CN113763617A - Entrance guard entrance and exit time processing method based on nesting and entrance guard system - Google Patents

Entrance guard entrance and exit time processing method based on nesting and entrance guard system Download PDF

Info

Publication number
CN113763617A
CN113763617A CN202110974580.4A CN202110974580A CN113763617A CN 113763617 A CN113763617 A CN 113763617A CN 202110974580 A CN202110974580 A CN 202110974580A CN 113763617 A CN113763617 A CN 113763617A
Authority
CN
China
Prior art keywords
time
schedule
access control
processing method
priority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110974580.4A
Other languages
Chinese (zh)
Inventor
何猛
莫明锋
陈荣
简智君
李锦华
郭军
胡运龙
胡远航
李大乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ralid Information System Co ltd
Original Assignee
Ralid Information System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ralid Information System Co ltd filed Critical Ralid Information System Co ltd
Priority to CN202110974580.4A priority Critical patent/CN113763617A/en
Publication of CN113763617A publication Critical patent/CN113763617A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/06Synchronising arrangements
    • H04J3/0635Clock or time synchronisation in a network
    • H04J3/0638Clock or time synchronisation among nodes; Internode synchronisation
    • H04J3/0644External master-clock

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a nested-based access control access time processing method and an access control system, wherein the access control access time processing method is applied to the access control system and comprises the steps of responding to a time verification requirement to obtain the current time; acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result. Another special time schedule is nested in a general time schedule and is assigned to the entrance guard controller as a whole time schedule, and the entrance and exit permission preferably meets the special time schedule while meeting the general time schedule so as to meet the requirement of complicated time entrance and exit scenes.

Description

Entrance guard entrance and exit time processing method based on nesting and entrance guard system
Technical Field
The invention relates to the field of access control systems, in particular to an entrance guard entrance and exit time processing method based on nesting and an entrance guard system.
Background
At present, a single user in an access control system only has authorization information of one schedule in one gate point, so that the requirement of complex time access scenes, such as holiday vacation, holiday shift compensation and the like, cannot be met, and the attendance checking condition of each staff still needs to be checked manually by enterprise attendance checking staff in special scenes such as holidays and the like, and cannot meet the checking requirements of different enterprises.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the purposes of the invention is to provide a nested-based access control access time processing method, which can meet the access scene requirements of different complex times and improve the flexibility of an access control system.
The second purpose of the invention is to provide an access control system.
It is a further object of the present invention to provide an electronic device.
It is a fourth object of the present invention to provide a storage medium.
One of the purposes of the invention is realized by adopting the following technical scheme:
a nested-based access control access time processing method is applied to an access control system and comprises the following steps:
obtaining a current time in response to a time validation requirement;
acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result.
Further, the time verification requirement is generated when the access control system is awakened.
Furthermore, the current time is obtained by obtaining a local clock of the access control system, and the access control system corrects the local clock when networking.
Further, the priority schedule and the general schedule are provided with corresponding schedule IDs and allowable time ranges, and the priority schedule and the general schedule are associated through the schedule IDs.
Further, when the time verification result is that the current time is not in the allowable time range of the priority schedule or the universal schedule, directly initiating an alarm prompt.
Further, when the time verification result shows that the current time is not in the allowable time range of the priority schedule or the general schedule, the allowable time which is closest to the current time in the priority schedule or the general schedule is called for displaying.
The second purpose of the invention is realized by adopting the following technical scheme:
an access control system comprising:
the time verification module executes the nested access control access time processing method;
and the authentication module is used for acquiring the input authentication information when the time authentication is successful, authenticating the authentication information and generating an unlocking instruction to control the access control system to execute an unlocking action when the authentication is successful.
The third purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the nested access control access time processing method.
The fourth purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements the nesting-based access time processing method described above.
Compared with the prior art, the invention has the beneficial effects that:
another special time schedule is nested in a general time schedule and is assigned to the entrance guard controller as a whole time schedule, and the entrance and exit permission preferably meets the special time schedule while meeting the general time schedule so as to meet the requirement of complicated time entrance and exit scenes.
Drawings
FIG. 1 is a schematic flow chart of a nested-based entrance guard entry-exit time processing method according to the present invention;
fig. 2 is a schematic view of the working process of the access control system of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
The embodiment provides a nested-based access control access time processing method, which is mainly applied to an access control system, so that the access control system is suitable for various access scenes, and the flexibility of the access control system is improved.
As shown in fig. 1, the method for processing entrance guard entry and exit time of the embodiment specifically includes the following steps:
step S1: obtaining a current time in response to a time validation requirement;
step S2: acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result.
The time verification requirement can be generated by waking up the access control system, that is, the access control system can be wakened up by methods such as touching, clicking or sound control by a user, and a local clock of the access control system is automatically read after the access control system is wakened up, so that the current time of the local clock is obtained.
The access control system of this embodiment is equipped with the networking module, and wireless networking is realized to the accessible networking module, and when access control system was in the networking state, the time of access control system's local clock was rectified to the network time of accessible internet, can improve local clock time accuracy. Meanwhile, the time is corrected when the access control system is networked, so that the access control system can keep relatively accurate time when not networked, time errors are reduced, and the time verification accuracy of the access control system is improved.
In addition, the access control system can be connected with the cloud end in a networking state, and after a manager can utilize the client end corresponding to the cloud end to bind the access control system, an access control access schedule is set in the client end, wherein the access control access schedule comprises a universal schedule, the universal schedule comprises a unique schedule ID, and the schedule ID can be generated in a random mode; in addition, the universal schedule also comprises an allowed time period which mainly comprises a date range, a starting time and an ending time, namely, the time can be verified from the starting time to the ending time of each day in the date range, and if the time verification is carried out in the time except the starting time to the ending time, the time can not be verified. And a corresponding valid week can be set in the date range, if the valid week is a working day in one week, the time verification can be passed from the starting time to the ending time of the working day in the date range, and the time verification cannot be passed at the weekend time in the date range.
If the manager needs to add a special schedule, a priority schedule can be added into the client, the priority schedule also comprises a corresponding schedule ID and an allowed time period, when the manager adds the priority schedule, the manager can automatically generate the corresponding schedule ID, and the allowed time period mainly comprises a date range, a start time and an end time, namely, the time can be verified from the start time to the end time of each day in the date range, and if the time verification is carried out in the time except the start time to the end time, the time can not be verified. And a corresponding valid week can be set in the date range, if the valid week is a working day in one week, the time verification can be passed from the starting time to the ending time of the working day in the date range, and the time verification cannot be passed at the weekend time in the date range.
In this embodiment, the priority schedule and the universal schedule are associated by the schedule ID, that is, after the administrator adds a new priority schedule in the client and generates the schedule ID of the priority schedule, the schedule ID of the priority schedule is bound and associated with the schedule ID of the universal schedule. The method for judging whether the universal time schedule is nested with the priority time schedule in the embodiment comprises the following steps:
step S21: look up the universal schedule.
Step S22: and judging whether the associated priority schedule ID of the universal schedule is empty, if so, determining that the universal schedule is a non-nested priority schedule, and if not, determining that the universal schedule is a nested priority schedule.
In some embodiments, the association method may be to add the schedule ID of the priority schedule in the schedule ID of the general schedule with a preset rule, for example, to add the schedule ID of the priority schedule after the schedule ID of the general schedule; when the access control system receives a time verification requirement, whether the schedule ID of the universal schedule contains the schedule ID of the priority schedule or not can be judged, if yes, the universal schedule is associated with the priority schedule, the current time read from the local clock is compared with the allowed time period in the priority schedule, and if the current time is within the allowed time period of the priority schedule, the time verification is successful; if the current time is not within the allowed time period of the priority schedule, the time validation fails.
If the universal time schedule is judged not to be associated with the priority time schedule, comparing the current time with the allowed time period in the universal time schedule, and if the current time is within the allowed time period of the universal time schedule, successfully verifying the time; if the current time is not within the allowed time period of the universal schedule, the time validation fails.
In some embodiments, when the time verification result is that the time verification fails, that is, when the current time is not within the allowable time range of the priority schedule or the general schedule, the alarm prompt is directly initiated, and the generated corresponding abnormal information may also be sent to a specified client for prompt.
In some embodiments, when the time verification result is that the current time is not within the allowable time range of the priority schedule or the general schedule, the allowable time closest to the current time in the priority schedule or the general schedule may also be called for display. The allowable time period is from 8 am to 8 pm, if the user wakes up the access control system at 7 am and a half, the time verification cannot be passed, and the prompting message for verifying after half an hour is displayed on the display screen of the access control system so as to inform the user to verify after half an hour.
Example two
The embodiment provides an access control system, which mainly comprises an identity verification module, a time verification module, an access control controller and an intelligent door lock; the time verification module executes the nested access control access time processing method according to the embodiment one; as shown in fig. 2, when a user wants to unlock a door lock, the user first needs to wake up the access control system, and at this time, the time verification module automatically reads a local clock of the access control system, so as to obtain the current time of the local clock; meanwhile, the time verification module needs to immediately judge whether the schedule ID of the universal schedule contains the schedule ID of the priority schedule, if so, the universal schedule is associated with the priority schedule, at the moment, the current time read from the local clock is compared with the allowed time period in the priority schedule, and if the current time is within the allowed time period of the priority schedule, the time verification is successful; if the current time is not within the allowed time period of the priority schedule, the time validation fails.
If the universal time schedule is judged not to be associated with the priority time schedule, comparing the current time with the allowed time period in the universal time schedule, and if the current time is within the allowed time period of the universal time schedule, successfully verifying the time; if the current time is not within the allowed time period of the universal schedule, the time validation fails.
When the time verification of the time verification module is successful, the identity verification module can acquire the identity verification information input by the user, wherein the identity verification information can be fingerprint information, voiceprint information, face picture information and the like, the identity verification information input by the user is verified, namely the identity verification information input by the user is compared with prestored personnel information, if the identity verification information input by the user is the same as the prestored personnel information of any one person, the identity verification is successful, an unlocking instruction is generated under the conditions that the time verification is successful and the identity verification is successful, and the unlocking instruction is issued to the access control, and the access control controls the intelligent door lock to execute the unlocking action according to the unlocking instruction. If any one of the time verification and the identity verification cannot pass, the door lock cannot be unlocked.
The user can enter the authentication information immediately after awakening the access control system, and does not need to wait for the authentication to pass and then enter, so that the use experience of the user is improved. When the door lock system fails to unlock, the time verification failure and/or the identity verification failure prompt is displayed in a display module of the access control system so as to prompt a user of the reason of the unlocking verification failure.
EXAMPLE III
The embodiment provides an electronic device, which comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the nested access control access time processing method in the first embodiment; in addition, the present embodiment also provides a storage medium, on which a computer program is stored, and when the computer program is executed, the nested-based access control entry and exit time processing method is implemented.
The apparatus and the storage medium in this embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the structure and implementation process of the system in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here. The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (9)

1. A nested access control access time processing method is applied to an access control system and comprises the following steps:
obtaining a current time in response to a time validation requirement;
acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result.
2. The nested-based access control entry and exit time processing method of claim 1, wherein the time validation requirement is generated by waking up the access control system.
3. The nested-based access control entry and exit time processing method according to claim 1, wherein the current time is obtained by obtaining a local clock of the access control system, and the access control system corrects the local clock when networking.
4. The nesting-based entrance guard entry and exit time processing method according to claim 1, wherein the priority schedule and the general schedule are each provided with a schedule ID and an allowable time range corresponding thereto, and the priority schedule and the general schedule are associated by the schedule ID.
5. The nested-based entrance guard entry and exit time processing method according to claim 1, wherein when the time verification result is that the current time is not within the allowable time range of the priority schedule or the universal schedule, an alarm prompt is directly initiated.
6. The nesting-based entrance guard access time processing method according to claim 1, wherein when the time verification result indicates that the current time is not within the allowable time range of the priority schedule or the general schedule, the allowable time closest to the current time in the priority schedule or the general schedule is called and displayed.
7. An access control system, comprising:
the time verification module executes the nested access control entrance and exit time processing method according to any one of claims 1 to 6;
and the authentication module is used for acquiring the input authentication information when the time authentication is successful, authenticating the authentication information and generating an unlocking instruction to control the access control system to execute an unlocking action when the authentication is successful.
8. An electronic device, comprising a processor, a memory, and a computer program stored in the memory and executable on the processor, wherein the processor implements the nested access time processing method according to any one of claims 1 to 6 when executing the computer program.
9. A storage medium having a computer program stored thereon, wherein the computer program is executed to implement the nesting-based entrance guard entry and exit time processing method according to any one of claims 1 to 6.
CN202110974580.4A 2021-08-24 2021-08-24 Entrance guard entrance and exit time processing method based on nesting and entrance guard system Pending CN113763617A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110974580.4A CN113763617A (en) 2021-08-24 2021-08-24 Entrance guard entrance and exit time processing method based on nesting and entrance guard system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110974580.4A CN113763617A (en) 2021-08-24 2021-08-24 Entrance guard entrance and exit time processing method based on nesting and entrance guard system

Publications (1)

Publication Number Publication Date
CN113763617A true CN113763617A (en) 2021-12-07

Family

ID=78790997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110974580.4A Pending CN113763617A (en) 2021-08-24 2021-08-24 Entrance guard entrance and exit time processing method based on nesting and entrance guard system

Country Status (1)

Country Link
CN (1) CN113763617A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115359593A (en) * 2022-07-11 2022-11-18 北京燕山电子设备厂 Access control management method, system, electronic device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466148A (en) * 2008-12-30 2009-06-24 福建先创电子有限公司 Method for scheduling carrier of carrier pool discharging-directly machine
CN109191631A (en) * 2018-08-08 2019-01-11 北京猎户星空科技有限公司 Control method, device and the electronic equipment that gate inhibition opens
CN109697779A (en) * 2018-12-27 2019-04-30 厦门中控智慧信息技术有限公司 A kind of access control method and relevant apparatus
CN110046059A (en) * 2019-04-15 2019-07-23 联芸科技(杭州)有限公司 Read control device, reading and control method thereof and controller for memory
CN111479272A (en) * 2020-04-16 2020-07-31 广东好太太科技集团股份有限公司 Method, equipment and storage medium for automatically connecting AP (Access Point) hotspots according to priorities
CN111899381A (en) * 2020-07-13 2020-11-06 珠海格力电器股份有限公司 Unlocking verification method and device, door lock, door lock system and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101466148A (en) * 2008-12-30 2009-06-24 福建先创电子有限公司 Method for scheduling carrier of carrier pool discharging-directly machine
CN109191631A (en) * 2018-08-08 2019-01-11 北京猎户星空科技有限公司 Control method, device and the electronic equipment that gate inhibition opens
CN109697779A (en) * 2018-12-27 2019-04-30 厦门中控智慧信息技术有限公司 A kind of access control method and relevant apparatus
CN110046059A (en) * 2019-04-15 2019-07-23 联芸科技(杭州)有限公司 Read control device, reading and control method thereof and controller for memory
CN111479272A (en) * 2020-04-16 2020-07-31 广东好太太科技集团股份有限公司 Method, equipment and storage medium for automatically connecting AP (Access Point) hotspots according to priorities
CN111899381A (en) * 2020-07-13 2020-11-06 珠海格力电器股份有限公司 Unlocking verification method and device, door lock, door lock system and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115359593A (en) * 2022-07-11 2022-11-18 北京燕山电子设备厂 Access control management method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US7222361B2 (en) Computer security with local and remote authentication
US20190147672A1 (en) Systems and methods for multifactor physical authentication
US8756704B2 (en) User impersonation and authentication
US20180046988A1 (en) Method and system for reporting and monitoring location-related activities of mobile devices
US20190068588A1 (en) Authentication system
US10096182B2 (en) Using a light up feature of a mobile device to trigger door access
US10063540B2 (en) Trusted status transfer between associated devices
US20150106150A1 (en) System and method for managing event participant authorizations
US11594092B2 (en) Multi-site building access using mobile credentials
US8087070B2 (en) Predictive method for multi-party strengthening of authentication credentials with non-real time synchronization
US9032507B2 (en) Access request authentication and authorization information generation
CN113763617A (en) Entrance guard entrance and exit time processing method based on nesting and entrance guard system
US20190311303A1 (en) System and method for credentialing access to restricted rooms
WO2022193615A1 (en) Method and apparatus for deleting digital key, and device, system and storage medium
CN110517372B (en) Biological characteristic information processing method and device
US10091177B1 (en) Controlling access to a computerized resource of a mobile device based on whether the mobile device is within a vehicle that is currently moving
CN110796273A (en) Conference management method, intelligent lock and conference management system
US9762570B2 (en) Information processing system, information processing method and computer readable recording medium stored a program
CN109684791B (en) Software protection method and device
JP2018173923A (en) Terminal device, gate control method, gate control program and gate control system
CN112182521A (en) Real estate right dynamic information query method, integrated platform and storage medium
WO2018095184A1 (en) Data interaction method and system
JP2010095918A (en) Expiration date renewal device, room entrance/exit control device and room entrance/exit management system
US20210319638A1 (en) Information processing apparatus, information processing system, information processing method, and non-transitory storage medium
JP5086142B2 (en) Authentication system, authentication method, and program executed by computer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination