Bluetooth connection, computer equipment and storage medium
JP2003067744A (en) Device and method for authenticating individual person
CN111047750A (en) Method, device and system for controlling offline access control device
JP2024019251A (en) Information processing system, method, device, and program
CN109960920A (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190507

RJ01 Rejection of invention patent application after publication