CN113674462A - Access control authorization method, device and storage medium - Google Patents

Access control authorization method, device and storage medium Download PDF

Info

Publication number
CN113674462A
CN113674462A CN202110820393.0A CN202110820393A CN113674462A CN 113674462 A CN113674462 A CN 113674462A CN 202110820393 A CN202110820393 A CN 202110820393A CN 113674462 A CN113674462 A CN 113674462A
Authority
CN
China
Prior art keywords
node
directed graph
information
destination
entrance guard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110820393.0A
Other languages
Chinese (zh)
Inventor
张科
区宏英
胡正才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Aciga Technology Co ltd
Original Assignee
Guangdong Aciga Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Aciga Technology Co ltd filed Critical Guangdong Aciga Technology Co ltd
Priority to CN202110820393.0A priority Critical patent/CN113674462A/en
Publication of CN113674462A publication Critical patent/CN113674462A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/29Geographical information databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/907Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/909Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using geographical or spatial information, e.g. location
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Abstract

The invention discloses a method, a device and a storage medium for access control authorization, wherein the method comprises the steps of constructing a directed graph according to map information; acquiring information of a departure place and a destination; obtaining a target node from the directed graph according to the information of the departure place and the destination; authorizing the entrance guard corresponding to the target node; the target entrance guard to pass through can be obtained through the generated directed graph according to the information of the departure point and the destination, and then the target entrance guard is automatically authorized, so that the method has the advantages of automation, intelligence and quickness.

Description

Access control authorization method, device and storage medium
Technical Field
The invention relates to the technical field of access control, in particular to an access authorization method, an access authorization device and a storage medium.
Background
With the development of society, an access control system has become an important component of social security as an important component of building security management.
The entrance guard passage authorization is an important work of passage management, namely, the authorization of the permission of a person passing through the department to enter certain areas, buildings or rooms in a park is realized, and only authorized persons are allowed to enter a specific area. At present, access control passing authorization is mainly carried out in a manual authorization mode, the access control posts needing authorization are judged according to the regions where passers-by need to enter, and authorization efficiency is low.
Disclosure of Invention
The present invention at least solves one of the technical problems in the prior art, and provides a method, an apparatus and a storage medium for access authorization.
The technical scheme adopted by the invention for solving the problems is as follows:
in a first aspect of the present invention, a method for access authorization includes:
constructing a directed graph according to map information, wherein the map information comprises position information of each place area, position information of each entrance guard and communication information among all the place areas, and nodes of the directed graph correspond to the entrance guard and the place areas;
acquiring information of a departure place and a destination, wherein the departure place and the destination correspond to the place area;
obtaining target nodes from the directed graph according to the information of the departure place and the destination, wherein the target nodes are all nodes passing through the directed graph from the departure place to the destination;
and authorizing the entrance guard corresponding to the target node.
According to a first aspect of the invention, said constructing a directed graph from map information comprises:
constructing a plurality of first data lists which are in one-to-one correspondence with the access control in a database, wherein the first data lists comprise first node identification numbers and equipment identification numbers of the access control;
constructing a plurality of second data lists corresponding to the nodes one by one in the database, wherein the second data lists comprise second node identification numbers and node names, the second node identification numbers correspond to the first node identification numbers, and the node names correspond to the location areas;
constructing a plurality of node dependency relationship tables among the nodes in the database according to the map information, wherein the node dependency relationship tables comprise third node identification numbers and dependent node identification numbers, the third node identification numbers correspond to the second node identification numbers, and the dependent node identification numbers correspond to the second node identification numbers;
and constructing the directed graph according to the first data list, the second data list and the node dependency relationship table.
According to the first aspect of the present invention, the obtaining a target node from the directed graph according to the information of the departure place and the destination includes:
determining an initial node corresponding to the departure place and a terminal node corresponding to the destination according to the information of the departure place and the destination;
and obtaining the target node from the directed graph by utilizing a search algorithm according to the initial node and the terminal node.
According to the first aspect of the present invention, the search algorithm is a breadth-first algorithm, a depth-first algorithm, or a recursive method.
According to a first aspect of the present invention, the authorizing the access control corresponding to the first node includes:
when the entrance guard adopts the human body biological characteristics to carry out passage verification, the human body biological characteristics of the passage personnel are obtained;
and issuing the human body biological characteristics of the passers to the entrance guard corresponding to the first node for authorization.
According to a first aspect of the present invention, the authorizing the access control corresponding to the first node includes:
when the entrance guard adopts an integrated circuit card to carry out passage verification, acquiring a first identification number corresponding to the integrated circuit card of a passage person;
and writing the door opening key of the entrance guard corresponding to the first node into the integrated circuit card corresponding to the first identification number through a recording device so as to authorize.
According to a first aspect of the present invention, the authorizing the access control corresponding to the first node includes:
when the access control adopts an identification card for passing verification, acquiring a second identification number corresponding to the identification card of a passing person;
and issuing the second identification number to the access control corresponding to the first node for authorization.
In a second aspect of the present invention, an access authorization apparatus includes:
the system comprises a directed graph construction unit, a storage unit and a control unit, wherein the directed graph construction unit is used for constructing a directed graph according to map information, the map information comprises position information of each place area, position information of each entrance guard and communication information among all the place areas, and nodes of the directed graph correspond to the entrance guard and the place areas;
an information acquisition unit configured to acquire information of a departure place and a destination, both of which correspond to the place area;
a target node obtaining unit, configured to obtain a target node from the directed graph according to the information of the departure point and the destination, where the target node is all nodes that pass through from the departure point to the destination in the directed graph;
and the authorization unit is used for authorizing the entrance guard corresponding to the target node.
In a third aspect of the present invention, a door access authorization apparatus includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the door access authorization method according to the first aspect of the present invention is implemented.
In a fourth aspect of the present invention, a storage medium stores executable instructions, and when executed by a processor, the storage medium implements the access authorization method according to the first aspect of the present invention.
The scheme at least has the following beneficial effects: the method has the advantages of being automatic, intelligent and fast, simplifying operation flow and operation difficulty of access control passing authorization, and improving efficiency of access control passing management.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The invention is further illustrated with reference to the following figures and examples.
FIG. 1 is a flow chart of a method for authorizing access control according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of constructing a directed graph from map information;
fig. 3 is a structural diagram of an access authorization apparatus according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the present preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
In the description of the present invention, it should be understood that the orientation or positional relationship referred to in the description of the orientation, such as the upper, lower, front, rear, left, right, etc., is based on the orientation or positional relationship shown in the drawings, and is only for convenience of description and simplification of description, and does not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention.
In the description of the present invention, the meaning of a plurality of means is one or more, the meaning of a plurality of means is two or more, and larger, smaller, larger, etc. are understood as excluding the number, and larger, smaller, inner, etc. are understood as including the number. If the first and second are described for the purpose of distinguishing technical features, they are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
In the description of the present invention, unless otherwise explicitly limited, terms such as arrangement, installation, connection and the like should be understood in a broad sense, and those skilled in the art can reasonably determine the specific meanings of the above terms in the present invention in combination with the specific contents of the technical solutions.
Referring to fig. 1, an embodiment of a first aspect of the present invention provides a method for access authorization.
The access control authorization method comprises the following steps:
s100, constructing a directed graph according to map information, wherein the map information comprises position information of each place area, position information of each entrance guard and communication information among all the place areas, and nodes of the directed graph correspond to the entrance guard and the place areas.
For example, the map is a grid map, the location areas are a campus area, an area a, an area B, an area a1, and an area a2, the location information of the location areas is coordinates of the entire location area, the location information of the location areas is the coordinates of the entire location area, the campus area includes the area a and the area B, and the area a includes the area a1 and the area a 2. Generally, the range of the site area can be determined by the edge of the site area, and meanwhile, the edge of the site area is provided with an impenetrable obstacle. Generally, the position of the entrance guard is set at the edge of the place area, and then according to the position information of the entrance guard, which place area can be entered through the entrance guard can be known. According to the communication information among all the site areas, for example, the access control MJ001 is needed from the area A to the area A1.
Referring to fig. 2, specifically, for step S100, a directed graph is constructed from map information, including:
constructing a plurality of first data lists which correspond to the access control one by one in a database, wherein the first data lists comprise first node identification numbers and equipment identification numbers of the access control; certainly, the first data list may further include a number, an identification type, and a door opening key of the door control device, and the first data list is used to store relevant information of the door control device;
constructing a plurality of second data lists which are in one-to-one correspondence with the nodes in the database, wherein the second data lists comprise second node identification numbers and node names, and the node names correspond to the location areas; the second data list stores relevant information of the nodes in the graph, the second node identification number corresponds to the first node identification number, namely the second node identification number can determine the access control equipment corresponding to the node;
constructing a plurality of node dependency relationship tables among the nodes in a database according to the map information, wherein the node dependency relationship tables comprise third node identification numbers and dependent node identification numbers, the third node identification numbers correspond to the second node identification numbers, and the dependent node identification numbers correspond to the second node identification numbers; the node corresponding to the third node identification number points to the node corresponding to the dependent node identification number;
and constructing a directed graph according to the first data list, the second data list and the node dependency relationship table.
It should be noted that, an expert may manually read the map information, and then construct the first data list, the second data list, and the node dependency relationship table in the database according to the map information. Or automatically reading the map information through a machine learning algorithm, and then constructing a first data list, a second data list and a node dependency relationship table in a database according to the map information.
For example, for an access control device of an east gate sentry in the area a, the access control device corresponds to the following first data list: the first node identification number is a11 and the device identification number is MJ 006. The access control equipment of the east gate sentry in the area A corresponds to a node A11 in the graph, and a node A11 corresponds to the following second data list: the second node identification number is a11 and the node name is zone a.
For the access control device of the a1 building gate post, the access control device corresponds to the following first data list: the first node identification number is a21 and the device identification number is MJ 001. The access control equipment of the A1 building gate post corresponds to a node A21 in the graph, and the node A21 corresponds to the following second data list: the second node identification is a21, the node name being floor a1 area.
Then, according to the map information, it can be known that the access control MJ006 is communicated with the area a and the area campus, and the access control MJ001 is communicated with the area a1, so that for the node a11 and the node a21, the corresponding node dependency relationship table has a third node identification number of a11 and a dependent node identification number of a21, and the node a21 points to the node a 11.
And step S200, acquiring information of a departure place and a destination, wherein the departure place and the destination correspond to the place area.
For step S200, information of the departure place and destination is input by the authority manager through an input device such as a keyboard.
And step S300, obtaining target nodes from the directed graph according to the information of the departure place and the destination, wherein the target nodes are all nodes passing from the departure place to the destination in the directed graph.
For step S300, obtaining a target node from the directed graph according to the information of the departure point and the destination, including:
determining an initial node corresponding to the departure place and a terminal node corresponding to the destination according to the information of the departure place and the destination; for example, if the starting place is a building area of a1, the initial node is a21, and the destination is a garden area, the destination node is a 01;
and obtaining the target node from the directed graph by utilizing a search algorithm according to the initial node and the terminal node. The target nodes are node a21, node a11, node a12, node a 01. Node a21 corresponds to door forbidden MJ001, node a11 corresponds to door forbidden MJ006, node a12 corresponds to door forbidden MJ005, and node a01 corresponds to door forbidden MJ 007.
Specifically, the search algorithm is a breadth-first algorithm, a depth-first algorithm, or a recursive method.
The breadth-first algorithm will be described as an example.
In the initialization stage, a directed graph is loaded from a database by using a HashMap < NodeId, GateNode >, a target node NodeId is used as a Key of the HashMap, and a second data list GateNode is used as a value of the HashMap. Defining a Queue < NodeId > to store the intermediate result in the searching process, and inserting the target node NodeId into the Queue < NodeId >. Defining an Array < gateway > to store a node result list corresponding to the passing area. Another tuple List < Device > is defined to hold the List of authorized Device results.
In the searching stage, a node is taken out from the Queue < NodeId >, the node is added into the Array < GateNode >, the node dependency relationship table corresponding to the node is read at the same time, and the dependency node corresponding to the node in the node dependency relationship table is added into the Queue < NodeId >. And repeating the steps until the Queue < NodeId > is empty, namely completing the search of all dependent nodes.
In the result processing stage, the Array < GateNode > is subjected to de-duplication processing, so that only one node object with the same Array < GateNode > is provided. The node in the Array < gateway > is the target node.
And traversing the nodes in the Array < gateway >. And acquiring a first data List corresponding to each node, traversing the first data List to obtain the equipment identification number of the access control, and adding the equipment identification number into an array List < Device >.
And S400, authorizing the entrance guard corresponding to the target node.
For step S400, in an embodiment, when the access control adopts the human body biological characteristics to perform the passage verification, the human body biological characteristics of the person who passes the passage are obtained; and issuing the human body biological characteristics of the passers to the entrance guard corresponding to the first node for authorization.
In another embodiment, when the entrance guard adopts an integrated circuit card for passage verification, a first identification number corresponding to the integrated circuit card of a passage person is obtained; and writing the door opening key of the entrance guard corresponding to the first node into the integrated circuit card corresponding to the first identification number through the recording equipment so as to authorize. It should be noted that the integrated circuit card is an IC card.
In another embodiment, when the access control adopts the identification card for passing verification, a second identification number corresponding to the identification card of a passing person is obtained; and issuing the second identification number to the access control corresponding to the first node for authorization. It should be noted that the identification card is an ID card.
By the access control authorization method, the target access control to be passed can be obtained through the generated directed graph according to the information of the departure point and the destination, and then the target access control is automatically authorized.
Referring to fig. 3, an embodiment of a second aspect of the present invention provides an access authorization apparatus. The access control authorization device adopts the embodiment of the first aspect of the invention
The access control authorization device comprises a directed graph construction unit 10, an information acquisition unit 20, a target node acquisition unit 30 and an authorization unit 40.
The directed graph constructing unit 10 is configured to construct a directed graph according to map information, where the map information includes location information of each location area, location information of each access control, and communication information between all the location areas, and nodes of the directed graph correspond to the access controls and the location areas;
the information acquisition unit 20 is configured to acquire information of a departure place and a destination, both of which correspond to a place area;
the target node obtaining unit 30 is configured to obtain a target node from the digraph according to the information of the departure point and the destination, where the target node is all nodes that pass through from the departure point to the destination in the digraph;
the authorization unit 40 is configured to authorize an access control corresponding to the target node.
It should be noted that, each unit of the access authorization apparatus adopted in the embodiment of the second aspect of the present invention corresponds to each step of the access authorization method adopted in the embodiment of the second aspect of the present invention one to one, and the same technical means is adopted, so that the same technical problems are solved, and the same technical effects are achieved.
The embodiment of the third aspect of the invention provides an access authorization device. The access authorization apparatus includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor executes the computer program to implement the access authorization method according to the embodiment of the first aspect of the present invention.
The processor and memory may be connected by a bus or other means.
The memory, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and these remote memories may be connected to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
An embodiment of a fourth aspect of the invention provides a storage medium. The storage medium stores executable instructions, and when executed by the processor, the executable instructions implement the access authorization method according to the embodiment of the first aspect of the present invention.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
The above description is only a preferred embodiment of the present invention, and the present invention is not limited to the above embodiment, and the present invention shall fall within the protection scope of the present invention as long as the technical effects of the present invention are achieved by the same means.

Claims (10)

1. An access authorization method, comprising:
constructing a directed graph according to map information, wherein the map information comprises position information of each place area, position information of each entrance guard and communication information among all the place areas, and nodes of the directed graph correspond to the entrance guard and the place areas;
acquiring information of a departure place and a destination, wherein the departure place and the destination correspond to the place area;
obtaining target nodes from the directed graph according to the information of the departure place and the destination, wherein the target nodes are all nodes passing through the directed graph from the departure place to the destination;
and authorizing the entrance guard corresponding to the target node.
2. The access authorization method according to claim 1, wherein the constructing a directed graph according to map information comprises:
constructing a plurality of first data lists which are in one-to-one correspondence with the access control in a database, wherein the first data lists comprise first node identification numbers and equipment identification numbers of the access control;
constructing a plurality of second data lists corresponding to the nodes one by one in the database, wherein the second data lists comprise second node identification numbers and node names, the second node identification numbers correspond to the first node identification numbers, and the node names correspond to the location areas;
constructing a plurality of node dependency relationship tables among the nodes in the database according to the map information, wherein the node dependency relationship tables comprise third node identification numbers and dependent node identification numbers, the third node identification numbers correspond to the second node identification numbers, and the dependent node identification numbers correspond to the second node identification numbers;
and constructing the directed graph according to the first data list, the second data list and the node dependency relationship table.
3. The access authorization method according to claim 1, wherein the obtaining of the target node from the directed graph according to the information of the departure place and the destination comprises:
determining an initial node corresponding to the departure place and a terminal node corresponding to the destination according to the information of the departure place and the destination;
and obtaining the target node from the directed graph by utilizing a search algorithm according to the initial node and the terminal node.
4. The access authorization method according to claim 3, characterized in that the search algorithm is a breadth-first algorithm, a depth-first algorithm or a recursive method.
5. The access authorization method according to claim 1, wherein the authorization of the access corresponding to the first node includes:
when the entrance guard adopts the human body biological characteristics to carry out passage verification, the human body biological characteristics of the passage personnel are obtained;
and issuing the human body biological characteristics of the passers to the entrance guard corresponding to the first node for authorization.
6. The access authorization method according to claim 1, wherein the authorization of the access corresponding to the first node includes:
when the entrance guard adopts an integrated circuit card to carry out passage verification, acquiring a first identification number corresponding to the integrated circuit card of a passage person;
and writing the door opening key of the entrance guard corresponding to the first node into the integrated circuit card corresponding to the first identification number through a recording device so as to authorize.
7. The access authorization method according to claim 1, wherein the authorization of the access corresponding to the first node includes:
when the access control adopts an identification card for passing verification, acquiring a second identification number corresponding to the identification card of a passing person;
and issuing the second identification number to the access control corresponding to the first node for authorization.
8. Entrance guard's authorizer, its characterized in that includes:
the system comprises a directed graph construction unit, a storage unit and a control unit, wherein the directed graph construction unit is used for constructing a directed graph according to map information, the map information comprises position information of each place area, position information of each entrance guard and communication information among all the place areas, and nodes of the directed graph correspond to the entrance guard and the place areas;
an information acquisition unit configured to acquire information of a departure place and a destination, both of which correspond to the place area;
a target node obtaining unit, configured to obtain a target node from the directed graph according to the information of the departure point and the destination, where the target node is all nodes that pass through from the departure point to the destination in the directed graph;
and the authorization unit is used for authorizing the entrance guard corresponding to the target node.
9. A door access authorization device, comprising a memory, a processor and a computer program stored on the memory and operable on the processor, wherein the processor executes the computer program to implement the door access authorization method according to any one of claims 1 to 7.
10. Storage medium, characterized in that the storage medium stores executable instructions, and the executable instructions when executed by a processor implement the access authorization method according to any one of claims 1 to 7.
CN202110820393.0A 2021-07-20 2021-07-20 Access control authorization method, device and storage medium Pending CN113674462A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110820393.0A CN113674462A (en) 2021-07-20 2021-07-20 Access control authorization method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110820393.0A CN113674462A (en) 2021-07-20 2021-07-20 Access control authorization method, device and storage medium

Publications (1)

Publication Number Publication Date
CN113674462A true CN113674462A (en) 2021-11-19

Family

ID=78539600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110820393.0A Pending CN113674462A (en) 2021-07-20 2021-07-20 Access control authorization method, device and storage medium

Country Status (1)

Country Link
CN (1) CN113674462A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115240308A (en) * 2022-09-26 2022-10-25 深圳市极致科技股份有限公司 Access control machine authorization method, device and system, access control machine and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0239342A2 (en) * 1986-03-21 1987-09-30 Emhart Industries, Inc. Electronic locking systems
EP1780652A1 (en) * 2005-10-31 2007-05-02 Sap Ag Data processing system and method
CN107833329A (en) * 2017-11-21 2018-03-23 丹东华通测控有限公司 It is a kind of to be used for Region control and the anti-gate control system for sneaking into management
US20180096544A1 (en) * 2016-10-05 2018-04-05 Tyler James Intelligent pathway access control
US20210112064A1 (en) * 2019-10-15 2021-04-15 Bioconnect Inc. Systems and methods for physical access control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0239342A2 (en) * 1986-03-21 1987-09-30 Emhart Industries, Inc. Electronic locking systems
EP1780652A1 (en) * 2005-10-31 2007-05-02 Sap Ag Data processing system and method
US20070100832A1 (en) * 2005-10-31 2007-05-03 Sap Ag Systems and methods for performing authorization
US20180096544A1 (en) * 2016-10-05 2018-04-05 Tyler James Intelligent pathway access control
CN107833329A (en) * 2017-11-21 2018-03-23 丹东华通测控有限公司 It is a kind of to be used for Region control and the anti-gate control system for sneaking into management
US20210112064A1 (en) * 2019-10-15 2021-04-15 Bioconnect Inc. Systems and methods for physical access control

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李航涛 等: ""基于二维地图的可视化授权门禁系统"", 《科技创新》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115240308A (en) * 2022-09-26 2022-10-25 深圳市极致科技股份有限公司 Access control machine authorization method, device and system, access control machine and computer storage medium
CN115240308B (en) * 2022-09-26 2022-12-06 深圳市极致科技股份有限公司 Access control machine authorization method, device and system, access control machine and computer storage medium

Similar Documents

Publication Publication Date Title
EP3586475B1 (en) Property management system utilizing a blockchain network
CN111710074B (en) Method for controlling and managing access of multi-stage access control, electronic equipment and storage medium
Basilico et al. Adversarial patrolling with spatially uncertain alarm signals
KR102394287B1 (en) Method and apparatus for increasing reliability in monitoring systems
US20110109441A1 (en) Systems and methods for object localization and path identification based on rfid sensing
KR100781697B1 (en) Management method and system for entrance or exit of a vehicle
CN112820137B (en) Parking lot management method and device
CN109816906B (en) Security monitoring method and device, electronic equipment and storage medium
CN111243155B (en) Method, device and system for issuing household characteristic information
KR101513172B1 (en) Parking lot Reservation system using Smartphone App.
CN113674462A (en) Access control authorization method, device and storage medium
KR20220041695A (en) System and method for access control using blockchain network and computer program for the same
CN106448249A (en) Parking lot management method, server and system
CN112927408A (en) Visitor visiting processing method and device
CN111292454A (en) Intelligent identity access control identification system and method
JP4458975B2 (en) Parking lot management system
CN117058801A (en) Safety intelligent access control monitoring method and system
JP2009086912A (en) Access control system and access control method
CN110648443B (en) Access control verification method, device, equipment and medium
CN107578361A (en) Management method, device, server and the storage medium of intelligent residential district
CN116188223A (en) Personnel residence management system, method and electronic equipment
JP2004019339A (en) Device and method for management entrance and exit
CN114944028A (en) Vehicle access management method, device and system, vehicle-mounted terminal and intelligent terminal
CN110768942A (en) Identity authentication system
JP4522716B2 (en) Access control device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20211119