CN112530067A - Visitor management method, related device, storage medium and system - Google Patents

Visitor management method, related device, storage medium and system Download PDF

Info

Publication number
CN112530067A
CN112530067A CN202011364293.3A CN202011364293A CN112530067A CN 112530067 A CN112530067 A CN 112530067A CN 202011364293 A CN202011364293 A CN 202011364293A CN 112530067 A CN112530067 A CN 112530067A
Authority
CN
China
Prior art keywords
visitor
information
server
terminal
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011364293.3A
Other languages
Chinese (zh)
Inventor
王曙光
赵峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanguang Software Co Ltd
Original Assignee
Yuanguang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanguang Software Co Ltd filed Critical Yuanguang Software Co Ltd
Priority to CN202011364293.3A priority Critical patent/CN112530067A/en
Publication of CN112530067A publication Critical patent/CN112530067A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/21Individual registration on entry or exit involving the use of a pass having a variable access code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The embodiment of the application discloses visitor control, a visitor device, a storage medium and related equipment, wherein a scanning unit is used for scanning a visitor graphic code in a visitor certificate displayed on a visitor terminal to obtain a verification code; acquiring a face image of a visitor through a camera; after the verification code is verified to be correct, the face image and the visitor information of the visitor are sent to a visitor receiving person terminal; after receiving the confirmation instruction of the visitor terminal aiming at the face image and the visitor information, the visitor terminal is sent with the passing permission message, and compared with the prior art in which the visitor information is verified manually, the passing efficiency of the visitor can be improved.

Description

Visitor management method, related device, storage medium and system
Technical Field
The present application relates to the field of office automation, and in particular, to a visitor management method, a related device, a storage medium, and a system.
Background
It is very common for office buildings to have frequent visitors to office parks and parks due to work or business needs. In most cases, when a visitor arrives at an office building or a park, the visitor information is registered in a register or an information system by security personnel who have the value, the visited department or the visited personnel is contacted by a telephone, the visitor is confirmed by the telephone of the visited personnel or the visitor is confirmed by the visiting personnel, and after the confirmation, a visitor card or a certificate is issued to complete the visitor registration and the visitor passage. When the security personnel of the value are arranged in a shift, the security personnel encountered by the visitors when entering and exiting may not be the same batch of personnel, which results in lower working efficiency and unsmooth passage of the visitors.
Disclosure of Invention
The embodiment of the application provides a visitor management method and device, a storage medium and electronic equipment, and can solve the problem of low visitor passing efficiency in the related art. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a visitor management method, where the visitor management method includes:
scanning a visitor graphic code in a visitor certificate displayed on a visitor terminal through a scanning unit to obtain a verification code;
acquiring a face image of a visitor through a camera;
after the verification code is verified to be correct, the face image and the visitor information of the visitor are sent to a visitor receiving person terminal;
and after receiving a confirmation instruction of the visitor terminal aiming at the face image and the visitor information, sending a running passing message to the visitor terminal.
In a second aspect, the present application provides a visitor management method, including:
receiving a face image of a visitor and visitor information from a server;
displaying the face image and the visitor information through a display unit;
and sending a permission message to the server in response to a confirmation instruction of the user for the face image and the visitor information.
In a third aspect, the present application provides a visitor control method, including:
responding to a trigger instruction of a user, and displaying a visitor certificate through a display unit; wherein the visitor credential includes a visitor graphical code and an unconfirmed token, the visitor graphical code being generated based on a verification code;
receiving a pass-allowing message generated after the visitor graphic code is verified to be correct from a server;
changing an unconfirmed flag on the guest credential to a confirmed flag according to the allow pass message.
In a fourth aspect, the present application provides a visitor management apparatus, including a processing unit and a transceiver unit;
the processing unit is used for scanning a visitor graphic code in a visitor certificate displayed on a visitor terminal through the scanning unit to obtain a verification code;
acquiring a face image of a visitor through a camera;
after the verification code is verified to be correct, the face image and the visitor information of the visitor are sent to a visitor terminal through the receiving and sending unit;
and after receiving a confirmation instruction of the visitor terminal aiming at the face image and the visitor information, the receiving and sending unit sends a passing permission message to the visitor terminal.
In a fifth aspect, the present application provides a visitor management apparatus, including a processing unit and a transceiver unit;
the processor is used for receiving a face image of a visitor and visitor information from the server through the transceiving unit;
displaying the face image and the visitor information through a display unit;
and sending a pass permission message to the server through the transceiving unit in response to a confirmation instruction of the user for the face image and the visitor information.
In a sixth aspect, the present application provides a visitor management apparatus, including a processing unit and a transceiver unit;
the processing unit is used for responding to a trigger instruction of a visitor and displaying a visitor certificate through the display unit; wherein the visitor credential includes a visitor graphical code and an unconfirmed token, the visitor graphical code being generated based on a verification code;
receiving a pass-allowing message generated after the visitor graphic code is verified to be correct by the server through the transceiving unit;
changing an unconfirmed flag on the guest credential to a confirmed flag according to the allow pass message.
In a seventh aspect, an embodiment of the present application provides a computer storage medium storing a plurality of instructions, which are adapted to be loaded by a processor and to perform the above-mentioned method steps.
In an eighth aspect, an embodiment of the present application provides an electronic device, which may include: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the above-mentioned method steps.
The beneficial effects brought by the technical scheme provided by some embodiments of the application at least comprise:
the visitor information is passively queued and registered to the visitor information and the visitor information at the entrance of the park, and the visitor information is registered in advance by the visitor; the visitor card or the receipt is issued, and the pass verification code is issued through the system; the passcode is encrypted and dynamically changed. The method can effectively prevent illegal means such as screenshot, photographing, printing and the like; the original visitor access control is controlled by security personnel, and is changed into the control by the visitor or the visitor department; doing so is more secure and guest control is more efficient. In the conventional method, security personnel at an entrance and an exit confirm whether visitors pass, but due to the reason that the security personnel are on duty and arranged on duty every day, the visitors have large visiting volume, and the visitors cannot be controlled well. The traditional mode can be changed into a mode that a visiting department is used as a main part and a security department is used as an auxiliary part through the patent means, so that the visiting is more efficient and safer.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a network structure diagram of a virtual work card management system according to an embodiment of the present application;
fig. 2 is an interaction diagram of a guest management method according to an embodiment of the present application;
FIG. 3 is another interaction diagram of a visitor management method according to an embodiment of the present application;
FIG. 4, FIG. 5, FIG. 6, FIG. 7, and FIG. 8 are interface diagrams of a virtual card provided by an embodiment of the present application;
fig. 9 is a schematic structural diagram of a guest management apparatus according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
In the description of the present application, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art. Further, in the description of the present application, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Referring to fig. 1, a network architecture diagram of a visitor management system provided in an embodiment of the present application includes: the number of the server 11, the visitor terminal 10, the visitor terminal 12 and the access control device 13 may be one or more than one. The server 11 may be a server, the number of the servers may be one or more, and a plurality of servers may constitute a server cluster. The server 11 and the visitor terminal 10 can communicate with each other in a wireless manner or in a wired manner, and the server 11 and the visitor terminal 12 can be connected with each other in a wireless manner, wherein the wireless manner includes but is not limited to a cellular data network, a wireless local area network or a bluetooth network, and the wired manner includes but is not limited to a network cable, a telephone line or a power line, etc. The visitor terminal 10 is provided with a scanning unit for scanning the virtual work card displayed on the visitor terminal 12, and the scanning unit may be a camera or a code scanning gun, etc. The access control equipment 13 is used for controlling the access of a user, the access control equipment can be a gate, a retractable door or other equipment, and the like, and the access control equipment 13 can be communicated with a server in a wired or wireless mode.
Referring to fig. 2, an interaction diagram of a visitor management method according to an embodiment of the present application is shown based on the network architecture of fig. 1. As shown in fig. 2, the method of the embodiment of the present application may include the steps of:
s201, displaying the visitor certificate through the display unit by the visitor terminal.
The visitor terminal can be provided with an application program, a user carries out triggering operation aiming at the application program, the visitor terminal receives a triggering instruction from the user and displays visitor certificates through the display unit, the visitor certificates comprise visitor graphic codes, and the visitor graphic codes can be two-dimensional codes, bar codes or other codes represented in a graphic mode. The visitor voucher may include, in addition to the visitor graphic code, an access period, a visiting department, a visitor name, and a confirmation flag, the confirmation flag including an unconfirmed flag indicating that the visitor is not allowed to pass and a confirmed flag indicating that the visitor is allowed to pass.
For example: referring to the interface diagram of the access credential shown in fig. 5, the access credential includes the name of the visitor: king access, access period: 2020/08/0809: 30:00 to 2020/08/0817: 30:00, reception department: halo service department/pan, confirmed flag is unconfirmed flag.
S202, the server 11 scans the visitor image code through the scanning unit to obtain the verification code, and the face image of the visitor is collected through the camera.
Wherein, entrance guard's equipment can be for the floodgate machine, and entrance guard's equipment can include scanning unit and camera, and scanning unit can place entrance guard's equipment's scanning rifle in, and the visitor is pressed close to the scanning unit with visitor's voucher, and scanning unit scans visitor's figure code in the visitor's voucher, and the analysis obtains the identifying code, and the face image of visitor is gathered to the camera simultaneously.
S203, the server 11 determines that the verification code is correct.
The server 11 stores the verification code of the visitor in advance, the server 11 inquires whether the verification code obtained by analyzing the visitor graphic code is stored in advance, if yes, the verification code is determined to be correct, and if not, the verification code is determined to be incorrect.
In a possible embodiment, the server 11 may further send an authentication code authentication success message to the guest terminal after determining that the authentication code is correct, and the guest terminal receives and displays the authentication code authentication success message. For example: referring to fig. 6, the guest terminal displays an "authenticated" message on the guest credential.
S204, the server 11 sends the face image and the visitor information to the reception staff terminal 10, and the reception staff terminal 10 receives the face image and the visitor information from the server 11.
The server 11 prestores a mapping relationship between the verification code and the visitor information, the server 11 queries the visitor information associated with the verification code after determining that the verification code is correct, the visitor information includes visitor identity information and visitor event information, and the visitor identity information includes: the visitor identity information includes: one or more of name, gender, mobile phone number, identification card number, work unit and license plate number, wherein the visiting item information comprises: visit date, visit time, visit duration, visit subject, reception department, reception personnel.
And S205, the visitor terminal prompts a user to verify the face image and the visitor information through the display unit.
The visitor receiving terminal displays the face image and the visitor information, a dialog box can be displayed on a user interface to prompt a user to judge whether the face image is matched with the visitor information or not, whether the visitor is a pre-registered visitor or not can be generated through the dialog box, and after the visitor receiving terminal receives the confirmation instruction from the user, the visitor is represented as the pre-registered visitor, and the passing allowing message is generated.
S206, the visitor terminal sends the passage permission message to the server, and the server receives the passage permission message from the visitor terminal.
And S207, the server controls the entrance guard equipment to be opened.
S208, the server sends the pass permission message to the guest terminal, and the guest terminal receives the pass permission message from the server.
And S209, the visitor terminal displays a confirmation mark on the visitor certificate.
Wherein the guest terminal changes the unconfirmed flag on the guest credential to a confirmed flag. For example: referring to the guest credential shown in fig. 7, a confirmed flag is displayed on the guest credential.
In a possible implementation manner, before S201, referring to fig. 3, an embodiment of the present application further includes:
s301, the visitor information is registered by the visitor terminal.
Wherein, reception personnel terminal is through input device, for example: the touch display screen or the keyboard obtains the visitor information input by the user, the visitor information includes visitor identity information and visiting item information, the visitor identity information identifies the identity of the visitor, the visiting item information identifies the specific event of visiting of the visitor, and each parameter included by the visitor identity information and the visiting item information can refer to the embodiment described in fig. 2.
S302, the reception staff terminal sends the visitor information to the server, and the server receives the visitor information from the reception staff terminal.
S303, the server 11 approves the visitor information.
The server 11 may send the visitor information to the upper level of the visitor for approval according to an approval process inside the company.
And S304, generating visitor invitation information according to the visitor information.
After the approval is passed, the server generates visitor invitation information according to the visitor information, the visitor invitation information comprises verification codes, each visitor has different verification codes, and the visitor invitation information can contain a link address. The verification code can be generated by plaintext characters based on a symmetric encryption algorithm or an asymmetric encryption algorithm, the server encrypts the plaintext characters by using the encryption key to generate the verification code, the server can periodically change the encryption key, and the visitor terminal also periodically generates the visitor graphic code according to the changed encryption key, so that the visitor graphic code is prevented from being cracked, and the safety is improved.
S305, the server sends the visitor invitation information to the visitor terminal, and the visitor terminal receives the visitor invitation information from the server.
The server may also directly send the guest invitation information to the guest terminal, and the sending mode includes but is not limited to: the visitor invitation information carries the verification code and the link address, the terminal can access the server according to the link address, and for example, the link address can be a URL address.
S306, the visitor terminal sends the visitor invitation information to the visitor terminal, and the visitor terminal receives the visitor invitation information from the visitor terminal.
The sending mode includes but is not limited to: instant messaging messages, text messages, email, or other means.
S307, the visitor terminal sends an identity authentication request to the server, and the server receives the identity authentication request from the visitor terminal.
Wherein, visitor invitation information includes the link address, and after the visitor clicked this link address through visitor terminal, visitor terminal sent the HTTP request to the server, and the HTTP request can be encrypted request, and server 11 shows a verification interface through the HTTP response on visitor terminal, and verification interface includes the input box, and the input box suggestion visitor inputs visitor identity information, and visitor identity information includes: one or more of a name, an identification number, a telephone number, and a mailbox address.
Referring to fig. 4, fig. 4 is a schematic diagram of a verification interface displayed on a guest terminal, where the verification interface includes a guest name: the system comprises a king access device, an input box and an activation button, wherein a visitor inputs visitor identity information in the input box, then the visitor identity information is submitted to a server after the activation button is clicked, and an identity verification request is sent to the server.
S308, the server verifies the identity information of the visitor.
The server stores a mapping relation between the visitor identity information and the verification code in advance, and verifies whether the visitor identity information submitted by the visitor terminal is legal or not according to the mapping relation.
S309, the server sends a verification success message to the visitor terminal, and the visitor terminal receives the verification success message from the server.
When verifying that the visitor identity information submitted by the visitor terminal is legal, the server sends a verification success message to the visitor terminal.
And S310, the visitor terminal generates a visitor image code according to the verification code.
The visitor terminal generates a visitor certificate according to the visitor information and the verification code, and the verification code is used for generating a visitor graphic code.
In one possible embodiment, the method further comprises:
displaying a deactivation flag on the visitor credential after leaving the access control device or exceeding an access time.
For example: referring to fig. 8, after the visitor leaves the access control device or the access time is exceeded, the visitor certificate of the visitor terminal displays a failure flag, and the server also sets the verification code corresponding to the visitor certificate to a failure state, so that the visitor cannot pass through by using the access graphic code.
In the embodiment of the application, the visitor information is registered in advance by the visitor instead of being queued and registered to the visitor information and the visitor information at the entrance of the park passively; the visitor card or the receipt is issued, and the pass verification code is issued through the system; the passcode is encrypted and dynamically changed. The method can effectively prevent illegal means such as screenshot, photographing, printing and the like; the original visitor access control is controlled by security personnel, and is changed into the control by the visitor or the visitor department; doing so is more secure and guest control is more efficient. In the conventional method, security personnel at an entrance and an exit confirm whether visitors pass, but due to the reason that the security personnel are on duty and arranged on duty every day, the visitors have large visiting volume, and the visitors cannot be controlled well. The traditional mode can be changed into a mode that a visiting department is used as a main part and a security department is used as an auxiliary part through the patent means, so that the visiting is more efficient and safer.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Referring to fig. 9, a schematic structural diagram of a guest management apparatus according to an exemplary embodiment of the present application is shown. The guest management apparatus may be implemented as all or a part of the electronic device by software, hardware, or a combination of both. The device 3 comprises: a processing unit 30 and a transceiver unit 31.
Example one
The processing unit 30 is used for scanning the visitor graphic code displayed on the visitor terminal through the scanning unit to obtain a verification code;
acquiring a face image of the visitor through a camera;
after the verification code is verified to be legal, the face image is sent to the terminal of the interviewer through the receiving and sending unit 31;
and after receiving a confirmation instruction of the interviewer terminal for the face image through the receiving and sending unit, controlling the entrance guard equipment to be opened.
In one or more embodiments, processing unit 30 is further configured to:
receiving visitor information from a visitor terminal through the transceiving unit 31; wherein the visitor information comprises visitor identity information and visitor event information;
after the visitor information is approved, generating a verification code associated with the visitor information, and sending visitor invitation information to the visitor receiving personnel terminal through a transceiving unit 31; wherein the visitor invitation information carries the verification code;
receiving an authentication request sent by a guest terminal based on the guest invitation information through the transceiving unit 31; wherein the identity authentication request carries visitor identity information;
after the visitor identity information is verified correctly, a verification success message is sent to the visitor terminal through the transceiving unit 31.
In one or more embodiments, the generating a passcode associated with the guest information includes:
and encrypting the plaintext characters based on a symmetric encryption algorithm or an asymmetric encryption algorithm to obtain the verification code.
In one or more embodiments, the guest information includes guest identity information and visitor entry information, the guest identity information including: one or more of name, gender, mobile phone number, identification card number, work unit and license plate number, wherein the visiting item information comprises: visit date, visit time, visit duration, visit subject, reception department, reception personnel.
In one or more embodiments, processing unit 30 is further configured to:
transmitting a verification code verification success message to the guest terminal through the transceiving unit 31; wherein the verification code verification success message indicates that the verification code verification is successful.
Example two
A processing unit 30 for receiving a face image of a visitor from the server through the transceiving unit 31;
displaying the face image through a display unit;
a confirmation instruction of the user with respect to the face image is transmitted to the visitor management unit through the transceiving unit 31.
In a possible embodiment, the processing unit 30 is further configured to:
registering visitor information;
transmitting the guest information to the server through a transceiving unit 31;
receiving, by the transceiving unit 31, guest invitation information generated according to the guest information transmitted from the server; wherein the visitor invitation information carries a verification code associated with the visitor information;
the guest invitation information is transmitted to the guest terminal through the transceiving unit 31.
EXAMPLE III
The processing unit is used for acquiring an encrypted ciphertext on the virtual workcard of the workcard client;
the receiving and sending unit is used for sending the encrypted ciphertext to the card server; receiving verification result information of the worker card server side on the encrypted ciphertext;
the processing unit is further used for displaying the verification result information on a display unit.
In one or more embodiments, processing unit 30 is further configured to:
after the server verifies that the passcode is correct, a passcode verification success message from the server is received through the transceiving unit 31, and the passcode verification success message is displayed on the guest credential.
In one or more embodiments, processing unit 30 is further configured to:
receiving guest invitation information from the server through the transceiving unit 31; wherein the visitor invitation information carries a verification code;
sending an authentication request to the server through the transceiving unit 31; wherein the identity authentication request carries visitor identity information;
when receiving a verification success message from the server through the transceiving unit 31, generating a visitor graphic code based on the verification code; wherein the verification success message indicates that the server verifies that the visitor identity information is legal.
In one or more embodiments, processing unit 30 is further configured to:
displaying a deactivation flag on the visitor credential after leaving the access control device or exceeding an access time.
It should be noted that, when the guest management apparatus provided in the foregoing embodiment executes the guest management method, only the division of the functional modules is illustrated, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the visitor management apparatus and the visitor management method provided in the above embodiments belong to the same concept, and details of implementation processes thereof are referred to as method embodiments, which are not described herein again.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the method steps in the embodiment shown in fig. 2, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 2 and fig. 3, which is not described herein again.
Please refer to fig. 10, which provides a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 10, the electronic device may be a visitor terminal, a server, or a visitor terminal in fig. 1, and the electronic device 1000 may include: at least one processor 1001, at least one network interface 1004, a user interface 1003, memory 1005, at least one communication bus 1002.
Wherein a communication bus 1002 is used to enable connective communication between these components.
The user interface 1003 may include a Display screen (Display) and a Camera (Camera), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Processor 1001 may include one or more processing cores, among other things. The processor 1001, which is connected to various parts throughout the electronic device 1000 using various interfaces and lines, performs various functions of the electronic device 1000 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 1005 and calling data stored in the memory 1005. Alternatively, the processor 1001 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 1001 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 1001, but may be implemented by a single chip.
The Memory 1005 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 1005 includes a non-transitory computer-readable medium. The memory 1005 may be used to store an instruction, a program, code, a set of codes, or a set of instructions. The memory 1005 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 10, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an application program.
In the electronic device 1000 shown in fig. 10, the user interface 1003 is mainly used as an interface for providing input for a user, and acquiring data input by the user; and the processor 1001 may be configured to invoke an application program stored in the memory 1005 that configures an application program interface and to specifically perform the methods described in fig. 2-3.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (17)

1. A method for visitor management, comprising:
scanning a visitor graphic code in a visitor certificate displayed on a visitor terminal through a scanning unit to obtain a verification code;
acquiring a face image of a visitor through a camera;
after the verification code is verified to be correct, the face image and the visitor information of the visitor are sent to a visitor receiving person terminal;
and after receiving a confirmation instruction of the visitor terminal aiming at the face image and the visitor information, sending a passing permission message to the visitor terminal.
2. The method of claim 1, wherein before the scanning the visitor graphic code displayed on the visitor terminal by the scanning unit to obtain the verification code, the method further comprises:
receiving visitor information from a visitor terminal; wherein the visitor information comprises visitor identity information and visitor event information;
after the visitor information is approved, generating a verification code associated with the visitor information, and sending visitor invitation information to the visitor receiving personnel terminal; wherein the visitor invitation information carries the verification code;
receiving an authentication request sent by a visitor terminal based on the visitor invitation information; wherein the identity authentication request carries visitor identity information;
and after the identity information of the visitor is verified correctly, sending a verification success message to the visitor terminal.
3. The method of claim 2, wherein generating the passcode associated with the guest information comprises:
and encrypting the plaintext characters based on a symmetric encryption algorithm or an asymmetric encryption algorithm to obtain the verification code.
4. The method of claim 2 or 3, wherein the guest information comprises guest identity information and visitor transaction information, the guest identity information comprising: one or more of name, gender, mobile phone number, identification card number, work unit and license plate number, wherein the visiting item information comprises: visit date, visit time, visit duration, visit subject, reception department, reception personnel.
5. The method of claim 4, further comprising:
sending a verification code verification success message to the visitor terminal; wherein the verification code verification success message indicates that the verification code verification is successful.
6. A method for visitor management, comprising:
receiving a face image of a visitor and visitor information from a server;
displaying the face image and the visitor information through a display unit;
and sending a permission message to the server in response to a confirmation instruction of the user for the face image and the visitor information.
7. The method of claim 6, wherein before receiving the face image of the visitor and the visitor information from the server, further comprising:
registering visitor information;
sending the guest information to the server;
receiving visitor invitation information which is sent by the server and generated according to the visitor information; wherein the visitor invitation information carries a verification code associated with the visitor information;
and sending the visitor invitation information to a visitor terminal.
8. A visitor control method, comprising:
responding to a triggering instruction of a visitor, and displaying a visitor certificate through a display unit; wherein the visitor credential includes a visitor graphical code and an unconfirmed token, the visitor graphical code being generated based on a verification code;
receiving a pass-allowing message generated after the visitor graphic code is verified to be correct from the server;
changing an unconfirmed flag on the guest credential to a confirmed flag according to the allow pass message.
9. The method of claim 8, further comprising:
after the server verifies that the verification code is correct, receiving a verification code verification success message from the server, and displaying the verification code verification success message on the visitor credential.
10. The method of claim 7, wherein before displaying the guest credential through the display unit in response to the guest's trigger instruction, further comprising:
receiving visitor invitation information from a server; wherein the visitor invitation information carries a verification code;
sending an authentication request to the server; wherein the identity authentication request carries visitor identity information;
when receiving a verification success message from the server, generating a visitor graphic code based on the verification code; wherein the verification success message indicates that the visitor identity information is verified to be legal by the server.
11. The method of claim 7, further comprising:
displaying a deactivation flag on the visitor credential after leaving the access control device or exceeding an access time.
12. A visitor control device is characterized by comprising a processing unit and a transceiving unit;
the processing unit is used for scanning the visitor graphic code displayed on the visitor terminal through the scanning unit to obtain a verification code;
acquiring a face image of the visitor through a camera;
after the verification code is verified to be legal, the face image is sent to the terminal of the interviewer through the receiving and sending unit;
and after receiving a confirmation instruction of the interviewer terminal for the face image through the receiving and sending unit, controlling the entrance guard equipment to be opened.
13. A visitor control device is characterized by comprising a processing unit and a transceiving unit;
the processing unit is used for receiving a face image of a visitor from a server through the transceiving unit;
displaying the face image through a display unit;
and sending a confirmation instruction of the user aiming at the face image to the visitor management unit through the transceiving unit.
14. The visitor management device is characterized by comprising a processing unit and a transmitting and receiving unit;
the processing unit is used for acquiring an encrypted ciphertext on the virtual workcard of the workcard client;
the receiving and sending unit is used for sending the encrypted ciphertext to the card server; receiving verification result information of the worker card server side on the encrypted ciphertext;
the processing unit is further used for displaying the verification result information on a display unit.
15. A computer storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor and to carry out the method steps according to any one of claims 1 to 11.
16. An electronic device, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps of any of claims 1 to 11.
17. A guest management system, comprising: the system comprises a visitor terminal, a server and a visitor terminal;
the visitor terminal is used for responding to a trigger instruction of a visitor and displaying a visitor certificate through the display unit; wherein the guest credential includes a guest graphical code and an unconfirmed flag;
the server is used for scanning the visitor graphic code through a scanning unit to obtain a verification code; acquiring a face image of a visitor through a camera; after the verification code is verified to be correct, the face image and the visitor information of the visitor are sent to a visitor receiving person terminal;
the interviewer terminal is used for receiving the face image and the visitor information from the server; displaying a face image and visitor information through a display unit, and sending a passage allowing message to the server in response to a confirmation instruction for the face image and the visitor information;
the server is also used for receiving the passage-allowing message from the visitor terminal, controlling the entrance guard equipment to be opened, and sending the passage-allowing message to the visitor terminal;
and the visitor terminal is also used for changing the unconfirmed mark on the visitor certificate into a confirmed mark after receiving the permission message from the server.
CN202011364293.3A 2020-11-27 2020-11-27 Visitor management method, related device, storage medium and system Pending CN112530067A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011364293.3A CN112530067A (en) 2020-11-27 2020-11-27 Visitor management method, related device, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011364293.3A CN112530067A (en) 2020-11-27 2020-11-27 Visitor management method, related device, storage medium and system

Publications (1)

Publication Number Publication Date
CN112530067A true CN112530067A (en) 2021-03-19

Family

ID=74994645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011364293.3A Pending CN112530067A (en) 2020-11-27 2020-11-27 Visitor management method, related device, storage medium and system

Country Status (1)

Country Link
CN (1) CN112530067A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
WO2023045133A1 (en) * 2021-09-27 2023-03-30 深圳市商汤科技有限公司 Visitor management method and apparatus, and electronic device and storage medium
CN118762427A (en) * 2024-09-05 2024-10-11 成都国腾实业集团有限公司 Visitor identity card identification and authority management method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957521A (en) * 2014-04-09 2014-07-30 华中科技大学 Community visitor authentication method and system based on NFC technology
CN108122318A (en) * 2017-12-22 2018-06-05 广州云系信息科技有限公司 Visitor verifies passing method and system
CN109272127A (en) * 2018-07-19 2019-01-25 国政通科技有限公司 A kind of visitor's reserving method and system
CN109685948A (en) * 2018-12-13 2019-04-26 深圳市万物联有限公司 One kind being based on mobile device dynamic two-dimension code visitor's method
CN109816829A (en) * 2019-01-25 2019-05-28 一石数字技术成都有限公司 A kind of visitor's vehicle pass-through system
CN111179484A (en) * 2019-10-30 2020-05-19 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium
CN111243145A (en) * 2020-03-15 2020-06-05 腾讯科技(深圳)有限公司 Method, device, medium and electronic equipment for processing visitor information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103957521A (en) * 2014-04-09 2014-07-30 华中科技大学 Community visitor authentication method and system based on NFC technology
CN108122318A (en) * 2017-12-22 2018-06-05 广州云系信息科技有限公司 Visitor verifies passing method and system
CN109272127A (en) * 2018-07-19 2019-01-25 国政通科技有限公司 A kind of visitor's reserving method and system
CN109685948A (en) * 2018-12-13 2019-04-26 深圳市万物联有限公司 One kind being based on mobile device dynamic two-dimension code visitor's method
CN109816829A (en) * 2019-01-25 2019-05-28 一石数字技术成都有限公司 A kind of visitor's vehicle pass-through system
CN111179484A (en) * 2019-10-30 2020-05-19 腾讯科技(深圳)有限公司 Visitor management method, device, system and storage medium
CN111243145A (en) * 2020-03-15 2020-06-05 腾讯科技(深圳)有限公司 Method, device, medium and electronic equipment for processing visitor information

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113223224B (en) * 2021-05-12 2023-10-24 支付宝(杭州)信息技术有限公司 Traffic processing method and device
WO2023045133A1 (en) * 2021-09-27 2023-03-30 深圳市商汤科技有限公司 Visitor management method and apparatus, and electronic device and storage medium
CN118762427A (en) * 2024-09-05 2024-10-11 成都国腾实业集团有限公司 Visitor identity card identification and authority management method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
EP3477568B1 (en) Customer identification verification process
CN112530067A (en) Visitor management method, related device, storage medium and system
CN107395903B (en) Communication method, data processing platform and communication system
CN111199601B (en) Access control method and device, intelligent terminal, server and storage medium
CN111352740B (en) Application interaction processing method and device
CN104125485B (en) A kind of user profile shared method, equipment and system
JP2014531694A (en) User authentication
MX2013011116A (en) Distribution of premises access information.
JP2007060172A (en) Authenticating device, authenticating method and authenticating program
CN104488245A (en) Improvements relating to security methods using mobile devices
CN107094088B (en) Method, device and system for identifying network rubbing equipment and computer readable storage medium
JP2022168244A (en) Ticket providing method and ticket providing system
CN107453871A (en) Password generated method, password authentication method, method of payment and device
WO2023021572A1 (en) Data processing system, data processing method, and data processing device
EP2913785A1 (en) Virtual queue management system
KR20170001416A (en) Remote generating system for an account
CN113128946A (en) Interactive control method and equipment for network court trial
JP2017027249A (en) Electronic authentication system and electronic authentication method, as well as electronic authentication program
CN113661527B (en) Access rights management
CN106254226A (en) A kind of information synchronization method and device
CN110223131A (en) Depressurized system and the method for booking tickets and user terminal apparatus and computer program product
CN114866268B (en) Method and device for realizing account intercommunication and electronic equipment
CN112364951A (en) Virtual work card management method, related equipment, storage medium and system
CN113709082A (en) Application login method and device and account login mode setting method
JP2006302116A (en) Authentication system, authentication server, terminal device, authentication method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210319

RJ01 Rejection of invention patent application after publication