CN110599651A - Access control system based on unified authorization center and control method - Google Patents

Access control system based on unified authorization center and control method Download PDF

Info

Publication number
CN110599651A
CN110599651A CN201910859319.2A CN201910859319A CN110599651A CN 110599651 A CN110599651 A CN 110599651A CN 201910859319 A CN201910859319 A CN 201910859319A CN 110599651 A CN110599651 A CN 110599651A
Authority
CN
China
Prior art keywords
access control
authorization
terminal
resource
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910859319.2A
Other languages
Chinese (zh)
Inventor
李远军
陈鸿睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunnan Jiuji Information Technology Co Ltd
Original Assignee
Yunnan Jiuji Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Jiuji Information Technology Co Ltd filed Critical Yunnan Jiuji Information Technology Co Ltd
Priority to CN201910859319.2A priority Critical patent/CN110599651A/en
Publication of CN110599651A publication Critical patent/CN110599651A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an access control system and a control method based on a unified authorization center, which comprises an authorization center server, a user authentication server, an access control resource terminal, a mobile terminal and the like. And the access control administrator registers the managed access control terminal to the unified authorization server and configures the access control terminal into an open state, a login state and an authorization state according to requirements. Each department provides respective user authentication service for the mobile terminal, and the user passes through the mobile terminal and obtains the access token after authentication. When the entrance guard needs to be opened, the access token is provided for the unified authorization server, the only access control resource mark and the validity mark need to be accessed, and after the unified authorization server authenticates, the unified authorization server issues an opening instruction to the access control resource. The invention realizes centralized management for different access control resources and authentication requirements.

Description

Access control system based on unified authorization center and control method
Technical Field
The invention relates to the technical field of access control, in particular to an access control system and a control method based on a unified authorization center.
Background
At present, most office buildings are multi-company office buildings which are commonly used by multiple departments. Entrance guards are arranged at the entrance and exit of the office building, each floor and each office area, and each department of each company according to the requirements of management departments. There is no uniform authorization authentication method among all access control systems, which is easy to cause management confusion and office building safety problems. If respective entrance guard rules are set layer by layer, multiple authentication modes are needed for entering and exiting the office area, and inconvenience is brought to office staff.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide an access control system and a control method based on a unified authorization center, so that centralized management is realized for different access control resources and authentication requirements.
The purpose of the invention is realized by the following technical scheme:
an access control system and a control method based on a unified authorization center comprise an authorization center server, a user authentication server, an access control resource terminal and a mobile terminal, wherein the mobile terminal is connected with the access control resource terminal, the access control resource terminal is connected with the user authentication server, and the user authentication server is connected with the authorization center server; the authorization center server is used for providing an entrance guard resource terminal registration function, a user authentication server registration user information function, an entrance guard administrator configuration management entrance guard resource function and a verification authentication authorization function; the user authentication server is used for providing a user management function and a user authentication function and registering user authentication information and authorization conditions passing the current authentication to the unified authorization center; the access control resource terminal comprises an access control resource terminal host and a two-dimensional code display screen, and after being started, the access control resource terminal registers equipment with the unified authorization center, updates the valid line mark at regular time, informs the authentication center of the valid line mark, and synchronously updates the two-dimensional code on the two-dimensional code display of the access control resource terminal; the mobile terminal is used for sending an authentication request to the user authentication server, acquiring a corresponding authentication token, and acquiring a request address of the unified authorization center for accessing the corresponding resource by scanning the two-dimensional code on the two-dimensional code display of the access control resource terminal.
An entrance guard control method based on a uniform authorization center comprises a user authentication step, an entrance guard resource terminal registration step and an authentication authorization verification step; the user authentication step comprises the following procedures:
s1, the user uses the mobile terminal to obtain authentication information, wherein the authentication information comprises one or more of account password/fingerprint/portrait/equipment information;
s2, the mobile terminal submits the user authentication information to the user authentication server;
s3, the mobile terminal judges whether the user meets the authentication condition according to the authentication information submitted by the user, and inquires the authorization of the user in the authentication mode;
and S4, after the authentication is passed, the user authentication server issues an access token to the mobile terminal, and registers the token, the corresponding authorization and the token valid time to the unified authorization server.
Further, the step of registering the access control resource terminal includes the following processes:
SS1, after the access control terminal resource is connected to the network, the access control terminal registers the own equipment information to the uniform authorization center according to the authentication information distributed by the uniform authorization center to the access control administrator;
SS2, if the access control terminal resource is registered in the uniform authorization center and passes the confirmation of the access control terminal resource by the access control administrator, regularly and randomly generating validity marks, updating the validity marks to the uniform authorization center, and updating the two-dimensional codes on the two-dimensional code display, wherein the two-dimensional codes comprise authorization addresses, equipment codes and current validity marks of the uniform authorization center;
and the SS3 registers the access terminal resource in the list to be confirmed according to the authentication information in the registration information if the access terminal resource is not registered in the unified authorization center, and can confirm and authorize the access terminal resource to be configured after a corresponding access manager logs in the system.
Further, the step of verifying the authentication and authorization includes the following steps:
a) after the user passes the user authentication step, the mobile terminal obtains an access token;
b) a user uses a mobile terminal to scan a two-dimensional code on an access control resource terminal needing to pass through, and a uniform authorization center authorization address, an equipment code and an effectiveness mark are obtained;
c) the mobile terminal provides a corresponding equipment code, an effectiveness mark and an access token to an authorization address of the unified authorization center;
d) after receiving the authorization request, the authorization center performs the following verification, including: whether the access control resource corresponding to the equipment code is used or not, whether the corresponding validity indication is valid or not, whether the access token of the user is valid or not and whether the corresponding access token has the right to access the resource or not are judged;
e) and after the authorization is passed, the unified authorization server issues an opening instruction to the corresponding access control resource.
The invention has the beneficial effects that:
(1) according to the invention, through the unified authorization center, the access control of each department of each company is used as access control resource and is registered in the unified authorization center, and each department sets the authority requirement of the access control resource according to respective requirements. Meanwhile, each company can provide respective user authentication service and provide different authorization information for different users and different login modes. After the mobile terminal passes the authentication of each department, the mobile terminal can check whether the authority for opening the entrance guard is available through the unified authorization center, so that the centralized management is realized for different entrance guard resources and authentication requirements.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a system configuration diagram of an access control system according to a first embodiment of the present invention;
FIG. 2 is a flowchart of the user authentication procedure in the first embodiment of the present invention;
fig. 3 is a flowchart of the entrance guard resource terminal registration procedure in the first embodiment of the present invention;
fig. 4 is a diagram illustrating an authentication and authorization verification method according to a first embodiment of the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following. All of the features disclosed in this specification, or all of the steps of a method or process so disclosed, may be combined in any combination, except combinations where mutually exclusive features and/or steps are used.
Any feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving equivalent or similar purposes, unless expressly stated otherwise. That is, unless expressly stated otherwise, each feature is only an example of a generic series of equivalent or similar features.
Specific embodiments of the present invention will be described in detail below, and it should be noted that the embodiments described herein are only for illustration and are not intended to limit the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known circuits, software, or methods have not been described in detail so as not to obscure the present invention.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before describing the embodiments, some necessary terms need to be explained. For example:
if the terms "first," "second," etc. are used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. Thus, a "first" element discussed below could also be termed a "second" element without departing from the teachings of the present invention. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly connected" or "directly coupled" to another element, there are no intervening elements present.
The various terms appearing in this application are used for the purpose of describing particular embodiments only and are not intended as limitations of the invention, with the singular being intended to include the plural unless the context clearly dictates otherwise.
When the terms "comprises" and/or "comprising" are used in this specification, these terms are intended to specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence and/or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Example one
As shown in fig. 1 to 4, an access control system and a control method based on a unified authorization center include an authorization center server, a user authentication server, an access control resource terminal and a mobile terminal, where the mobile terminal is connected to the access control resource terminal, the access control resource terminal is connected to the user authentication server, and the user authentication server is connected to the authorization center server; the authorization center server is used for providing an entrance guard resource terminal registration function, a user authentication server registration user information function, an entrance guard administrator configuration management entrance guard resource function and a verification authentication authorization function; the user authentication server is used for providing a user management function and a user authentication function and registering user authentication information and authorization conditions passing the current authentication to the unified authorization center; the access control resource terminal comprises an access control resource terminal host and a two-dimensional code display screen, and after being started, the access control resource terminal registers equipment with the unified authorization center, updates the valid line mark at regular time, informs the authentication center of the valid line mark, and synchronously updates the two-dimensional code on the two-dimensional code display of the access control resource terminal; the mobile terminal is used for sending an authentication request to the user authentication server, acquiring a corresponding authentication token, and acquiring a request address of the unified authorization center for accessing the corresponding resource by scanning the two-dimensional code on the two-dimensional code display of the access control resource terminal.
An entrance guard control method based on a uniform authorization center comprises a user authentication step, an entrance guard resource terminal registration step and an authentication authorization verification step; the user authentication step comprises the following procedures:
s1, the user uses the mobile terminal to obtain authentication information, wherein the authentication information comprises one or more of account password/fingerprint/portrait/equipment information;
s2, the mobile terminal submits the user authentication information to the user authentication server;
s3, the mobile terminal judges whether the user meets the authentication condition according to the authentication information submitted by the user, and inquires the authorization of the user in the authentication mode;
and S4, after the authentication is passed, the user authentication server issues an access token to the mobile terminal, and registers the token, the corresponding authorization and the token valid time to the unified authorization server.
Further, the step of registering the access control resource terminal includes the following processes:
SS1, after the access control terminal resource is connected to the network, the access control terminal registers the own equipment information to the uniform authorization center according to the authentication information distributed by the uniform authorization center to the access control administrator;
SS2, if the access control terminal resource is registered in the uniform authorization center and passes the confirmation of the access control terminal resource by the access control administrator, regularly and randomly generating validity marks, updating the validity marks to the uniform authorization center, and updating the two-dimensional codes on the two-dimensional code display, wherein the two-dimensional codes comprise authorization addresses, equipment codes and current validity marks of the uniform authorization center;
and the SS3 registers the access terminal resource in the list to be confirmed according to the authentication information in the registration information if the access terminal resource is not registered in the unified authorization center, and can confirm and authorize the access terminal resource to be configured after a corresponding access manager logs in the system.
Further, the step of verifying the authentication and authorization includes the following steps:
a) after the user passes the user authentication step, the mobile terminal obtains an access token;
b) a user uses a mobile terminal to scan a two-dimensional code on an access control resource terminal needing to pass through, and a uniform authorization center authorization address, an equipment code and an effectiveness mark are obtained;
c) the mobile terminal provides a corresponding equipment code, an effectiveness mark and an access token to an authorization address of the unified authorization center;
d) after receiving the authorization request, the authorization center performs the following verification, including: whether the access control resource corresponding to the equipment code is used or not, whether the corresponding validity indication is valid or not, whether the access token of the user is valid or not and whether the corresponding access token has the right to access the resource or not are judged;
e) and after the authorization is passed, the unified authorization server issues an opening instruction to the corresponding access control resource.
In the embodiment, the unified authorization center is used, the entrance guard of each department of each company is used as the entrance guard resource and is registered in the unified authorization center, and each department sets the authority requirement of the entrance guard resource according to respective requirements. Meanwhile, each company can provide respective user authentication service and provide different authorization information for different users and different login modes. After the mobile terminal passes the authentication of each department, the mobile terminal can check whether the authority of opening the entrance guard is available through the unified authorization center, so that the centralized management is realized for different entrance guard resources and authentication requirements.
In other technical features of the embodiment, those skilled in the art can flexibly select and use the features according to actual situations to meet different specific actual requirements. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known algorithms, methods or systems have not been described in detail so as not to obscure the present invention, and are within the scope of the present invention as defined by the claims.
For simplicity of explanation, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and elements referred to are not necessarily required in this application.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The disclosed systems, modules, and methods may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units may be only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be referred to as an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may also be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It will be understood by those skilled in the art that all or part of the processes in the methods for implementing the embodiments described above can be implemented by instructing the relevant hardware through a computer program, and the program can be stored in a computer-readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a ROM, a RAM, etc.
The foregoing is illustrative of the preferred embodiments of this invention, and it is to be understood that the invention is not limited to the precise form disclosed herein and that various other combinations, modifications, and environments may be resorted to, falling within the scope of the concept as disclosed herein, either as described above or as apparent to those skilled in the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (4)

1. An access control system and a control method based on a unified authorization center are characterized by comprising an authorization center server, a user authentication server, an access control resource terminal and a mobile terminal, wherein the mobile terminal is connected with the access control resource terminal, the access control resource terminal is connected with the user authentication server, and the user authentication server is connected with the authorization center server;
the authorization center server is used for providing an entrance guard resource terminal registration function, a user authentication server registration user information function, an entrance guard administrator configuration management entrance guard resource function and a verification authentication authorization function;
the user authentication server is used for providing a user management function and a user authentication function and registering user authentication information and authorization conditions passing the current authentication to the unified authorization center;
the access control resource terminal comprises an access control resource terminal host and a two-dimensional code display screen, and after being started, the access control resource terminal registers equipment with the unified authorization center, updates the valid line mark at regular time, informs the authentication center of the valid line mark, and synchronously updates the two-dimensional code on the two-dimensional code display of the access control resource terminal;
the mobile terminal is used for sending an authentication request to the user authentication server, acquiring a corresponding authentication token, and acquiring a request address of the unified authorization center for accessing the corresponding resource by scanning the two-dimensional code on the two-dimensional code display of the access control resource terminal.
2. An entrance guard control method based on a uniform authorization center is characterized by comprising a user authentication step, an entrance guard resource terminal registration step and an authentication authorization verification step; the user authentication step comprises the following procedures:
s1, the user uses the mobile terminal to obtain authentication information, wherein the authentication information comprises one or more of account password/fingerprint/portrait/equipment information;
s2, the mobile terminal submits the user authentication information to the user authentication server;
s3, the mobile terminal judges whether the user meets the authentication condition according to the authentication information submitted by the user, and inquires the authorization of the user in the authentication mode;
and S4, after the authentication is passed, the user authentication server issues an access token to the mobile terminal, and registers the token, the corresponding authorization and the token valid time to the unified authorization server.
3. The unified authorization center-based access control method according to claim 2, wherein the access control resource terminal registration step comprises the following procedures:
SS1, after the access control terminal resource is connected to the network, the access control terminal registers the own equipment information to the uniform authorization center according to the authentication information distributed by the uniform authorization center to the access control administrator;
SS2, if the access control terminal resource is registered in the uniform authorization center and passes the confirmation of the access control terminal resource by the access control administrator, regularly and randomly generating validity marks, updating the validity marks to the uniform authorization center, and updating the two-dimensional codes on the two-dimensional code display, wherein the two-dimensional codes comprise authorization addresses, equipment codes and current validity marks of the uniform authorization center;
and the SS3 registers the access terminal resource in the list to be confirmed according to the authentication information in the registration information if the access terminal resource is not registered in the unified authorization center, and can confirm and authorize the access terminal resource to be configured after a corresponding access manager logs in the system.
4. The unified authorization center-based access control method according to claim 2, wherein the authentication authorization verification step comprises the following steps:
a) after the user passes the user authentication step, the mobile terminal obtains an access token;
b) a user uses a mobile terminal to scan a two-dimensional code on an access control resource terminal needing to pass through, and a uniform authorization center authorization address, an equipment code and an effectiveness mark are obtained;
c) the mobile terminal provides a corresponding equipment code, an effectiveness mark and an access token to an authorization address of the unified authorization center;
d) after receiving the authorization request, the authorization center performs the following verification, including: whether the access control resource corresponding to the equipment code is used or not, whether the corresponding validity indication is valid or not, whether the access token of the user is valid or not and whether the corresponding access token has the right to access the resource or not are judged;
e) and after the authorization is passed, the unified authorization server issues an opening instruction to the corresponding access control resource.
CN201910859319.2A 2019-09-11 2019-09-11 Access control system based on unified authorization center and control method Pending CN110599651A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910859319.2A CN110599651A (en) 2019-09-11 2019-09-11 Access control system based on unified authorization center and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910859319.2A CN110599651A (en) 2019-09-11 2019-09-11 Access control system based on unified authorization center and control method

Publications (1)

Publication Number Publication Date
CN110599651A true CN110599651A (en) 2019-12-20

Family

ID=68859117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910859319.2A Pending CN110599651A (en) 2019-09-11 2019-09-11 Access control system based on unified authorization center and control method

Country Status (1)

Country Link
CN (1) CN110599651A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112822217A (en) * 2021-02-25 2021-05-18 上海派拉软件股份有限公司 Server access method, device, equipment and storage medium
CN114613047A (en) * 2022-03-11 2022-06-10 上海思慧德安防设备有限公司 Access control system, offline cloud authorization system and method for access control, and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002059727A2 (en) * 2001-01-25 2002-08-01 Lets Guard It Europe Ab Security system and method for providing a user with an authorisation code for accessing a service
CN204303062U (en) * 2014-12-08 2015-04-29 安朗杰安防技术(中国)有限公司 A kind of many access control systems
CN104966340A (en) * 2015-06-19 2015-10-07 深圳市幸福立方科技有限公司 Access control system, access control method and cloud service platform
CN105303664A (en) * 2015-11-10 2016-02-03 清华大学 Intelligent access control system based on two dimensional code technology and control method thereof
CN106204864A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system based on dynamic two-dimension code and door opening method
CN106803295A (en) * 2016-12-28 2017-06-06 福建星网锐捷安防科技有限公司 Gate inhibition's authentication control method and system based on Quick Response Code
CN107123178A (en) * 2016-01-22 2017-09-01 安朗杰安防技术(中国)有限公司 Access control system
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002059727A2 (en) * 2001-01-25 2002-08-01 Lets Guard It Europe Ab Security system and method for providing a user with an authorisation code for accessing a service
CN204303062U (en) * 2014-12-08 2015-04-29 安朗杰安防技术(中国)有限公司 A kind of many access control systems
CN104966340A (en) * 2015-06-19 2015-10-07 深圳市幸福立方科技有限公司 Access control system, access control method and cloud service platform
CN105303664A (en) * 2015-11-10 2016-02-03 清华大学 Intelligent access control system based on two dimensional code technology and control method thereof
CN107123178A (en) * 2016-01-22 2017-09-01 安朗杰安防技术(中国)有限公司 Access control system
CN106204864A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system based on dynamic two-dimension code and door opening method
CN106803295A (en) * 2016-12-28 2017-06-06 福建星网锐捷安防科技有限公司 Gate inhibition's authentication control method and system based on Quick Response Code
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112822217A (en) * 2021-02-25 2021-05-18 上海派拉软件股份有限公司 Server access method, device, equipment and storage medium
CN114613047A (en) * 2022-03-11 2022-06-10 上海思慧德安防设备有限公司 Access control system, offline cloud authorization system and method for access control, and medium

Similar Documents

Publication Publication Date Title
CN110912938B (en) Access verification method and device for network access terminal, storage medium and electronic equipment
CN109150828B (en) Verification registration method and system
CN110086783B (en) Multi-account management method and device, electronic equipment and storage medium
CN109474632B (en) Method, apparatus, system, and medium for authenticating and managing rights of user
CN103516514B (en) The establishing method of account access rights and control device
US10003975B2 (en) Authorized areas of authentication
MX2013011116A (en) Distribution of premises access information.
JP5743786B2 (en) Server apparatus, information processing method, and program
US20160359849A1 (en) Service provision system, information processing system, information processing apparatus, and service provision method
CN104468553A (en) Method, device and system for login of public account
KR102229345B1 (en) Time and attendance management system server capable of performing time and attendance management based on wireless ap access information and operating method thereof
CN103516674B (en) Quickly and the method for network device online and control device
CN110599651A (en) Access control system based on unified authorization center and control method
JP5308985B2 (en) Supervisory control system
CN112035807A (en) Object authentication method and apparatus, storage medium, and electronic apparatus
CN110648443B (en) Access control verification method, device, equipment and medium
JP2007172039A (en) Login management system and method using location information of user
CN116318911A (en) Domain name access method and device, electronic equipment and storage medium
CN112585602A (en) Temporary password based firmware access
KR102450328B1 (en) Method and apparatus for providing user profile
KR102232406B1 (en) Time and attendance management system server that enables attendance management through periodic check of wireless ap access information and operating method thereof
JP7023218B2 (en) Plant monitoring and control equipment and plant monitoring and control system
CN106878296B (en) Data access control method and device
JP2007172176A (en) Authentication device
CN110599650A (en) Access control system based on trusted mobile terminal and control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191220

WD01 Invention patent application deemed withdrawn after publication