CN112825203A - Method and apparatus for admission control of a specific area - Google Patents

Method and apparatus for admission control of a specific area Download PDF

Info

Publication number
CN112825203A
CN112825203A CN201911147416.5A CN201911147416A CN112825203A CN 112825203 A CN112825203 A CN 112825203A CN 201911147416 A CN201911147416 A CN 201911147416A CN 112825203 A CN112825203 A CN 112825203A
Authority
CN
China
Prior art keywords
specific area
authorized
request object
request
control information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911147416.5A
Other languages
Chinese (zh)
Other versions
CN112825203B (en
Inventor
刘智春
李瑞平
左涛
周祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spic Chongqing Hechuan Power Generation Co ltd
Original Assignee
Spic Chongqing Hechuan Power Generation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spic Chongqing Hechuan Power Generation Co ltd filed Critical Spic Chongqing Hechuan Power Generation Co ltd
Priority to CN201911147416.5A priority Critical patent/CN112825203B/en
Publication of CN112825203A publication Critical patent/CN112825203A/en
Application granted granted Critical
Publication of CN112825203B publication Critical patent/CN112825203B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

Embodiments of the present invention provide a method for admission control of a specific area. In the method, an entry request requesting entry into the specific area from a request object is received. The entry request includes: identification information of the request object and a code of the specific area. Admission control information for the particular region is then obtained based on the code for the particular region. The admission control information includes: identification information of authorized objects authorized to enter the specific area. Then, it is determined whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. And opening the entrance of the specific area if the request object is authorized to enter the specific area. Closing the entry of the specific region if the request object is not authorized to enter the specific region.

Description

Method and apparatus for admission control of a specific area
Technical Field
The present invention relates to the field of admission control, and more particularly, to a method and apparatus for admission control of a specific area.
Background
The entrance guard management system is mainly used for closed places such as enterprises and public institutions, schools, communities, offices and the like. In an access control system, the identity of a person may be determined based on an access card or a biometric characteristic of the person, etc., to permit entry and exit of the person. By managing the opening and closing of the door, the access control system can permit access of authorized persons and restrict access of unauthorized persons.
Disclosure of Invention
Embodiments described herein provide a method and apparatus for admission control of a particular area. The specific region may be a sub-region within a certain region. According to the method and the device provided by the embodiment of the invention, the access control of each sub-area in the area can be respectively controlled so as to strengthen the safety precaution.
According to a first aspect of the present invention, a method for admission control of a specific area is provided. In the method, an entry request requesting entry into the specific area from a request object is received. The entry request includes: identification information of the request object and a code of the specific area. Admission control information for the particular region is then obtained based on the code for the particular region. The admission control information includes: identification information of authorized objects authorized to enter the specific area. Then, it is determined whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. Opening an entry to the particular region in response to the request object being authorized to enter the particular region. Closing the entry of the particular region in response to the request object not being authorized to enter the particular region.
In some embodiments of the invention, the admission control information further comprises: attribute information of an admission device authorized to enter said specific area. Wherein the attribute information of the admission device comprises at least one of: name, number, price, user, expiration date, and inspection status. In the method, attribute information of the peer devices carried by the request object is further obtained. Then, it is determined whether the peer device is authorized to enter the specific area based on the admission control information and the attribute information of the peer device. Closing the entry to the particular zone in response to the peer device not being authorized to enter the particular zone.
In some embodiments of the invention, the admission control information further comprises: and the admission carrying relationship between the authorization object and the admission equipment. In the method, it is further determined whether the request object is authorized to enter the specific area with the peer device based on the admission control information, the identification information of the request object, and the attribute information of the peer device. Closing the entrance of the specific area in response to the request object not being authorized to enter the specific area with the peer device.
In some embodiments of the invention, the admission control information further comprises: an admission period for the particular area. Closing the entrance of the specific area in case that a current time is not within the admission period.
In some embodiments of the invention, in the method, a leave request requesting to leave the specific area from the request object is further received. The leave request includes: the identification information of the request object and the code of the specific area. Then, the permission control information of the specific area is acquired based on the code of the specific area. The permission control information includes: attribute information of a drop-out device authorized to leave the particular area. Wherein the attribute information of the drop-out device comprises at least one of: name, number, price, user, expiration date, and inspection status. And then, obtaining the attribute information of the same-row equipment carried by the request object. Then, it is determined whether the peer device is authorized to leave the specific area based on the admission control information and the attribute information of the peer device. Closing an exit of the particular zone in response to the peer device not being authorized to leave the particular zone.
In some embodiments of the invention, the permission control information further comprises: an egress carrying relationship between the authorization object and the egress device. In the method, it is further determined whether the request object is authorized to leave the specific area with the peer device based on the admission control information, the identification information of the request object, and the attribute information of the peer device. Closing the exit of the particular zone in response to the request object not being authorized to leave the particular zone with the peer device.
In some embodiments of the invention, the permission control information further comprises: a time period of permission for the particular region. Closing the exit of the particular area if a current time is not within the allowance time period.
In some embodiments of the invention, the admission control information further comprises: identification information of a manager of the specific area. In the method, identification information of objects located in the specific area is further recorded. Then, it is determined whether the manager is located within the specific area based on the recorded identification information of the object located within the specific area. Closing an entry to the particular region in response to the request object not being the administrator and the administrator not being located within the particular region.
In some embodiments of the invention, in the method, further, in a case where an object other than the manager is located within the specific area, the manager is not authorized to leave the specific area.
In some embodiments of the invention, in the method, further, when the request object is authorized to enter the specific area, an image of the entrance of the specific area is acquired. Then, based on the image, it is identified whether an object entering the specific area is the request object.
In some embodiments of the invention, the request object comprises at least one of: a requesting person, and a requesting vehicle.
In some embodiments of the present invention, in the method, further, after opening the entry of the specific area, a guidance for an operation of the request object in the specific area is displayed or played.
According to a second aspect of the present invention, there is provided an apparatus for admission control of a specific area. The apparatus includes at least one processor, and at least one memory storing a computer program. The computer program, when executed by the at least one processor, causes the apparatus to: receiving an entry request from a request object requesting entry into the specific area, the entry request including: identification information of the request object and a code of the specific area; obtaining admission control information of the specific area based on the code of the specific area, wherein the admission control information comprises: identification information of an authorized object authorized to enter the specific area; determining whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object; opening an entrance of the specific area in response to the request object being authorized to enter the specific area; and closing the entrance of the specific region in response to the request object not being authorized to enter the specific region.
In some embodiments of the invention, the admission control information further comprises: attribute information of an admission device authorized to enter said specific area. Wherein the attribute information of the admission device comprises at least one of: name, number, price, user, expiration date, and inspection status. The computer program, when executed by the at least one processor, further causes the apparatus to: acquiring attribute information of the same-row equipment carried by the request object; determining whether the peer device is authorized to enter the specific area based on the admission control information and the attribute information of the peer device; and closing the entrance to the particular zone in response to the peer device not being authorized to enter the particular zone.
In some embodiments of the invention, the admission control information further comprises: and the admission carrying relationship between the authorization object and the admission equipment. The computer program, when executed by the at least one processor, further causes the apparatus to: determining whether the request object is authorized to enter the specific area with the peer device based on the admission control information, the identification information of the request object and the attribute information of the peer device; and closing the entrance of the specific area in response to the request object not being authorized to enter the specific area with the peer device.
In some embodiments of the invention, the admission control information further comprises: an admission period for the particular area. Wherein the entrance to the specific area is closed if the current time is not within the admission period.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: receiving a leave request from the request object requesting to leave the specific area, the leave request including: the identification information of the request object and the code of the specific area; obtaining, based on the code of the specific area, a permission control information of the specific area, the permission control information including: attribute information of a drop-out device authorized to leave the particular area, wherein the attribute information of the drop-out device includes at least one of: name, number, price, user, expiration date, and inspection status; acquiring attribute information of the same-row equipment carried by the request object; determining whether the peer device is authorized to leave the specific area based on the admission control information and the attribute information of the peer device; and closing an exit of the particular zone in response to the peer device not being authorized to leave the particular zone.
In some embodiments of the invention, the permission control information further comprises: an egress carrying relationship between the authorization object and the egress device. The computer program, when executed by the at least one processor, further causes the apparatus to: determining whether the request object is authorized to leave the specific area with the peer device based on the permission control information, the identification information of the request object and the attribute information of the peer device; and closing the exit of the particular zone in response to the request object not being authorized to leave the particular zone with the peer device.
In some embodiments of the invention, the permission control information further comprises: a time period of permission for the particular region. Wherein the exit of the particular zone is closed if the current time is not within the allowance time period.
In some embodiments of the invention, the admission control information further comprises: identification information of a manager of the specific area. The computer program, when executed by the at least one processor, further causes the apparatus to: recording identification information of objects located in the specific area; determining whether the manager is located within the specific area based on the recorded identification information of the object located within the specific area; and closing an entry of the specific area in response to the request object not being the manager and the manager not being located within the specific area.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: in a case where an object other than the manager is located within the specific area, the manager is not authorized to leave the specific area.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: acquiring an image of the entrance of the specific area when the request object is authorized to enter the specific area; based on the image, identifying whether an object entering the specific area is the request object.
In some embodiments of the invention, the request object comprises at least one of: a requesting person, and a requesting vehicle.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: displaying or playing guidance for an operation of the request object in the specific area after opening the entry of the specific area.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings of the embodiments will be briefly described below, it being understood that the drawings described below relate only to some embodiments of the present invention and are not limiting thereof, wherein:
figure 1 is an exemplary flow diagram of a method for admission control of a particular area according to an embodiment of the present invention;
figure 2 is an exemplary flow chart of steps further comprised by a method for admission control of a specific area according to an embodiment of the present invention;
figure 3 is an exemplary flow chart of steps further comprised by a method for admission control of a specific area according to an embodiment of the present invention;
figure 4 is an exemplary flow chart of steps further comprised by a method for admission control of a specific area according to an embodiment of the present invention;
figure 5 is an exemplary flow chart of steps further comprised by a method for admission control of a specific area according to an embodiment of the present invention;
figure 6 is an exemplary flow chart of steps further comprised by a method for admission control of a specific area according to an embodiment of the present invention;
figure 7 is an exemplary flow chart of steps further comprised by a method for admission control of a specific area according to an embodiment of the present invention; and
fig. 8 is a schematic block diagram of an apparatus for admission control of a specific area according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the invention without any inventive step, also belong to the scope of protection of the invention.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the subject matter of this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the specification and relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein. As used herein, the statement that two or more parts are "connected" or "coupled" together shall mean that the parts are joined together either directly or joined through one or more intermediate components. Terms such as "first" and "second" are only used to distinguish one module/component from another.
In this context, the term "admission control of a particular area" may include control of admission into and/or out of a particular area. The term "device" may include, for example, tools, instruments, and electronics, among others.
In locations with more stringent safety requirements, such as thermal power plants, laboratory parks, etc., different areas may be open for different jurisdictions of personnel and/or vehicles. Therefore, it is necessary to distinguish various situations and adopt respective management and control authorization modes. Thus, the standard and safety regulation can be strengthened, and the function of safety precaution can be better played.
Fig. 1 shows an exemplary flow diagram of a method 100 for admission control of a specific area according to an embodiment of the present invention. The method 100 may be performed by any computing device. In some embodiments of the invention, consider the case where a region may include at least one subregion. Wherein, for the sake of clarity, the sub-region in which the requested object requests to enter or leave is referred to as "specific region" hereinafter. The defined area may include separate inlets and outlets or may include an access opening that permits both entry and exit. Hereinafter, the inlet and outlet may be referred to as an inlet or an outlet according to functions. At the entrance and/or exit of a specific area, an information reading device may be provided to receive a request for an object.
As shown in fig. 1, in step 102, an entry request requesting entry into a particular area from a request object is received. The entry request includes: identification information of the object and a code of the specific area are requested. The request object may include a requesting person and/or a requesting vehicle. In some embodiments of the invention, the identification information of the requesting person may include one or more of the following: name, gender, birth date, identification, post status, job title, skill level, information related to special qualifications, safety training information, job ticket accountability, violation assessment, administrative assessment, technical transaction record, safety transaction record, and the serial number and validity period of the safety helmet. The identification information of the requesting vehicle may include one or more of: license plate number, driving license number and valid period, driver name, driving license number and valid period, and name of unit to which the vehicle belongs.
In the case where the request object is a requesting person, the entry request may be made, for example, by the request object swiping an access card at an information reading device (e.g., a card reader) at the entrance of the specific area. The entry request may also be made, for example, by requesting the object to enter identification information (e.g., username and password) at an information reading device (e.g., keyboard, mouse) of the entry to the particular area. The entry request may also be made, for example, by requesting that the object provide a biometric at an information reading device (e.g., a biometric means) of the entrance to the particular area. The biometric characteristic of the requesting subject is, for example, one or more of a facial characteristic, a fingerprint characteristic, a palm print characteristic, an iris characteristic, a voice print characteristic, and the like of the requesting subject. For example, the facial features of the requested object may be acquired by a camera. The fingerprint characteristics of the requested object may be obtained by a fingerprinting device. The palm print characteristics of the requesting object can be obtained by the palm print recognition means. The iris feature of the requested object may be acquired by the iris recognition apparatus. The voiceprint feature of the requested object may be obtained by the recording device.
In the case where the requested object is a requesting vehicle, the entry request may be made, for example, by a license plate automatic recognition system automatically recognizing the license plate number of the requesting vehicle located at the entrance of the particular area. The entry request may also be made, for example, by requesting a person on the vehicle to scan a driver's license, a travel license, an access card, or the like at an information reading device (e.g., a scanner) at the entrance of the particular area.
In some embodiments of the present invention, a code of a specific area may be preset in the information reading apparatus. The code of the specific area has a correspondence relationship with the information reading apparatus established in advance. When the information reading device reads the identification information of the requested object, the information reading device obtains the code of the specific area preset in the information reading device. For example, an information reading apparatus located at the entrance of sub-area No. 1 is preset with the code 001 of the sub-area. The information reading device located at the entrance of sub-area No. 2 is preset with the code 002 of the sub-area. The information reading device located at the entrance of sub-zone No. 3 is preset with the code 003 of the sub-zone. When the information reading device located at entry No. 1 reads the identification information of the requested object, the information reading device may provide the identification information of the requested object and the code 001 of the specific area to the computing device executing the method 100.
Then, in step 104, admission control information for the particular area is obtained based on the code of the particular area. The admission control information may include: identification information of authorized objects authorized to enter a particular area. The authorized object may include an authorized person and/or an authorized vehicle. The item included in the identification information of the authorized person may be the same as the item included in the identification information of the requesting person. The item included with the identification information of the authorized vehicle may be the same as the item included with the identification information of the requesting vehicle. The admission control information for that particular area may for example be included in the list. The list may include codes and corresponding admission control information for each sub-region in the region.
In step 106, it is determined whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. For example, whether the request object is authorized to enter the specific area may be determined by comparing identification information of the authorization object of the specific area with identification information of the request object. Assuming that the admission control information defines that the authorization object authorized to enter the specific area includes only females, the request object is not authorized to enter the specific area in a case where the identification information of the request object indicates that the request object is male. In the case where the identification information of the request object indicates that the request object is female, the request object is authorized to enter the specific area. It should be noted that the admission control information may also define a plurality of conditions. For example, the admission control information may define that the authorized objects authorized to enter the particular region include only women born before 2000.
If the requested object is authorized to enter the specific area (yes in step 106), the entry to the specific area is opened in step 108. In some embodiments, an output device such as a display or speaker may be used to prompt that the requesting object is authorized to enter the particular area.
If the request object is not authorized to enter the specific area ("no" in step 106), the entrance to the specific area is closed in step 110. In some embodiments, the requesting object may be notified via an output device such as a display or speaker that the object is not authorized to enter the particular region.
In some scenarios, the requesting object may carry a peer device into a particular area. For example, a service person may carry a service tool into a particular area. Fig. 2 shows an exemplary flow diagram of the steps further included in the method 100 according to an embodiment of the present invention in such a case. In the example of fig. 2, the admission control information further includes: attribute information of an admission device authorized to enter a particular area. Wherein the attribute information of the admission device comprises at least one of: name, number, price, user, expiration date, and inspection status.
In step 202, the attribute information of the peer devices carried by the request object is obtained. The entry included in the attribute information of the peer device may be the same as the entry included in the attribute information of the admission device. The attribute information of the peer device may be obtained, for example, by scanning a barcode or a two-dimensional code on the peer device containing the attribute information thereof, may be obtained, for example, by directly inputting identification information of the peer device, and may be obtained, for example, by recognizing an external shape of the peer device by an image recognition technique.
In step 204, it is determined whether the peer device is authorized to enter the specific area based on the admission control information and the attribute information of the peer device. For example, it may be determined whether the peer device is authorized to enter a particular area by comparing the attribute information of the admission device and the attribute information of the peer device. Assuming that the admission control information defines that the checking state of the admitted device must be qualified, the peer device is not authorized to enter the particular area if the checking state of the peer device is not qualified. In the case where the check-up status of the peer device is qualified, the peer device is authorized to enter the specific area.
If the peer device is authorized to enter the specific area ("yes" in step 204), then the entry to the specific area is opened in step 206. It should be appreciated that in step 206, if the requested object is not authorized to enter the particular region, then the entry to the particular region is not opened.
If the peer device is not authorized to enter the particular zone ("no" at step 204), then the entry to the particular zone is closed at step 208. It should be appreciated that in step 208, even if the request object is authorized to enter the particular region, the entry to the particular region may still be closed because the peer device is not authorized to enter the particular region. In some embodiments, the reason why the entry to the specific area is not opened may be notified to the requesting object through an output device such as a display or a speaker.
In some cases, separate request objects and peer devices may each be allowed to enter a particular region, but a particular request object may only carry a particular peer device into a particular region. For example, a service person may carry a service tool into a service area, but a cleaning person may not carry a service tool into a service area. Therefore, the cleaning personnel who do not have the authority to operate the maintenance tool can be prevented from entering the maintenance area to perform maintenance operation, and danger is avoided.
Fig. 3 shows an exemplary flow diagram of the steps further comprised by the method 100 according to an embodiment of the present invention in such a case. In the example of fig. 3, the admission control information further includes: and (4) an admission carrying relationship between the authorization object and the admission equipment. The admission carrying relationship defines which authorized objects can carry which admission devices into the particular area.
In step 302, it is determined whether the request object is authorized to enter a specific area with the peer device based on the admission control information, the identification information of the request object, and the attribute information of the peer device. In one example, it may be determined whether the request object and the peer device are each authorized to enter the particular zone. And comparing whether the carrying relation between the request object and the peer equipment conforms to the admission carrying relation defined in the admission control information or not under the condition that the request object and the peer equipment are authorized to enter the specific area. If yes, determining that the request object is authorized to enter the specific area with the peer device; otherwise, determining that the request object is not authorized to enter the specific area with the peer device.
If the request object is authorized to enter the specific area with the peer device (yes in step 302), the entrance to the specific area is opened in step 304. It should be understood that the request object is authorized to carry the peer device into the specific area, and the carrying relationship between the request object and the peer device conforms to the admission carrying relationship.
If the request object is not authorized to enter the specific area with the peer device (no in step 302), the entry to the specific area is closed in step 306. In some embodiments, the reason why the entry to the specific area is not opened may be notified to the requesting object through an output device such as a display or a speaker.
The examples shown in fig. 2 and 3 can not only control the admission management of a specific area based on the rights of a request object, but also further propose admission control to a peer device, thereby further improving the security level.
In some cases, a particular zone may only allow access to the request object and/or peer device for a particular period of time, as desired. Thus, in some embodiments of the invention, the admission control information further comprises: admission period of a particular area. In case the current time is not within the admission period, the entry of the specific area is closed. For example, the admission period may be a work period, such as 9 am to 6 pm. Only during this period of operation is access to a particular area allowed to open.
As described above, "admission control of a particular area" may also include control of admission to leave a particular area. In some embodiments, authorized objects that are permitted to enter a particular zone are also permitted to leave the particular zone.
In a further embodiment, consider also the case where the request object leaves a particular area with a peer device. Fig. 4 shows an exemplary flow diagram of the steps further included in the method 100 according to an embodiment of the present invention in such a case. In the example of FIG. 4, a leave request is received from a request object requesting to leave a particular area, step 402. The leave request includes: identification information of the object and a code of the specific area are requested. The identification information of the request object and the code of the specific area may be obtained in a manner as described in step 102 of fig. 1.
Then, in step 404, the permission control information of the specific area is acquired based on the code of the specific area. The permission control information includes: attribute information of a drop-out device authorized to leave a particular area. Wherein the attribute information of the drop-out device includes at least one of: name, number, price, user, expiration date, and inspection status. In some examples, the admittance apparatus may be the same, partially the same, or completely different from the admittance apparatus.
In step 406, the attribute information of the peer device carried by the request object is obtained. The items included in the attribute information of the peer devices may be the same as the items included in the attribute information of the drop-out device. The attribute information of peer devices may be obtained in a manner as described in step 202 of fig. 2.
At step 408, it is determined whether the peer device is authorized to leave the specific area based on the admission control information and the attribute information of the peer device. For example, it may be determined whether the peer device is authorized to leave the particular area by comparing the attribute information of the egress device with the attribute information of the peer device. Assuming that the check-out control information defines the price of the check-out device to be less than or equal to one hundred thousand yuan, the peer device is not authorized to leave the specific area under the condition that the price of the peer device exceeds one hundred thousand yuan, so that the valuable device is prevented from being lost. In the case where the price of the peer device does not exceed one hundred thousand dollar bills, the peer device is authorized to leave the particular area.
If the peer device is authorized to leave the particular area ("yes" at step 408), the exit from the particular area is opened at step 410. It should be appreciated that in step 410, if the requested object is not authorized to leave the particular zone, then the exit from the particular zone is not opened.
If the peer device is not authorized to leave the particular area ("no" at step 408), the exit of the particular area is closed at step 412. It should be appreciated that in step 412, even if the request object is authorized to leave the particular area, the exit of the particular area may still be closed because the peer device is not authorized to leave the particular area. In some embodiments, the reason why the outlet of the specific area is not opened may be notified to the requesting object through an output device such as a display or a speaker.
In some cases, separate request objects and peer devices may each be allowed to leave a particular area, but a particular request object may only carry a particular peer device away from a particular area. For example, a laboratory worker may leave the laboratory area carrying a laboratory instrument that may cause environmental contamination, but a cleaning worker may not carry the laboratory instrument away from the laboratory area. Therefore, the problem that the cleaner without experience of managing the experimental instrument takes the experimental instrument away from the experimental area to cause environmental pollution in other areas except the experimental area can be avoided.
Fig. 5 shows an exemplary flow diagram of the steps further included in the method 100 according to an embodiment of the present invention in such a case. In the example of fig. 5, the permission control information further includes: an egress carrying relationship between the authorization object and the egress device. The drop-out carrying relationship defines which authorized objects can carry which drop-out devices away from the particular area.
In step 502, it is determined whether the request object is authorized to leave the specific area with the peer device based on the permission control information, the identification information of the request object, and the attribute information of the peer device. In one example, it may be determined whether the request object and the peer device are each authorized to leave the particular area. And in the case that the request object and the peer device are authorized to leave the specific area, comparing whether the carrying relationship between the request object and the peer device conforms to the outbound carrying relationship defined in the outbound control information. If yes, determining that the request object is authorized to leave the specific area with the peer device; otherwise, it is determined that the request object is not authorized to leave the particular area with the peer device.
If the request object is authorized to leave the specific area with the peer device ("yes" in step 502), an exit of the specific area is opened in step 504. It should be understood that the request object is authorized to leave a specific area with the peer device is understood to mean that the request object and the peer device are authorized to leave the specific area respectively, and the carrying relationship between the request object and the peer device conforms to the outbound carrying relationship.
If the request object is not authorized to leave the specific area with the peer device ("no" in step 502), the exit of the specific area is closed in step 506. In some embodiments, the reason why the outlet of the specific area is not opened may be notified to the requesting object through an output device such as a display or a speaker.
The examples shown in fig. 4 and 5 may not only control the permission management of a specific region based on the permission of a request object, but also further propose permission control of a peer device, thereby further improving the security level.
In some cases, a particular zone may only allow the requesting object and/or peer device to leave for a particular period of time, as desired. Therefore, in some embodiments of the present invention, the permission control information further comprises: a time period for the grant of a particular region. In the case that the current time is not within the allowance time period, the exit of the specific area is closed. For example, the time period of grant-out may be a non-working period, such as 6 pm to 9 pm. Only during this period of inactivity is the opening of the exit from the particular zone permitted.
In some scenarios, a particular area must be supervised by a manager. The administrator may be the person in charge of the particular area. Other requesting objects are only allowed to come in and go out if the manager is in the particular area. Fig. 6 shows an exemplary flow diagram of the steps further included in the method 100 in accordance with an embodiment of the present invention in such a case. In the example of fig. 6, the admission control information further includes: identification information of a manager of the specific area.
In step 602, identification information of objects located in a specific area is recorded. In one example, objects located within a particular region may be determined based on received entry requests and exit requests. For example, after receiving an entry request for an authorized object, the authorized object may be considered to have entered the particular zone. At this time, the state of the authorized object is recorded as "in", and the identification information of the authorized object is recorded. In some examples, after receiving the access request of the authorized object, a camera, a sensor, or the like may be further utilized to determine whether the authorized object actually enters the specific area. In the case where the authorized object actually enters the specific area, the state of the authorized object is recorded as "in", and the identification information of the authorized object is recorded.
Likewise, after receiving a request to leave an authorized object, the authorized object may be considered to have left the particular area. At this time, the entry including the identification information of the authorized object is deleted. In some examples, after receiving the leaving request of the authorized object, a camera, a sensor, or the like may be further utilized to determine whether the authorized object actually leaves the specific area. In the case where the authorized object actually leaves the specific area, the entry including the identification information of the authorized object is deleted.
In step 604, it is determined whether the manager is located within the specific area based on the recorded identification information of the object located within the specific area. Whether the manager is located within the specific area may be determined by comparing the identification information of the manager with the identification information of the objects located within the specific area.
If the administrator is located within the particular area ("yes" in step 604), the process proceeds to step 106 of FIG. 1 to determine whether the requested object is authorized to enter the particular area. If the administrator is not located within the specific area (NO in step 604), it is determined whether the requested object is an administrator in step 606. If the requested object is a manager (YES in step 606), then entry into the particular region is opened in step 608. If the requested object is not the manager (NO in step 606), the entry to the specific area is closed in step 610. In some embodiments, the reason why the entry to the specific area is not opened may be notified to the requesting object through an output device such as a display or a speaker.
Further, although not shown in FIG. 6, in some embodiments of the invention, in the event that an object other than the administrator is located within a particular region, the administrator is not authorized to leave the particular region. For example, upon receiving a leave request for a requested object, it is determined whether the requested object is a manager. If the requested object is a manager, it is determined from the record whether an object other than the manager is located within the specific area. If so, the administrator is not allowed to leave the particular area. In some embodiments, the administrator may be notified via an output device such as a display or speaker of the reason why the exit for the particular area is not open. By recording, by the computing device, identification information of objects located within a particular area and determining whether to authorize the administrator to leave the particular area based on the recording, the administrator can be prevented from leaving the particular area by mistake without seeing other objects.
In some scenarios, there may be situations where the object actually entering a particular area does not correspond to the requesting object making the entry request. An embodiment of the present invention addresses the measures that can be taken for this situation in fig. 7. In the example of FIG. 7, at step 702, an image of an entrance to a particular region is captured when a requesting object is authorized to enter the particular region. In some examples, a camera may be provided, for example, at the entrance to the particular area. The camera is activated when the computing device receives an entry request to begin capturing images at the entry.
At step 704, based on the image, it is identified whether the object entering the specific area is a request object. For example, image recognition techniques may be employed to identify facial features of a subject entering the particular region based on the captured images. Then, based on the identification information of the request object obtained in step 102 of fig. 1, the facial features of the request object that are pre-stored in the computing device are extracted. It is determined whether the object entering the specific area is the requested object by comparing the recognized facial features with the pre-stored facial features.
If the object entering the specific area is not the requested object ("no" in step 704), the entrance to the specific area is closed in step 706. In some embodiments, the alarm may be provided by an output device such as a display, speaker, or alarm so that security personnel may detect the abnormality.
If the object entering the specific area is the requested object (yes in step 704), the acquisition of the image at the entrance of the specific area may be stopped to save the calculation resources.
Similar to the example of FIG. 7, in one example, it may also be determined whether the object that actually left the particular area coincides with the requesting object that made the leave request to enforce security precautions.
Further, in some embodiments of the present invention, after opening the entry of the specific region, guidance for the operation of the request object in the specific region may be displayed or played. The guidance may for example take the form of text, video or audio.
Fig. 8 is an apparatus 800 for admission control of a specific area according to an embodiment of the present invention. The device 800 may be included in an access control system. As shown in fig. 8, the apparatus 800 may include a processor 810 and a memory 820 in which computer programs are stored. The computer program, when executed by the processor 810, causes the apparatus 800 to perform the steps of the method 100 for admission control of a specific area as illustrated in fig. 1. That is, the apparatus 800 may receive an entry request requesting entry into a specific area from a request object. The entry request includes: identification information of the object and a code of the specific area are requested. The apparatus 800 may obtain admission control information for a particular region based on a code of the particular region. The admission control information includes: identification information of authorized objects authorized to enter a particular area. The apparatus 800 may determine whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. If the request object is authorized to enter the specific region, the apparatus 800 may open an entry of the specific region. If the request object is not authorized to enter the specific region, the device 800 may close the entrance of the specific region.
The computer program, when executed by the processor 810, may also cause the apparatus 800 to perform the steps as shown in fig. 2-7.
In an embodiment of the present disclosure, the processor 810 may be, for example, a central processing unit CPU, a microprocessor, a Digital Signal Processor (DSP), a processor based on a multi-core processor architecture, or the like. The memory 820 may be any type of memory implemented using data storage technology including, but not limited to, random access memory, read only memory, semiconductor-based memory, flash memory, disk memory, and the like.
Further, in embodiments of the present disclosure, the apparatus 800 may also include an input device 830, such as a keyboard, a mouse, a card reader, a camera, a fingerprint recognition device, a palm print recognition device, an iris recognition device, a voice recording device, and so on. Additionally, the apparatus 800 may also include output devices 840 such as a display, speakers, alarms, and the like for outputting operational instructions, presentation videos and prompts, and alerts and the like.
In other embodiments of the present disclosure, there is also provided a computer readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of the method for admission control of a specific area as illustrated in fig. 1 to 7.
As used herein and in the appended claims, the singular forms of words include the plural and vice versa, unless the context clearly dictates otherwise. Thus, when reference is made to the singular, it is generally intended to include the plural of the corresponding term. Similarly, the terms "comprising" and "including" are to be construed as being inclusive rather than exclusive. Likewise, the terms "include" and "or" should be construed as inclusive unless such an interpretation is explicitly prohibited herein. Where the term "example" is used herein, particularly when it comes after a set of terms, it is merely exemplary and illustrative and should not be considered exclusive or extensive.
Further aspects and ranges of adaptability will become apparent from the description provided herein. It should be understood that various aspects of the present application may be implemented alone or in combination with one or more other aspects. It should also be understood that the description and specific examples are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
Several embodiments of the present invention have been described in detail above, but it is apparent that various modifications and variations can be made to the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention. The scope of protection of the invention is defined by the appended claims.

Claims (13)

1. A method for admission control of a particular area, the method comprising:
receiving an entry request from a request object requesting entry into the specific area, the entry request including: identification information of the request object and a code of the specific area;
obtaining admission control information of the specific area based on the code of the specific area, wherein the admission control information comprises: identification information of an authorized object authorized to enter the specific area;
determining whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object;
opening an entrance of the specific area in response to the request object being authorized to enter the specific area; and
closing the entry of the particular region in response to the request object not being authorized to enter the particular region.
2. The method of claim 1, wherein the admission control information further comprises: attribute information of an admission device authorized to enter the particular area, wherein the attribute information of the admission device comprises at least one of: name, number, price, user, expiration date, and inspection status;
wherein the method further comprises:
acquiring attribute information of the same-row equipment carried by the request object;
determining whether the peer device is authorized to enter the specific area based on the admission control information and the attribute information of the peer device; and
closing the entry to the particular zone in response to the peer device not being authorized to enter the particular zone.
3. The method of claim 2, wherein the admission control information further comprises: an admission carrying relationship between the authorization object and the admission equipment;
wherein the method further comprises:
determining whether the request object is authorized to enter the specific area with the peer device based on the admission control information, the identification information of the request object and the attribute information of the peer device; and
closing the entrance of the specific area in response to the request object not being authorized to enter the specific area with the peer device.
4. The method of any of claims 1-3, the admission control information further comprising: the admission period of the specific area is,
wherein the entrance to the specific area is closed if the current time is not within the admission period.
5. The method of any of claims 1-4, further comprising:
receiving a leave request from the request object requesting to leave the specific area, the leave request including: the identification information of the request object and the code of the specific area;
obtaining, based on the code of the specific area, a permission control information of the specific area, the permission control information including: attribute information of a drop-out device authorized to leave the particular area, wherein the attribute information of the drop-out device includes at least one of: name, number, price, user, expiration date, and inspection status;
acquiring attribute information of the same-row equipment carried by the request object;
determining whether the peer device is authorized to leave the specific area based on the admission control information and the attribute information of the peer device; and
closing an exit of the particular zone in response to the peer device not being authorized to leave the particular zone.
6. The method of claim 5, wherein the allowing out control information further comprises: an egress carrying relationship between the authorization object and the egress device;
wherein the method further comprises:
determining whether the request object is authorized to leave the specific area with the peer device based on the permission control information, the identification information of the request object and the attribute information of the peer device; and
closing the exit of the particular zone in response to the request object not being authorized to leave the particular zone with the peer device.
7. The method of claim 5 or 6, the allowing out control information further comprising: the time period of the permission to go out of the specific area,
wherein the exit of the particular zone is closed if the current time is not within the allowance time period.
8. The method of any of claims 1-7, wherein the admission control information further comprises: identification information of a manager of the specific area,
wherein the method further comprises:
recording identification information of objects located in the specific area;
determining whether the manager is located within the specific area based on the recorded identification information of the object located within the specific area; and
closing an entry to the particular region in response to the request object not being the administrator and the administrator not being located within the particular region.
9. The method of claim 8, further comprising:
in a case where an object other than the manager is located within the specific area, the manager is not authorized to leave the specific area.
10. The method according to any one of claims 1-9, further comprising:
acquiring an image of the entrance of the specific area when the request object is authorized to enter the specific area; and
based on the image, identifying whether an object entering the specific area is the request object.
11. The method of any of claims 1-10, the request object comprising at least one of: a requesting person, and a requesting vehicle.
12. The method according to any one of claims 1-11, further comprising:
displaying or playing guidance for an operation of the request object in the specific area after opening the entry of the specific area.
13. An apparatus for admission control of a particular area, comprising:
at least one processor; and
at least one memory storing a computer program;
wherein the computer program, when executed by the at least one processor, causes the apparatus to perform the method of any of claims 1-12.
CN201911147416.5A 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area Active CN112825203B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911147416.5A CN112825203B (en) 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911147416.5A CN112825203B (en) 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area

Publications (2)

Publication Number Publication Date
CN112825203A true CN112825203A (en) 2021-05-21
CN112825203B CN112825203B (en) 2023-10-03

Family

ID=75906508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911147416.5A Active CN112825203B (en) 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area

Country Status (1)

Country Link
CN (1) CN112825203B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114360225A (en) * 2021-12-28 2022-04-15 深圳市邦迪工程顾问有限公司 Building engineering safety supervision method

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0016579D0 (en) * 1999-07-07 2000-08-23 Welsh Neil An improved method,system and device for controlling access of individuals to and/or from a restricted area
JP2001005875A (en) * 1999-06-24 2001-01-12 Hitachi Information Technology Co Ltd Entering/leaving managing system and method for managing entering and leaving
US6208984B1 (en) * 1997-08-29 2001-03-27 Electronic Data Systems Corporation Method and system of determining access to records of members of a community
JP2001175905A (en) * 1999-12-17 2001-06-29 Toshiba Corp Entering/leaving method to be used for entering/leaving system
US20020082859A1 (en) * 2000-09-29 2002-06-27 Lancos Kenneth J. System and method for selectively allowing the passage of a guest through a region within a coverage area
JP2006209728A (en) * 2004-06-08 2006-08-10 Chuo Electronics Co Ltd Unauthorized entry detection device and detection method, and entry control system using it
CN101510324A (en) * 2009-03-13 2009-08-19 黄以华 System for monitoring building safety by wireless radio frequency discrimination RFID
CN201298248Y (en) * 2008-12-11 2009-08-26 四川大学 Goods control system based on wireless radio frequency identification
CN102376143A (en) * 2010-08-24 2012-03-14 国民技术股份有限公司 Safety management system for enterprise assets and method thereof
KR20120119724A (en) * 2011-04-22 2012-10-31 주식회사 유니온커뮤니티 Management system for entrance and method thereof
US8749347B1 (en) * 2009-01-29 2014-06-10 Bank Of America Corporation Authorized custodian verification
CN104700202A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for controlling people permission in nuclear power plant area
CN105139494A (en) * 2015-08-14 2015-12-09 无锡物讯科技有限公司 Anti-foreign body zone omission item automatic recording and alarm detection system and method
CN105956731A (en) * 2016-04-18 2016-09-21 佛山市高明区高科中小企业技术服务中心 Enterprise personnel supervision method and enterprise personnel supervision system
CN106448012A (en) * 2016-07-22 2017-02-22 盛世龙图(北京)物联技术有限公司 Antitheft system
CN106548542A (en) * 2015-09-21 2017-03-29 创新网络有限公司 access management system and method
CN107316070A (en) * 2017-06-05 2017-11-03 安徽福讯信息技术有限公司 A kind of personnel based on RFID and visual plant monitoring system
US20180005471A1 (en) * 2015-02-02 2018-01-04 Tma Capital Australia Pty Ltd System, method and computer program for an access control system
CN107667375A (en) * 2015-05-01 2018-02-06 亚萨合莱有限公司 Determine to enter or go out using wearable device
US20190087464A1 (en) * 2017-09-21 2019-03-21 Hongfujin Precision Electronics (Tianjin) Co.,Ltd. Regional population management system and method
CN110136313A (en) * 2019-05-24 2019-08-16 岭澳核电有限公司 Nuclear power station gate inhibition management-control method, device, computer equipment and storage medium

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6208984B1 (en) * 1997-08-29 2001-03-27 Electronic Data Systems Corporation Method and system of determining access to records of members of a community
JP2001005875A (en) * 1999-06-24 2001-01-12 Hitachi Information Technology Co Ltd Entering/leaving managing system and method for managing entering and leaving
GB0016579D0 (en) * 1999-07-07 2000-08-23 Welsh Neil An improved method,system and device for controlling access of individuals to and/or from a restricted area
JP2001175905A (en) * 1999-12-17 2001-06-29 Toshiba Corp Entering/leaving method to be used for entering/leaving system
US20020082859A1 (en) * 2000-09-29 2002-06-27 Lancos Kenneth J. System and method for selectively allowing the passage of a guest through a region within a coverage area
JP2006209728A (en) * 2004-06-08 2006-08-10 Chuo Electronics Co Ltd Unauthorized entry detection device and detection method, and entry control system using it
CN201298248Y (en) * 2008-12-11 2009-08-26 四川大学 Goods control system based on wireless radio frequency identification
US8749347B1 (en) * 2009-01-29 2014-06-10 Bank Of America Corporation Authorized custodian verification
CN101510324A (en) * 2009-03-13 2009-08-19 黄以华 System for monitoring building safety by wireless radio frequency discrimination RFID
CN102376143A (en) * 2010-08-24 2012-03-14 国民技术股份有限公司 Safety management system for enterprise assets and method thereof
KR20120119724A (en) * 2011-04-22 2012-10-31 주식회사 유니온커뮤니티 Management system for entrance and method thereof
CN104700202A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for controlling people permission in nuclear power plant area
US20180005471A1 (en) * 2015-02-02 2018-01-04 Tma Capital Australia Pty Ltd System, method and computer program for an access control system
CN107667375A (en) * 2015-05-01 2018-02-06 亚萨合莱有限公司 Determine to enter or go out using wearable device
CN105139494A (en) * 2015-08-14 2015-12-09 无锡物讯科技有限公司 Anti-foreign body zone omission item automatic recording and alarm detection system and method
CN106548542A (en) * 2015-09-21 2017-03-29 创新网络有限公司 access management system and method
CN105956731A (en) * 2016-04-18 2016-09-21 佛山市高明区高科中小企业技术服务中心 Enterprise personnel supervision method and enterprise personnel supervision system
CN106448012A (en) * 2016-07-22 2017-02-22 盛世龙图(北京)物联技术有限公司 Antitheft system
CN107316070A (en) * 2017-06-05 2017-11-03 安徽福讯信息技术有限公司 A kind of personnel based on RFID and visual plant monitoring system
US20190087464A1 (en) * 2017-09-21 2019-03-21 Hongfujin Precision Electronics (Tianjin) Co.,Ltd. Regional population management system and method
CN110136313A (en) * 2019-05-24 2019-08-16 岭澳核电有限公司 Nuclear power station gate inhibition management-control method, device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114360225A (en) * 2021-12-28 2022-04-15 深圳市邦迪工程顾问有限公司 Building engineering safety supervision method

Also Published As

Publication number Publication date
CN112825203B (en) 2023-10-03

Similar Documents

Publication Publication Date Title
US7158657B2 (en) Face image recording system
JP6911154B2 (en) Access control methods and devices, systems, electronic devices, programs and media
CN105261105B (en) Safety door inhibition method
JP2020530144A (en) Door access control method, door access control device, system and storage medium
US8694792B2 (en) Biometric based repeat visitor recognition system and method
CN111402481A (en) Intelligent access control system with body temperature measuring function, control method and computer readable storage medium
CN109461233A (en) Caller management method, system, computer equipment and storage medium
JP2009098814A (en) Access control method and face image recognition security system
JP2011048547A (en) Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method
US11200767B2 (en) Method and system for enhancing security of a secured area
JP6015592B2 (en) Information processing apparatus and information processing program
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
Podio Personal authentication through biometric technologies
CN110334535A (en) A kind of financial management control system
CN112364733B (en) Intelligent security face recognition system
CN112825203A (en) Method and apparatus for admission control of a specific area
KR20020032048A (en) Face cognition the preservation a means
Castelluccia Impact analysis of facial recognition
CN109885994A (en) A kind of offline identity authorization system, equipment and computer readable storage medium
CN109885993A (en) A kind of identity authorization system, equipment and computer readable storage medium
JP4198413B2 (en) Entrance / exit management system and method
WO2022201490A1 (en) Authentication terminal, authentication system, authentication method, and non-transitory computer-readable medium
US8442277B1 (en) Identity authentication system for controlling egress of an individual visiting a facility
GB2442504A (en) Face recognition system, security system comprising same and method for operating same
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant