CN112950833A - Authorization method, device, equipment and storage medium of access control equipment - Google Patents

Authorization method, device, equipment and storage medium of access control equipment Download PDF

Info

Publication number
CN112950833A
CN112950833A CN201911265856.0A CN201911265856A CN112950833A CN 112950833 A CN112950833 A CN 112950833A CN 201911265856 A CN201911265856 A CN 201911265856A CN 112950833 A CN112950833 A CN 112950833A
Authority
CN
China
Prior art keywords
access control
authorization
target
control equipment
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911265856.0A
Other languages
Chinese (zh)
Other versions
CN112950833B (en
Inventor
胡晓华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Uniview Technologies Co Ltd
Original Assignee
Zhejiang Uniview Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Uniview Technologies Co Ltd filed Critical Zhejiang Uniview Technologies Co Ltd
Priority to CN201911265856.0A priority Critical patent/CN112950833B/en
Publication of CN112950833A publication Critical patent/CN112950833A/en
Application granted granted Critical
Publication of CN112950833B publication Critical patent/CN112950833B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses an authorization method, an authorization device and an authorization storage medium of access control equipment. The method is executed by a server or an access control device and comprises the following steps: when an authorization event is monitored, acquiring authorization information of at least two access control devices; selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices; sending target personnel information to be authorized to the target access control equipment, wherein the target personnel information is used for indicating the target access control equipment: and authorizing the target personnel information, and transmitting the target personnel information to other access control equipment in the access control equipment group. According to the embodiment of the invention, the authorization information of the access control equipment is acquired, the target access control equipment meeting the conditions is selected, the personnel information transmitted by the server is received, and the personnel information is sent to other access control equipment by the target access control equipment, so that the pressure of the server is reduced, and the authorization efficiency of the access control equipment is improved.

Description

Authorization method, device, equipment and storage medium of access control equipment
Technical Field
The embodiment of the invention relates to the internet technology, in particular to an authorization method, an authorization device and a storage medium of access control equipment.
Background
Along with the development of face recognition technology, entrance guard equipment with face recognition function is widely used in scenes such as large-scale garden, school and factory for realize the management and control to personnel. Multiple access control devices are generally deployed in each scene, and each access control device needs to configure information of all authorized persons.
In the prior art, a plurality of persons and a plurality of access control devices are generally authorized on a main server respectively, the main server performs information interaction with the access control devices, and the person data is sequentially imported into the access control devices.
However, due to the large data volume and the large number of access control devices, the time consumed for the server to issue the authorization to the access control devices is long, the platform service pressure is large, the server performance consumption is serious, and the authorization efficiency is low.
Disclosure of Invention
The embodiment of the invention provides an authorization method, an authorization device and a storage medium of an access control device.
In a first aspect, an embodiment of the present invention provides an authorization method for an access control device, where the authorization method is executed by a server or the access control device, and the method includes:
when an authorization event is monitored, acquiring authorization information of at least two access control devices;
selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
and sending target personnel information to be authorized to the target access control equipment, wherein the target personnel information is used for indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
In a second aspect, an embodiment of the present invention further provides an authorization method for an access control device, where the authorization method is executed by the access control device, and the method includes:
sending local authorization information to the server or the access control equipment, wherein the local authorization information is used for indicating the server or the access control equipment to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
receiving target person information to be authorized from a server or access control equipment;
and authorizing the target personnel information, and transmitting the target personnel information to other access control equipment in the access control equipment group.
In a third aspect, an embodiment of the present invention further provides an authorization apparatus for an access device, where the authorization apparatus is configured on a server or an access device, and the apparatus includes:
the system comprises an authorization information acquisition module, a storage module and a control module, wherein the authorization information acquisition module is used for acquiring authorization information of at least two access control devices when an authorization event is monitored;
the access control equipment selection module is used for selecting target access control equipment from the at least two access control equipment according to the authorization information of the at least two access control equipment;
the personnel information sending module is used for sending target personnel information to be authorized to the target access control equipment and indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
In a fourth aspect, an embodiment of the present invention further provides an authorization apparatus for an access device, where the authorization apparatus is configured on the access device, and the apparatus includes:
the authorization information sending module is used for sending local authorization information to the server or the access control equipment, and is used for indicating the server or the access control equipment to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
the personnel information receiving module is used for receiving target personnel information to be authorized from a server or access control equipment;
and the personnel information authorization module is used for authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
In a fifth aspect, an embodiment of the present invention further provides a server or a door access device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the method for authorizing a door access device according to any embodiment of the first aspect or the second aspect of the present invention.
In a sixth aspect, the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the method for authorizing a door access device according to any embodiment of the first aspect or the second aspect of the present invention.
According to the embodiment of the invention, the authorization information of the access control equipment is acquired, the target access control equipment meeting the conditions is selected, the personnel information transmitted by the server is received, and the personnel information is sent to other access control equipment by the target access control equipment, so that the problem of sequential information interaction from the server to the access control equipment in the prior art is solved, the pressure of the server is reduced, the authorization time is saved, and the authorization efficiency of the access control equipment is improved.
Drawings
Fig. 1 is a schematic flowchart of an authorization method of an access control device in an embodiment of the present invention;
fig. 2 is a flowchart illustrating an authorization method of an access control device according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating an authorization method of an access control device in a third embodiment of the present invention;
fig. 4 is a block diagram of an authorization apparatus of an access control device according to a fourth embodiment of the present invention;
fig. 5 is a block diagram of an authorization apparatus of an access control device according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server or an access control device according to a sixth embodiment of the present invention;
fig. 7 is a schematic structural diagram of an access control device in a seventh embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a schematic flowchart of an authorization method for an access control device according to an embodiment of the present invention, where the method is applicable to the case of authorizing an access control device, and the method can be executed by an access control device authorization apparatus configured on a server or an access control device. As shown in fig. 1, the method specifically includes the following steps:
and step 110, acquiring authorization information of at least two access control devices when an authorization event is monitored.
The server or the access control equipment monitors an authorization event and acquires authorization information from at least two access control equipment, wherein the authorization information can comprise an authorization state and an authorization capability value of the access control equipment, and the access control equipment can be face access control equipment or fingerprint access control equipment and the like. The authorization event may be that the user triggers an authorization request at the client, or that the authorization state of the access control device is changed. If the authorization event is that the user triggers an authorization request at the client, the server acquires authorization information of the access control equipment; if the authorization event is that the authorization state of the access control equipment is changed from unauthorized to authorized, the server or the access control equipment can acquire the authorization information of all the access control equipment. The authorization state is a state of the access control device currently in any stage of an authorization process, and may include an unauthorized state, an authorization-in-progress state, and an authorization-completed state. The authorization capability value is the authorization performance of the access control equipment, the higher the authorization capability value is, the more the number of persons authorized by the access control equipment at a time is, and the faster the authorization speed is. The authorization capability value may be represented by P, the authorization status may be represented by K, a K of 0 may be represented as an unauthorized status, a K of 1 may be represented as an authorization status, and a K of 2 may be represented as an authorization completion status. Before obtaining the authorization information of at least two access control devices, at least two access control devices can be added into a multicast group, a server or an access control device sends an obtaining request of the authorization information of the access control devices to the multicast group, and the multicast group sends the authorization information of each access control device to the server or the access control device. Multiple interactions between the server or the access control equipment and the queried access control equipment are avoided, the interaction speed is accelerated, and the waste of network flow is reduced.
And 120, selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices.
The server or the access control equipment acquires authorization information of at least two access control equipment, and searches the access control equipment meeting authorization conditions from the authorization information to serve as target access control equipment, wherein the target access control equipment is equipment for personnel authorization. The authorization condition may include that the authorization state of the access control device meets the authorization condition and the authorization capability value meets the authorization condition.
Optionally, an access control device in an unauthorized state in the at least two access control devices is used as a candidate access control device; and selecting the target access control equipment according to the authorization capability value of the candidate access control equipment.
Specifically, the server or the access control device obtains authorization information of the access control device, and searches for the access control device with an unauthorized authorization state in the access control device as a candidate access control device. And comparing the authorization capability values in the candidate access control devices, and determining the access control device with the highest authorization capability value as the target access control device. For example, the server obtains authorization information of three access control devices, which are respectively: and the first equipment/unauthorized equipment/0.8, the second equipment/unauthorized equipment/0.5 and the third equipment/authorized completion equipment/0.9, screening the first equipment and the second equipment as candidate access control equipment according to the authorization state, comparing the authorization capability values of the first equipment and the second equipment, and determining that the first equipment is the target access control equipment. By searching the access control equipment meeting the authorization condition, the problem that the searched access control equipment cannot authorize people can be avoided, the searching accuracy of the access control equipment is improved, and the authorization efficiency of the access control equipment is improved.
Optionally, the authorization capability value is determined according to the network response speed, the central processing unit capability value and the free memory value.
Specifically, the authorization capability value is a comprehensive parameter index that can represent the network response speed of the access control device, the CPU (Central Processing Unit) capability, and the free memory, and can be calculated by the following formula:
P=A×α+B×β+C×γ
wherein, P is an authorized capacity value, A is a network response speed, B is a CPU capacity value, C is an idle memory value, alpha is the weight of the network response speed, beta is the weight of the CPU capacity value, and gamma is the weight of the idle memory value. The network response speed is the speed of personnel authorization of the access control equipment, the CPU capacity value is the performance percentage of the rest processing data and instructions of the access control equipment, and the idle memory value is the rest memory of the access control equipment. The larger the authorization capability value is, the higher the authorization efficiency of the access control device is. And on the premise of determining the candidate access control equipment, determining the target access control equipment according to the authorization capacity value. Through the calculation of the three factors of the authorization capacity value, the calculation precision of the authorization capacity value is improved, the access control equipment which best meets the authorization condition can be selected, and the authorization efficiency is improved.
Step 130, sending target person information to be authorized to the target access control device, wherein the target person information is used for indicating the target access control device: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
After the server or the access control equipment determines the target access control equipment, the server or the access control equipment sends the information of the target personnel to be authorized to the target access control equipment. And the target access control equipment receives the target personnel information to be authorized, models the target personnel information to be authorized and extracts the characteristic value to finish the authorization of the target personnel. When the target access control equipment receives the information of the target person to be authorized, the authorization state of the target access control equipment is changed from unauthorized to authorized, and the change of the authorization state is an authorization event for triggering the target access control equipment to transmit the information of the target person to be authorized. And the target access control equipment monitors the authorization event, inquires other access control equipment meeting the authorization condition in the rest access control equipment, transmits the received target personnel information to other access control equipment, and performs the authorization process of other access control equipment. The problem that other access control devices can be authorized only after the target access control devices complete authorization of all target personnel is solved, chain-type authorization between the access control devices is achieved, authorization efficiency is effectively improved, and performance consumption of a server is reduced.
Optionally, after sending the target person information to be authorized to the target access control device, the method further includes: and if the completion of the operation of sending the target personnel information to be authorized to the target access control equipment is detected, generating a new authorization event.
Specifically, after the server or the access control device sends all information of target people to be authorized to the target access control device, if it is monitored that the target access control device completes authorization of all target people, and the authorization state of the target access control device is changed from authorization to authorization completion, a new authorization event is generated, and the server or the access control device continues to send authorization information acquisition requests to at least two access control devices to obtain new target access control devices for continuing authorization. By monitoring the authorization state of the target access control equipment, the continuous operation of automatic authorization of the server or the access control equipment can be realized, and the authorization efficiency of the access control equipment is improved.
According to the technical scheme, the authorization information of all entrance guard equipment is acquired by the server or the entrance guard equipment, the target entrance guard equipment meeting the conditions is selected, the target personnel information transmitted by the server or the entrance guard equipment is received, and then the target personnel information is sent to other entrance guard equipment by the target entrance guard equipment, so that the problem that in the prior art, the server can only carry out information interaction on the entrance guard equipment in sequence is solved, the pressure of the server is reduced, the authorization time is saved, and the authorization efficiency of the entrance guard equipment is improved.
Example two
Fig. 2 is a schematic flow chart of an authorization method for an access control device according to a second embodiment of the present invention, and the present embodiment is further optimized based on the above embodiments. As shown in fig. 2, the method specifically includes the following steps:
step 210, when an authorization event is monitored, acquiring authorization information of at least two access control devices.
And step 220, selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices.
Step 230, grouping the target personnel information according to the authorization capability value of the target access control equipment; according to the grouping result of the target personnel information, sending the target personnel information to the target access control equipment, and indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
Before the server or the entrance guard equipment sends the target personnel information to be authorized to the target entrance guard equipment, the target personnel information is grouped according to the obtained authorization capacity value of the target entrance guard equipment, and the larger the authorization capacity value is, the more the number of the target personnel in each group is. The range of the authorization capability value can be associated with the number of each group of target personnel, a preset rule is established, and the number of each group of target personnel is determined according to the range of the authorization capability value of the target access control equipment. For example, if 0 < P < 0.3, the number of people per group is n 1; if P is more than or equal to 0.3 and less than 0.5, the number of people in each group is n 2; if P is more than or equal to 0.5 and less than 0.7, the number of people in each group is n 3; if P is more than or equal to 0.7 and less than 1, the number of people in each group is n 4.
According to the grouping result of the target person information, sending the grouped target person information to be authorized to the target access control equipment in a group form, and when the target access control equipment receives the first group of target person information to be authorized, switching the authorization state of the target access control equipment from unauthorized to authorized; and when the target access control equipment completes the authorization of the last group of target personnel, the authorization state of the target access control equipment is switched from authorization to authorization completion. Target personnel information to be authorized is grouped according to the authorization capacity value of the target access control equipment, and the groups of information are sequentially sent, so that the data transmission speed is increased, the authorization pressure of the target access control equipment is effectively reduced, and the authorization efficiency of the target access control equipment is improved.
When the target access control equipment receives the information of the first group of target personnel to be authorized, the authorization of other access control equipment can be started, the authorization time is saved, and the authorization efficiency is improved.
According to the embodiment of the invention, the server or the access control equipment acquires the authorization information of at least two access control equipment, the information of the target personnel to be authorized is grouped according to the authorization capability value in the authorization information, and the data is transmitted to the target access control equipment according to the grouping, so that the data transmission speed is increased, the authorization pressure of the target access control equipment is reduced, the chain authorization mode among the access control equipment is realized, and the authorization efficiency of the access control equipment is improved.
EXAMPLE III
Fig. 3 is a schematic flowchart of an authorization method for an access control device according to a third embodiment of the present invention, where the method is applicable to the case of authorizing an access control device, and the method can be executed by an access control device authorization apparatus configured on an access control device. As shown in fig. 3, the method specifically includes the following steps:
step 310, sending local authorization information to a server or an access control device, wherein the local authorization information is used for indicating the server or the access control device to: and selecting the target access control equipment from the at least two access control equipment according to the authorization information of the at least two access control equipment.
The access control device receives an authorization information acquisition request sent by the server or the access control device, and sends local authorization information to the server or the access control device, wherein the authorization information may include an authorization state and an authorization capability value of the access control device. Or the multicast group comprising at least two access control devices receives the authorization information acquisition request sent by the server or the access control devices, and the multicast group sends the authorization information of all the access control devices to the server or the access control devices together. And after receiving the authorization information, the server or the access control equipment selects target access control equipment from at least two access control equipment according to the authorization information, and is used for receiving the information of target personnel to be authorized in the server or the access control equipment.
And the server or the entrance guard equipment searches the entrance guard equipment with the unauthorized authorization state from the received authorization information to be used as candidate entrance guard equipment, compares the authorization capability values of the candidate entrance guard equipment, and selects the candidate entrance guard equipment with the maximum authorization capability value as target entrance guard equipment.
And step 320, receiving target person information to be authorized from a server or access control equipment.
After the target access control equipment is determined, the target access control equipment receives target person information to be authorized, which is sent by the server or the access control equipment. Before the information of the target personnel to be authorized is sent by the server or the access control equipment, the target personnel can be grouped according to the authorization capability value of the target access control equipment and a preset rule, and the larger the authorization capability value is, the more the quantity of the target personnel in each group is. And if the target access control equipment receives the first group of target personnel information to be authorized, the authorization state of the target access control equipment is changed from unauthorized to authorized, and the target personnel information to be authorized is subjected to authorization processes such as modeling, characteristic value extraction and the like. The information of the target personnel to be authorized is sent in groups, so that the authorization capability of the target access control equipment can be effectively utilized, the consumption in the data transmission process is reduced, the data transmission efficiency is improved, and the authorization speed is accelerated.
And 330, authorizing the target personnel information, and transmitting the target personnel information to other access control equipment in the access control equipment group.
The target access control equipment authorizes the target personnel information from the fact that the first group of target personnel information to be authorized is received. In this embodiment, the authorization manner of the target person is not specifically limited. And if the target access control equipment completes authorization of all target personnel information, the target access control equipment transmits the target personnel information to other access control equipment in a multicast group of the access control equipment, so that the other access control equipment starts to authorize the target personnel information.
Optionally, obtaining authorization information of other access control devices in the access control device group; and according to the authorization information of other access control equipment, selecting other access control equipment to be transmitted from other access control equipment.
Specifically, after the authorization state of the target access control device is changed into authorization, an authorization information acquisition request of other access control devices is sent to the access control device group, and the access control device group sends the authorization information of the other access control devices in the multicast group to the target access control device. And the target access control equipment searches for the access control equipment with the unauthorized authorization state according to the authorization information, and selects the access control equipment with the maximum authorization capability value from the unauthorized access control equipment as other access control equipment to be transmitted. And the target access control equipment groups the target personnel according to the authorization capability values and preset rules of other access control equipment to be transmitted and transmits the target personnel to the other access control equipment to be transmitted according to the groups. After the target access control equipment changes the authorization state, other access control equipment starts to start the authorization of the target personnel information, the target access control equipment does not need to wait for the authorization completion of all personnel, the chain authorization mode among the access control equipment can be realized, the authorization efficiency of the access control equipment is improved, and the pressure of a server is effectively reduced.
Optionally, after receiving the target person information to be authorized from the server or the access control device, the method further includes: and switching the local device from the unauthorized state to the authorized state.
Specifically, the authorization status of the access control device may include unauthorized, authorized, and authorized completion. After receiving the target person information to be authorized from the server or the access control device, the authorization state of the local access control device is switched from unauthorized to authorized. After the authorization of all target personnel information is completed, the authorization state of the local access control equipment is switched from authorization to authorization completion. By switching the authorization state of the local equipment, the authorization process of the local equipment can be known in real time, and unauthorized access control equipment can be conveniently found for authorization of target personnel.
According to the embodiment of the invention, the target access control equipment is found by sending the authorization information by the access control equipment, the target access control equipment authorizes the target personnel information and sends the target personnel information to other access control equipment to be transmitted. The problem that the information of target personnel can only be transmitted by the server in the prior art is solved, the pressure of the server is reduced, the door control devices are authorized in a chain mode, the authorization speed is increased, and the authorization efficiency is improved.
Example four
Fig. 4 is a block diagram of an authorization apparatus of an access control device according to a fourth embodiment of the present invention, which is configured on a server or an access control device, and is capable of executing an authorization method of an access control device according to one or two embodiments of the present invention, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus specifically includes:
the authorization information acquiring module 401 is configured to acquire authorization information of at least two access control devices when an authorization event is monitored;
the access control device selection module 402 is configured to select a target access control device from the at least two access control devices according to authorization information of the at least two access control devices;
a personnel information sending module 403, configured to send target personnel information to be authorized to the target access control device, and configured to indicate the target access control device: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
Optionally, the access control device selection module 402 is specifically configured to:
taking the entrance guard equipment in an unauthorized state in at least two entrance guard equipment as candidate entrance guard equipment;
and selecting the target access control equipment according to the authorization capability value of the candidate access control equipment.
Optionally, the authorization capability value is determined according to the network response speed, the central processing unit capability value and the free memory value.
Optionally, the personnel information sending module 403 is specifically configured to:
grouping target personnel information according to the authorization capability value of the target access control equipment;
and sending the target personnel information to the target access control equipment according to the grouping result of the target personnel information.
Optionally, the apparatus further comprises:
and the authorization event generation module is used for generating a new authorization event if the operation of sending the target personnel information to be authorized to the target access control equipment is detected to be completed.
According to the embodiment of the invention, the server or the access control equipment acquires the authorization information of all the access control equipment, the target access control equipment meeting the conditions is selected, the target personnel information transmitted by the server or the access control equipment is received, and then the target personnel information is sent to other access control equipment by the target access control equipment, so that the problem that the server can only carry out sequential information interaction on the access control equipment in the prior art is solved, the pressure of the server is reduced, the authorization time is saved, and the authorization efficiency of the access control equipment is improved.
EXAMPLE five
Fig. 5 is a block diagram of an authorization apparatus of an access control device according to a fifth embodiment of the present invention, which is configured on an access control device, and is capable of executing an authorization method of an access control device according to a third embodiment of the present invention, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 5, the apparatus specifically includes:
an authorization information sending module 501, configured to send local authorization information to a server or an access control device, and instruct the server or the access control device to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
a personnel information receiving module 502, configured to receive target personnel information to be authorized from a server or an access control device;
and the personnel information authorization module 503 is configured to authorize the target personnel information and transmit the target personnel information to other access control devices in the access control device group.
Optionally, the personnel information authorization module 503 is specifically configured to:
acquiring authorization information of other access control devices in the access control device group;
and according to the authorization information of other access control equipment, selecting other access control equipment to be transmitted from other access control equipment.
Optionally, the apparatus further comprises:
and the authorization state switching module is used for switching the local equipment from an unauthorized state to an authorization state.
The embodiment of the invention is used for finding the target access control equipment by sending the authorization information by the access control equipment, authorizing the target personnel information by the target access control equipment and sending the target personnel information to other access control equipment to be transmitted. The problem that the information of target personnel can only be transmitted by the server in the prior art is solved, the pressure of the server is reduced, the door control devices are authorized in a chain mode, the authorization speed is increased, and the authorization efficiency is improved.
EXAMPLE six
Fig. 6 is a schematic structural diagram of a server or an access control device according to a sixth embodiment of the present invention. Fig. 6 shows a block diagram of an exemplary server or access control device 600 suitable for implementing embodiments one, two and four of the present invention. The server or the access control device 600 shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of the embodiments of the present invention.
As shown in fig. 6, the server or access control device 600 is in the form of a general purpose computing device. The components of the server or access control device 600 may include, but are not limited to: one or more processors or processing units 601, a system memory 602, and a bus 603 that couples various system components including the system memory 602 and the processing unit 601.
Bus 603 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The server or access control device 600 typically includes a variety of computer system readable media. Such media can be any available media that can be accessed by server or access control device 600 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 602 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)604 and/or cache memory 605. The server or access control device 600 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 606 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 6, commonly referred to as a "hard drive"). Although not shown in FIG. 6, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to the bus 603 by one or more data media interfaces. Memory 602 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments one, two, and four of the present invention.
A program/utility 608 having a set (at least one) of program modules 607 may be stored, for example, in memory 602, such program modules 607 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. The program modules 607 generally perform the functions and/or methods of the embodiments one, two, and four described herein.
The server or access control device 600 may also communicate with one or more external devices 609 (e.g., keyboard, pointing device, display 610, etc.), with one or more devices that enable a user to interact with the server or access control device 600, and/or with any devices (e.g., network card, modem, etc.) that enable the server or access control device 600 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 611. Also, the server or access control device 600 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 612. As shown, the network adapter 612 communicates with a server or other module of the access device 600 via the bus 603. It should be understood that although not shown, other hardware and/or software modules may be used in conjunction with the server or access device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 601 executes various functional applications and data processing by running the program stored in the system memory 602, for example, implementing the method for authorizing access control devices according to the first, second and fourth embodiments of the present invention, including:
when an authorization event is monitored, acquiring authorization information of at least two access control devices;
selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
sending target personnel information to be authorized to the target access control equipment, wherein the target personnel information is used for indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of an access control device according to a seventh embodiment of the present invention. Fig. 7 shows a block diagram of an exemplary access control device 700 suitable for use in implementing embodiments three and five of the present invention. The door access device 700 shown in fig. 7 is only an example, and should not bring any limitation to the functions and the application range of the embodiment of the present invention.
As shown in fig. 7, the access control device 700 is in the form of a general purpose computing device. Components of the access control device 700 may include, but are not limited to: one or more processors or processing units 701, a system memory 702, and a bus 703 that couples various system components including the system memory 702 and the processing unit 701.
Bus 703 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The access control device 700 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by access control device 700 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 702 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)704 and/or cache memory 705. The access control device 700 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, the storage system 706 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 7, commonly referred to as a "hard drive"). Although not shown in FIG. 7, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 703 via one or more data media interfaces. Memory 702 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments three and five of the invention.
A program/utility 708 having a set (at least one) of program modules 707 may be stored, for example, in memory 702, such program modules 707 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. The program modules 707 generally perform the functions and/or methods of the embodiments three and five described herein.
The access control device 700 may also communicate with one or more external devices 709 (e.g., keyboard, pointing device, display 710, etc.), with one or more devices that enable a user to interact with the access control device 700, and/or with any devices (e.g., network card, modem, etc.) that enable the access control device 700 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 711. Also, the access control device 700 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 712. As shown, the network adapter 712 communicates with the other modules of the access control device 700 over a bus 703. It should be understood that although not shown, other hardware and/or software modules may be used in conjunction with the access control device 700, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 701 executes various functional applications and data processing by running the program stored in the system memory 702, for example, implementing the authorization method for the access control device provided in the third and fifth embodiments of the present invention, including:
sending local authorization information to the server or the access control equipment, wherein the local authorization information is used for indicating the server or the access control equipment to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
receiving target person information to be authorized from a server or access control equipment;
and authorizing the target personnel information, and transmitting the target personnel information to other access control equipment in the access control equipment group.
Example eight
An eighth embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the storage medium stores a computer program, and the computer program, when executed by a processor, implements the method for authorizing access control devices according to the first, second, fourth, and sixth embodiments of the present invention, where the method includes:
when an authorization event is monitored, acquiring authorization information of at least two access control devices;
selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
sending target personnel information to be authorized to the target access control equipment, wherein the target personnel information is used for indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Example nine
The ninth embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the storage medium stores a computer program, and when the program is executed by a processor, the method for authorizing access control devices according to the third, fifth and seventh embodiments of the present invention includes:
sending local authorization information to the server or the access control equipment, wherein the local authorization information is used for indicating the server or the access control equipment to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
receiving target person information to be authorized from a server or access control equipment;
and authorizing the target personnel information, and transmitting the target personnel information to other access control equipment in the access control equipment group.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (12)

1. An authorization method of an access control device, which is executed by a server or an access control device, the method comprising:
when an authorization event is monitored, acquiring authorization information of at least two access control devices;
selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
and sending target personnel information to be authorized to the target access control equipment, wherein the target personnel information is used for indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
2. The method of claim 1, wherein selecting the target access control device from the at least two access control devices according to the authorization information of the at least two access control devices comprises:
taking the entrance guard equipment in an unauthorized state in the at least two entrance guard equipments as candidate entrance guard equipment;
and selecting the target entrance guard equipment according to the authorization capability value of the candidate entrance guard equipment.
3. The method of claim 2, wherein the authorization capability value is determined based on a network response speed, a central processor capability value, and a free memory value.
4. The method of claim 1, wherein the sending target person information to be authorized to the target access control device comprises:
grouping the target personnel information according to the authorization capability value of the target access control equipment;
and sending the target personnel information to the target access control equipment according to the grouping result of the target personnel information.
5. The method of claim 1, further comprising, after sending the target person information to be authorized to the target access control device:
and if the completion of the operation of sending the target personnel information to be authorized to the target access control equipment is detected, generating a new authorization event.
6. An authorization method of an access control device, the method being performed by the access control device, the method comprising:
sending local authorization information to the server or the access control equipment, wherein the local authorization information is used for indicating the server or the access control equipment to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
receiving target person information to be authorized from a server or access control equipment;
and authorizing the target personnel information, and transmitting the target personnel information to other access control equipment in the access control equipment group.
7. The method of claim 6, wherein transmitting the target person information to other access control devices in a group of access control devices comprises:
acquiring authorization information of other access control devices in the access control device group;
and selecting other entrance guard equipment to be transmitted from the other entrance guard equipment according to the authorization information of the other entrance guard equipment.
8. The method of claim 6, further comprising, after receiving the target person information to be authorized from the server or the access control device:
and switching the local device from the unauthorized state to the authorized state.
9. An authorization apparatus of an access control device, configured on a server or an access control device, the apparatus comprising:
the system comprises an authorization information acquisition module, a storage module and a control module, wherein the authorization information acquisition module is used for acquiring authorization information of at least two access control devices when an authorization event is monitored;
the access control equipment selection module is used for selecting target access control equipment from the at least two access control equipment according to the authorization information of the at least two access control equipment;
the personnel information sending module is used for sending target personnel information to be authorized to the target access control equipment and indicating the target access control equipment: and authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
10. An authorization device for an access control device, configured on an access control device, the device comprising:
the authorization information sending module is used for sending local authorization information to the server or the access control equipment, and is used for indicating the server or the access control equipment to: selecting a target access control device from the at least two access control devices according to the authorization information of the at least two access control devices;
the personnel information receiving module is used for receiving target personnel information to be authorized from a server or access control equipment;
and the personnel information authorization module is used for authorizing the target personnel information and transmitting the target personnel information to other access control equipment in the access control equipment group.
11. A server or access control device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to perform the method of authorization of the access control device according to any of claims 1-5 or 6-8.
12. A storage medium containing computer-executable instructions for performing the method of authorizing a door access device of any of claims 1-5 or 6-8 when executed by a computer processor.
CN201911265856.0A 2019-12-11 2019-12-11 Authorization method, device, equipment and storage medium of access control equipment Active CN112950833B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911265856.0A CN112950833B (en) 2019-12-11 2019-12-11 Authorization method, device, equipment and storage medium of access control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911265856.0A CN112950833B (en) 2019-12-11 2019-12-11 Authorization method, device, equipment and storage medium of access control equipment

Publications (2)

Publication Number Publication Date
CN112950833A true CN112950833A (en) 2021-06-11
CN112950833B CN112950833B (en) 2022-08-30

Family

ID=76226325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911265856.0A Active CN112950833B (en) 2019-12-11 2019-12-11 Authorization method, device, equipment and storage medium of access control equipment

Country Status (1)

Country Link
CN (1) CN112950833B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080775A (en) * 2022-08-24 2022-09-20 深圳市亲邻科技有限公司 Access control equipment face data storage method and device, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678872A (en) * 2015-12-30 2016-06-15 福建星网锐捷通讯股份有限公司 Entrance guard manage system, authorization method thereof and entrance guard terminal device
CN106302653A (en) * 2016-08-01 2017-01-04 厦门中控生物识别信息技术有限公司 The control authority sharing method of a kind of door control terminal and relevant device
JP2017214789A (en) * 2016-06-01 2017-12-07 パナソニックIpマネジメント株式会社 Electric lock system and electric lock device
CN108961475A (en) * 2017-05-19 2018-12-07 腾讯科技(深圳)有限公司 A kind of gate inhibition's dispositions method and gate inhibition's deployment services device
CN110417784A (en) * 2019-07-30 2019-11-05 腾讯科技(深圳)有限公司 The authorization method and device of access control equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105678872A (en) * 2015-12-30 2016-06-15 福建星网锐捷通讯股份有限公司 Entrance guard manage system, authorization method thereof and entrance guard terminal device
JP2017214789A (en) * 2016-06-01 2017-12-07 パナソニックIpマネジメント株式会社 Electric lock system and electric lock device
CN106302653A (en) * 2016-08-01 2017-01-04 厦门中控生物识别信息技术有限公司 The control authority sharing method of a kind of door control terminal and relevant device
CN108961475A (en) * 2017-05-19 2018-12-07 腾讯科技(深圳)有限公司 A kind of gate inhibition's dispositions method and gate inhibition's deployment services device
CN110417784A (en) * 2019-07-30 2019-11-05 腾讯科技(深圳)有限公司 The authorization method and device of access control equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115080775A (en) * 2022-08-24 2022-09-20 深圳市亲邻科技有限公司 Access control equipment face data storage method and device, server and storage medium

Also Published As

Publication number Publication date
CN112950833B (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN110191021B (en) Protocol testing method and device, electronic equipment and storage medium
US20190370341A1 (en) Method and device for retelling text, server, and storage medium
CN114416667B (en) Method and device for rapidly sharing network disk file, network disk and storage medium
CN110489440B (en) Data query method and device
CN110222775B (en) Image processing method, image processing device, electronic equipment and computer readable storage medium
CN111949708B (en) Multi-task prediction method, device, equipment and medium based on time sequence feature extraction
CN109376173A (en) A kind of data query method, apparatus, electronic equipment and storage medium
CN110618999A (en) Data query method and device, computer storage medium and electronic equipment
CN107291835B (en) Search term recommendation method and device
CN112950833B (en) Authorization method, device, equipment and storage medium of access control equipment
CN109086097B (en) Method and device for starting small program, server and storage medium
CN104580109A (en) Method and device for generating click verification code
CN112131903B (en) Equipment data analysis method, device, service platform, system and medium
WO2020233364A1 (en) Resource processing platform confirmation method and apparatus, and electronic device and medium
JP7389860B2 (en) Security information processing methods, devices, electronic devices, storage media and computer programs
CN114238391A (en) Data paging query method and device, electronic equipment and storage medium
CN114201729A (en) Method, device and equipment for selecting matrix operation mode and storage medium
CN112307021A (en) Data processing method, device, equipment and storage medium
CN111523681A (en) Global feature importance representation method and device, electronic equipment and storage medium
CN112148712A (en) Data processing method, device, equipment and medium
US20230214394A1 (en) Data search method and apparatus, electronic device and storage medium
CN109936567A (en) Detection method, device, electronic equipment and the storage medium of log-on message
CN112328960B (en) Optimization method and device for data operation, electronic equipment and storage medium
CN111367875B (en) Ticket file processing method, system, equipment and medium
CN112000945B (en) Authorization method, device, equipment and medium based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant