CN112825203B - Method and apparatus for admission control for a particular area - Google Patents

Method and apparatus for admission control for a particular area Download PDF

Info

Publication number
CN112825203B
CN112825203B CN201911147416.5A CN201911147416A CN112825203B CN 112825203 B CN112825203 B CN 112825203B CN 201911147416 A CN201911147416 A CN 201911147416A CN 112825203 B CN112825203 B CN 112825203B
Authority
CN
China
Prior art keywords
specific area
authorized
request object
admission control
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911147416.5A
Other languages
Chinese (zh)
Other versions
CN112825203A (en
Inventor
刘智春
李瑞平
左涛
周祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spic Chongqing Hechuan Power Generation Co ltd
Original Assignee
Spic Chongqing Hechuan Power Generation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spic Chongqing Hechuan Power Generation Co ltd filed Critical Spic Chongqing Hechuan Power Generation Co ltd
Priority to CN201911147416.5A priority Critical patent/CN112825203B/en
Publication of CN112825203A publication Critical patent/CN112825203A/en
Application granted granted Critical
Publication of CN112825203B publication Critical patent/CN112825203B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

Embodiments of the present invention provide a method for admission control for a particular area. In the method, an entry request is received from a request object requesting entry into the particular region. The entry request includes: identification information of the request object and the code of the specific area. Then, based on the code of the specific area, access control information of the specific area is acquired. The admission control information includes: identification information of authorized objects authorized to enter the specific area. Next, it is determined whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. And opening an entrance of the specific area if the request object is authorized to enter the specific area. If the request object is not authorized to enter the specific area, closing the entrance of the specific area.

Description

Method and apparatus for admission control for a particular area
Technical Field
The present invention relates to the field of admission control, and more particularly to a method and apparatus for admission control for a particular area.
Background
The access control management system is mainly used for enterprises and public institutions, schools, communities, offices and other closed places. In the access control system, the identity of a person may be determined based on an access card or a biometric feature of the person, etc., thereby permitting access to the person. By managing the opening and closing of the door, the access control system can grant access to authorized personnel and restrict access to unauthorized personnel.
Disclosure of Invention
Embodiments described herein provide a method and apparatus for admission control for a particular area. The specific region may be a sub-region in a certain region. The method and the device provided by the embodiment of the invention can respectively control the access control of each subarea in the area so as to strengthen the safety precaution.
According to a first aspect of the present invention, a method for admission control for a specific area is provided. In the method, an entry request is received from a request object requesting entry into the particular region. The entry request includes: identification information of the request object and the code of the specific area. Then, based on the code of the specific area, access control information of the specific area is acquired. The admission control information includes: identification information of authorized objects authorized to enter the specific area. Next, it is determined whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. Responsive to the request object being authorized to enter the particular region, an entry to the particular region is opened. Responsive to the request object not being authorized to enter the particular region, the entry to the particular region is closed.
In some embodiments of the invention, the admission control information further comprises: attribute information of an admission device authorized to enter the specific area. Wherein the attribute information of the admission device includes at least one of: name, number, price, user, expiration date, and check status. In the method, attribute information of peer devices carried by the request object is further obtained. Then, based on the admission control information and the attribute information of the peer device, it is determined whether the peer device is authorized to enter the specific area. Responsive to the peer device not being authorized to enter the particular zone, the portal of the particular zone is closed.
In some embodiments of the invention, the admission control information further comprises: and the admission carrying relationship between the authorized object and the admission equipment. In the method, it is further determined whether the request object is authorized to carry the peer device into the specific area based on the admission control information, the identification information of the request object, and the attribute information of the peer device. And closing the entrance of the specific area in response to the request object not being authorized to carry the peer device into the specific area.
In some embodiments of the invention, the admission control information further comprises: and the admission time period of the specific area. And closing the entrance of the specific area in the case that the current time is not within the admission time period.
In some embodiments of the invention, in the method, a leave request is further received from the request object requesting to leave the particular region. The leave request includes: the identification information of the request object and the code of the specific area. Then, based on the code of the specific area, admission control information of the specific area is acquired. The admission control information includes: attribute information of a admission device authorized to leave the specific area. Wherein the attribute information of the out-put device includes at least one of: name, number, price, user, expiration date, and check status. And then, obtaining attribute information of the peer devices carried by the request object. Then, based on the admission control information and the attribute information of the peer device, it is determined whether the peer device is authorized to leave the specific area. Responsive to the peer device not being authorized to leave the particular zone, closing an exit of the particular zone.
In some embodiments of the present invention, the admission control information further includes: and the grant object and the grant equipment are in grant carrying relation. In the method, it is further determined whether the request object is authorized to leave the specific area with the peer device based on the admission control information, the identification information of the request object, and the attribute information of the peer device. And closing the outlet of the specific area in response to the request object not being authorized to carry the peer device away from the specific area.
In some embodiments of the present invention, the admission control information further includes: and the quasi-emergent time period of the specific area. And closing the outlet of the specific area in the case that the current time is not within the quasi-exiting time period.
In some embodiments of the invention, the admission control information further comprises: and the identification information of the manager of the specific area. In the method, identification information of an object located within the specific area is further recorded. Then, it is determined whether the manager is located in the specific area based on the recorded identification information of the object located in the specific area. Responsive to the request object not being the administrator and the administrator not being located within the particular area, closing an entry for the particular area.
In some embodiments of the invention, in the method, further, in a case where an object other than the manager is located within the specific area, the manager is not authorized to leave the specific area.
In some embodiments of the invention, in the method, further, when the requesting object is authorized to enter the specific area, an image of the entrance of the specific area is acquired. Then, based on the image, it is recognized whether or not an object entering the specific area is the request object.
In some embodiments of the invention, the request object includes at least one of: requesting personnel, and requesting vehicles.
In some embodiments of the invention, in the method, further, after opening the entry to the specific area, a guidance of the operation of the request object in the specific area is displayed or played.
According to a second aspect of the present invention, an apparatus for admission control for a specific area is provided. The apparatus includes at least one processor and at least one memory storing a computer program. The computer program, when executed by at least one processor, causes an apparatus to: receiving an entry request from a request object requesting entry into the particular region, the entry request comprising: identification information of the request object and codes of the specific areas; based on the code of the specific area, obtaining admission control information of the specific area, wherein the admission control information comprises: identification information of an authorized object authorized to enter the specific area; determining whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object; responsive to the request object being authorized to enter the particular region, opening an entry to the particular region; and closing the entry to the particular region in response to the request object not being authorized to enter the particular region.
In some embodiments of the invention, the admission control information further comprises: attribute information of an admission device authorized to enter the specific area. Wherein the attribute information of the admission device includes at least one of: name, number, price, user, expiration date, and check status. The computer program, when executed by the at least one processor, further causes the apparatus to: acquiring attribute information of peer devices carried by the request object; determining whether the peer device is authorized to enter the specific area based on the admission control information and the attribute information of the peer device; and closing the entry to the particular zone in response to the peer device not being authorized to enter the particular zone.
In some embodiments of the invention, the admission control information further comprises: and the admission carrying relationship between the authorized object and the admission equipment. The computer program, when executed by the at least one processor, further causes the apparatus to: determining whether the request object is authorized to carry the peer device into the specific area based on the access control information, the identification information of the request object and the attribute information of the peer device; and closing the entrance of the specific area in response to the request object not being authorized to carry the peer device into the specific area.
In some embodiments of the invention, the admission control information further comprises: and the admission time period of the specific area. Wherein the entrance of the specific area is closed in case that the current time is not within the admission time period.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: receiving a leave request from the request object requesting to leave the particular region, the leave request comprising: the identification information of the request object and the code of the specific area; based on the code of the specific area, obtaining admission control information of the specific area, wherein the admission control information comprises: attribute information of a quasi-outgoing device authorized to leave the specific area, wherein the attribute information of the quasi-outgoing device includes at least one of: name, number, price, user, expiration date, and check status; acquiring attribute information of peer devices carried by the request object; determining whether the peer device is authorized to leave the specific area based on the admission control information and the attribute information of the peer device; and closing an exit of the particular zone in response to the peer device not being authorized to leave the particular zone.
In some embodiments of the present invention, the admission control information further includes: and the grant object and the grant equipment are in grant carrying relation. The computer program, when executed by the at least one processor, further causes the apparatus to: determining whether the request object is authorized to carry the peer device out of the specific area based on the admission control information, the identification information of the request object and the attribute information of the peer device; and closing the exit of the particular zone in response to the request object not being authorized to carry the peer device away from the particular zone.
In some embodiments of the present invention, the admission control information further includes: and the quasi-emergent time period of the specific area. Wherein the outlet of the specific area is closed in case that the current time is not within the out-time period.
In some embodiments of the invention, the admission control information further comprises: and the identification information of the manager of the specific area. The computer program, when executed by the at least one processor, further causes the apparatus to: recording identification information of an object located in the specific area; determining whether the manager is located in the specific area based on the recorded identification information of the object located in the specific area; and responsive to the request object not being the manager and the manager not being located within the particular area, closing an entry of the particular area.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: in the case where an object other than the manager is located within the specific area, the manager is not authorized to leave the specific area.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: acquiring an image of the entrance of the specific area when the request object is authorized to enter the specific area; based on the image, it is identified whether an object entering the specific area is the request object.
In some embodiments of the invention, the request object includes at least one of: requesting personnel, and requesting vehicles.
In some embodiments of the invention, the computer program, when executed by the at least one processor, further causes the apparatus to: after opening the entry to the particular region, displaying or playing a guide for the operation of the request object in the particular region.
Drawings
For a clearer description of the technical solutions of embodiments of the present invention, reference will be made to the accompanying drawings of embodiments, which are to be understood as being only related to some embodiments of the present invention, and not limiting thereof, wherein:
Figure 1 is an exemplary flow chart of a method for admission control for a particular area in accordance with an embodiment of the present invention;
figure 2 is an exemplary flowchart of steps further included in a method for admission control for a particular area in accordance with an embodiment of the present invention;
figure 3 is an exemplary flowchart of steps further included in a method for admission control for a particular area in accordance with an embodiment of the present invention;
figure 4 is an exemplary flowchart of steps further included in a method for admission control for a particular area in accordance with an embodiment of the present invention;
figure 5 is an exemplary flowchart of steps further included in a method for admission control for a particular area in accordance with an embodiment of the present invention;
figure 6 is an exemplary flowchart of steps further included in a method for admission control for a particular area in accordance with an embodiment of the present invention;
figure 7 is an exemplary flowchart of steps further included in a method for admission control for a particular area in accordance with an embodiment of the present invention; and
figure 8 is a schematic block diagram of an apparatus for admission control for a particular area in accordance with an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without creative efforts, based on the described embodiments of the present invention also fall within the protection scope of the present invention.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the inventive subject matter belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the specification and relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein. As used herein, a statement that two or more parts are "connected" or "coupled" together shall mean that the parts are joined together either directly or joined through one or more intermediate parts. Terms such as "first" and "second" are used merely to distinguish one module/component from another module/component.
Herein, the term "admission control of a specific area" may include control of admission into and/or departure from the specific area. The term "apparatus" may include, for example, tools, instruments, electronic equipment, and the like.
In places where safety requirements are more stringent, such as thermal power plants, experimental parks, etc., different areas may be open to different authorities of personnel and/or vehicles. Therefore, it is necessary to distinguish between various situations and to adopt a separate management and control authorization mode. Therefore, the standard and the safety regulation can be enhanced, and the safety precaution function is better played.
Figure 1 illustrates an exemplary flow chart of a method 100 for admission control for a particular area in accordance with an embodiment of the present invention. The method 100 may be performed by any computing device. In some embodiments of the present invention, consider the case where one region may include at least one sub-region. Wherein, for clarity of reference, a sub-region in which a request object requests entry or exit is hereinafter referred to as a "specific region". The particular zone may include separate entrances and exits, or may include an entrance that permits both entrance and exit. Hereinafter, the inlet may be referred to as an inlet or an outlet according to functions. At the entrance and/or exit of a specific area, an information reading device may be provided to receive a request for an object.
As shown in fig. 1, in step 102, an entry request is received from a request object requesting entry into a particular area. The entry request includes: identification information of the object is requested and a code of a specific area. The request object may include a requesting person and/or a requesting vehicle. In some embodiments of the invention, the identification information of the requesting person may include one or more of the following: name, gender, birth date, identity, post status, job title, skill level, information related to special qualifications, security training information, job ticket liability, violation assessment, administrative assessment, technical clearance records, security clearance records, and number and expiration date of the helmet. The identification information of the requesting vehicle may include one or more of the following: license plate number, license number and expiration date, driver's name, license number and expiration date, and unit name to which the vehicle belongs.
In the case where the requesting object is a requesting person, the entry request may be made, for example, by swiping an access card at an information reading device (e.g., a card reader) requesting entry of the object at a specific area. The entry request may also be made, for example, by requesting the object to enter identification information (e.g., a user name and password) at an information reading device (e.g., keyboard, mouse) at the entrance of a particular area. The entry request may also be made, for example, by requesting that the subject provide a biometric feature at an information reading device (e.g., biometric means) at the entrance of a particular area. The biometric feature of the requesting object is, for example, one or more of a facial feature, a fingerprint feature, a palmprint feature, an iris feature, and a voiceprint feature of the requesting object, etc. For example, the facial feature of the request object may be acquired by a camera. The fingerprint characteristics of the requested object may be acquired by a fingerprint recognition device. The palmprint characteristics of the request object can be acquired by the palmprint recognition device. The iris characteristics of the requested object may be acquired by an iris recognition device. Voiceprint characteristics of the requested object can be obtained by the recording device.
In the case where the requesting object is a requesting vehicle, the entry request may be made, for example, by the license plate automatic recognition system automatically recognizing the license plate number of the requesting vehicle at the entrance of the specific area. The entry request may also be made, for example, by requesting a person on the vehicle to scan a driver's license, a travel license, or an access card, etc., at an information reading device (e.g., scanner) at the entrance to the particular area.
In some embodiments of the present invention, the code of the specific area may be preset in the information reading apparatus. The code of the specific area has a pre-established correspondence with the information reading device. When the information reading apparatus reads the identification information of the request object, the information reading apparatus obtains the code of the specific area preset inside thereof. For example, an information reading device located at the entrance of sub-area 1 is preset with the code 001 of the sub-area. The information reading device located at the entrance of the sub-area No. 2 is preset with the code 002 of the sub-area. The information reading device located at the entrance of the sub-area No. 3 is preset with the code 003 of the sub-area. When the information reading device located at entry No. 1 reads the identification information of the request object, the information reading device may provide the identification information of the request object and the code 001 of the specific area to the computing device performing the method 100.
Then, in step 104, admission control information for the specific area is acquired based on the code of the specific area. The admission control information may include: identification information of an authorized object authorized to enter a specific area. The authorized object may include an authorized person and/or an authorized vehicle. The item included in the identification information of the authorized person may be the same as the item included in the identification information of the requesting person. The item included in the identification information of the authorized vehicle may be the same as the item included in the identification information of the requesting vehicle. The admission control information for that particular area may be included in the list, for example. The list may include codes and corresponding admission control information for each sub-area in the area.
In step 106, it is determined whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. For example, whether the request object is authorized to enter the specific area may be determined by comparing identification information of the authorized object of the specific area with identification information of the request object. Assuming that the admission control information defines that the authorized object authorized to enter the specific area includes only females, the request object is not authorized to enter the specific area in case the identification information of the request object indicates that the request object is males. In case the identification information of the request object indicates that the request object is female, the request object is authorized to enter the specific area. It should be noted that the admission control information may also define a plurality of conditions. For example, the admission control information may define that the authorized objects authorized to enter the particular area include only women born before 2000.
If the request object is authorized to enter the specific area (yes in step 106), then the entry to the specific area is opened in step 108. In some embodiments, the requesting object may be prompted by an output device such as a display or speaker that the requesting object has been authorized to enter the particular area.
If the request object is not authorized to enter the specific area (no in step 106), the entry of the specific area is closed in step 110. In some embodiments, the requesting object may be notified that it is not authorized to enter the particular area by an output device such as a display or speaker.
In some scenarios, the request object may carry peer devices into a particular region. For example, a serviceman may carry a service tool into a particular area. Fig. 2 shows an exemplary flowchart of the steps further comprised by the method 100 according to an embodiment of the invention in this case. In the example of fig. 2, the admission control information further includes: attribute information of an admission device authorized to enter a specific area. Wherein the attribute information of the admission device comprises at least one of: name, number, price, user, expiration date, and check status.
In step 202, attribute information of peer devices carried by the request object is obtained. The items included in the attribute information of the peer devices may be the same as the items included in the attribute information of the admission devices. The attribute information of the peer devices may be obtained, for example, by scanning a bar code or a two-dimensional code on the peer devices containing the attribute information thereof, may be obtained, for example, by directly inputting identification information of the peer devices, or may be obtained, for example, by recognizing the outline of the peer devices by an image recognition technique.
In step 204, it is determined whether the peer device is authorized to enter a particular area based on the admission control information and attribute information of the peer device. For example, it may be determined whether the peer device is authorized to enter the particular area by comparing the attribute information of the admittance device with the attribute information of the peer device. Assuming that the admission control information defines that the check status of the admitted devices must be acceptable, the peer devices are not authorized to enter the particular area in case the check status of the peer devices is unacceptable. In the event that the check status of the peer device is acceptable, the peer device is authorized to enter the particular area.
If the peer device is authorized to enter the particular zone (yes in step 204), then the portal for the particular zone is opened in step 206. It should be appreciated that if the requesting object is not authorized to enter the particular region, then the entry for the particular region will not be opened in step 206.
If the peer device is not authorized to enter the particular zone (no at step 204), then the portal for the particular zone is closed at step 208. It should be appreciated that in step 208, even if the requesting object is authorized to enter the particular zone, the entrance to the particular zone may still be closed because the peer device is not authorized to enter the particular zone. In some embodiments, the reason for requesting that the entry to the particular region of the subject not be open may be notified via an output device such as a display or speaker.
In some cases, separate request objects and peer devices may be allowed to enter a particular area, respectively, but a particular request object may only carry a particular peer device into a particular area. For example, an inspection crew may carry an inspection tool into the inspection area, but a cleaner may not carry an inspection tool into the inspection area. Therefore, cleaning personnel without authority to operate the overhaul tool can be prevented from entering an overhaul area to carry out overhaul operation, and danger is avoided.
Fig. 3 shows an exemplary flowchart of the steps further comprised by the method 100 according to an embodiment of the invention in this case. In the example of fig. 3, the admission control information further includes: an admission carrying relationship between an authorized object and an admission device. The admission carrying relationship defines which authorized objects can carry which admission devices into the particular area.
In step 302, it is determined whether the request object is authorized to enter the specific area with the peer device based on the admission control information, the identification information of the request object and the attribute information of the peer device. In one example, a determination may be made as to whether the requesting object and the peer device are each authorized to enter the particular region. In case both the request object and the peer device are authorized to enter the specific area, a comparison is made as to whether the carrying relationship between the request object and the peer device corresponds to the admission carrying relationship defined in the admission control information. If yes, determining that the request object is authorized to carry the peer device into the specific area; otherwise, it is determined that the request object is not authorized to carry the peer device into the particular region.
If the request object is authorized to carry the peer device into the particular zone (yes in step 302), then the entry to the particular zone is opened in step 304. It should be understood that a request object being authorized to carry a peer device into a particular area should be understood that the request object and the peer device are each authorized to enter the particular area, and that the carrying relationship between the request object and the peer device conforms to an admission carrying relationship.
If the request object is not authorized to carry the peer device into the particular zone (no in step 302), then the entry to the particular zone is closed in step 306. In some embodiments, the reason for requesting that the entry to the particular region of the subject not be open may be notified via an output device such as a display or speaker.
The examples shown in fig. 2 and 3 may not only control admission management of a specific area based on the rights of the requested object, but may further propose admission control of peer devices, thereby further improving the security level.
In some cases, a particular region allows entry of the requesting object and/or peer device for only a particular period of time, as desired. Thus, in some embodiments of the invention, the admission control information further comprises: admission time period for a specific area. And closing the entrance of the specific area in the case that the current time is not within the admission time period. For example, the admission period may be an operational period, such as 9 a.m. to 6 a.m.. Only during this operating period is the access to a specific area allowed to be opened.
As described above, "admission control of a particular area" may also include control of admitting departure from a particular area. In some embodiments, authorized objects that are permitted to enter a particular region are also permitted to leave the particular region.
In a further embodiment, consider the case where the request object carries a peer device away from a particular area. Fig. 4 shows an exemplary flowchart of the steps further comprised by the method 100 according to an embodiment of the invention in this case. In the example of fig. 4, at step 402, a leave request is received from a request object requesting that a particular region be left. The leave request includes: identification information of the object is requested and a code of a specific area. The identification information of the request object and the code of the specific area may be obtained as described in step 102 of fig. 1.
Then, in step 404, based on the code of the specific area, the admission control information of the specific area is acquired. The admission control information includes: attribute information of the admission device authorized to leave the specific area. Wherein the attribute information of the admission device includes at least one of: name, number, price, user, expiration date, and check status. In some examples, the admission device may be the same, partially the same, or completely different from the admission device.
In step 406, attribute information of peer devices carried by the request object is obtained. Items included in the attribute information of the peer devices may be the same as items included in the attribute information of the quasi-exit device. Attribute information for peer devices may be obtained in a manner as described in step 202 of fig. 2.
In step 408, it is determined whether the peer device is authorized to leave the specific area based on the admission control information and attribute information of the peer device. For example, it may be determined whether the peer device is authorized to leave the particular area by comparing the attribute information of the calibration out device with the attribute information of the peer device. Assuming that the admission control information defines that the price of the admission device is less than or equal to one hundred thousand yuan of civil coins, the same party device is not authorized to leave the specific area in case that the price of the same party device exceeds one hundred thousand yuan of civil coins, so that the valuable device is prevented from being lost. In the event that the price of the peer device does not exceed one hundred thousand primordial notes, the peer device is authorized to leave the particular area.
If the peer device is authorized to leave the particular zone (yes in step 408), then the exit of the particular zone is opened in step 410. It should be appreciated that in step 410, if the requesting object is not authorized to leave the particular zone, then the exit of the particular zone is not opened.
If the peer device is not authorized to leave the particular zone (no at step 408), the exit from the particular zone is closed at step 412. It should be appreciated that in step 412, even if the requesting object is authorized to leave the particular zone, the exit of the particular zone may still be closed because the peer device is not authorized to leave the particular zone. In some embodiments, the reason for requesting that the exit of the particular area of the object not be open may be notified via an output device such as a display or speaker.
In some cases, separate request objects and peer devices may be allowed to leave a particular area, respectively, but a particular request object may only carry a particular peer device to leave a particular area. For example, an experimenter may carry an experimental instrument away from an experimental area that may cause environmental pollution, but a cleaner may not carry the experimental instrument away from the experimental area. This can prevent a cleaner who does not manage the experience of the laboratory apparatus from bringing the laboratory apparatus away from the experimental area and causing environmental pollution in other areas than the experimental area.
Fig. 5 shows an exemplary flowchart of the steps further comprised by the method 100 according to an embodiment of the invention in this case. In the example of fig. 5, the admission control information further includes: and the quasi-outgoing carrying relation between the authorized object and the quasi-outgoing device. The admission carrying relationship defines which authorized objects can carry which admission devices leave the particular area.
In step 502, it is determined whether the request object is authorized to leave the specific area with the peer device based on the admission control information, the identification information of the request object, and the attribute information of the peer device. In one example, a determination may be made as to whether the requesting object and the peer device, respectively, are authorized to leave the particular area. And comparing whether the carrying relationship between the request object and the peer device accords with the admission carrying relationship defined in the admission control information or not under the condition that the request object and the peer device are authorized to leave the specific area. If yes, determining that the request object is authorized to carry the peer device away from the specific area; otherwise, it is determined that the request object is not authorized to leave the particular area with the peer device.
If the request object is authorized to carry the peer device away from the particular zone (yes in step 502), then the exit of the particular zone is opened in step 504. It should be understood that a request object being authorized to carry a peer device away from a particular area should be understood as the request object and the peer device being respectively authorized to leave the particular area, and that the carrying relationship between the request object and the peer device corresponds to an approved carrying relationship.
If the request object is not authorized to carry the peer device away from the particular zone (no in step 502), then the exit from the particular zone is closed in step 506. In some embodiments, the reason for requesting that the exit of the particular area of the object not be open may be notified via an output device such as a display or speaker.
The examples shown in fig. 4 and 5 may not only control admission control of a specific area based on rights of a request object, but also further propose admission control of peer devices, thereby further improving the security level.
In some cases, a particular region allows the requesting object and/or peer device to leave only for a particular period of time, as desired. Thus, in some embodiments of the present invention, the admission control information further comprises: the grant time period for the specific region. And closing the outlet of the specific area in the case that the current time is not within the quasi-emergent time period. For example, the quasi-out period may be an inactive period, such as 6 pm to 9 am the next day. Only during this non-operating period is the opening of the exit of a specific zone allowed.
In some scenarios, a particular region must be supervised by a manager. The manager may be a responsible person for the specific area. Other requesting objects are allowed to come in and go out only when the manager is located in the specific area. Fig. 6 shows an exemplary flowchart of the steps further comprised by the method 100 according to an embodiment of the invention in this case. In the example of fig. 6, the admission control information further includes: identification information of the manager of the specific area.
In step 602, identification information of objects located within a specific area is recorded. In one example, objects located within a particular region may be determined based on received entry requests and exit requests. For example, after receiving an entry request for an authorized object, the authorized object may be considered to have entered the particular area. At this time, the state of the authorized object is recorded as "in", and the identification information of the authorized object is recorded. In some examples, after receiving the entry request of the authorized object, a camera, a sensor, or the like may be further utilized to determine whether the authorized object actually enters the specific area. In the case where an authorized object actually enters the specific area, the state of the authorized object is recorded as "in", and identification information of the authorized object is recorded.
Likewise, after receiving a leave request for an authorized object, the authorized object may be considered to have left the particular area. At this time, the entry including the identification information of the authorized object is deleted. In some examples, after receiving the leave request of the authorized object, a camera, sensor, or other facility may be further utilized to determine whether the authorized object actually leaves the particular area. In the case where the authorized object actually leaves the specific area, the entry including the identification information of the authorized object is deleted.
In step 604, it is determined whether the manager is located in the specific area based on the recorded identification information of the object located in the specific area. Whether the manager is located in the specific area may be determined by comparing the identification information of the manager with the identification information of the object located in the specific area.
If the administrator is located within a particular zone (yes in step 604), the process proceeds to step 106 of FIG. 1 to determine if the requesting object is authorized to enter the particular zone. If the manager is not located within the specific area (no in step 604), it is determined in step 606 whether the request object is a manager. If the request object is an administrator (yes in step 606), then in step 608, the entry for the specific area is opened. If the request object is not an administrator (no in step 606), the entry for the specific area is closed in step 610. In some embodiments, the reason for requesting that the entry to the particular region of the subject not be open may be notified via an output device such as a display or speaker.
Further, although not shown in FIG. 6, in some embodiments of the invention, in the event that an object other than the manager is located within a particular area, the manager is not authorized to leave the particular area. For example, upon receiving a leave request for a request object, it is determined whether the request object is a manager. If the requested object is a manager, it is determined from the record whether or not an object other than the manager is located within the specific area. If so, the manager is not allowed to leave the particular area. In some embodiments, the manager may be notified of the reason why the exit of the particular zone was not open by an output device such as a display or speaker. By the computing device recording identification information of objects located within a particular area and determining whether to authorize the manager to leave the particular area based on the recording, the manager can be prevented from erroneously leaving the particular area without seeing other objects.
In some scenarios, there may be situations where the object actually entering a particular region does not coincide with the requesting object making the entry request. An embodiment of the present invention proposes in fig. 7 the measures that can be taken for this case. In the example of fig. 7, at step 702, an image of an entry to a particular region is acquired when a request object is authorized to enter the particular region. In some examples, a camera may be provided, for example, at the entrance of the particular area. The camera is activated when the computing device receives an entry request, beginning to capture images at the portal.
Based on the image, it is identified whether the object entering the specific area is a request object, step 704. For example, image recognition techniques may be employed to identify facial features of the subject entering the particular region based on the acquired images. Then, based on the identification information of the request object obtained in step 102 of fig. 1, the facial features of the request object that are pre-stored in the computing device are extracted. It is determined whether the object entering the specific region is the request object by comparing the identified facial features with pre-stored facial features.
If the object entering the specific area is not the request object (no in step 704), the entry of the specific area is closed in step 706. In some embodiments, an alarm may be provided by an output device such as a display, speaker, or alarm, so that security personnel may find an anomaly.
If the object entering the specific region is the request object (yes in step 704), the acquisition of the image at the entrance of the specific region may be stopped to save the computing resources.
Similar to the example of fig. 7, in one example, it may also be determined whether the object actually leaving the particular area coincides with the request object making the leave request to enhance security.
Further, in some embodiments of the present invention, after opening the entry to the particular region, a guide to the operation of the request object in the particular region may be displayed or played. The instruction may take the form of text, video or audio, for example.
Figure 8 is an apparatus 800 for zone-specific admission control in accordance with an embodiment of the present invention. The apparatus 800 may be included in an access control system. As shown in fig. 8, the apparatus 800 may include a processor 810 and a memory 820 storing a computer program. The computer program, when executed by the processor 810, causes the apparatus 800 to perform the steps of the method 100 for admission control for a specific area as shown in fig. 1. That is, the device 800 may receive an entry request from a request object requesting entry into a particular area. The entry request includes: identification information of the object is requested and a code of a specific area. The apparatus 800 may obtain admission control information for a particular region based on the code for the particular region. The admission control information includes: identification information of an authorized object authorized to enter a specific area. The apparatus 800 may determine whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object. If the request object is authorized to enter the particular region, the apparatus 800 may open an entry to the particular region. If the request object is not authorized to enter the particular region, the apparatus 800 may close the entrance to the particular region.
The computer programs, when executed by the processor 810, may also cause the apparatus 800 to perform the steps shown in fig. 2-7.
In embodiments of the present disclosure, processor 810 may be, for example, a central processing unit, CPU, microprocessor, digital Signal Processor (DSP), processor of a multi-core based processor architecture, or the like. Memory 820 may be any type of memory implemented using data storage technology including, but not limited to, random access memory, read only memory, semiconductor-based memory, flash memory, disk storage, and the like.
Furthermore, in embodiments of the present disclosure, the apparatus 800 may also include an input device 830, such as a keyboard, mouse, card reader, camera, fingerprint recognition device, palm print recognition device, iris recognition device, voice recording device, and the like. In addition, the apparatus 800 may also include an output device 840, such as a display, speakers, alarms, etc., for outputting operational instructions, presentation videos and prompts, alarms, etc.
In other embodiments of the present disclosure, there is also provided a computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the method for admission control of a specific area as shown in fig. 1 to 7.
As used herein and in the appended claims, the singular forms of words include the plural and vice versa, unless the context clearly dictates otherwise. Thus, when referring to the singular, the plural of the corresponding term is generally included. Similarly, the terms "comprising" and "including" are to be construed as being inclusive rather than exclusive. Likewise, the terms "comprising" and "or" should be interpreted as inclusive, unless such an interpretation is expressly prohibited herein. Where the term "example" is used herein, particularly when it follows a set of terms, the "example" is merely exemplary and illustrative and should not be considered exclusive or broad.
Further aspects and scope of applicability will become apparent from the description provided herein. It is to be understood that various aspects of the application may be implemented alone or in combination with one or more other aspects. It should also be understood that the description and specific examples are intended for purposes of illustration only and are not intended to limit the scope of the present disclosure.
While several embodiments of the present application have been described in detail, it will be apparent to those skilled in the art that various modifications and variations can be made to the embodiments of the present application without departing from the spirit and scope of the application. The scope of the application is defined by the appended claims.

Claims (13)

1. A method for admission control for a particular area, the method comprising:
receiving an entry request from a request object requesting entry into the particular region, the entry request comprising: identification information of the request object and codes of the specific areas;
based on the code of the specific area, obtaining admission control information of the specific area, wherein the admission control information comprises: identification information of an authorized object authorized to enter the specific area;
determining whether the request object is authorized to enter the specific area based on the admission control information of the specific area and the identification information of the request object;
responsive to the request object being authorized to enter the particular region, opening an entry to the particular region;
closing the entry to the particular zone in response to the request object not being authorized to enter the particular zone;
receiving a leave request from the request object requesting to leave the particular region, the leave request comprising: the identification information of the request object and the code of the specific area;
based on the code of the specific area, obtaining admission control information of the specific area, wherein the admission control information comprises: attribute information of a quasi-outgoing device authorized to leave the specific area, the attribute information of the quasi-outgoing device including a price;
Acquiring attribute information of peer devices carried by the request object, wherein the attribute information of the peer devices comprises prices;
determining whether the peer device is authorized to leave the specific area based on the admission control information and the attribute information of the peer device, wherein determining whether the peer device is authorized to leave the specific area comprises: comparing the price of the quasi-outgoing device with the price of the peer device, wherein the peer device is not authorized to leave when the price of the peer device exceeds the price of the quasi-outgoing device; and
responsive to the peer device not being authorized to leave the particular zone, closing an exit of the particular zone.
2. The method of claim 1, wherein the admission control information further comprises: attribute information of an admission device authorized to enter the specific area, wherein the attribute information of the admission device comprises at least one of: name, number, price, user, expiration date, and check status;
wherein the method further comprises:
acquiring attribute information of peer devices carried by the request object;
determining whether the peer device is authorized to enter the specific area based on the admission control information and the attribute information of the peer device; and
Responsive to the peer device not being authorized to enter the particular zone, the portal of the particular zone is closed.
3. The method of claim 2, wherein the admission control information further comprises: an admission carrying relationship between the authorized object and the admission device;
wherein the method further comprises:
determining whether the request object is authorized to carry the peer device into the specific area based on the access control information, the identification information of the request object and the attribute information of the peer device; and
and closing the entrance of the specific area in response to the request object not being authorized to carry the peer device into the specific area.
4. A method according to any of claims 1-3, the admission control information further comprising: the admission period of the specific area,
wherein the entrance of the specific area is closed in case that the current time is not within the admission time period.
5. The method according to claim 1 to 4,
wherein the attribute information of the out-put device further includes at least one of: name, number, user, expiration date, and check status.
6. The method of claim 5, wherein the admission control information further comprises: a quasi-outbound carrying relationship between the authorized object and the quasi-outbound device;
wherein the method further comprises:
determining whether the request object is authorized to carry the peer device out of the specific area based on the admission control information, the identification information of the request object and the attribute information of the peer device; and
and closing the outlet of the specific area in response to the request object not being authorized to carry the peer device away from the specific area.
7. The method of claim 5 or 6, the admission control information further comprising: the grant out period of the specific region,
wherein the outlet of the specific area is closed in case that the current time is not within the out-time period.
8. The method of any of claims 1-7, wherein the admission control information further comprises: identification information of the manager of the specific area,
wherein the method further comprises:
recording identification information of an object located in the specific area;
determining whether the manager is located in the specific area based on the recorded identification information of the object located in the specific area; and
Responsive to the request object not being the administrator and the administrator not being located within the particular area, closing an entry for the particular area.
9. The method of claim 8, further comprising:
in the case where an object other than the manager is located within the specific area, the manager is not authorized to leave the specific area.
10. The method of any of claims 1-9, further comprising:
acquiring an image of the entrance of the specific area when the request object is authorized to enter the specific area; and
based on the image, it is identified whether an object entering the specific area is the request object.
11. The method of any of claims 1-10, the request object comprising at least one of: requesting personnel, and requesting vehicles.
12. The method of any of claims 1-11, further comprising:
after opening the entry to the particular region, displaying or playing a guide for the operation of the request object in the particular region.
13. An apparatus for admission control for a particular area, comprising:
at least one processor; and
At least one memory storing a computer program;
wherein the computer program, when executed by the at least one processor, causes the apparatus to perform the method according to any one of claims 1-12.
CN201911147416.5A 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area Active CN112825203B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911147416.5A CN112825203B (en) 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911147416.5A CN112825203B (en) 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area

Publications (2)

Publication Number Publication Date
CN112825203A CN112825203A (en) 2021-05-21
CN112825203B true CN112825203B (en) 2023-10-03

Family

ID=75906508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911147416.5A Active CN112825203B (en) 2019-11-21 2019-11-21 Method and apparatus for admission control for a particular area

Country Status (1)

Country Link
CN (1) CN112825203B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114360225A (en) * 2021-12-28 2022-04-15 深圳市邦迪工程顾问有限公司 Building engineering safety supervision method

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0016579D0 (en) * 1999-07-07 2000-08-23 Welsh Neil An improved method,system and device for controlling access of individuals to and/or from a restricted area
JP2001005875A (en) * 1999-06-24 2001-01-12 Hitachi Information Technology Co Ltd Entering/leaving managing system and method for managing entering and leaving
US6208984B1 (en) * 1997-08-29 2001-03-27 Electronic Data Systems Corporation Method and system of determining access to records of members of a community
JP2001175905A (en) * 1999-12-17 2001-06-29 Toshiba Corp Entering/leaving method to be used for entering/leaving system
JP2006209728A (en) * 2004-06-08 2006-08-10 Chuo Electronics Co Ltd Unauthorized entry detection device and detection method, and entry control system using it
CN101510324A (en) * 2009-03-13 2009-08-19 黄以华 System for monitoring building safety by wireless radio frequency discrimination RFID
CN201298248Y (en) * 2008-12-11 2009-08-26 四川大学 Goods control system based on wireless radio frequency identification
CN102376143A (en) * 2010-08-24 2012-03-14 国民技术股份有限公司 Safety management system for enterprise assets and method thereof
KR20120119724A (en) * 2011-04-22 2012-10-31 주식회사 유니온커뮤니티 Management system for entrance and method thereof
US8749347B1 (en) * 2009-01-29 2014-06-10 Bank Of America Corporation Authorized custodian verification
CN104700202A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for controlling people permission in nuclear power plant area
CN105139494A (en) * 2015-08-14 2015-12-09 无锡物讯科技有限公司 Anti-foreign body zone omission item automatic recording and alarm detection system and method
CN105956731A (en) * 2016-04-18 2016-09-21 佛山市高明区高科中小企业技术服务中心 Enterprise personnel supervision method and enterprise personnel supervision system
CN106448012A (en) * 2016-07-22 2017-02-22 盛世龙图(北京)物联技术有限公司 Antitheft system
CN106548542A (en) * 2015-09-21 2017-03-29 创新网络有限公司 access management system and method
CN107316070A (en) * 2017-06-05 2017-11-03 安徽福讯信息技术有限公司 A kind of personnel based on RFID and visual plant monitoring system
CN107667375A (en) * 2015-05-01 2018-02-06 亚萨合莱有限公司 Determine to enter or go out using wearable device
CN110136313A (en) * 2019-05-24 2019-08-16 岭澳核电有限公司 Nuclear power station gate inhibition management-control method, device, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6873260B2 (en) * 2000-09-29 2005-03-29 Kenneth J. Lancos System and method for selectively allowing the passage of a guest through a region within a coverage area
SG11201706051PA (en) * 2015-02-02 2017-08-30 Tma Capital Australia Pty Ltd System, method and computer program for an access control system
CN109544728B (en) * 2017-09-21 2021-08-27 鸿富锦精密电子(天津)有限公司 Regional population management and control system and method

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6208984B1 (en) * 1997-08-29 2001-03-27 Electronic Data Systems Corporation Method and system of determining access to records of members of a community
JP2001005875A (en) * 1999-06-24 2001-01-12 Hitachi Information Technology Co Ltd Entering/leaving managing system and method for managing entering and leaving
GB0016579D0 (en) * 1999-07-07 2000-08-23 Welsh Neil An improved method,system and device for controlling access of individuals to and/or from a restricted area
JP2001175905A (en) * 1999-12-17 2001-06-29 Toshiba Corp Entering/leaving method to be used for entering/leaving system
JP2006209728A (en) * 2004-06-08 2006-08-10 Chuo Electronics Co Ltd Unauthorized entry detection device and detection method, and entry control system using it
CN201298248Y (en) * 2008-12-11 2009-08-26 四川大学 Goods control system based on wireless radio frequency identification
US8749347B1 (en) * 2009-01-29 2014-06-10 Bank Of America Corporation Authorized custodian verification
CN101510324A (en) * 2009-03-13 2009-08-19 黄以华 System for monitoring building safety by wireless radio frequency discrimination RFID
CN102376143A (en) * 2010-08-24 2012-03-14 国民技术股份有限公司 Safety management system for enterprise assets and method thereof
KR20120119724A (en) * 2011-04-22 2012-10-31 주식회사 유니온커뮤니티 Management system for entrance and method thereof
CN104700202A (en) * 2014-12-31 2015-06-10 大亚湾核电运营管理有限责任公司 Method and device for controlling people permission in nuclear power plant area
CN107667375A (en) * 2015-05-01 2018-02-06 亚萨合莱有限公司 Determine to enter or go out using wearable device
CN105139494A (en) * 2015-08-14 2015-12-09 无锡物讯科技有限公司 Anti-foreign body zone omission item automatic recording and alarm detection system and method
CN106548542A (en) * 2015-09-21 2017-03-29 创新网络有限公司 access management system and method
CN105956731A (en) * 2016-04-18 2016-09-21 佛山市高明区高科中小企业技术服务中心 Enterprise personnel supervision method and enterprise personnel supervision system
CN106448012A (en) * 2016-07-22 2017-02-22 盛世龙图(北京)物联技术有限公司 Antitheft system
CN107316070A (en) * 2017-06-05 2017-11-03 安徽福讯信息技术有限公司 A kind of personnel based on RFID and visual plant monitoring system
CN110136313A (en) * 2019-05-24 2019-08-16 岭澳核电有限公司 Nuclear power station gate inhibition management-control method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112825203A (en) 2021-05-21

Similar Documents

Publication Publication Date Title
US10992666B2 (en) Identity verification method, terminal, and server
JP6887028B2 (en) Door access control method, door access control device, system and storage medium
US7158657B2 (en) Face image recording system
US7983452B2 (en) Using a surface based computing device for verification of an identification document
US20170032601A1 (en) Access control system and data processing method thereof
CN105261105B (en) Safety door inhibition method
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
US8694792B2 (en) Biometric based repeat visitor recognition system and method
US20080005578A1 (en) System and method for traceless biometric identification
CN112005231A (en) Biometric authentication method, system and computer program
CN109461233A (en) Caller management method, system, computer equipment and storage medium
JP2006516344A (en) Authentication apparatus, system, and method
KR102480910B1 (en) Face recognition system for easy registration
JP2011048547A (en) Abnormal-behavior detecting device, monitoring system, and abnormal-behavior detecting method
JP2009098814A (en) Access control method and face image recognition security system
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
CN210605858U (en) Intelligent visitor reservation management system based on face recognition
CN112825203B (en) Method and apparatus for admission control for a particular area
US7076664B2 (en) User confirmation system and method
Podio Personal authentication through biometric technologies
KR20020032048A (en) Face cognition the preservation a means
JP2005301861A (en) Entrance/exit management system
CN114387715A (en) Face recognition gate, gate control method, terminal device and storage medium
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program
EP3929884B1 (en) Device, method and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant