CN110648443B - Access control verification method, device, equipment and medium - Google Patents
Access control verification method, device, equipment and medium Download PDFInfo
- Publication number
- CN110648443B CN110648443B CN201910951407.5A CN201910951407A CN110648443B CN 110648443 B CN110648443 B CN 110648443B CN 201910951407 A CN201910951407 A CN 201910951407A CN 110648443 B CN110648443 B CN 110648443B
- Authority
- CN
- China
- Prior art keywords
- user
- identification information
- personal identification
- information
- family
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
Abstract
The embodiment of the invention discloses an access control verification method, an access control verification device, access control equipment and an access control medium, and relates to the technical field of object detection. Wherein the method comprises the following steps: matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database; according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database; and releasing or intercepting the user to be passed according to the obtained authorized residence information. The embodiment of the invention provides a convenient and quick access control verification method, a device, equipment and a medium.
Description
Technical Field
The embodiment of the invention relates to the technical field of intelligent communities, in particular to an access control verification method, device, equipment and medium.
Background
With the overall improvement of the technology level, especially the rapid development of the internet technology, the management of the community is also developed towards informatization and intellectualization.
With the continuous improvement of community security, many communities adopt a face recognition system with higher security performance to manage the entrance and exit of residents in the communities, but the permission for opening the face recognition needs to be registered and opened at a property place, and the permission is time-consuming and labor-consuming to open for families with a plurality of residents or people with a plurality of houses in different communities.
Disclosure of Invention
The embodiment of the invention provides an access control verification method, device, equipment and medium, and provides a convenient and rapid access control verification method.
In a first aspect, an embodiment of the present invention provides an access verification method for an access control, including:
matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database;
and releasing or intercepting the user to be passed according to the obtained authorized residence information.
In a second aspect, an embodiment of the present invention further provides an access verification apparatus, where the apparatus includes:
the personal identification information matching module is used for matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
the authorized living information acquisition module is used for acquiring authorized living information of the successfully matched user aiming at the house in the community from the community database according to the personal identification information of the successfully matched user and the identification information of the community;
and the passing module is used for passing or intercepting the user to be passed according to the obtained authorized residence information.
In a third aspect, an embodiment of the present invention further provides an apparatus, where the apparatus includes:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method of gate verification as described in any of the embodiments of the invention.
In a fourth aspect, the embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements an access control verification method according to any one of the embodiments of the present invention.
The embodiment of the invention acquires the authorized living information of the successfully matched user aiming at the house in the community from the community database by matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database and according to the personal identification information of the successfully matched user and the identification information of the community, thereby releasing or intercepting the user to be passed according to the acquired authorized living information. By matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database, the community user can realize the storage and verification of the access control passing information of the community user and other users through the mobile terminal. Therefore, the embodiment of the invention provides a convenient and quick intelligent access control verification method.
Drawings
Fig. 1 is a flowchart of a method for verifying access control according to an embodiment of the present invention;
FIG. 2 is a flow chart of adding relatives according to the second embodiment of the present invention;
FIG. 3A is a display interface of a user's current family and friends;
FIG. 3B is another display interface for a user's current family and family;
FIG. 4A is a display interface for inputting a user's phone number to be added;
FIG. 4B is a display interface for inputting a user identification number to be added;
FIG. 5A is a display interface for input of family and family information;
FIG. 5B is a diagram of another display interface for input of family and family information;
FIG. 6 is a flow chart of a face management operation for a family;
FIG. 7 is a flowchart illustrating a family member adding operation according to a third embodiment of the present invention;
FIG. 8A is a details page of family and friends management;
FIG. 8B is another detail page of family and friends management;
FIG. 9 is a flowchart illustrating a family delete operation according to an embodiment of the present invention;
FIG. 10 is a flow chart of a family and family relationship modification according to an embodiment of the present invention;
FIG. 11 is a display interface of authorized residential home information;
FIG. 12 is a flow chart of authorizing a building;
fig. 13 is a structural diagram of a door access verification apparatus according to a fourth embodiment of the present invention;
fig. 14 is a schematic structural diagram of an apparatus provided in the fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a door access verification method according to an embodiment of the present invention. The embodiment is applicable to the condition of carrying out identity authentication on the user. Typically, the present embodiment is applicable to the case of performing authentication on a cell resident. The method can be executed by a door access authentication device, which can be implemented by software and/or hardware. As shown in fig. 1, the access control verification method provided in this embodiment may specifically include the following steps:
and 110, matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database.
The personal identification information of the user may include, but is not limited to: the name of the user, the mobile phone number of the user, the certificate number of the user, the association relation between the user and the cell to which the user belongs, face information, fingerprint information and the like.
The community database is a database for storing information of residents in a community. Typically a community comprises a plurality of cells.
In this embodiment, the community users may be divided into four types of users according to the presence or absence of the mobile phone number, that is, the mobile phone number authenticated user, the mobile phone number unauthenticated user, the platform authenticated user, and the platform unauthenticated user, and the personal information data of the four types of users constitute the community database.
The mobile phone number authentication user refers to a user which is registered in the exclusive service and passes real-name authentication, and mobile phone number authentication information of the user is stored in the community database; the user whose mobile phone number is not authenticated comprises the user who has registered on the exclusive service and has not passed the real-name authentication; the platform authentication user refers to a user which is not registered in the exclusive service but passes real-name authentication; the platform unauthenticated user is a user which is not registered in the dedicated service and is not authenticated.
The dedicated service is a cloud service, and a mobile phone number user can register on the dedicated service by using a mobile phone to become a cloud user, and can also perform authorization operation for a non-mobile phone number user to register the non-mobile phone number user as a user on a certain platform governed by the cloud service.
Specifically, when the access control verification is performed, the personal identification information of the user to be passed is matched with the personal information of the user information existing in the community database.
For example, if the user to be passed is a mobile phone number user, the mobile phone number can be used as personal identification information of the user to be passed, and the personal identification information is matched with personal information of existing users in the database to determine whether the current user to be passed already exists in the community database.
And 120, acquiring authorized living information of the successfully matched user for the house in the community from the community database according to the personal identification information of the successfully matched user and the identification information of the community.
The cell identifier is information that can uniquely identify the cell, such as a name and a geographical location of the cell.
In this embodiment, if the personal information of the current user to be passed is successfully matched with the personal identification information of the existing user in the community database, it is further determined whether the user is a user of the current community according to the identification information of the current community, and if the matching is successful, authorized living information of the successfully matched user for the house in the community is obtained from the community database.
The authorized living information is the living authority information of the user to pass to the building family in the community.
And step 130, according to the obtained authorized residence information, releasing or intercepting the user to be passed.
In this embodiment, if the user to be passed has the living right of one or more sets of building users in the local community and has passed the corresponding face authentication, the user to be passed is released, and if the user to be passed does not have the corresponding face authentication, the user to be passed is intercepted.
The embodiment of the invention acquires the authorized living novelty of the successfully matched user aiming at the house in the community from the community database by matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database and according to the personal identification information of the successfully matched user and the identification information of the community, thereby releasing or intercepting the user to be passed according to the acquired authorized living information. By matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database, the community user can realize the storage and verification of the access control passing information of the community user and other users through the mobile terminal. Therefore, compared with the traditional manual authentication method, the embodiment of the invention provides a convenient and fast intelligent access control verification method.
Example two
Fig. 2 is a flowchart of adding relatives according to the second embodiment of the present invention. The embodiment is an alternative provided by adding information of relatives and friends authorized to live to the community database based on the above embodiment. Referring to fig. 2, the operation of adding relatives may specifically include the following steps:
step 210, responding to the user information adding request of the community database, and acquiring the personal identification information of the user to be added, which is input by the operation user.
The operation user refers to a mobile phone number authentication user, and specifically can be an owner who has a mobile phone number in a certain community.
The user to be added refers to a user who has a relationship with the operation user and with whom the operation user wants to establish a relationship.
In this embodiment, the personal identification information of the user includes a mobile phone number of the user and an identification number of the user. As shown in FIG. 3A and FIG. 3B, the content displayed includes the names of the friends, the relationship with the user, and the status information. The family relationship is the name of the operation user to the family, and the family relationship state includes "confirm", "confirmed", "to be confirmed by the other party", and "to be confirmed by you".
The operation user enters a new family and family process by clicking' + new family and family, and obtains the personal identification information of the user to be added, which is input by the operation user, referring to fig. 4A and 4B, the user can input the mobile phone number and the identification number of the family and family to be added on the family and family adding interface.
And step 220, matching the personal identification information of the user to be added with the personal identification information of the relatives and friends in the community database, wherein the relatives and friends refer to the users who have the relationship with the operation user.
In this embodiment, the personal identification information of the user to be added, which is input by the operation user, is matched with the personal identification information of the relatives and friends in the community database, so that it is determined that the user to be added is the existing relatives and friends of the operation user.
Specifically, matching is performed according to the personal identification information of the relatives and friends in the community database of the mobile phone number input by the operation user, and if the personal identification information of the relatives and friends in the community database of the mobile phone number input by the operation user is not matched, matching is performed continuously according to the personal identification information of the relatives and friends in the community database of the identity certificate number input by the operation user.
And step 230, if the user is not matched with the family user, matching the personal identification information of the user to be added with the personal identification information of other users in the community database.
The other users refer to users except for the relationship with the operation user in the community database.
In this embodiment, if the personal identification information of the user to be added, which is input by the operation user, is not matched with the personal identification information of other relatives and friends, the personal identification information of the user to be added is further matched with the personal identification information of other users in the community database. The other users may be mobile phone number authenticated users, mobile phone number unauthenticated users, platform authenticated users or platform unauthenticated users.
And step 240, if the information is not matched with other users, adding the personal identification information, the personal data, the relationship with the operation user and the authorized residence information of the user to be added to the community database.
In this embodiment, if no other user is matched, which indicates that the personal identification information of the current user to be added does not exist in the current community database, the certificate type and the certificate number of the user to be added, the relationship with the operation user, and the authorized living information are added to the community database, and the relationship between the user to be added and the operation user is established. The specific input interface of the family and family information is shown in FIG. 5A and FIG. 5B.
And if the other users are matched, establishing the relationship between the operation user and the other users according to the relationship between the operation user and the other users input by the operation user.
The relationship between the user to be added and the operation user can be determined by referring to the table below.
By establishing the relationship between the users, the community platform can provide customized service information for the users according to the information of the users conveniently.
For example, if a user a has a set of properties, a user B has a set of properties, and the two are relatives and couples, it may be determined that the family to which the user belongs has two sets of properties, and some renting and selling information may be pushed to the user a and the user B through the terminal application, so that they may better manage the properties of the family.
According to the technical scheme, the addition of the relatives and friends is realized by acquiring the personal identification information of the user to be added, which is input by the operation user, so that the management of the relatives and friends by the user is facilitated.
On the basis of the above embodiment, after the personal identification information, the personal details, the relationship with the operation user, and the authorized living information of the user to be added are added to the community database, the method further includes:
determining the authentication authority of the added information according to the relationship between the user to be added and the operation user;
and distributing the authentication task of the added information to an authenticator with the authentication authority, and authenticating the added information by the authenticator.
Specifically, when the user to be added is in a relationship with the operating user and the user to be added is a platform user, the user can perform face authentication operation on the added user through a face management button, so that the user can pass the access control verification of the current cell.
Referring to fig. 6, when performing face management, first of all, whether face information of a current family and a family exists in a community database is checked, if so, a face of the current family and the family is extracted, whether modification is needed is determined, if so, a face is entered through a Software Development Kit (SDK), networking check is performed, if the check is passed, the personal identity information of a user and the face information are synchronized to form an internet of things, and if the check is not passed, the face authentication operation is failed, and the face authentication operation is ended. The user carries out face management on relatives and friends through the mobile terminal, and the relatives and friends can carry out face brushing identification at the entrance guard through the face management, so that the trouble of manual authentication at property places is avoided, and convenience is provided for community residents.
Further, if the user to be added is not in a relationship with the operating user, the authentication task of the user needs to be distributed to an authenticator with authentication authority, and the authenticator authenticates the addition information.
For example, if the relationship between the user to be added and the operation user is a tenant and an owner, a face authentication operation needs to be performed at the property of the cell.
According to the authentication method provided by the embodiment, the user can perform face authentication operation by the family and the other users who are not family need to perform authentication at the community property, so that the user operation is facilitated and the community safety is improved.
EXAMPLE III
FIG. 7 is a flowchart illustrating a family member adding operation according to a third embodiment of the present invention. This embodiment is a further refinement of the steps in the second embodiment, based on the above implementation.
Specifically, referring to fig. 7, the business process of the new family and the family is to input the mobile phone number for matching first, and then input the certificate number for matching. The input mobile phone number needs to be 11-digit pure numbers at the beginning of '1', and if the mobile phone number does not meet the requirement, the user pops up the window to prompt 'please input the correct mobile phone number'. Firstly, matching is carried out on the friends in the community database by using the input mobile phone number. If the matching is successful, the popup prompts that the relatives and friends of the user with the mobile phone number already exist, clicks confirmation, returns to the my relatives and friends list, and ends the new adding operation of the relatives and friends.
Further, if the mobile phone number is not successfully matched with the existing family and family of the user, matching is carried out among all users in the community database. If the matching is successful, entering a page of inputting the family and family information, wherein the name, the certificate type, the certificate number and the mobile phone number are matched user information displayed reversely, and are not allowed to be modified, and the certificate number needs to be shielded according to a desensitization rule. And if the mobile phone number is not successfully matched in all the users, entering a page of inputting certificate numbers. "certificate type" is the selection box, and the options are: "resident identification card", "temporary identification card", "military officer card", "passport (China)", "passport (foreign country)", "passage toward the interior of harbor and Macau", and "passage toward the continent of Taiwan resident". Then, matching is carried out on the existing relatives of the user by using the input certificate type and the certificate number. If the matching is successful, the popup prompts that the relatives and friends of the certificate personnel already exist, clicks confirmation, returns to the my relatives and friends list, and finishes the new adding operation of the relatives and friends. If the certificate type and the certificate number are not successfully matched with the existing friends of the user, matching is carried out in all users, if a mobile phone number authentication client is matched (the certificate numbers are the same, and the mobile phones are different), a popup window prompts that the mobile phone number of the user is inconsistent with the mobile phone number input by the user, and the user enters a page for inputting the family data, wherein the name, the certificate type, the certificate number and the mobile phone number are matched user data which are displayed reversely, modification is not allowed, and the mobile phone number needs to be shielded according to a desensitization rule. If the matched platform authenticates the client, the system enters a page of inputting the family and family information, wherein the name, the certificate type and the certificate number are the matched user information displayed reversely, and the modification is not allowed. If the matched platform is not the authenticated client, the user enters a page of inputting the family and family information, wherein the name, the certificate type and the certificate number are the matched user information displayed reversely, and the modification is not allowed. If the name of the matched platform non-authentication client is not consistent with the actual name, the name can be changed after the face real-name authentication is carried out by clicking 'change of names of relatives and friends'. If the certificate types and the certificate numbers are not successfully matched in all the users, entering a page of inputting family and family information, wherein the name is a text input box; the certificate type and the certificate number are used for showing the input data of the user in a reverse mode and are not allowed to be modified.
And selecting the relationship of relatives and friends in the page of 'inputting relatives and friends data' to submit, wherein when the associated party is a mobile phone number user, the newly-established user relationship is in a 'to be confirmed' state before the opposite party is confirmed. When the associated party is the platform user, the newly created user relationship is in a 'confirmed' state. When there is no matching user for the associated party, a new platform non-authenticated user is generated for the associated party, and a user relationship with a "confirmed" status is newly created, which can be seen in fig. 8A and 8B, a family and family management details page.
Further, on the basis of the above embodiment, the method further includes: acquiring personal identification information of a user to be deleted, which is input by an operation user;
determining a user to be deleted from the relatives and friends of the operation user according to the personal identification information of the user to be deleted, and deleting the relationship between the operation user and the relatives and friends of the user to be deleted from the community database.
Referring to fig. 9, in a specific process of deleting a family and a user clicks "delete family", a popup prompts "confirm to delete the family? And yes and no buttons. And if the user selects 'yes', deleting the user relationship, deleting the relatives and the friends without the confirmation of the opposite party, and pushing the deletion message to the deleted party if the deleted relatives and friends are the mobile phone number users, thereby finishing the operation of deleting the relatives and the friends.
Further, on the basis of the above embodiment, the method further includes: in response to a modification request for a relationship between an operation user and a target relationship user, the modification request being input by the operation user, the relationship between the operation user and the target relationship user in the community database is changed into the modified relationship.
Specifically, referring to fig. 10, the user selects a user who wants to modify the relationship between the relatives and the friends, and determines whether the current relatives and friends are mobile phone number users. And when the relatives and the friends are mobile phone number users, reflecting the names, the certificate types and the certificate numbers for the users to modify the relationship information, sending the modified information to the relatives and the friends for confirmation after the relationship information is modified, changing the relationship information of the relatives and the friends if the relatives and the friends confirm the modification, storing the modified relationship into a community database, and canceling the change if the relatives and the friends do not confirm the modification. And when the relatives and the friends are non-mobile phone users, the names and the identity card numbers of the relatives and the friends are displayed, and the relationship information is input and modified to update the relationship information of the relatives and the friends.
In this embodiment, modifying a family only allows modifying the relationship between the family and the family, and if the personal identification information of the existing family and the family needs to be updated, the modification can be realized only by deleting the personal identification information and then adding the personal identification information again.
Further, on the basis of the above embodiment, the method further comprises a family authorized residence management for managing residence rights of the family to the building. Referring to FIG. 11, the user enters the "authorized residential home" flow by clicking the "authorized residential home" button, which shows the premises where family and family are authorized to live. Click on "cancel authorization", pop-up window prompt "confirm to cancel the authorization? And yes and no buttons. If "yes" is selected, the house authorization is revoked. The "authorized premises" shows all premises under the logged-on user's name, except the premises where the resident of the family is authorized. Click "authorize living", pop-up window prompt "confirm that house living is authorized? And yes and no buttons. If yes, the family is added as the resident of the house, and the residence is authorized. Further, a family or family who has been authorized to live does not allow transfer of his authorized living right to others.
With further reference to fig. 12, when the user performs authorized building operation on a family in the login terminal application, whether the user is a business owner or not is judged through personal identification information input by the user, if yes, building information under the business owner name is inquired, whether the current family is a resident or not is judged, if yes, the current family is displayed as an authorized list, and if not, the current family is selected to be authorized to the building where the current family lives first, and the current family is set as a family identity resident, so that the living right of the authorized family to the building is realized. By the method, the user can conveniently manage the right of residence of the user, face authentication information of relatives and friends can be added through face authentication after the family and family are authorized to live, and the user can verify entrance guard and is convenient to pass.
Example four
Fig. 13 is a structural diagram of a door access verification apparatus according to a fourth embodiment of the present invention. Referring to fig. 13, the access control verification apparatus provided in an embodiment of the present invention includes: a personal identification information matching module 310, an authorized occupancy information acquisition module 320, and a traffic module 330.
The personal identification information matching module 310 is configured to match the personal identification information of the user to be passed with the personal identification information of the existing user in the community database.
And the authorized living information obtaining module 320 is configured to obtain, from the community database, authorized living information of the successfully matched user for the house in the local community according to the personal identification information of the successfully matched user and the local community identification information.
And the passing module 330 is configured to pass or intercept the user to be passed according to the obtained authorized residence information.
The embodiment of the invention acquires the authorized living novelty of the successfully matched user aiming at the house in the community from the community database by matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database and according to the personal identification information of the successfully matched user and the identification information of the community, thereby releasing or intercepting the user to be passed according to the acquired authorized living information. By matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database, the community user can realize the storage and verification of the access control passing information of the community user and other users through the mobile terminal. Therefore, compared with the traditional manual authentication method, the embodiment of the invention provides a convenient and fast intelligent access control verification method.
On the basis of the above embodiment, the apparatus further includes:
and the adding request response module is used for responding to the user information adding request of the community database and acquiring the personal identification information of the user to be added, which is input by the operation user.
And the family and family user matching module is used for matching the personal identification information of the user to be added with the personal identification information of the family and family users in the community database, wherein the family and family users are users who have a family and family relationship with the operation user.
And the other user matching module is used for matching the personal identification information of the user to be added with the personal identification information of other users in the community database if the user to be added is not matched with the user of a family.
And the data adding module is used for adding the personal identification information, the personal data, the relation with the operation user and the authorized residence information of the user to be added to the community database if the user to be added is not matched with other users.
Further, the other user matching module is further configured to, if the other user is matched, establish a relationship between the operation user and the other user according to the relationship between the operation user and the other user input by the operation user.
Further, on the basis of the above embodiment, the apparatus further includes:
and the authentication authority adding module is used for determining the authentication authority of the added information according to the relationship between the user to be added and the operation user.
And the authority authentication module is used for distributing the authentication task of the added information to an authenticator with the authentication authority, and the authenticator authenticates the added information.
On the basis of the above embodiment, the apparatus further includes a deletion module, specifically configured to: acquiring personal identification information of a user to be deleted, which is input by an operation user;
determining a user to be deleted from the relatives and friends of the operation user according to the personal identification information of the user to be deleted, and deleting the relationship between the operation user and the relatives and friends of the user to be deleted from the community database.
On the basis of the above embodiment, the apparatus further includes a relationship modification module configured to change the relationship between the operation user and the target friend user in the community database to a modified relationship in response to a relationship modification request for the target friend user input by the operation user.
The access control verification device provided by the embodiment of the invention can execute the access control verification method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
EXAMPLE five
Fig. 14 is a schematic structural diagram of an apparatus according to a fifth embodiment of the present invention. FIG. 14 illustrates a block diagram of an exemplary device 12 suitable for use in implementing embodiments of the present invention. The device 12 shown in fig. 14 is only an example and should not bring any limitation to the function and scope of use of the embodiments of the present invention.
As shown in FIG. 14, device 12 is in the form of a general purpose computing device. The components of device 12 may include, but are not limited to: one or more processors 16 or processing units, a system memory device 28, and a bus 18 that couples various system components including the system memory device 28 and the processors 16.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in storage 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
The processor 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, to implement an access verification method provided by the embodiment of the present invention.
EXAMPLE five
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform a method for verifying an access control, and the method includes:
matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database;
and releasing or intercepting the user to be passed according to the obtained authorized residence information.
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the above method operations, and may also perform related operations in an access verification method provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a terminal, or a network device) to execute the methods of the embodiments of the present invention.
It should be noted that, in the embodiment of the access control verification apparatus, the included units and modules are only divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments illustrated herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (7)
1. A method for verifying an access control, the method comprising:
matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
according to the personal identification information of the successfully matched user and the identification information of the community, obtaining authorized living information of the successfully matched user for the house in the community from the community database;
according to the obtained authorized residence information, the user to be passed is released or intercepted;
responding to a user information adding request of the community database, and acquiring personal identification information of a user to be added, which is input by an operation user;
matching the personal identification information of the user to be added with the personal identification information of a family user in the community database, wherein the family user is a user having a family relationship with the operation user;
if the user is not matched with the user of a family or a family, matching the personal identification information of the user to be added with the personal identification information of other users in the community database;
if the information is not matched with other users, adding the personal identification information, the personal data, the relationship with the operation user and the authorized living information of the user to be added to the community database;
if the other users are matched, establishing the relationship between the operation user and the other users according to the relationship between the operation user and the other users input by the operation user;
the community database consists of personal information data of mobile phone number authenticated users, mobile phone number unauthenticated users, platform authenticated users and platform unauthenticated users;
after the personal identification information, the personal data, the relationship with the operation user and the authorized residence information of the user to be added are added to the community database, the method further comprises the following steps:
determining the authentication authority of the added information according to the relationship between the user to be added and the operation user;
distributing the authentication task of the added information to an authenticator with the authentication authority, and authenticating the added information by the authenticator;
and if the user to be added and the operation user are the relationship between the tenant and the owner, performing face authentication operation at the property place of the cell.
2. The method of claim 1, further comprising:
acquiring personal identification information of a user to be deleted, which is input by an operation user;
determining a user to be deleted from the relatives and friends of the operation user according to the personal identification information of the user to be deleted, and deleting the relationship between the operation user and the relatives and friends of the user to be deleted from the community database.
3. The method of claim 1, further comprising:
in response to a modification request for a relationship between an operation user and a target relationship user, the modification request being input by the operation user, the relationship between the operation user and the target relationship user in the community database is changed into the modified relationship.
4. An access verification apparatus, comprising:
the personal identification information matching module is used for matching the personal identification information of the user to be passed with the personal identification information of the existing user in the community database;
the authorized living information acquisition module is used for acquiring authorized living information of the successfully matched user aiming at the house in the community from the community database according to the personal identification information of the successfully matched user and the identification information of the community;
the passing module is used for passing or intercepting the user to be passed according to the obtained authorized residence information;
responding to a user information adding request of the community database, and acquiring personal identification information of a user to be added, which is input by an operation user;
matching the personal identification information of the user to be added with the personal identification information of a family user in the community database, wherein the family user is a user having a family relationship with the operation user;
if the user is not matched with the user of a family or a family, matching the personal identification information of the user to be added with the personal identification information of other users in the community database;
if the information is not matched with other users, adding the personal identification information, the personal data, the relationship with the operation user and the authorized living information of the user to be added to the community database;
if the other users are matched, establishing the relationship between the operation user and the other users according to the relationship between the operation user and the other users input by the operation user;
the community database consists of personal information data of mobile phone number authenticated users, mobile phone number unauthenticated users, platform authenticated users and platform unauthenticated users;
after the personal identification information, the personal data, the relationship with the operation user and the authorized residence information of the user to be added are added to the community database,
determining the authentication authority of the added information according to the relationship between the user to be added and the operation user;
distributing the authentication task of the added information to an authenticator with the authentication authority, and authenticating the added information by the authenticator;
and if the user to be added and the operation user are the relationship between the tenant and the owner, performing face authentication operation at the property place of the cell.
5. The apparatus of claim 4, further comprising:
the personal identification information acquisition module is used for acquiring the personal identification information of the user to be deleted, which is input by the operation user;
and the family and family relationship deleting module is used for determining the user to be deleted from the family and family users of the operation user according to the personal identification information of the user to be deleted, and deleting the family and family relationship between the operation user and the user to be deleted from the community database.
6. An apparatus, characterized in that the apparatus comprises:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a gate verification method as recited in any of claims 1-3.
7. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a door access verification method as claimed in any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910951407.5A CN110648443B (en) | 2019-10-08 | 2019-10-08 | Access control verification method, device, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910951407.5A CN110648443B (en) | 2019-10-08 | 2019-10-08 | Access control verification method, device, equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110648443A CN110648443A (en) | 2020-01-03 |
CN110648443B true CN110648443B (en) | 2021-12-10 |
Family
ID=68993548
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910951407.5A Active CN110648443B (en) | 2019-10-08 | 2019-10-08 | Access control verification method, device, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110648443B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7358297B2 (en) * | 2020-05-27 | 2023-10-10 | 本田技研工業株式会社 | Entry support system, entry support method, and entry support program |
CN112614265A (en) * | 2021-01-07 | 2021-04-06 | 北京八路通科技有限公司 | Method for massive resident face information distribution mechanism based on community intelligent access control |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1995008038A1 (en) * | 1993-09-13 | 1995-03-23 | Rockwell International Corporation | Method for friend/foe screening of a remote access command signal |
CN102955781B (en) * | 2011-08-19 | 2016-04-20 | 腾讯科技(深圳)有限公司 | A kind of personage's searching method and device |
TW201508150A (en) * | 2013-08-27 | 2015-03-01 | Hon Hai Prec Ind Co Ltd | Remote control key for vehicles |
CN103679884B (en) * | 2013-12-02 | 2016-07-06 | 大连智慧城科技有限公司 | The Internet gate inhibition casual user's authorization device and method |
CN104392527B (en) * | 2014-11-28 | 2018-01-02 | 深圳市科漫达智能管理科技有限公司 | Gate inhibition current request sending method, passing control method, passing method and system |
CN105809777B (en) * | 2014-12-29 | 2019-06-18 | 腾讯科技(深圳)有限公司 | Access control system, client and the auth method of gate inhibition |
CN104715046A (en) * | 2015-03-26 | 2015-06-17 | 杭州云灵科技有限公司 | Method and system for inputting information |
CN104917762B (en) * | 2015-06-08 | 2020-07-24 | 联想(北京)有限公司 | Authority distribution method, first electronic equipment and system |
CN105677798A (en) * | 2015-12-31 | 2016-06-15 | 上海万格科学器材有限公司 | Custom data acquisition method and device |
CN107093228B (en) * | 2016-02-17 | 2020-09-01 | 腾讯科技(深圳)有限公司 | Authorization method, device and system applied to electronic lock |
CN106162530B (en) * | 2016-07-18 | 2019-04-16 | 北京千丁互联科技有限公司 | A kind of access control management method, system and background server |
CN106302653B (en) * | 2016-08-01 | 2020-01-14 | 厦门中控智慧信息技术有限公司 | Control authority sharing method of access control terminal and related equipment |
CN107274531A (en) * | 2017-07-07 | 2017-10-20 | 成都东软学院 | Access control method and gate control system |
CN109389703A (en) * | 2017-08-04 | 2019-02-26 | 福州百益百利自动化科技有限公司 | A kind of intelligent door lock control system and its control method based on social networks |
CN108898705A (en) * | 2018-06-14 | 2018-11-27 | 贵州大学 | A kind of Household access control system and its authorization method shared with permission |
CN108961520A (en) * | 2018-09-21 | 2018-12-07 | 深圳市九洲电器有限公司 | A kind of face identification method and device |
CN109598831A (en) * | 2018-11-20 | 2019-04-09 | 北京千丁互联科技有限公司 | A kind of visitor's access control system control method and its device based on image recognition |
CN110009543A (en) * | 2019-04-02 | 2019-07-12 | 深圳市万物云科技有限公司 | Based on artificial intelligence community access control management method and device and system and storage medium |
-
2019
- 2019-10-08 CN CN201910951407.5A patent/CN110648443B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110648443A (en) | 2020-01-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI706368B (en) | Block chain-based service leasing method, device, system and electronic equipment | |
CN110912938B (en) | Access verification method and device for network access terminal, storage medium and electronic equipment | |
US9591126B2 (en) | Personal allowed number system | |
US10681026B2 (en) | Secure shell public key audit system | |
US20160191484A1 (en) | Secure Inmate Digital Storage | |
CN108122109B (en) | Electronic credential identity management method and device | |
WO2017140240A1 (en) | Guest authentication method and system | |
US20150180865A1 (en) | Device and method for identity authentication | |
CN110021092B (en) | Tenant access control method based on openid | |
US20070143475A1 (en) | Identification services | |
JP5925373B1 (en) | Communication support system | |
US20240121086A1 (en) | Security key for geographical locations | |
US20130247149A1 (en) | Internet protocol address authentication method | |
US20160371482A1 (en) | Information processing apparatus and information processing method | |
CN110648443B (en) | Access control verification method, device, equipment and medium | |
CN110838195A (en) | Method for authorizing others to unlock | |
US8761360B1 (en) | Individual location tracking in detention environments | |
CN110766850B (en) | Visitor information management method, access control system, server and storage medium | |
CN111382422B (en) | System and method for changing passwords of account records under threat of illegally accessing user data | |
US11409856B2 (en) | Video-based authentication | |
CN110021084B (en) | Code scanning door opening system and method of distributed authorization architecture | |
AU2019246929A1 (en) | A System and Method for Providing Authentication and Authorisation for a Person to Perform Specific Instructions (Tasks) | |
US11551496B1 (en) | Access control systems, devices, and methods therefor | |
CN113596842B (en) | Control method, system and related device | |
US10003464B1 (en) | Biometric identification system and associated methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220920 Address after: 25 Financial Street, Xicheng District, Beijing 100033 Patentee after: CHINA CONSTRUCTION BANK Corp. Address before: 25 Financial Street, Xicheng District, Beijing 100033 Patentee before: CHINA CONSTRUCTION BANK Corp. Patentee before: Jianxin Financial Science and Technology Co.,Ltd. |