CN111951455A - Method, system, equipment and storage medium for remotely authorizing visitor to pass - Google Patents

Method, system, equipment and storage medium for remotely authorizing visitor to pass Download PDF

Info

Publication number
CN111951455A
CN111951455A CN202010859207.XA CN202010859207A CN111951455A CN 111951455 A CN111951455 A CN 111951455A CN 202010859207 A CN202010859207 A CN 202010859207A CN 111951455 A CN111951455 A CN 111951455A
Authority
CN
China
Prior art keywords
visitor
information
mobile terminal
permission
address information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010859207.XA
Other languages
Chinese (zh)
Inventor
李旭滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Maosheng Intelligent Technology Co ltd
Original Assignee
Shanghai Maosheng Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Maosheng Intelligent Technology Co ltd filed Critical Shanghai Maosheng Intelligent Technology Co ltd
Priority to CN202010859207.XA priority Critical patent/CN111951455A/en
Publication of CN111951455A publication Critical patent/CN111951455A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application relates to a method, a system, equipment and a storage medium for remotely authorizing visitor passage, wherein the method comprises the following steps: the method comprises the steps that a cloud platform obtains address information accessed by a visitor and face information of the visitor, wherein the address information is collected by an access control terminal; the mobile terminal verifies the address information and the face information; under the condition of successful verification, the mobile terminal generates an authorization instruction, wherein the authorization instruction comprises address information and face information; the mobile terminal generates key information with visitor passing authority corresponding to the authorization instruction; the cloud platform receives and sends the key information to the access control terminal; and the access control terminal displays the key information so that the visitor can obtain the key information. Through the method and the device, the problem that an owner cannot remotely authorize an external visitor to enter a room when the owner is not at home is solved, and the technical effect that the owner can intelligently pass according to the face information of the visitor is achieved.

Description

Method, system, equipment and storage medium for remotely authorizing visitor to pass
Technical Field
The present application relates to the field of remote control, and in particular, to a method, system, device, and storage medium for remotely authorizing visitor passage.
Background
At present, because the security awareness of an intelligent community is strong, under the condition that no access control card exists or a community owner does not exist, an external visitor can not directly enter the community, and under the condition that external personnel need to enter the community to search friends, the external visitor can generally get the IC card and obtain the permission of taking a community elevator or the permission of opening an access control machine of an underground parking lot and a unit door within limited time. If the visitor from the outside can get the corresponding authority by getting the IC card to enter the unit to search the owner.
In the related art, under the condition that an external visitor takes an IC card to enter the community and an owner is not at home, the external visitor can only come again every day because the IC card cannot directly enter the owner's home and the owner cannot remotely authorize the external visitor to enter the room; and under the condition that the express delivery personnel or the takeaway personnel are owners to deliver goods and the owners are not at home, if the express delivery personnel or the takeaway personnel cannot acquire the IC card and the owners cannot remotely authorize the express delivery personnel or the takeaway personnel to enter the owners room, the goods cannot be delivered to the owners, so that the living experience of the owners can be influenced.
At present, no effective solution is provided for the problem that in the related art, under the condition that an owner is not at home, the owner cannot remotely authorize an external visitor to enter a room.
Disclosure of Invention
The embodiment of the application provides a method, a system, equipment and a storage medium for remotely authorizing visitor passage, so as to solve at least the problem that in the related art, under the condition that a business owner is not at home, the business owner can not remotely authorize foreign visitors to enter a room.
In a first aspect, the present invention provides a method for remotely authorizing visitor to pass, which is applied to a mobile terminal and includes:
the method comprises the steps that a cloud platform obtains address information accessed by a visitor and face information of the visitor, wherein the address information is collected by an access control terminal;
the mobile terminal verifies the address information and the face information;
under the condition that the verification is successful, the mobile terminal generates an authorization instruction, wherein the authorization instruction comprises the address information and the face information;
the mobile terminal generates key information with visitor passage permission corresponding to the authorization instruction;
the cloud platform receives and sends the key information to the access control terminal;
and the access control terminal displays the key information so that the visitor acquires the key information.
Further, after the mobile terminal verifies the address information and the face information, the method further includes:
under the condition that the verification is unsuccessful, the mobile terminal generates an authorization prohibiting instruction, wherein the authorization prohibiting instruction comprises the face information and the address information;
the cloud platform generates no-pass information corresponding to the no-authorization instruction;
and the entrance guard terminal displays the no-passing information.
Further, the mobile terminal generating the key information with the visitor passage authority corresponding to the authorization instruction comprises:
the mobile terminal acquires owner information corresponding to the address information;
the mobile terminal acquires owner passing authority corresponding to the owner information;
the mobile terminal generates the key information with the visitor permission corresponding to the authorization instruction according to the owner permission, wherein the visitor permission is a subset of the owner permission.
Further, after the access control terminal displays the key information to enable the visitor to obtain the key information, the method further includes:
when the cloud platform identifies that the visitor opens a terminal device through the key information, the cloud platform verifies whether the terminal device is matched with the visitor passage permission;
and under the condition that the terminal equipment is matched with the visitor passage permission, the cloud platform controls to start the terminal equipment.
In a second aspect, the present invention provides a system for remotely authorizing visitor to pass, applied to a mobile terminal, including:
the access control terminal is used for acquiring address information accessed by a visitor and face information of the visitor and displaying key information so that the visitor can acquire the key information with visitor passage permission;
the cloud platform is used for acquiring the address information, the face information and the key information with the visitor passage permission;
and the mobile terminal is used for receiving and verifying the address information and the face information, generating the authorization instruction corresponding to the address information and the face information under the condition of successful verification, and generating the key information corresponding to the authorization instruction and having the visitor passing authority, wherein the authorization instruction comprises the address information and the face information.
Further, the mobile terminal includes:
the generation module is used for the authorization instruction, the key information and an authorization forbidding instruction, wherein the authorization forbidding instruction comprises the face information and the address information;
the cloud platform is further used for generating the traffic prohibition information corresponding to the authorization prohibition instruction;
the entrance guard terminal is also used for displaying the no-pass information.
Further, the mobile terminal further includes:
the acquisition module is used for acquiring owner information corresponding to the address information and owner passing permission corresponding to the owner information;
the generation module is further used for generating the key information with the visitor permission corresponding to the authorization instruction according to the owner permission, wherein the visitor permission is a subset of the owner permission.
Further, the cloud platform further comprises:
the verification module is used for verifying whether the terminal equipment is matched with the visitor passage permission or not under the condition that the visitor opens the terminal equipment through the key information;
and the control module is used for controlling the opening of the terminal equipment under the condition that the terminal equipment is matched with the visitor passage permission.
In a third aspect, an embodiment of the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor executes the computer program to implement the method for remotely authorizing guest traffic as described in the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method for remotely authorizing guest traffic as described in the first aspect above.
Compared with the prior art, the method, the system, the equipment and the storage medium for remotely authorizing the passage of the visitor, provided by the embodiment of the application, are used for acquiring the address information accessed by the visitor and the face information of the visitor, which are acquired by the access control terminal, through the cloud platform; the mobile terminal verifies the address information and the face information; under the condition of successful verification, the mobile terminal generates an authorization instruction, wherein the authorization instruction comprises address information and face information; the mobile terminal generates key information with visitor passing authority corresponding to the authorization instruction; the cloud platform receives and sends the key information to the access control terminal; and the access control terminal displays the key information so that the visitor can obtain the key information. The problem of the business owner can't long-rangely authorize external visitor to get into the room under the condition that the business owner is not at home is solved, the intelligent current technological effect that the business owner can carry out according to visitor's face information has been realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a first flowchart of a method for remotely authorizing visitor traffic according to an embodiment of the present invention;
FIG. 2 is a flowchart II of a method for remotely authorizing visitor passage according to an embodiment of the present invention;
FIG. 3 is a flowchart III of a method for remotely authorizing visitor traffic according to an embodiment of the present invention;
FIG. 4 is a flow chart of a method for remotely authorizing visitor traffic according to an embodiment of the present invention;
FIG. 5 is a block diagram of a system for remotely authorizing guest traffic according to an embodiment of the present invention;
FIG. 6 is a block diagram of a second embodiment of a system for remotely authorizing guest access;
FIG. 7 is a block diagram of a system for remotely authorizing guest access according to an embodiment of the present invention;
FIG. 8 is a block diagram of a system for remotely authorizing guest access according to an embodiment of the present invention;
fig. 9 is an application scenario diagram of a method for remotely authorizing visitor passage according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The invention provides a method, a system, equipment and a storage medium for remotely authorizing visitor passage, which are applied to the field of remote control.
Fig. 1 is a first flowchart of a method for remotely authorizing visitor passage according to an embodiment of the present invention, please refer to fig. 1, the method includes the following steps:
step S102, the cloud platform acquires address information accessed by the visitor and face information of the visitor, wherein the address information is acquired by the access control terminal;
step S104, the mobile terminal verifies the address information and the face information;
step S106, under the condition of successful verification, the mobile terminal generates an authorization instruction, wherein the authorization instruction comprises address information and face information;
step S108, the mobile terminal generates key information with visitor passing authority corresponding to the authorization instruction;
step S110, the cloud platform receives and sends key information to the access control terminal;
and step S112, the access control terminal displays the key information sent by the cloud platform so that the visitor can obtain the key information.
The access control terminal can acquire a plurality of face information at one time and send the face information to the cloud platform, and then the cloud platform selects clear face information to send to the mobile terminal, so that the mobile terminal can accurately check the face information, and the check failure caused by the unclear face information is prevented.
The mobile terminal can receive the address information and the face information through an applet, an H5 page or an application program, check the address information and the face information, and generate an authorization instruction under the condition that the check is successful.
Under the condition that the mobile terminal generates key information with visitor passing permission corresponding to the authorization instruction, the mobile terminal sends the key information to the cloud platform; and then the cloud platform sends the key information to the access control terminal, and the access control terminal displays the key information so that the visitor can obtain the key information.
For example, in the case that the key information is a digital password, if the cloud platform receives the digital password, the digital password is sent to the access control terminal, the access control terminal displays the digital password, and then after the visitor acquires the digital password, the visitor can open the terminal device corresponding to the visitor passage authority through the digital password, for example, the community door or the elevator in the call unit can be opened.
In some embodiments, the cloud platform may send address information and face information of a visitor to the mobile terminal at the same time, so that the mobile terminal performs verification according to the address information and the face information.
For example, when the visitor is an express delivery person, the cloud platform acquires address information, accessed by the express delivery person, acquired by the access control terminal and face information of the express delivery person, and sends the face information and the address information to the mobile terminal, and the mobile terminal generates an authorization instruction and key information with visitor passing permission corresponding to the authorization instruction according to the face information, wherein the authorization instruction comprises the face information and the address information.
In some embodiments, the cloud platform may simultaneously send address information and a plurality of face information of a visitor to the mobile terminal, where the face information is face information of the same visitor, so that the mobile terminal can accurately identify the visitor according to the face information.
For example, when the visitor is an express delivery person, the cloud platform can acquire 3 different pieces of face information of the express delivery person and address information which the express delivery person needs to access and is acquired by the access control terminal, and send the 3 different pieces of face information and address information to the mobile terminal, and the mobile terminal generates an authorization instruction and key information with visitor passing permission corresponding to the authorization instruction under the condition that the 3 different pieces of face information and address information are successfully checked, wherein the authorization instruction comprises the address information and 3 different pieces of face information, so that the mobile terminal can accurately identify the express delivery person according to the 3 different pieces of face information.
In some embodiments, the cloud platform may simultaneously send address information and face information of multiple visitors to the mobile terminal, where each visitor corresponds to at least one face information, so that the mobile terminal verifies each visitor.
For example, under the condition that 3 visitors access the same address information at the same time, the access control terminal can respectively acquire 3 face information of 3 visitors, and send the 3 face information to the cloud platform, the cloud platform sends the 3 face information and the address information to the mobile terminal, the mobile terminal generates an authorization instruction and key information with visitor passing permission corresponding to the authorization instruction according to the 3 face information and the address information, wherein the authorization instruction comprises the 3 face information and the address information, so that the 3 visitors are verified at the same time, and irrelevant personnel are prevented from entering an address corresponding to the address information.
In some embodiments, the cloud platform may simultaneously send address information and at least one face information of a visitor to the mobile terminal, so that the visitor can enter addresses corresponding to the address information, where one address information corresponds to one address.
For example, in the case that the visitor is a friend of the owner and the owner has two sets of rooms, if the cloud platform receives two sets of address information of the two sets of rooms and at least one piece of face information of the visitor collected by the access control terminal, and the two address information are respectively the first address information and the second address information, at this time, the cloud platform can send the first address information, the second address information and at least one face information of the visitor to the mobile terminal, and under the condition that the mobile terminal successfully verifies the first address information, the second address information and the at least one face information of the visitor, generating an authorization instruction and key information with visitor passage authority corresponding to the authorization instruction, the authorization instruction comprises first address information, second address information and at least one piece of face information, so that the visitor can enter two sets of rooms of the owner through the key information.
In some embodiments, the cloud platform may simultaneously send a plurality of address information and a plurality of face information of a plurality of visitors to the mobile terminal, where one visitor corresponds to one face information, so that the mobile terminal simultaneously verifies the plurality of address information and the plurality of face information, and verification efficiency is improved.
For example, under the condition that two visitors simultaneously and respectively access two sets of rooms of the same owner, the cloud platform respectively acquires two pieces of face information of the two visitors and two pieces of address information of the two sets of rooms, wherein the two pieces of address information can be first address information and second address information, the two pieces of face information can be first face information and second face information, the first face information corresponds to the first address information, the second face information corresponds to the second address information, the cloud platform sends the first face information, the second face information, the first address information and the second address information to the mobile terminal, and the mobile terminal generates a first authorized visitor instruction according to the first face information and the first address information and has a first right of passage corresponding to the first authorized instruction under the condition that the first face information, the second face information, the first address information and the second address information are verified successfully And limited key information, a second authorization instruction and second key information which is corresponding to the second authorization instruction and has a second visitor passage permission are generated according to second face information and second address information, wherein the first visitor passage permission corresponds to the first authorization instruction, and the second visitor passage permission corresponds to the second authorization instruction, so that a visitor can enter one room corresponding to the first address information according to the key information with the first visitor passage permission, and another visitor can enter another room corresponding to the second address information according to the key information with the second visitor passage permission, so that the mobile terminal can simultaneously check the plurality of address information and the plurality of face information, generate different key information for different visitors, and further improve the checking efficiency.
The key information may be a digital password or a face password.
And when the visitor acquires the key information with the visitor passing permission, the visitor can pass through the key information.
In some embodiments, the key information may be a digital password. For example, under the condition that the visitor is an express delivery person, the mobile terminal can generate a digital password with visitor passage permission, and at the moment, the express delivery person can control to open the terminal device corresponding to the visitor passage permission by inputting the digital password.
In some embodiments, the key information may be a face password. For example, under the condition that the visitor is an express delivery person and receives face information of the express delivery person, the mobile terminal can generate key information with visitor passing permission according to the face information, namely generate a face password with the visitor passing permission, and at the moment, the express delivery person can control to open the terminal device corresponding to the visitor passing permission through the face information.
Through steps S102 to S112, the problem that the owner cannot remotely authorize the external visitor to enter the room when the owner is not at home in the prior art is solved, and the effect of enabling the visitor to pass through without feeling when the visitor has the key information is achieved.
Fig. 2 is a flowchart of a method for remotely authorizing visitor passage according to an embodiment of the present invention, and referring to fig. 2, after the mobile terminal verifies the address information and the face information, the method further includes the following steps:
step S202, under the condition of unsuccessful verification, the mobile terminal generates an authorization prohibiting instruction, wherein the authorization prohibiting instruction comprises face information and address information;
step S204, the cloud platform generates the traffic prohibition information corresponding to the authorization prohibition instruction;
and step S206, the entrance guard terminal displays the no-pass information.
The mobile terminal can generate an authorization forbidding instruction and sends the authorization forbidding instruction to the cloud platform, the cloud platform generates the traffic forbidding information according to the authorization forbidding instruction and sends the traffic forbidding information to the access control terminal, and the access control terminal receives and displays the traffic forbidding information so that a visitor can know the traffic forbidding information.
For example, under the condition that the visitor is an express delivery person and the mobile terminal acquires face information of the express delivery person and address information required to be accessed by the express delivery person, if the face information and the address information of the express delivery person are checked by the mobile terminal unsuccessfully, the mobile terminal generates an authorization forbidding instruction and sends the authorization forbidding instruction to the cloud platform, the cloud platform generates the traffic forbidding information 'no pass' according to the authorization forbidding instruction and sends the traffic forbidding information to the access control terminal, and the access control terminal displays the traffic forbidding information to inform the visitor of the traffic forbidding.
Through steps S202 to S206, the problem that in the prior art, when the owner is not at home, the remote authorization cannot be performed is solved, and a technical effect that the owner can decide whether to authorize the relevant visitor to pass through the mobile terminal is achieved.
Fig. 3 is a flow chart of a method for remotely authorizing visitor passage according to an embodiment of the present invention, please refer to fig. 3, where the step of generating the key information with the visitor passage right corresponding to the authorization instruction by the mobile terminal includes the following steps:
step S302, the mobile terminal acquires owner information corresponding to the address information;
step S304, the mobile terminal acquires owner passing authority corresponding to owner information;
and step S306, the mobile terminal generates key information with visitor passage permission corresponding to the authorization instruction according to the owner passage permission, wherein the visitor passage permission is a subset of the owner passage permission.
The owner permission is all permissions owned by the owner.
For example, under the condition that the owner passing permission of the owner is the unit access control permission, the calling unit elevator permission and the parking garage access control permission, if the mobile terminal successfully verifies the face information and the address information, the key information with the visitor passing permission corresponding to the authorization instruction can be generated according to the owner passing permission, and if the visitor passing permission is the unit access control permission and the calling unit elevator permission, the visitor can open the unit access control and the calling unit elevator through the key information.
Through the steps S302 to S304, the problem that the owner cannot remotely authorize the external visitor to enter the room under the condition that the owner is not at home in the prior art is solved, and the technical effect that the owner can authorize the visitor according to the own passing permission is achieved.
Fig. 4 is a fourth flowchart of a method for remotely authorizing passage of a visitor according to an embodiment of the present invention, please refer to fig. 4, where after the access control terminal receives and displays key information sent by the cloud platform, so that the visitor obtains the key information, the method further includes:
step S402, when the cloud platform identifies that the visitor opens a terminal device through the key information, the cloud platform verifies whether the terminal device is matched with the visitor passage authority;
and S404, under the condition that the terminal equipment is matched with the visitor passage permission, the cloud platform controls to start the terminal equipment.
The visitor passage permission corresponds to the plurality of terminal devices, and under the condition that the secret key information has the visitor passage permission, the visitor can open the terminal devices through the secret key information.
For example, under the condition that the terminal equipment corresponding to the visitor passage permission is the unit access control and the elevator access control of one unit, if the cloud platform identifies that the visitor opens the unit access control of one unit through the key information, at the moment, because the visitor passage permission is matched with the unit access control of one unit, the unit access control of one unit is opened, so that the visitor can enter one unit.
Through the steps S402 to S404, the technical effect that the visitor can pass through the area corresponding to the visitor passing authority according to the key information is achieved.
Corresponding to the above method for remotely authorizing visitor to pass, the embodiment of the present invention further provides a system for remotely authorizing visitor to pass, which is used to implement the above embodiment and the preferred embodiment, and has been described and will not be described again.
Fig. 5 is a block diagram of a first structure of a system for remotely authorizing visitor passage according to an embodiment of the present invention, and referring to fig. 5, the system includes:
the access control terminal 510 is configured to obtain address information accessed by a visitor and face information of the visitor, and display key information to enable the visitor to obtain the key information;
the cloud platform 520 is used for acquiring address information, face information and key information with visitor passage permission;
and the mobile terminal 530 is configured to receive and verify the address information and the face information, and generate an authorization instruction corresponding to the address information and the face information and generate key information with visitor passage permission corresponding to the authorization instruction if the verification is successful, where the authorization instruction includes the address information and the face information.
The entrance guard terminal 510 can be installed at a community doorway, the cloud platform 520 is respectively connected with the entrance guard terminal 510 and the mobile terminal 530 through the network 540, the entrance guard terminal 510 is used for collecting address information accessed by a visitor and capturing face information of the visitor, the address information and the face information are sent to the cloud platform 520 through the network 540, and the cloud platform 520 sends the address information and the face information to the mobile terminal 530 through the network 540; the mobile terminal 530 verifies the address information and the face information through an applet or an H5 page or an application program, and generates an authorization instruction and key information with a visitor passing right corresponding to the authorization instruction if the verification is successful, wherein the authorization instruction comprises the address information and the face information; in the case that the cloud platform 520 receives the key information sent by the mobile terminal 530, the key information is sent to the access terminal 510, and the access terminal 510 displays the key information, so that the visitor obtains the key information.
The access control terminal 510 may be a split type, and may include an intercom and a snapshot machine, so as to obtain address information accessed by a visitor and face information of the visitor; or may be integrated, such as a visual interphone.
The cloud platform 520 may be a private cloud platform, a public cloud platform, a single server, or a server cluster.
The mobile terminal 530 may be a smart phone, a tablet computer, or a notebook computer.
For example, in the case where the access terminal 510 is installed at a doorway of a community, the address information may be unit information and floor information, and the face information may be face image information of a visitor.
The network 540 may be a wired network connection or a wireless network connection. In some of these embodiments, the network 540 may include a public network (e.g., the internet), a private network (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), etc.), a wireless network (e.g., an 802.11 network, a Wi-Fi network, etc.), a cellular network (e.g., a 4G network, a 5G network, etc.), a frame relay network, a Virtual Private Network (VPN), a satellite network, a router, a hub, a switch, a server, etc., or any combination thereof. By way of example only, network 540 may include a cable network, a wireline network, a fiber optic network, a telecommunications network, an intranet, a Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), a Public Switched Telephone Network (PSTN), the like, or any combination thereof. In some embodiments, network 540 may include one or more network access points. For example, the network 540 may include wired and/or wireless network access points, such as base stations and/or internet switching points, through which the devices described above may connect to the network to exchange information and/or data.
Through entrance guard terminal 510, cloud platform 520 and mobile terminal 530, solved the condition that the owner is not at home among the prior art, the problem that the owner can't long-range authorization external visitor gets into the room has realized that the visitor's is noninductive current.
Fig. 6 is a block diagram of a second structure of a system for remotely authorizing visitor passage according to an embodiment of the present invention, and referring to fig. 6, the mobile terminal 530 further includes:
the generating module 531 is configured to generate an authorization instruction, key information, and an authorization prohibition instruction, where the authorization prohibition instruction includes face information and address information;
the cloud platform 520 is further configured to generate no-pass information corresponding to the no-authorization instruction;
the access terminal 510 is also used to display no-pass information.
The generation module 531 generates an authorization prohibition instruction, the cloud platform 520 generates pass prohibition information corresponding to the authorization prohibition instruction, the cloud platform 520 sends the pass prohibition information to the access control terminal 510, and the access control terminal 510 displays the pass prohibition information, so that the problem that in the prior art, when an owner is not at home, a visitor cannot be remotely authorized to pass is solved, and the technical effect that the owner can decide whether to authorize the passage of the relevant visitor through the mobile terminal 530 is achieved.
Fig. 7 is a block diagram of a third structure of a system for remotely authorizing visitor passage according to an embodiment of the present invention, and referring to fig. 7, the mobile terminal 530 further includes:
an obtaining module 532, configured to obtain owner information corresponding to the address information and owner permission corresponding to the owner information;
the generating module 531 is further configured to generate a visitor permission according to the owner permission, where the visitor permission is a subset of the owner permission.
Through the generation module 531 and the acquisition module 532, the technical effect that the owner can authorize the visitor according to the own passing permission is achieved.
Fig. 8 is a block diagram of a system for remotely authorizing guest passage according to an embodiment of the present invention, please refer to fig. 8, the cloud platform 520 includes:
the checking module 521 is configured to check whether the terminal device is matched with the visitor passage permission right when the visitor is identified to open the terminal device through the key information;
and the control module 522 is configured to control to start the terminal device under the condition that the terminal device is matched with the visitor passage permission.
Under the condition that the verification module 521 identifies that the visitor opens a terminal device through the key information, whether the terminal device is matched with the visitor passage permission carried by the key information is verified, and the control module 522 controls the opening of the terminal device under the condition that the terminal device is matched with the visitor passage permission, so that the technical effect that the visitor can pass in the area corresponding to the visitor passage permission according to the key information is achieved.
For example, as shown in fig. 9, in a case where a visitor accesses an owner room, an access control terminal may obtain address information and face information of the visitor, the access control terminal then sends the address information and the face information to a mobile terminal through a cloud platform, the mobile terminal verifies the address information and the face information, and in a case where the verification is successful, the mobile terminal generates an authorization instruction and key information with a visitor passage permission corresponding to the authorization instruction, then the cloud platform sends the key information to the access control terminal, and the access control terminal displays the key information, so that the visitor obtains the key information; under the condition that the cloud platform detects that the visitor inputs the key information to open the access control terminal or the terminal equipment or the owner room, the cloud platform checks whether the key information is matched with the visitor passage permission, and under the condition of matching, the cloud platform controls to open the access control terminal or the terminal equipment or the owner room, wherein the visitor can also be express personnel and other personnel, and the terminal equipment can be an elevator or an entrance guard of a unit.
In addition, the method for remotely authorizing visitor passage in the embodiment of the application can be realized by computer equipment. Components of the computer device may include, but are not limited to, a processor and a memory storing computer program instructions.
In some embodiments, the processor may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of embodiments of the present Application.
In some embodiments, the memory may include mass storage for data or instructions. By way of example, and not limitation, memory may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. The memory may include removable or non-removable (or fixed) media, where appropriate. The memory may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory is a Non-Volatile (Non-Volatile) memory. In particular embodiments, the Memory includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory may be used to store or cache various data files for processing and/or communication use, as well as possibly computer program instructions for execution by the processor.
The processor implements any of the above described embodiments of a method for remotely authorizing guest access by reading and executing computer program instructions stored in the memory.
In some of these embodiments, the computer device may also include a communication interface and a bus. The processor, the memory and the communication interface are connected through a bus and complete mutual communication.
The communication interface is used for realizing communication among modules, devices, units and/or equipment in the embodiment of the application. The communication interface may also be implemented with other components such as: the data communication is carried out among external equipment, image and data acquisition equipment, a database, external storage, an image and data processing workstation and the like.
A bus comprises hardware, software, or both that couple components of a computer device to one another. Buses include, but are not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, a Bus may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, abbreviated VLB) bus or other suitable bus or a combination of two or more of these. A bus may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
In addition, in combination with the method for remotely authorizing visitor passage in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any of the above-described embodiments of a method for remotely authorizing guest access.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for remotely authorizing visitor passage is applied to a mobile terminal and is characterized by comprising the following steps:
the method comprises the steps that a cloud platform obtains address information accessed by a visitor and face information of the visitor, wherein the address information is collected by an access control terminal;
the mobile terminal verifies the address information and the face information;
under the condition that the verification is successful, the mobile terminal generates an authorization instruction, wherein the authorization instruction comprises the address information and the face information;
the mobile terminal generates key information with visitor passage permission corresponding to the authorization instruction;
the cloud platform receives and sends the key information to the access control terminal;
and the access control terminal displays the key information so that the visitor acquires the key information.
2. The method of claim 1, wherein after the mobile terminal verifies the address information and the face information, the method further comprises:
under the condition that the verification is unsuccessful, the mobile terminal generates an authorization prohibiting instruction, wherein the authorization prohibiting instruction comprises the face information and the address information;
the cloud platform generates no-pass information corresponding to the no-authorization instruction;
and the entrance guard terminal displays the no-passing information.
3. The method of claim 1, wherein the mobile terminal generating key information with the guest passing right corresponding to the authorization instruction comprises:
the mobile terminal acquires owner information corresponding to the address information;
the mobile terminal acquires owner passing authority corresponding to the owner information;
the mobile terminal generates the key information with the visitor permission corresponding to the authorization instruction according to the owner permission, wherein the visitor permission is a subset of the owner permission.
4. The method of claim 1, wherein after the access control terminal displays the key information to enable the visitor to obtain the key information, the method further comprises:
when the cloud platform identifies that the visitor opens a terminal device through the key information, the cloud platform verifies whether the terminal device is matched with the visitor passage permission;
and under the condition that the terminal equipment is matched with the visitor passage permission, the cloud platform controls to start the terminal equipment.
5. A system for remotely authorizing visitor passage is applied to a mobile terminal and is characterized by comprising:
the access control terminal is used for acquiring address information accessed by a visitor and face information of the visitor and displaying key information so that the visitor can acquire the key information with visitor passage permission;
the cloud platform is used for acquiring the address information, the face information and the key information with the visitor passage permission;
and the mobile terminal is used for receiving and verifying the address information and the face information, generating the authorization instruction corresponding to the address information and the face information under the condition of successful verification, and generating the key information corresponding to the authorization instruction and having the visitor passing authority, wherein the authorization instruction comprises the address information and the face information.
6. The system according to claim 5, wherein the mobile terminal comprises:
the generating module is used for generating the authorization instruction, the key information and an authorization forbidding instruction, wherein the authorization forbidding instruction comprises the face information and the address information;
the cloud platform is further used for generating the traffic prohibition information corresponding to the authorization prohibition instruction;
the entrance guard terminal is also used for displaying the no-pass information.
7. The system according to claim 6, wherein said mobile terminal further comprises:
the acquisition module is used for acquiring owner information corresponding to the address information and owner passing permission corresponding to the owner information;
the generation module is further used for generating the key information with the visitor permission corresponding to the authorization instruction according to the owner permission, wherein the visitor permission is a subset of the owner permission.
8. The system of claim 5, wherein the cloud platform further comprises:
the verification module is used for verifying whether the terminal equipment is matched with the visitor passage permission or not under the condition that the visitor opens the terminal equipment through the key information;
and the control module is used for controlling the opening of the terminal equipment under the condition that the terminal equipment is matched with the visitor passage permission.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method for remote authorized guest passage according to any one of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out a method for remote authorized guest passage as claimed in any one of claims 1 to 4.
CN202010859207.XA 2020-08-24 2020-08-24 Method, system, equipment and storage medium for remotely authorizing visitor to pass Pending CN111951455A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010859207.XA CN111951455A (en) 2020-08-24 2020-08-24 Method, system, equipment and storage medium for remotely authorizing visitor to pass

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010859207.XA CN111951455A (en) 2020-08-24 2020-08-24 Method, system, equipment and storage medium for remotely authorizing visitor to pass

Publications (1)

Publication Number Publication Date
CN111951455A true CN111951455A (en) 2020-11-17

Family

ID=73359535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010859207.XA Pending CN111951455A (en) 2020-08-24 2020-08-24 Method, system, equipment and storage medium for remotely authorizing visitor to pass

Country Status (1)

Country Link
CN (1) CN111951455A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112419555A (en) * 2020-11-23 2021-02-26 浙江安防职业技术学院 Door and window protective device for preventing typhoon
CN112784242A (en) * 2021-02-03 2021-05-11 张德运 Internet of things data processing system and method, computer equipment and storage medium
CN113284283A (en) * 2021-07-22 2021-08-20 深圳市知酷信息技术有限公司 Entrance and exit control method and system for entrance guard of smart campus dormitory and computer equipment
CN113570765A (en) * 2021-07-23 2021-10-29 小控(杭州)科技有限公司 Zero-contact-based access control security access method
CN114821860A (en) * 2022-03-30 2022-07-29 深圳绿米联创科技有限公司 Password generation method, device and system and electronic equipment
CN114973479A (en) * 2021-02-25 2022-08-30 星络社区云物联科技有限公司 Remote control method for entrance guard, community platform and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106204867A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system and access control management method that visitor opens the door authority can be authorized
CN108921993A (en) * 2018-06-29 2018-11-30 夏烬楚 A method of authorization temporary traffic gate inhibition
CN109064601A (en) * 2018-07-30 2018-12-21 深圳招商建筑科技有限公司 A kind of intelligence gate sentry robot implementation method
CN109377590A (en) * 2018-09-13 2019-02-22 深圳福鸽科技有限公司 A kind of intelligent door lock system and method
CN110211278A (en) * 2019-07-31 2019-09-06 一石数字技术成都有限公司 The access control system and passing method for remotely confirming visitor's identity based on face snap
KR20190107867A (en) * 2018-03-13 2019-09-23 (주)바이셀코리아 Automatic recognition system for centralized control system using camera

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106204867A (en) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 Gate control system and access control management method that visitor opens the door authority can be authorized
KR20190107867A (en) * 2018-03-13 2019-09-23 (주)바이셀코리아 Automatic recognition system for centralized control system using camera
CN108921993A (en) * 2018-06-29 2018-11-30 夏烬楚 A method of authorization temporary traffic gate inhibition
CN109064601A (en) * 2018-07-30 2018-12-21 深圳招商建筑科技有限公司 A kind of intelligence gate sentry robot implementation method
CN109377590A (en) * 2018-09-13 2019-02-22 深圳福鸽科技有限公司 A kind of intelligent door lock system and method
CN110211278A (en) * 2019-07-31 2019-09-06 一石数字技术成都有限公司 The access control system and passing method for remotely confirming visitor's identity based on face snap

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112419555A (en) * 2020-11-23 2021-02-26 浙江安防职业技术学院 Door and window protective device for preventing typhoon
CN112784242A (en) * 2021-02-03 2021-05-11 张德运 Internet of things data processing system and method, computer equipment and storage medium
CN114973479A (en) * 2021-02-25 2022-08-30 星络社区云物联科技有限公司 Remote control method for entrance guard, community platform and computer readable storage medium
CN113284283A (en) * 2021-07-22 2021-08-20 深圳市知酷信息技术有限公司 Entrance and exit control method and system for entrance guard of smart campus dormitory and computer equipment
CN113284283B (en) * 2021-07-22 2021-09-24 深圳市知酷信息技术有限公司 Entrance and exit control method and system for entrance guard of smart campus dormitory and computer equipment
CN113570765A (en) * 2021-07-23 2021-10-29 小控(杭州)科技有限公司 Zero-contact-based access control security access method
CN114821860A (en) * 2022-03-30 2022-07-29 深圳绿米联创科技有限公司 Password generation method, device and system and electronic equipment
CN114821860B (en) * 2022-03-30 2024-06-07 深圳绿米联创科技有限公司 Password generation method, device and system and electronic equipment

Similar Documents

Publication Publication Date Title
CN111951455A (en) Method, system, equipment and storage medium for remotely authorizing visitor to pass
CN107730669B (en) Access control method, system and computer readable storage medium
CN106056707A (en) Residential quarter network access control scheme
CN106850209A (en) A kind of identity identifying method and device
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN105894627A (en) Bluetooth access control equipment and bluetooth access control management system and method
CN109618344B (en) Safe connection method and device of wireless monitoring equipment
CN105551120A (en) Building intercommunication method, near field communication (NFC) unlocking device and building intercommunication system
CN104504789A (en) Access control management method and access control management device
CN105118125A (en) Intelligent unlocking method and intelligent unlocking system for electronic door lock
CN105574967A (en) Intelligent access control system and operation method thereof
CN112927408A (en) Visitor visiting processing method and device
CN107578502A (en) A kind of cell caller management method and device
CN108171850A (en) Substation safety system and electric power management system
KR102495115B1 (en) System and method of identity verification for visitor identification
JP7403093B2 (en) Authentication system and intercom system
CN106330580A (en) Method and device for controlling monitoring equipment
CN114499899B (en) Identity verification system
CN110738759A (en) fingerprint storage method, identity verification method, device and system
CN110706388A (en) Access control management method and related product
CN113781695A (en) Access control management method, system, device and computer readable storage medium
CN105991821A (en) Antitheft processing method and device
CN109255870A (en) A kind of hotel occupancy method, apparatus, terminal and storage medium
CN111369711B (en) Unlocking method, unlocking device, electronic equipment and computer readable storage medium
CN211718947U (en) Information checking system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117