CN113660245A - Terminal access right control method, device, equipment and medium - Google Patents

Terminal access right control method, device, equipment and medium Download PDF

Info

Publication number
CN113660245A
CN113660245A CN202110917760.9A CN202110917760A CN113660245A CN 113660245 A CN113660245 A CN 113660245A CN 202110917760 A CN202110917760 A CN 202110917760A CN 113660245 A CN113660245 A CN 113660245A
Authority
CN
China
Prior art keywords
information
terminal
access
visitor
gate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110917760.9A
Other languages
Chinese (zh)
Other versions
CN113660245B (en
Inventor
金鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pudong Development Bank Co Ltd
Original Assignee
Shanghai Pudong Development Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pudong Development Bank Co Ltd filed Critical Shanghai Pudong Development Bank Co Ltd
Priority to CN202110917760.9A priority Critical patent/CN113660245B/en
Publication of CN113660245A publication Critical patent/CN113660245A/en
Application granted granted Critical
Publication of CN113660245B publication Critical patent/CN113660245B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The embodiment of the invention discloses a method, a device, equipment and a medium for controlling terminal access authority, wherein the method comprises the following steps: acquiring gate opening information fed back by the security management platform, and changing the state of an access request form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by the gate after the gate successfully matches the acquired facial information of the visitor with the facial information in the access request form which is received by the security management platform and has an audited state; acquiring terminal login information input by a visitor at any terminal of a master control center, and matching the terminal login information with terminal login information in an access request form of the visitor; and when the terminal login information is successfully matched, opening the terminal access authority. According to the technical scheme, the automation of the access authority management of the master control center is realized, and the flow of the access authority management of the master control center is optimized, so that the efficiency and the safety of the access authority management of the master control center are improved.

Description

Terminal access right control method, device, equipment and medium
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a method, a device, equipment and a medium for controlling terminal access authority.
Background
In the field of banking, when a visitor of an ECC needs to enter the ECC and operate a terminal of the ECC, the visitor needs to submit an application in advance in a staff access management system. Then, when the visitor enters the ECC, the visitor performs card swiping registration, and the ECC manager performs manual identity verification, so that the use authority of the ECC terminal can be opened after the verification is passed. And after the visitor leaves the ECC terminal after the use of the ECC terminal is finished, the ECC operation manager manually controls the end of the visitor's access and locks the terminal.
However, in the above-mentioned terminal access right management process for ECC, it is difficult to ensure accurate verification of the identity of the visitor by means of manual recheck, and it takes a long time. In addition, the manual control of the ECC terminal has frequent operation, heavy management work and low automation management degree.
Disclosure of Invention
The embodiment of the invention provides a terminal access right control method, a device, equipment and a medium, which are used for realizing the automation of the access right management of a master control center and optimizing the flow of the access right management of the master control center, thereby improving the efficiency and the safety of the access right management of the master control center.
In a first aspect, an embodiment of the present invention provides a method for controlling access rights of a terminal, where the method includes:
acquiring gate opening information fed back by a security management platform, and changing the state of an access request form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by a gate after the obtained facial information of a visitor is successfully matched with the facial information in the access request form which is received by the security management platform and has an audited state;
acquiring terminal login information input by the visitor at any terminal of a master control center, and matching the terminal login information with terminal login information in an access request form of the visitor;
and when the terminal login information is successfully matched, opening the terminal access authority.
Optionally, the method further includes:
and when second-time gate opening information associated with the visitor is acquired, changing the state of the access request form of the visitor to a leaving state and locking the access authority of the terminal for login access of the visitor.
Optionally, before gate opening information fed back by the security management platform is acquired, the method includes:
receiving an access application of the visitor and generating an access application form;
auditing the access request form;
and when the access request form passes the audit, changing the state of the access request form into the audited state, and sending the visitor information of the access request form to a security management platform so that the security management platform sends the information of the visitor passing the audit to a face recognition gate terminal.
Optionally, obtaining the gate opening information fed back by the security management platform includes:
and establishing connection with the security management platform through an application program interface to acquire gate opening information and record the entering time or leaving time of the visitor.
Optionally, the method further includes:
and acquiring a gate number corresponding to the gate opening information, and adding the gate setting position information corresponding to the gate number into the visit application form of the visitor.
Optionally, the access control is completed by interacting with the accessed terminal in a Socket communication mode.
Optionally, the access request form includes identity information of an accessing person, face information, terminal access login information, request form state information, and/or accompanying person information.
In a second aspect, an embodiment of the present invention further provides a device for controlling access rights of a terminal, where the device includes:
the access application form state changing module is used for obtaining gate opening information fed back by the security management platform and changing the state of the access application form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by the gate after the obtained facial information of the visitor is successfully matched with the facial information in the access application form which is received by the security management platform and has a checked state;
the terminal access authority verification module is used for acquiring terminal login information input by the visitor at any terminal of the master control center and matching the terminal login information with the terminal login information in the visitor's access request form;
and the terminal access authority control module is used for opening the terminal access authority when the terminal login information is successfully matched.
Optionally, the access application form state changing module is further configured to:
and when second-time gate opening information associated with the visitor is acquired, changing the state of the access request form of the visitor to a leaving state and locking the access authority of the terminal for login access of the visitor.
Optionally, the terminal access right control apparatus further includes an access list generation module, configured to:
receiving an access application of the visitor and generating an access application form;
auditing the access request form;
and when the access request form passes the audit, changing the state of the access request form into the audited state, and sending the visitor information of the access request form to a security management platform so that the security management platform sends the information of the visitor passing the audit to a face recognition gate terminal.
Optionally, the access application form state changing module:
and establishing connection with the security management platform through an application program interface to acquire gate opening information and record the entering time or leaving time of the visitor.
Optionally, the terminal access right control apparatus further includes a location information obtaining module, configured to:
and acquiring a gate number corresponding to the gate opening information, and adding the gate setting position information corresponding to the gate number into the visit application form of the visitor.
Optionally, the terminal access right verification module and the terminal access right control module interact with an accessed terminal in a Socket communication manner to complete access right control.
Optionally, the access request form includes identity information of an accessing person, face information, terminal access login information, request form state information, and/or accompanying person information.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
a memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement a method for controlling access rights of a terminal as provided by any embodiment of the present invention.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a terminal access right control method as provided in any embodiment of the present invention.
The embodiment of the invention has the following advantages or beneficial effects:
in the embodiment of the invention, the gate machine with the face recognition function is arranged in the master control center, so that the access management system is in communication connection with the security management platform which is directly connected with and controls the gate machine, the gate machine opening information fed back by the security management platform is received, the state of the access request form corresponding to the gate machine opening information is changed into the entered state, and the access information of the visitor is recorded; furthermore, terminal login information input by a visitor at any terminal of the master control center can be acquired, the terminal login information is matched with the terminal login information in the visit application form of the visitor, and when the terminal login information is successfully matched, the terminal access authority is opened, so that automation of terminal access authority control is realized. The problem of rely on artifical recheck visitor's identity and control terminal access authority among the prior art, be difficult to guarantee accurate verification, and consuming time longer is solved, realized the automation of total accuse center access authority management, optimized the flow of total accuse center access authority management to promote the efficiency and the security of total accuse center access authority management.
Drawings
Fig. 1 is a flowchart of a method for controlling access rights of a terminal according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for controlling access rights of a terminal according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal access right control device according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a method for controlling access rights of a terminal according to an embodiment of the present invention, which is applicable to access of a control center and access of the terminal in the control center. The method can be executed by a terminal access right control device, which can be realized by software and/or hardware and is integrated in a computer device with an application development function.
As shown in fig. 1, the terminal access right control method includes the following steps:
s110, gate opening information fed back by the security management platform is obtained, and the state of an access request form corresponding to the gate opening information is changed into an entered state.
An Enterprise or company master control Center (ECC) controls and optimizes the Enterprise or company system as a whole by monitoring and managing Enterprise operation data, and provides an accurate and advanced scheme for the development of the Enterprise or company. The security management of the ECC data monitoring platform has great significance and influence on the development of enterprises, and therefore, management and control of access management of the ECC and authority of terminal access in the ECC are required.
In this embodiment, a gate with a face recognition function is arranged at the gate of the ECC, so that whether the identity of a visitor entering the ECC is legal or not is verified in a face recognition mode, and the gate control is realized. Therefore, the terminal access authority control of the ECC can be further controlled in linkage with the management of the entrance guard and the state of the access application form of the visitor.
Specifically, when a visitor wants to enter the ECC, the visitor needs to perform access registration in the access management system to apply for entry into the ECC. The access management system generates an access request form based on the contents registered by the visitor. The access application form may include information such as the name, sex, photo, department of the affiliated entity, reason for applying for entering the ECC, access time, and ECC terminal login authority information (key, password, etc.). Further, the access management system can check the content of the access application form. And if the audit of the access application form is passed, changing the state of the access application form into the audited state. Meanwhile, the access management system issues the checked access application form to the security management platform, and the security management platform issues the received information such as the photo information and/or name of the visitor in the access application form to the gate terminal. When a visitor wants to enter the ECC and arrives at the gate, the face recognition device of the gate scans the face information of the visitor and matches the scanned face information with the face information of the visitor which is obtained in advance and passes the examination. If the matching is successful, the gate is opened to allow the visitor to enter the ECC. Meanwhile, the gate machine can send out a gate machine opening message. The gate opening information is information which is sent by the gate after the gate successfully matches the acquired facial information of the visitor with the facial information in the access request form which is received by the security management platform and has an audited state, so that the security management system is informed that the visitor enters the ECC, and the entry time is recorded. Furthermore, the security management system can transmit the opening of the gate to the access management system, and the access management system can know which visitor enters the ECC at what time. The access management system may thereby change the status of the visitor's access application form from approved to entered. The access management system can be connected with the security management platform through an application program interface to acquire the gate opening information.
Further, when the face recognition device of the gate scans the face information of the visitor and matches the scanned face information with the face information of the visitor who has passed the audit, which is acquired in advance, but the matching fails, the gate is not opened. Alarm warning information is further generated to inform relevant management personnel that illegal personnel want to enter the ECC to attract attention.
S120, acquiring terminal login information input by the visitor at any terminal of a master control center, and matching the terminal login information with the terminal login information in the visit application form of the visitor.
When a visitor enters the ECC and performs login access at any terminal of the ECC, login information such as a login user name and a password needs to be input when the system is operated.
The ECC terminal, after acquiring the log-in information input by the visitor, transmits the log-in information to the entry and exit management system. The access management system matches the acquired terminal login information input by the visitor at any terminal of the master control center with the terminal login information which is filled in the access request form by the visitor in advance so as to verify the login authority of the visitor.
And S130, opening the terminal access authority when the terminal login information is successfully matched.
When the login information of the visitor is successfully matched, the access management system can remotely control the access authority of the ECC terminal and open an access channel for the visitor, so that the management automation of the access authority of the ECC terminal is realized, and errors which may occur in the process of manually checking the identity of the visitor by a manager and manually controlling the access authority of the terminal are effectively avoided.
According to the technical scheme of the embodiment, the gate machine with the face recognition function is arranged in the master control center, so that the access management system is in communication connection with the security management platform which is directly connected with and controls the gate machine, the gate machine opening information fed back by the security management platform is received, the state of the access request form corresponding to the gate machine opening information is changed into the entered state, and the access information of the visitor is recorded; furthermore, terminal login information input by a visitor at any terminal of the master control center can be acquired, the terminal login information is matched with the terminal login information in the visit application form of the visitor, and when the terminal login information is successfully matched, the terminal access authority is opened, so that automation of terminal access authority control is realized. The problem of rely on artifical recheck visitor's identity and control terminal access authority among the prior art, be difficult to guarantee accurate verification, and consuming time longer is solved, realized the automation of total accuse center access authority management, optimized the flow of total accuse center access authority management to promote the efficiency and the security of total accuse center access authority management.
Example two
Fig. 2 is a flowchart of a terminal access right control method provided in the second embodiment of the present invention, which belongs to the same inventive concept as the terminal access right control method in the foregoing embodiment, and further describes the whole process of visiting a general control center and using a terminal by a visitor. The method can be executed by a terminal access right control device, which can be realized by software and/or hardware and is integrated in a computer device with an application development function.
As shown in fig. 2, the terminal access right control method includes the following steps:
s210, receiving an access application of a visitor and generating an access application form.
When a visitor wants to access the ECC, the visitor needs to perform access registration in the access management system to apply for access to the ECC. The visitor can make an access application to the access management system through a card swiping registration system, a computer terminal registration system or other registration modes in the enterprise. The access management system generates an access request form based on the contents registered by the visitor. The access application form may include information such as the name, sex, photo, department of the affiliated entity, reason for applying for entering the ECC, access time, and ECC terminal login authority information (key, password, etc.). Particularly, the access application form may further include information of a follower, where the follower is a person who cannot apply for entering the ECC by himself, such as an official supervision and management person. The information of the accompanying person also includes information such as name, sex, photograph, work unit, and reason for access.
S220, auditing the access request form, changing the state of the access request form into audited state when the access request form passes the audit, and sending the visitor information of the access request form to a security management platform so that the security management platform sends the information of the visitor passing the audit to a face recognition gate terminal.
The access management system will audit the contents of the access request form to confirm whether the visitor is able to access the ECC. And if the audit of the access application form is passed, changing the state of the access application form into the audited state. Meanwhile, the access management system issues the checked access application form to the security management platform, and the security management platform issues the received information such as the photo information and/or name of the visitor in the access application form to the gate terminal.
And S230, acquiring gate opening information fed back by the security management platform, and changing the state of the access request form corresponding to the gate opening information into an entered state.
The gate opening information is information sent by the gate after the gate successfully matches the acquired facial information of the visitor with the facial information in the access request form which is received by the security management platform and has an audited state.
Specifically, when a visitor wants to enter the ECC and arrives at the gate, the face recognition device of the gate scans the face information of the visitor and matches the scanned face information with the face information of the visitor that has been obtained in advance and passed the audit. If the matching is successful, the gate is opened to allow the visitor to enter the ECC. Meanwhile, the gate machine can send out a gate machine opening message. The gate opening information is information which is sent by the gate after the gate successfully matches the acquired facial information of the visitor with the facial information in the access request form which is received by the security management platform and has an audited state, so that the security management system is informed that the visitor enters the ECC, and the entry time is recorded. Furthermore, the security management system can transmit the opening of the gate to the access management system, and the access management system can know which visitor enters the ECC at what time. The access management system may thereby change the status of the visitor's access application form from approved to entered.
In addition, the gate opening information also comprises gate number information, and the access management system can inquire the set position information of the gate to the security management system according to the gate number, so that the ECC (error correction code) of where the visitor enters can be known, and the action path of the visitor is further determined.
S240, terminal login information input by the visitor at any terminal of the general control center is obtained, and the terminal login information is matched with the terminal login information in the visit application form of the visitor.
When a visitor enters the ECC and performs login access at any terminal of the ECC, login information such as a login user name and a password needs to be input when the system is operated.
The ECC terminal, after acquiring the log-in information input by the visitor, transmits the log-in information to the entry and exit management system. The access management system matches the acquired terminal login information input by the visitor at any terminal of the master control center with the terminal login information which is filled in the access request form by the visitor in advance so as to verify the login authority of the visitor.
And S250, opening the terminal access authority when the terminal login information is successfully matched.
And S260, when the second-time gate opening information associated with the visitor is acquired, changing the state of the access request form of the visitor into a leaving state and locking the access authority of the terminal for login and access of the visitor.
The visitor also passes through the gate when he wishes to leave the ECC after completing the operation of the ECC terminal. And the face recognition device of the gate collects the face information of the visitor again to be matched with the face information of the visitor who can enter the ECC, and when the matching is successful, the gate is opened to generate gate opening information again. When the access management system receives the gate opening information through the security management platform, the state information of the access request form of the visitor associated with the gate opening information is read. When the status information is the entered status, it indicates that the current gate opening information is the second gate opening information of the relevant visitor, and indicates that the visitor needs to leave the ECC. Further, the second time gate opening information also includes the gate opening time as the leaving time of the visitor.
Specifically, the access management system and the ECC terminal transmit interactive control information with the terminal in a Socket communication manner. After determining that the visitor leaves the ECC, the access management system locks the terminal accessed and logged by the visitor who leaves, and closes the access right of the terminal. Therefore, the opening and closing process of the access right of the ECC terminal is realized at one time.
According to the technical scheme of the embodiment, the gate machine with the face recognition function is arranged in the master control center, so that the access management system is in communication connection with the security management platform which is directly connected with and controls the gate machine, the gate machine opening information fed back by the security management platform is received, the state of the access request form corresponding to the gate machine opening information is changed into the entered state, and the access information of the visitor is recorded; further, terminal login information input by a visitor at any terminal of the master control center can be acquired, the terminal login information is matched with the terminal login information in the visit application form of the visitor, the terminal visit authority is opened when the terminal login information is successfully matched, when the visitor leaves, the visit application form state of the visitor is changed into a leaving state, the visit process is ended, and therefore automation of terminal visit authority control is achieved. The problem of rely on artifical recheck visitor's identity and control terminal access authority among the prior art, be difficult to guarantee accurate verification, and consuming time longer is solved, realized the automation of total accuse center access authority management, optimized the flow of total accuse center access authority management to promote the efficiency and the security of total accuse center access authority management.
EXAMPLE III
Fig. 3 is a schematic structural diagram of a terminal access right control apparatus according to a third embodiment of the present invention, which is applicable to a situation where a control center enters and exits and controls a terminal access right in the control center, and the apparatus may be implemented in a software and/or hardware manner and integrated in a computer device with an application development function.
As shown in fig. 3, the terminal access right control device includes: an access application form state changing module 310, a terminal access right verifying module 320 and a terminal access right control module 330.
The access application form state changing module 310 is used for obtaining gate opening information fed back by the security management platform and changing the state of the access application form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by the gate after the obtained facial information of the visitor is successfully matched with the facial information in the access application form which is received by the security management platform and has a checked state; the terminal access authority verification module 320 is used for acquiring terminal login information input by the visitor at any terminal of the master control center, and matching the terminal login information with the terminal login information in the visitor's access request form; and the terminal access right control module 330 is configured to open the terminal access right when the terminal login information is successfully matched.
According to the technical scheme of the embodiment, the gate machine with the face recognition function is arranged in the master control center, so that the access management system is in communication connection with the security management platform which is directly connected with and controls the gate machine, the gate machine opening information fed back by the security management platform is received, the state of the access request form corresponding to the gate machine opening information is changed into the entered state, and the access information of the visitor is recorded; furthermore, terminal login information input by a visitor at any terminal of the master control center can be acquired, the terminal login information is matched with the terminal login information in the visit application form of the visitor, and when the terminal login information is successfully matched, the terminal access authority is opened, so that automation of terminal access authority control is realized. The problem of rely on artifical recheck visitor's identity and control terminal access authority among the prior art, be difficult to guarantee accurate verification, and consuming time longer is solved, realized the automation of total accuse center access authority management, optimized the flow of total accuse center access authority management to promote the efficiency and the security of total accuse center access authority management.
Optionally, the access application form state changing module 310 is further configured to:
and when second-time gate opening information associated with the visitor is acquired, changing the state of the access request form of the visitor to a leaving state and locking the access authority of the terminal for login access of the visitor.
Optionally, the terminal access right control apparatus further includes an access list generation module, configured to:
receiving an access application of the visitor and generating an access application form;
auditing the access request form;
and when the access request form passes the audit, changing the state of the access request form into the audited state, and sending the visitor information of the access request form to a security management platform so that the security management platform sends the information of the visitor passing the audit to a face recognition gate terminal.
Optionally, the access application form state changing module 310:
and establishing connection with the security management platform through an application program interface to acquire gate opening information and record the entering time or leaving time of the visitor.
Optionally, the terminal access right control apparatus further includes a location information obtaining module, configured to:
and acquiring a gate number corresponding to the gate opening information, and adding the gate setting position information corresponding to the gate number into the visit application form of the visitor.
Optionally, the terminal access right verification module 320 and the terminal access right control module 330 interact with an accessed terminal in a Socket communication manner to complete access right control.
Optionally, the access request form includes identity information of an accessing person, face information, terminal access login information, request form state information, and/or accompanying person information.
The terminal access right control device provided by the embodiment of the invention can execute the terminal access right control method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
Example four
Fig. 4 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention. FIG. 4 illustrates a block diagram of an exemplary computer device 12 suitable for use in implementing embodiments of the present invention. The computer device 12 shown in FIG. 4 is only one example and should not bring any limitations to the functionality or scope of use of embodiments of the present invention. The computer device 12 may be any terminal device with computing capability, such as a terminal device of an intelligent controller, a server, a mobile phone, and the like.
As shown in FIG. 4, computer device 12 is in the form of a general purpose computing device. The components of computer device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. Computer device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, and commonly referred to as a "hard drive"). Although not shown in FIG. 4, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Computer device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with computer device 12, and/or with any devices (e.g., network card, modem, etc.) that enable computer device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, computer device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via network adapter 20. As shown, network adapter 20 communicates with the other modules of computer device 12 via bus 18. It should be appreciated that although not shown in FIG. 4, other hardware and/or software modules may be used in conjunction with computer device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by running a program stored in the system memory 28, for example, to implement the terminal access right control method provided by the embodiment of the present invention, the method includes:
acquiring gate opening information fed back by a security management platform, and changing the state of an access request form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by a gate after the obtained facial information of a visitor is successfully matched with the facial information in the access request form which is received by the security management platform and has an audited state;
acquiring terminal login information input by the visitor at any terminal of a master control center, and matching the terminal login information with terminal login information in an access request form of the visitor;
and when the terminal login information is successfully matched, opening the terminal access authority.
EXAMPLE five
This fifth embodiment provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method for controlling access rights of a terminal according to any embodiment of the present invention, where the method includes:
acquiring gate opening information fed back by a security management platform, and changing the state of an access request form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by a gate after the obtained facial information of a visitor is successfully matched with the facial information in the access request form which is received by the security management platform and has an audited state;
acquiring terminal login information input by the visitor at any terminal of a master control center, and matching the terminal login information with terminal login information in an access request form of the visitor;
and when the terminal login information is successfully matched, opening the terminal access authority.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer-readable storage medium may be, for example but not limited to: an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It will be understood by those skilled in the art that the modules or steps of the invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of computing devices, and optionally they may be implemented by program code executable by a computing device, such that it may be stored in a memory device and executed by a computing device, or it may be separately fabricated into various integrated circuit modules, or it may be fabricated by fabricating a plurality of modules or steps thereof into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A terminal access right control method is applied to an access management system, and the method comprises the following steps:
acquiring gate opening information fed back by a security management platform, and changing the state of an access request form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by a gate after the obtained facial information of a visitor is successfully matched with the facial information in the access request form which is received by the security management platform and has an audited state;
acquiring terminal login information input by the visitor at any terminal of a master control center, and matching the terminal login information with terminal login information in an access request form of the visitor;
and when the terminal login information is successfully matched, opening the terminal access authority.
2. The method of claim 1, further comprising:
and when second-time gate opening information associated with the visitor is acquired, changing the state of the access request form of the visitor to a leaving state and locking the access authority of the terminal for login access of the visitor.
3. The method according to claim 1, wherein before acquiring the gate opening information fed back by the security management platform, the method comprises:
receiving an access application of the visitor and generating an access application form;
auditing the access request form;
and when the access request form passes the audit, changing the state of the access request form into the audited state, and sending the visitor information of the access request form to a security management platform so that the security management platform sends the information of the visitor passing the audit to a face recognition gate terminal.
4. The method according to claim 1, wherein the acquiring the gate opening information fed back by the security management platform comprises:
and establishing connection with the security management platform through an application program interface to acquire gate opening information and record the entering time or leaving time of the visitor.
5. The method of claim 1, further comprising:
and acquiring a gate number corresponding to the gate opening information, and adding the gate setting position information corresponding to the gate number into the visit application form of the visitor.
6. The method according to any one of claims 1 to 5, wherein the access right control is completed by interacting with the accessed terminal in a Socket communication mode.
7. The method according to any one of claims 1 to 5, wherein the access request form comprises identity information of an accessing person, face information, terminal access login information, request form status information and/or accompanying person information.
8. An apparatus for controlling access rights of a terminal, the apparatus comprising:
the access application form state changing module is used for obtaining gate opening information fed back by the security management platform and changing the state of the access application form corresponding to the gate opening information into an entered state, wherein the gate opening information is information sent by the gate after the obtained facial information of the visitor is successfully matched with the facial information in the access application form which is received by the security management platform and has a checked state;
the terminal access authority verification module is used for acquiring terminal login information input by the visitor at any terminal of the master control center and matching the terminal login information with the terminal login information in the visitor's access request form;
and the terminal access authority control module is used for opening the terminal access authority when the terminal login information is successfully matched.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a terminal access rights control method as recited in any of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a terminal access right control method according to any one of claims 1 to 7.
CN202110917760.9A 2021-08-11 2021-08-11 Terminal access right control method, device, equipment and medium Active CN113660245B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110917760.9A CN113660245B (en) 2021-08-11 2021-08-11 Terminal access right control method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110917760.9A CN113660245B (en) 2021-08-11 2021-08-11 Terminal access right control method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN113660245A true CN113660245A (en) 2021-11-16
CN113660245B CN113660245B (en) 2023-04-07

Family

ID=78479460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110917760.9A Active CN113660245B (en) 2021-08-11 2021-08-11 Terminal access right control method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN113660245B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060253358A1 (en) * 2005-04-08 2006-11-09 David Delgrosso System and method for identifying and managing customers in a financial institution
JP2009033354A (en) * 2007-07-25 2009-02-12 Panasonic Corp Communication system
CN103067350A (en) * 2011-10-18 2013-04-24 安讯士有限公司 Apparatus and method for access control
US8978104B1 (en) * 2008-07-23 2015-03-10 United Services Automobile Association (Usaa) Access control center workflow and approval
CN106060041A (en) * 2016-05-30 2016-10-26 北京琵琶行科技有限公司 Enterprises network access authority control method and device
WO2018006456A1 (en) * 2016-07-05 2018-01-11 中兴通讯股份有限公司 Method and device for controlling visitor terminal, and server and mobile terminal
CN108377244A (en) * 2018-02-26 2018-08-07 云南维者科技有限公司 A kind of Intranet uniform authentication method
CN108726294A (en) * 2017-04-13 2018-11-02 北京中矿赛力贝特科技有限公司 A kind of gate inhibition's Elevator Intelligent Control System and method
CN109062064A (en) * 2018-08-07 2018-12-21 武汉工程大学 A kind of intelligent home control device and control method based on electrnic house number plates
CN110115014A (en) * 2016-12-22 2019-08-09 三星电子株式会社 Electronic device, the control authority authentication method of electronic device and user terminal apparatus
CN110349309A (en) * 2019-07-02 2019-10-18 深圳华视电子读写设备有限公司 A kind of visitor's authentication register method and device
CN111107044A (en) * 2018-10-26 2020-05-05 珠海格力电器股份有限公司 Data security management method and information management platform
CN111131433A (en) * 2019-12-20 2020-05-08 厦门瑞为信息技术有限公司 Visitor management system and method based on cloud edge cooperation
CN111556052A (en) * 2020-04-27 2020-08-18 京东方科技集团股份有限公司 Authority management method, processing device and storage medium
CN111556069A (en) * 2020-05-12 2020-08-18 南方电网数字电网研究院有限公司 Visitor identity authentication method, system, device, computer equipment and storage medium
WO2021063068A1 (en) * 2019-09-30 2021-04-08 全球能源互联网研究院有限公司 Operation and maintenance control and operation and maintenance analysis method and apparatus, system, and storage medium
CN113079134A (en) * 2021-03-19 2021-07-06 南方电网数字电网研究院有限公司 Mobile terminal access method, mobile terminal access device, computer equipment and medium

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060253358A1 (en) * 2005-04-08 2006-11-09 David Delgrosso System and method for identifying and managing customers in a financial institution
JP2009033354A (en) * 2007-07-25 2009-02-12 Panasonic Corp Communication system
US8978104B1 (en) * 2008-07-23 2015-03-10 United Services Automobile Association (Usaa) Access control center workflow and approval
CN103067350A (en) * 2011-10-18 2013-04-24 安讯士有限公司 Apparatus and method for access control
CN106060041A (en) * 2016-05-30 2016-10-26 北京琵琶行科技有限公司 Enterprises network access authority control method and device
WO2018006456A1 (en) * 2016-07-05 2018-01-11 中兴通讯股份有限公司 Method and device for controlling visitor terminal, and server and mobile terminal
CN110115014A (en) * 2016-12-22 2019-08-09 三星电子株式会社 Electronic device, the control authority authentication method of electronic device and user terminal apparatus
CN108726294A (en) * 2017-04-13 2018-11-02 北京中矿赛力贝特科技有限公司 A kind of gate inhibition's Elevator Intelligent Control System and method
CN108377244A (en) * 2018-02-26 2018-08-07 云南维者科技有限公司 A kind of Intranet uniform authentication method
CN109062064A (en) * 2018-08-07 2018-12-21 武汉工程大学 A kind of intelligent home control device and control method based on electrnic house number plates
CN111107044A (en) * 2018-10-26 2020-05-05 珠海格力电器股份有限公司 Data security management method and information management platform
CN110349309A (en) * 2019-07-02 2019-10-18 深圳华视电子读写设备有限公司 A kind of visitor's authentication register method and device
WO2021063068A1 (en) * 2019-09-30 2021-04-08 全球能源互联网研究院有限公司 Operation and maintenance control and operation and maintenance analysis method and apparatus, system, and storage medium
CN111131433A (en) * 2019-12-20 2020-05-08 厦门瑞为信息技术有限公司 Visitor management system and method based on cloud edge cooperation
CN111556052A (en) * 2020-04-27 2020-08-18 京东方科技集团股份有限公司 Authority management method, processing device and storage medium
CN111556069A (en) * 2020-05-12 2020-08-18 南方电网数字电网研究院有限公司 Visitor identity authentication method, system, device, computer equipment and storage medium
CN113079134A (en) * 2021-03-19 2021-07-06 南方电网数字电网研究院有限公司 Mobile terminal access method, mobile terminal access device, computer equipment and medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
代辉辉等: "面向铁路运维的信息设备登录管理系统", 《铁道通信信号》 *

Also Published As

Publication number Publication date
CN113660245B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US11276131B2 (en) Property management system utilizing a blockchain network
US8533797B2 (en) Using windows authentication in a workgroup to manage application users
US8707422B2 (en) Method and apparatus for process enforced configuration management
US9088562B2 (en) Using service request ticket for multi-factor authentication
CN107634951A (en) Docker vessel safeties management method, system, equipment and storage medium
CN112534792A (en) Method and system for providing secure access to cloud services in a cloud computing environment
CN110930561B (en) Control method and device of intelligent lock
CN111915789A (en) Visitor reservation management method, device, equipment and storage medium
CN113949534A (en) Resource access method and device for information system, electronic equipment and storage medium
US11734616B2 (en) Method and system for access control of shared spaces through blockchain
CN111861415A (en) Approval chain setting method and device, electronic equipment and storage medium
US11170080B2 (en) Enforcing primary and secondary authorization controls using change control record identifier and information
US8495730B2 (en) Dynamically constructed capability for enforcing object access order
CN113612766B (en) Data management device, method, computer equipment and storage medium
CN113660245B (en) Terminal access right control method, device, equipment and medium
CN112581257A (en) Dispute service management method, system, device and medium supporting different card organizations
US20210211868A1 (en) Mobile device application software security
US11106770B2 (en) Multi-factor authorization detection and password storage system
CN112905983B (en) Equipment leasing method, equipment and storage medium
CN113067706B (en) Service identification system and method, storage medium, and electronic device
US20230308432A1 (en) Authenticating and authorizing api calls with multiple factors
CN115878221A (en) Intelligent park management method, program, device, medium and electronic equipment
CN112712365B (en) Processing method and device for digital certificate
KR102480453B1 (en) Personal information sharing device through personal information collection entity
US20160284141A1 (en) Access authorization based on physical location

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant