CN110648443B - Access control verification method, device, equipment and medium - Google Patents

Access control verification method, device, equipment and medium Download PDF

Info

Publication number
CN110648443B
CN110648443B CN201910951407.5A CN201910951407A CN110648443B CN 110648443 B CN110648443 B CN 110648443B CN 201910951407 A CN201910951407 A CN 201910951407A CN 110648443 B CN110648443 B CN 110648443B
Authority
CN
China
Prior art keywords
user
identification information
personal identification
information
family
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910951407.5A
Other languages
Chinese (zh)
Other versions
CN110648443A (en
Inventor
廖宫燕
张上仪
英杰
蒋祈效
王扬
杜亮
潘秋真
詹韶鑫
韩敏仪
袁国能
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN201910951407.5A priority Critical patent/CN110648443B/en
Publication of CN110648443A publication Critical patent/CN110648443A/en
Application granted granted Critical
Publication of CN110648443B publication Critical patent/CN110648443B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing

Abstract

The embodiment of the invention discloses an access control verification method, an access control verification device, access control equipment and an access control medium, and relates to the technical field of object detection. Wherein the method comprises the following steps: matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database; according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database; and releasing or intercepting the user to be passed according to the obtained authorized residence information. The embodiment of the invention provides a convenient and quick access control verification method, a device, equipment and a medium.

Description

Access control verification method, device, equipment and medium
Technical Field
The embodiment of the invention relates to the technical field of intelligent communities, in particular to an access control verification method, device, equipment and medium.
Background
With the overall improvement of the technology level, especially the rapid development of the internet technology, the management of the community is also developed towards informatization and intellectualization.
With the continuous improvement of community security, many communities adopt a face recognition system with higher security performance to manage the entrance and exit of residents in the communities, but the permission for opening the face recognition needs to be registered and opened at a property place, and the permission is time-consuming and labor-consuming to open for families with a plurality of residents or people with a plurality of houses in different communities.
Disclosure of Invention
The embodiment of the invention provides an access control verification method, device, equipment and medium, and provides a convenient and rapid access control verification method.
In a first aspect, an embodiment of the present invention provides an access verification method for an access control, including:
matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database;
and releasing or intercepting the user to be passed according to the obtained authorized residence information.
In a second aspect, an embodiment of the present invention further provides an access verification apparatus, where the apparatus includes:
the personal identification information matching module is used for matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
the authorized living information acquisition module is used for acquiring authorized living information of the successfully matched user aiming at the house in the community from the community database according to the personal identification information of the successfully matched user and the identification information of the community;
and the passing module is used for passing or intercepting the user to be passed according to the obtained authorized residence information.
In a third aspect, an embodiment of the present invention further provides an apparatus, where the apparatus includes:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method of gate verification as described in any of the embodiments of the invention.
In a fourth aspect, the embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements an access control verification method according to any one of the embodiments of the present invention.
The embodiment of the invention acquires the authorized living information of the successfully matched user aiming at the house in the community from the community database by matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database and according to the personal identification information of the successfully matched user and the identification information of the community, thereby releasing or intercepting the user to be passed according to the acquired authorized living information. By matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database, the community user can realize the storage and verification of the access control passing information of the community user and other users through the mobile terminal. Therefore, the embodiment of the invention provides a convenient and quick intelligent access control verification method.
Drawings
Fig. 1 is a flowchart of a method for verifying access control according to an embodiment of the present invention;
FIG. 2 is a flow chart of adding relatives according to the second embodiment of the present invention;
FIG. 3A is a display interface of a user's current family and friends;
FIG. 3B is another display interface for a user's current family and family;
FIG. 4A is a display interface for inputting a user's phone number to be added;
FIG. 4B is a display interface for inputting a user identification number to be added;
FIG. 5A is a display interface for input of family and family information;
FIG. 5B is a diagram of another display interface for input of family and family information;
FIG. 6 is a flow chart of a face management operation for a family;
FIG. 7 is a flowchart illustrating a family member adding operation according to a third embodiment of the present invention;
FIG. 8A is a details page of family and friends management;
FIG. 8B is another detail page of family and friends management;
FIG. 9 is a flowchart illustrating a family delete operation according to an embodiment of the present invention;
FIG. 10 is a flow chart of a family and family relationship modification according to an embodiment of the present invention;
FIG. 11 is a display interface of authorized residential home information;
FIG. 12 is a flow chart of authorizing a building;
fig. 13 is a structural diagram of a door access verification apparatus according to a fourth embodiment of the present invention;
fig. 14 is a schematic structural diagram of an apparatus provided in the fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a door access verification method according to an embodiment of the present invention. The embodiment is applicable to the condition of carrying out identity authentication on the user. Typically, the present embodiment is applicable to the case of performing authentication on a cell resident. The method can be executed by a door access authentication device, which can be implemented by software and/or hardware. As shown in fig. 1, the access control verification method provided in this embodiment may specifically include the following steps:
and 110, matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database.
The personal identification information of the user may include, but is not limited to: the name of the user, the mobile phone number of the user, the certificate number of the user, the association relation between the user and the cell to which the user belongs, face information, fingerprint information and the like.
The community database is a database for storing information of residents in a community. Typically a community comprises a plurality of cells.
In this embodiment, the community users may be divided into four types of users according to the presence or absence of the mobile phone number, that is, the mobile phone number authenticated user, the mobile phone number unauthenticated user, the platform authenticated user, and the platform unauthenticated user, and the personal information data of the four types of users constitute the community database.
The mobile phone number authentication user refers to a user which is registered in the exclusive service and passes real-name authentication, and mobile phone number authentication information of the user is stored in the community database; the user whose mobile phone number is not authenticated comprises the user who has registered on the exclusive service and has not passed the real-name authentication; the platform authentication user refers to a user which is not registered in the exclusive service but passes real-name authentication; the platform unauthenticated user is a user which is not registered in the dedicated service and is not authenticated.
The dedicated service is a cloud service, and a mobile phone number user can register on the dedicated service by using a mobile phone to become a cloud user, and can also perform authorization operation for a non-mobile phone number user to register the non-mobile phone number user as a user on a certain platform governed by the cloud service.
Specifically, when the access control verification is performed, the personal identification information of the user to be passed is matched with the personal information of the user information existing in the community database.
For example, if the user to be passed is a mobile phone number user, the mobile phone number can be used as personal identification information of the user to be passed, and the personal identification information is matched with personal information of existing users in the database to determine whether the current user to be passed already exists in the community database.
And 120, acquiring authorized living information of the successfully matched user for the house in the community from the community database according to the personal identification information of the successfully matched user and the identification information of the community.
The cell identifier is information that can uniquely identify the cell, such as a name and a geographical location of the cell.
In this embodiment, if the personal information of the current user to be passed is successfully matched with the personal identification information of the existing user in the community database, it is further determined whether the user is a user of the current community according to the identification information of the current community, and if the matching is successful, authorized living information of the successfully matched user for the house in the community is obtained from the community database.
The authorized living information is the living authority information of the user to pass to the building family in the community.
And step 130, according to the obtained authorized residence information, releasing or intercepting the user to be passed.
In this embodiment, if the user to be passed has the living right of one or more sets of building users in the local community and has passed the corresponding face authentication, the user to be passed is released, and if the user to be passed does not have the corresponding face authentication, the user to be passed is intercepted.
The embodiment of the invention acquires the authorized living novelty of the successfully matched user aiming at the house in the community from the community database by matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database and according to the personal identification information of the successfully matched user and the identification information of the community, thereby releasing or intercepting the user to be passed according to the acquired authorized living information. By matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database, the community user can realize the storage and verification of the access control passing information of the community user and other users through the mobile terminal. Therefore, compared with the traditional manual authentication method, the embodiment of the invention provides a convenient and fast intelligent access control verification method.
Example two
Fig. 2 is a flowchart of adding relatives according to the second embodiment of the present invention. The embodiment is an alternative provided by adding information of relatives and friends authorized to live to the community database based on the above embodiment. Referring to fig. 2, the operation of adding relatives may specifically include the following steps:
step 210, responding to the user information adding request of the community database, and acquiring the personal identification information of the user to be added, which is input by the operation user.
The operation user refers to a mobile phone number authentication user, and specifically can be an owner who has a mobile phone number in a certain community.
The user to be added refers to a user who has a relationship with the operation user and with whom the operation user wants to establish a relationship.
In this embodiment, the personal identification information of the user includes a mobile phone number of the user and an identification number of the user. As shown in FIG. 3A and FIG. 3B, the content displayed includes the names of the friends, the relationship with the user, and the status information. The family relationship is the name of the operation user to the family, and the family relationship state includes "confirm", "confirmed", "to be confirmed by the other party", and "to be confirmed by you".
The operation user enters a new family and family process by clicking' + new family and family, and obtains the personal identification information of the user to be added, which is input by the operation user, referring to fig. 4A and 4B, the user can input the mobile phone number and the identification number of the family and family to be added on the family and family adding interface.
And step 220, matching the personal identification information of the user to be added with the personal identification information of the relatives and friends in the community database, wherein the relatives and friends refer to the users who have the relationship with the operation user.
In this embodiment, the personal identification information of the user to be added, which is input by the operation user, is matched with the personal identification information of the relatives and friends in the community database, so that it is determined that the user to be added is the existing relatives and friends of the operation user.
Specifically, matching is performed according to the personal identification information of the relatives and friends in the community database of the mobile phone number input by the operation user, and if the personal identification information of the relatives and friends in the community database of the mobile phone number input by the operation user is not matched, matching is performed continuously according to the personal identification information of the relatives and friends in the community database of the identity certificate number input by the operation user.
And step 230, if the user is not matched with the family user, matching the personal identification information of the user to be added with the personal identification information of other users in the community database.
The other users refer to users except for the relationship with the operation user in the community database.
In this embodiment, if the personal identification information of the user to be added, which is input by the operation user, is not matched with the personal identification information of other relatives and friends, the personal identification information of the user to be added is further matched with the personal identification information of other users in the community database. The other users may be mobile phone number authenticated users, mobile phone number unauthenticated users, platform authenticated users or platform unauthenticated users.
And step 240, if the information is not matched with other users, adding the personal identification information, the personal data, the relationship with the operation user and the authorized residence information of the user to be added to the community database.
In this embodiment, if no other user is matched, which indicates that the personal identification information of the current user to be added does not exist in the current community database, the certificate type and the certificate number of the user to be added, the relationship with the operation user, and the authorized living information are added to the community database, and the relationship between the user to be added and the operation user is established. The specific input interface of the family and family information is shown in FIG. 5A and FIG. 5B.
And if the other users are matched, establishing the relationship between the operation user and the other users according to the relationship between the operation user and the other users input by the operation user.
The relationship between the user to be added and the operation user can be determined by referring to the table below.
Figure BDA0002225861180000081
Figure BDA0002225861180000091
Figure BDA0002225861180000101
By establishing the relationship between the users, the community platform can provide customized service information for the users according to the information of the users conveniently.
For example, if a user a has a set of properties, a user B has a set of properties, and the two are relatives and couples, it may be determined that the family to which the user belongs has two sets of properties, and some renting and selling information may be pushed to the user a and the user B through the terminal application, so that they may better manage the properties of the family.
According to the technical scheme, the addition of the relatives and friends is realized by acquiring the personal identification information of the user to be added, which is input by the operation user, so that the management of the relatives and friends by the user is facilitated.
On the basis of the above embodiment, after the personal identification information, the personal details, the relationship with the operation user, and the authorized living information of the user to be added are added to the community database, the method further includes:
determining the authentication authority of the added information according to the relationship between the user to be added and the operation user;
and distributing the authentication task of the added information to an authenticator with the authentication authority, and authenticating the added information by the authenticator.
Specifically, when the user to be added is in a relationship with the operating user and the user to be added is a platform user, the user can perform face authentication operation on the added user through a face management button, so that the user can pass the access control verification of the current cell.
Referring to fig. 6, when performing face management, first of all, whether face information of a current family and a family exists in a community database is checked, if so, a face of the current family and the family is extracted, whether modification is needed is determined, if so, a face is entered through a Software Development Kit (SDK), networking check is performed, if the check is passed, the personal identity information of a user and the face information are synchronized to form an internet of things, and if the check is not passed, the face authentication operation is failed, and the face authentication operation is ended. The user carries out face management on relatives and friends through the mobile terminal, and the relatives and friends can carry out face brushing identification at the entrance guard through the face management, so that the trouble of manual authentication at property places is avoided, and convenience is provided for community residents.
Further, if the user to be added is not in a relationship with the operating user, the authentication task of the user needs to be distributed to an authenticator with authentication authority, and the authenticator authenticates the addition information.
For example, if the relationship between the user to be added and the operation user is a tenant and an owner, a face authentication operation needs to be performed at the property of the cell.
According to the authentication method provided by the embodiment, the user can perform face authentication operation by the family and the other users who are not family need to perform authentication at the community property, so that the user operation is facilitated and the community safety is improved.
EXAMPLE III
FIG. 7 is a flowchart illustrating a family member adding operation according to a third embodiment of the present invention. This embodiment is a further refinement of the steps in the second embodiment, based on the above implementation.
Specifically, referring to fig. 7, the business process of the new family and the family is to input the mobile phone number for matching first, and then input the certificate number for matching. The input mobile phone number needs to be 11-digit pure numbers at the beginning of '1', and if the mobile phone number does not meet the requirement, the user pops up the window to prompt 'please input the correct mobile phone number'. Firstly, matching is carried out on the friends in the community database by using the input mobile phone number. If the matching is successful, the popup prompts that the relatives and friends of the user with the mobile phone number already exist, clicks confirmation, returns to the my relatives and friends list, and ends the new adding operation of the relatives and friends.
Further, if the mobile phone number is not successfully matched with the existing family and family of the user, matching is carried out among all users in the community database. If the matching is successful, entering a page of inputting the family and family information, wherein the name, the certificate type, the certificate number and the mobile phone number are matched user information displayed reversely, and are not allowed to be modified, and the certificate number needs to be shielded according to a desensitization rule. And if the mobile phone number is not successfully matched in all the users, entering a page of inputting certificate numbers. "certificate type" is the selection box, and the options are: "resident identification card", "temporary identification card", "military officer card", "passport (China)", "passport (foreign country)", "passage toward the interior of harbor and Macau", and "passage toward the continent of Taiwan resident". Then, matching is carried out on the existing relatives of the user by using the input certificate type and the certificate number. If the matching is successful, the popup prompts that the relatives and friends of the certificate personnel already exist, clicks confirmation, returns to the my relatives and friends list, and finishes the new adding operation of the relatives and friends. If the certificate type and the certificate number are not successfully matched with the existing friends of the user, matching is carried out in all users, if a mobile phone number authentication client is matched (the certificate numbers are the same, and the mobile phones are different), a popup window prompts that the mobile phone number of the user is inconsistent with the mobile phone number input by the user, and the user enters a page for inputting the family data, wherein the name, the certificate type, the certificate number and the mobile phone number are matched user data which are displayed reversely, modification is not allowed, and the mobile phone number needs to be shielded according to a desensitization rule. If the matched platform authenticates the client, the system enters a page of inputting the family and family information, wherein the name, the certificate type and the certificate number are the matched user information displayed reversely, and the modification is not allowed. If the matched platform is not the authenticated client, the user enters a page of inputting the family and family information, wherein the name, the certificate type and the certificate number are the matched user information displayed reversely, and the modification is not allowed. If the name of the matched platform non-authentication client is not consistent with the actual name, the name can be changed after the face real-name authentication is carried out by clicking 'change of names of relatives and friends'. If the certificate types and the certificate numbers are not successfully matched in all the users, entering a page of inputting family and family information, wherein the name is a text input box; the certificate type and the certificate number are used for showing the input data of the user in a reverse mode and are not allowed to be modified.
And selecting the relationship of relatives and friends in the page of 'inputting relatives and friends data' to submit, wherein when the associated party is a mobile phone number user, the newly-established user relationship is in a 'to be confirmed' state before the opposite party is confirmed. When the associated party is the platform user, the newly created user relationship is in a 'confirmed' state. When there is no matching user for the associated party, a new platform non-authenticated user is generated for the associated party, and a user relationship with a "confirmed" status is newly created, which can be seen in fig. 8A and 8B, a family and family management details page.
Further, on the basis of the above embodiment, the method further includes: acquiring personal identification information of a user to be deleted, which is input by an operation user;
determining a user to be deleted from the relatives and friends of the operation user according to the personal identification information of the user to be deleted, and deleting the relationship between the operation user and the relatives and friends of the user to be deleted from the community database.
Referring to fig. 9, in a specific process of deleting a family and a user clicks "delete family", a popup prompts "confirm to delete the family? And yes and no buttons. And if the user selects 'yes', deleting the user relationship, deleting the relatives and the friends without the confirmation of the opposite party, and pushing the deletion message to the deleted party if the deleted relatives and friends are the mobile phone number users, thereby finishing the operation of deleting the relatives and the friends.
Further, on the basis of the above embodiment, the method further includes: in response to a modification request for a relationship between an operation user and a target relationship user, the modification request being input by the operation user, the relationship between the operation user and the target relationship user in the community database is changed into the modified relationship.
Specifically, referring to fig. 10, the user selects a user who wants to modify the relationship between the relatives and the friends, and determines whether the current relatives and friends are mobile phone number users. And when the relatives and the friends are mobile phone number users, reflecting the names, the certificate types and the certificate numbers for the users to modify the relationship information, sending the modified information to the relatives and the friends for confirmation after the relationship information is modified, changing the relationship information of the relatives and the friends if the relatives and the friends confirm the modification, storing the modified relationship into a community database, and canceling the change if the relatives and the friends do not confirm the modification. And when the relatives and the friends are non-mobile phone users, the names and the identity card numbers of the relatives and the friends are displayed, and the relationship information is input and modified to update the relationship information of the relatives and the friends.
In this embodiment, modifying a family only allows modifying the relationship between the family and the family, and if the personal identification information of the existing family and the family needs to be updated, the modification can be realized only by deleting the personal identification information and then adding the personal identification information again.
Further, on the basis of the above embodiment, the method further comprises a family authorized residence management for managing residence rights of the family to the building. Referring to FIG. 11, the user enters the "authorized residential home" flow by clicking the "authorized residential home" button, which shows the premises where family and family are authorized to live. Click on "cancel authorization", pop-up window prompt "confirm to cancel the authorization? And yes and no buttons. If "yes" is selected, the house authorization is revoked. The "authorized premises" shows all premises under the logged-on user's name, except the premises where the resident of the family is authorized. Click "authorize living", pop-up window prompt "confirm that house living is authorized? And yes and no buttons. If yes, the family is added as the resident of the house, and the residence is authorized. Further, a family or family who has been authorized to live does not allow transfer of his authorized living right to others.
With further reference to fig. 12, when the user performs authorized building operation on a family in the login terminal application, whether the user is a business owner or not is judged through personal identification information input by the user, if yes, building information under the business owner name is inquired, whether the current family is a resident or not is judged, if yes, the current family is displayed as an authorized list, and if not, the current family is selected to be authorized to the building where the current family lives first, and the current family is set as a family identity resident, so that the living right of the authorized family to the building is realized. By the method, the user can conveniently manage the right of residence of the user, face authentication information of relatives and friends can be added through face authentication after the family and family are authorized to live, and the user can verify entrance guard and is convenient to pass.
Example four
Fig. 13 is a structural diagram of a door access verification apparatus according to a fourth embodiment of the present invention. Referring to fig. 13, the access control verification apparatus provided in an embodiment of the present invention includes: a personal identification information matching module 310, an authorized occupancy information acquisition module 320, and a traffic module 330.
The personal identification information matching module 310 is configured to match the personal identification information of the user to be passed with the personal identification information of the existing user in the community database.
And the authorized living information obtaining module 320 is configured to obtain, from the community database, authorized living information of the successfully matched user for the house in the local community according to the personal identification information of the successfully matched user and the local community identification information.
And the passing module 330 is configured to pass or intercept the user to be passed according to the obtained authorized residence information.
The embodiment of the invention acquires the authorized living novelty of the successfully matched user aiming at the house in the community from the community database by matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database and according to the personal identification information of the successfully matched user and the identification information of the community, thereby releasing or intercepting the user to be passed according to the acquired authorized living information. By matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database, the community user can realize the storage and verification of the access control passing information of the community user and other users through the mobile terminal. Therefore, compared with the traditional manual authentication method, the embodiment of the invention provides a convenient and fast intelligent access control verification method.
On the basis of the above embodiment, the apparatus further includes:
and the adding request response module is used for responding to the user information adding request of the community database and acquiring the personal identification information of the user to be added, which is input by the operation user.
And the family and family user matching module is used for matching the personal identification information of the user to be added with the personal identification information of the family and family users in the community database, wherein the family and family users are users who have a family and family relationship with the operation user.
And the other user matching module is used for matching the personal identification information of the user to be added with the personal identification information of other users in the community database if the user to be added is not matched with the user of a family.
And the data adding module is used for adding the personal identification information, the personal data, the relation with the operation user and the authorized residence information of the user to be added to the community database if the user to be added is not matched with other users.
Further, the other user matching module is further configured to, if the other user is matched, establish a relationship between the operation user and the other user according to the relationship between the operation user and the other user input by the operation user.
Further, on the basis of the above embodiment, the apparatus further includes:
and the authentication authority adding module is used for determining the authentication authority of the added information according to the relationship between the user to be added and the operation user.
And the authority authentication module is used for distributing the authentication task of the added information to an authenticator with the authentication authority, and the authenticator authenticates the added information.
On the basis of the above embodiment, the apparatus further includes a deletion module, specifically configured to: acquiring personal identification information of a user to be deleted, which is input by an operation user;
determining a user to be deleted from the relatives and friends of the operation user according to the personal identification information of the user to be deleted, and deleting the relationship between the operation user and the relatives and friends of the user to be deleted from the community database.
On the basis of the above embodiment, the apparatus further includes a relationship modification module configured to change the relationship between the operation user and the target friend user in the community database to a modified relationship in response to a relationship modification request for the target friend user input by the operation user.
The access control verification device provided by the embodiment of the invention can execute the access control verification method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
EXAMPLE five
Fig. 14 is a schematic structural diagram of an apparatus according to a fifth embodiment of the present invention. FIG. 14 illustrates a block diagram of an exemplary device 12 suitable for use in implementing embodiments of the present invention. The device 12 shown in fig. 14 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present invention.
As shown in FIG. 14, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors 16 or processing units, a system memory device 28, and a bus 18 that couples various system components including the system memory device 28 and the processors 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory device bus or memory device controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
Storage 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 14, and commonly referred to as a "hard drive"). Although not shown in FIG. 14, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Storage 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in storage 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device), displays 24, etc., and may also communicate with one or more devices that enable a user to interact with device 12, and/or any devices (e.g., network card, modem, etc.) that enable device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with the other modules of the device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processor 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement an access verification method provided by the embodiment of the present invention.
EXAMPLE five
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform a method for verifying an access control, and the method includes:
matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database;
and releasing or intercepting the user to be passed according to the obtained authorized residence information.
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the above method operations, and may also perform related operations in an access verification method provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a terminal, or a network device) to execute the methods of the embodiments of the present invention.
It should be noted that, in the embodiment of the access control verification apparatus, the included units and modules are only divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments illustrated herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (7)

1. A method for verifying an access control, the method comprising:
matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database;
according to the obtained authorized residence information, the user to be passed is released or intercepted;
responding to a user information adding request of the community database, and acquiring personal identification information of a user to be added, which is input by an operation user;
matching the personal identification information of the user to be added with the personal identification information of a family user in the community database, wherein the family user is a user having a family relationship with the operation user;
if the user is not matched with the user of a family or a family, matching the personal identification information of the user to be added with the personal identification information of other users in the community database;
if the information is not matched with other users, adding the personal identification information, the personal data, the relationship with the operation user and the authorized living information of the user to be added to the community database;
if the other users are matched, establishing the relationship between the operation user and the other users according to the relationship between the operation user and the other users input by the operation user;
the community database consists of personal information data of mobile phone number authenticated users, mobile phone number unauthenticated users, platform authenticated users and platform unauthenticated users;
after the personal identification information, the personal data, the relationship with the operation user and the authorized residence information of the user to be added are added to the community database, the method further comprises the following steps:
determining the authentication authority of the added information according to the relationship between the user to be added and the operation user;
distributing the authentication task of the added information to an authenticator with the authentication authority, and authenticating the added information by the authenticator;
and if the user to be added and the operation user are the relationship between the tenant and the owner, performing face authentication operation at the property place of the cell.
2. The method of claim 1, further comprising:
acquiring personal identification information of a user to be deleted, which is input by an operation user;
determining a user to be deleted from the relatives and friends of the operation user according to the personal identification information of the user to be deleted, and deleting the relationship between the operation user and the relatives and friends of the user to be deleted from the community database.
3. The method of claim 1, further comprising:
in response to a modification request for a relationship between an operation user and a target relationship user, the modification request being input by the operation user, the relationship between the operation user and the target relationship user in the community database is changed into the modified relationship.
4. An access verification apparatus, comprising:
the personal identification information matching module is used for matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
the authorized living information acquisition module is used for acquiring authorized living information of the successfully matched user aiming at the house in the community from the community database according to the personal identification information of the successfully matched user and the identification information of the community;
the passing module is used for passing or intercepting the user to be passed according to the obtained authorized residence information;
responding to a user information adding request of the community database, and acquiring personal identification information of a user to be added, which is input by an operation user;
matching the personal identification information of the user to be added with the personal identification information of a family user in the community database, wherein the family user is a user having a family relationship with the operation user;
if the user is not matched with the user of a family or a family, matching the personal identification information of the user to be added with the personal identification information of other users in the community database;
if the information is not matched with other users, adding the personal identification information, the personal data, the relationship with the operation user and the authorized living information of the user to be added to the community database;
if the other users are matched, establishing the relationship between the operation user and the other users according to the relationship between the operation user and the other users input by the operation user;
the community database consists of personal information data of mobile phone number authenticated users, mobile phone number unauthenticated users, platform authenticated users and platform unauthenticated users;
after the personal identification information, the personal data, the relationship with the operation user and the authorized residence information of the user to be added are added to the community database,
determining the authentication authority of the added information according to the relationship between the user to be added and the operation user;
distributing the authentication task of the added information to an authenticator with the authentication authority, and authenticating the added information by the authenticator;
and if the user to be added and the operation user are the relationship between the tenant and the owner, performing face authentication operation at the property place of the cell.
5. The apparatus of claim 4, further comprising:
the personal identification information acquisition module is used for acquiring the personal identification information of the user to be deleted, which is input by the operation user;
and the family and family relationship deleting module is used for determining the user to be deleted from the family and family users of the operation user according to the personal identification information of the user to be deleted, and deleting the family and family relationship between the operation user and the user to be deleted from the community database.
6. An apparatus, characterized in that the apparatus comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a gate verification method as recited in any of claims 1-3.
7. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a door access verification method as claimed in any one of claims 1 to 3.
CN201910951407.5A 2019-10-08 2019-10-08 Access control verification method, device, equipment and medium Active CN110648443B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910951407.5A CN110648443B (en) 2019-10-08 2019-10-08 Access control verification method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910951407.5A CN110648443B (en) 2019-10-08 2019-10-08 Access control verification method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN110648443A CN110648443A (en) 2020-01-03
CN110648443B true CN110648443B (en) 2021-12-10

Family

ID=68993548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910951407.5A Active CN110648443B (en) 2019-10-08 2019-10-08 Access control verification method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN110648443B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7358297B2 (en) * 2020-05-27 2023-10-10 本田技研工業株式会社 Entry support system, entry support method, and entry support program
CN112614265A (en) * 2021-01-07 2021-04-06 北京八路通科技有限公司 Method for massive resident face information distribution mechanism based on community intelligent access control

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995008038A1 (en) * 1993-09-13 1995-03-23 Rockwell International Corporation Method for friend/foe screening of a remote access command signal
CN102955781B (en) * 2011-08-19 2016-04-20 腾讯科技(深圳)有限公司 A kind of personage's searching method and device
TW201508150A (en) * 2013-08-27 2015-03-01 Hon Hai Prec Ind Co Ltd Remote control key for vehicles
CN103679884B (en) * 2013-12-02 2016-07-06 大连智慧城科技有限公司 The Internet gate inhibition casual user's authorization device and method
CN104392527B (en) * 2014-11-28 2018-01-02 深圳市科漫达智能管理科技有限公司 Gate inhibition current request sending method, passing control method, passing method and system
CN105809777B (en) * 2014-12-29 2019-06-18 腾讯科技(深圳)有限公司 Access control system, client and the auth method of gate inhibition
CN104715046A (en) * 2015-03-26 2015-06-17 杭州云灵科技有限公司 Method and system for inputting information
CN104917762B (en) * 2015-06-08 2020-07-24 联想(北京)有限公司 Authority distribution method, first electronic equipment and system
CN105677798A (en) * 2015-12-31 2016-06-15 上海万格科学器材有限公司 Custom data acquisition method and device
CN107093228B (en) * 2016-02-17 2020-09-01 腾讯科技(深圳)有限公司 Authorization method, device and system applied to electronic lock
CN106162530B (en) * 2016-07-18 2019-04-16 北京千丁互联科技有限公司 A kind of access control management method, system and background server
CN106302653B (en) * 2016-08-01 2020-01-14 厦门中控智慧信息技术有限公司 Control authority sharing method of access control terminal and related equipment
CN107274531A (en) * 2017-07-07 2017-10-20 成都东软学院 Access control method and gate control system
CN109389703A (en) * 2017-08-04 2019-02-26 福州百益百利自动化科技有限公司 A kind of intelligent door lock control system and its control method based on social networks
CN108898705A (en) * 2018-06-14 2018-11-27 贵州大学 A kind of Household access control system and its authorization method shared with permission
CN108961520A (en) * 2018-09-21 2018-12-07 深圳市九洲电器有限公司 A kind of face identification method and device
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN110009543A (en) * 2019-04-02 2019-07-12 深圳市万物云科技有限公司 Based on artificial intelligence community access control management method and device and system and storage medium

Also Published As

Publication number Publication date
CN110648443A (en) 2020-01-03

Similar Documents

Publication Publication Date Title
TWI706368B (en) Block chain-based service leasing method, device, system and electronic equipment
CN110912938B (en) Access verification method and device for network access terminal, storage medium and electronic equipment
US9591126B2 (en) Personal allowed number system
US10681026B2 (en) Secure shell public key audit system
US20160191484A1 (en) Secure Inmate Digital Storage
CN108122109B (en) Electronic credential identity management method and device
WO2017140240A1 (en) Guest authentication method and system
US20150180865A1 (en) Device and method for identity authentication
CN110021092B (en) Tenant access control method based on openid
US20070143475A1 (en) Identification services
JP5925373B1 (en) Communication support system
US20240121086A1 (en) Security key for geographical locations
US20130247149A1 (en) Internet protocol address authentication method
US20160371482A1 (en) Information processing apparatus and information processing method
CN110648443B (en) Access control verification method, device, equipment and medium
CN110838195A (en) Method for authorizing others to unlock
US8761360B1 (en) Individual location tracking in detention environments
CN110766850B (en) Visitor information management method, access control system, server and storage medium
CN111382422B (en) System and method for changing passwords of account records under threat of illegally accessing user data
US11409856B2 (en) Video-based authentication
CN110021084B (en) Code scanning door opening system and method of distributed authorization architecture
AU2019246929A1 (en) A System and Method for Providing Authentication and Authorisation for a Person to Perform Specific Instructions (Tasks)
US11551496B1 (en) Access control systems, devices, and methods therefor
CN113596842B (en) Control method, system and related device
US10003464B1 (en) Biometric identification system and associated methods

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220920

Address after: 25 Financial Street, Xicheng District, Beijing 100033

Patentee after: CHINA CONSTRUCTION BANK Corp.

Address before: 25 Financial Street, Xicheng District, Beijing 100033

Patentee before: CHINA CONSTRUCTION BANK Corp.

Patentee before: Jianxin Financial Science and Technology Co.,Ltd.