CN113763617A - Entrance guard entrance and exit time processing method based on nesting and entrance guard system - Google Patents
Entrance guard entrance and exit time processing method based on nesting and entrance guard system Download PDFInfo
- Publication number
- CN113763617A CN113763617A CN202110974580.4A CN202110974580A CN113763617A CN 113763617 A CN113763617 A CN 113763617A CN 202110974580 A CN202110974580 A CN 202110974580A CN 113763617 A CN113763617 A CN 113763617A
- Authority
- CN
- China
- Prior art keywords
- time
- schedule
- access control
- processing method
- priority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 52
- 238000004590 computer program Methods 0.000 claims description 11
- 238000010200 validation analysis Methods 0.000 claims description 8
- 230000006855 networking Effects 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 3
- 230000002618 waking effect Effects 0.000 claims description 2
- 238000000034 method Methods 0.000 description 8
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04J—MULTIPLEX COMMUNICATION
- H04J3/00—Time-division multiplex systems
- H04J3/02—Details
- H04J3/06—Synchronising arrangements
- H04J3/0635—Clock or time synchronisation in a network
- H04J3/0638—Clock or time synchronisation among nodes; Internode synchronisation
- H04J3/0644—External master-clock
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a nested-based access control access time processing method and an access control system, wherein the access control access time processing method is applied to the access control system and comprises the steps of responding to a time verification requirement to obtain the current time; acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result. Another special time schedule is nested in a general time schedule and is assigned to the entrance guard controller as a whole time schedule, and the entrance and exit permission preferably meets the special time schedule while meeting the general time schedule so as to meet the requirement of complicated time entrance and exit scenes.
Description
Technical Field
The invention relates to the field of access control systems, in particular to an entrance guard entrance and exit time processing method based on nesting and an entrance guard system.
Background
At present, a single user in an access control system only has authorization information of one schedule in one gate point, so that the requirement of complex time access scenes, such as holiday vacation, holiday shift compensation and the like, cannot be met, and the attendance checking condition of each staff still needs to be checked manually by enterprise attendance checking staff in special scenes such as holidays and the like, and cannot meet the checking requirements of different enterprises.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the purposes of the invention is to provide a nested-based access control access time processing method, which can meet the access scene requirements of different complex times and improve the flexibility of an access control system.
The second purpose of the invention is to provide an access control system.
It is a further object of the present invention to provide an electronic device.
It is a fourth object of the present invention to provide a storage medium.
One of the purposes of the invention is realized by adopting the following technical scheme:
a nested-based access control access time processing method is applied to an access control system and comprises the following steps:
obtaining a current time in response to a time validation requirement;
acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result.
Further, the time verification requirement is generated when the access control system is awakened.
Furthermore, the current time is obtained by obtaining a local clock of the access control system, and the access control system corrects the local clock when networking.
Further, the priority schedule and the general schedule are provided with corresponding schedule IDs and allowable time ranges, and the priority schedule and the general schedule are associated through the schedule IDs.
Further, when the time verification result is that the current time is not in the allowable time range of the priority schedule or the universal schedule, directly initiating an alarm prompt.
Further, when the time verification result shows that the current time is not in the allowable time range of the priority schedule or the general schedule, the allowable time which is closest to the current time in the priority schedule or the general schedule is called for displaying.
The second purpose of the invention is realized by adopting the following technical scheme:
an access control system comprising:
the time verification module executes the nested access control access time processing method;
and the authentication module is used for acquiring the input authentication information when the time authentication is successful, authenticating the authentication information and generating an unlocking instruction to control the access control system to execute an unlocking action when the authentication is successful.
The third purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprises a processor, a memory and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the nested access control access time processing method.
The fourth purpose of the invention is realized by adopting the following technical scheme:
a storage medium having stored thereon a computer program which, when executed, implements the nesting-based access time processing method described above.
Compared with the prior art, the invention has the beneficial effects that:
another special time schedule is nested in a general time schedule and is assigned to the entrance guard controller as a whole time schedule, and the entrance and exit permission preferably meets the special time schedule while meeting the general time schedule so as to meet the requirement of complicated time entrance and exit scenes.
Drawings
FIG. 1 is a schematic flow chart of a nested-based entrance guard entry-exit time processing method according to the present invention;
fig. 2 is a schematic view of the working process of the access control system of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
The embodiment provides a nested-based access control access time processing method, which is mainly applied to an access control system, so that the access control system is suitable for various access scenes, and the flexibility of the access control system is improved.
As shown in fig. 1, the method for processing entrance guard entry and exit time of the embodiment specifically includes the following steps:
step S1: obtaining a current time in response to a time validation requirement;
step S2: acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result.
The time verification requirement can be generated by waking up the access control system, that is, the access control system can be wakened up by methods such as touching, clicking or sound control by a user, and a local clock of the access control system is automatically read after the access control system is wakened up, so that the current time of the local clock is obtained.
The access control system of this embodiment is equipped with the networking module, and wireless networking is realized to the accessible networking module, and when access control system was in the networking state, the time of access control system's local clock was rectified to the network time of accessible internet, can improve local clock time accuracy. Meanwhile, the time is corrected when the access control system is networked, so that the access control system can keep relatively accurate time when not networked, time errors are reduced, and the time verification accuracy of the access control system is improved.
In addition, the access control system can be connected with the cloud end in a networking state, and after a manager can utilize the client end corresponding to the cloud end to bind the access control system, an access control access schedule is set in the client end, wherein the access control access schedule comprises a universal schedule, the universal schedule comprises a unique schedule ID, and the schedule ID can be generated in a random mode; in addition, the universal schedule also comprises an allowed time period which mainly comprises a date range, a starting time and an ending time, namely, the time can be verified from the starting time to the ending time of each day in the date range, and if the time verification is carried out in the time except the starting time to the ending time, the time can not be verified. And a corresponding valid week can be set in the date range, if the valid week is a working day in one week, the time verification can be passed from the starting time to the ending time of the working day in the date range, and the time verification cannot be passed at the weekend time in the date range.
If the manager needs to add a special schedule, a priority schedule can be added into the client, the priority schedule also comprises a corresponding schedule ID and an allowed time period, when the manager adds the priority schedule, the manager can automatically generate the corresponding schedule ID, and the allowed time period mainly comprises a date range, a start time and an end time, namely, the time can be verified from the start time to the end time of each day in the date range, and if the time verification is carried out in the time except the start time to the end time, the time can not be verified. And a corresponding valid week can be set in the date range, if the valid week is a working day in one week, the time verification can be passed from the starting time to the ending time of the working day in the date range, and the time verification cannot be passed at the weekend time in the date range.
In this embodiment, the priority schedule and the universal schedule are associated by the schedule ID, that is, after the administrator adds a new priority schedule in the client and generates the schedule ID of the priority schedule, the schedule ID of the priority schedule is bound and associated with the schedule ID of the universal schedule. The method for judging whether the universal time schedule is nested with the priority time schedule in the embodiment comprises the following steps:
step S21: look up the universal schedule.
Step S22: and judging whether the associated priority schedule ID of the universal schedule is empty, if so, determining that the universal schedule is a non-nested priority schedule, and if not, determining that the universal schedule is a nested priority schedule.
In some embodiments, the association method may be to add the schedule ID of the priority schedule in the schedule ID of the general schedule with a preset rule, for example, to add the schedule ID of the priority schedule after the schedule ID of the general schedule; when the access control system receives a time verification requirement, whether the schedule ID of the universal schedule contains the schedule ID of the priority schedule or not can be judged, if yes, the universal schedule is associated with the priority schedule, the current time read from the local clock is compared with the allowed time period in the priority schedule, and if the current time is within the allowed time period of the priority schedule, the time verification is successful; if the current time is not within the allowed time period of the priority schedule, the time validation fails.
If the universal time schedule is judged not to be associated with the priority time schedule, comparing the current time with the allowed time period in the universal time schedule, and if the current time is within the allowed time period of the universal time schedule, successfully verifying the time; if the current time is not within the allowed time period of the universal schedule, the time validation fails.
In some embodiments, when the time verification result is that the time verification fails, that is, when the current time is not within the allowable time range of the priority schedule or the general schedule, the alarm prompt is directly initiated, and the generated corresponding abnormal information may also be sent to a specified client for prompt.
In some embodiments, when the time verification result is that the current time is not within the allowable time range of the priority schedule or the general schedule, the allowable time closest to the current time in the priority schedule or the general schedule may also be called for display. The allowable time period is from 8 am to 8 pm, if the user wakes up the access control system at 7 am and a half, the time verification cannot be passed, and the prompting message for verifying after half an hour is displayed on the display screen of the access control system so as to inform the user to verify after half an hour.
Example two
The embodiment provides an access control system, which mainly comprises an identity verification module, a time verification module, an access control controller and an intelligent door lock; the time verification module executes the nested access control access time processing method according to the embodiment one; as shown in fig. 2, when a user wants to unlock a door lock, the user first needs to wake up the access control system, and at this time, the time verification module automatically reads a local clock of the access control system, so as to obtain the current time of the local clock; meanwhile, the time verification module needs to immediately judge whether the schedule ID of the universal schedule contains the schedule ID of the priority schedule, if so, the universal schedule is associated with the priority schedule, at the moment, the current time read from the local clock is compared with the allowed time period in the priority schedule, and if the current time is within the allowed time period of the priority schedule, the time verification is successful; if the current time is not within the allowed time period of the priority schedule, the time validation fails.
If the universal time schedule is judged not to be associated with the priority time schedule, comparing the current time with the allowed time period in the universal time schedule, and if the current time is within the allowed time period of the universal time schedule, successfully verifying the time; if the current time is not within the allowed time period of the universal schedule, the time validation fails.
When the time verification of the time verification module is successful, the identity verification module can acquire the identity verification information input by the user, wherein the identity verification information can be fingerprint information, voiceprint information, face picture information and the like, the identity verification information input by the user is verified, namely the identity verification information input by the user is compared with prestored personnel information, if the identity verification information input by the user is the same as the prestored personnel information of any one person, the identity verification is successful, an unlocking instruction is generated under the conditions that the time verification is successful and the identity verification is successful, and the unlocking instruction is issued to the access control, and the access control controls the intelligent door lock to execute the unlocking action according to the unlocking instruction. If any one of the time verification and the identity verification cannot pass, the door lock cannot be unlocked.
The user can enter the authentication information immediately after awakening the access control system, and does not need to wait for the authentication to pass and then enter, so that the use experience of the user is improved. When the door lock system fails to unlock, the time verification failure and/or the identity verification failure prompt is displayed in a display module of the access control system so as to prompt a user of the reason of the unlocking verification failure.
EXAMPLE III
The embodiment provides an electronic device, which comprises a processor, a memory and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the computer program to realize the nested access control access time processing method in the first embodiment; in addition, the present embodiment also provides a storage medium, on which a computer program is stored, and when the computer program is executed, the nested-based access control entry and exit time processing method is implemented.
The apparatus and the storage medium in this embodiment are based on two aspects of the same inventive concept, and the method implementation process has been described in detail in the foregoing, so that those skilled in the art can clearly understand the structure and implementation process of the system in this embodiment according to the foregoing description, and for the sake of brevity of the description, details are not repeated here. The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (9)
1. A nested access control access time processing method is applied to an access control system and comprises the following steps:
obtaining a current time in response to a time validation requirement;
acquiring a general time table related to the access control, judging whether the general time table is related to a priority time table or not, and if so, comparing the current time with an allowable time range corresponding to the priority time table to output a time verification result; if the priority schedule is not associated, the current time is compared with the allowed time range in the general schedule to output a time verification result.
2. The nested-based access control entry and exit time processing method of claim 1, wherein the time validation requirement is generated by waking up the access control system.
3. The nested-based access control entry and exit time processing method according to claim 1, wherein the current time is obtained by obtaining a local clock of the access control system, and the access control system corrects the local clock when networking.
4. The nesting-based entrance guard entry and exit time processing method according to claim 1, wherein the priority schedule and the general schedule are each provided with a schedule ID and an allowable time range corresponding thereto, and the priority schedule and the general schedule are associated by the schedule ID.
5. The nested-based entrance guard entry and exit time processing method according to claim 1, wherein when the time verification result is that the current time is not within the allowable time range of the priority schedule or the universal schedule, an alarm prompt is directly initiated.
6. The nesting-based entrance guard access time processing method according to claim 1, wherein when the time verification result indicates that the current time is not within the allowable time range of the priority schedule or the general schedule, the allowable time closest to the current time in the priority schedule or the general schedule is called and displayed.
7. An access control system, comprising:
the time verification module executes the nested access control entrance and exit time processing method according to any one of claims 1 to 6;
and the authentication module is used for acquiring the input authentication information when the time authentication is successful, authenticating the authentication information and generating an unlocking instruction to control the access control system to execute an unlocking action when the authentication is successful.
8. An electronic device, comprising a processor, a memory, and a computer program stored in the memory and executable on the processor, wherein the processor implements the nested access time processing method according to any one of claims 1 to 6 when executing the computer program.
9. A storage medium having a computer program stored thereon, wherein the computer program is executed to implement the nesting-based entrance guard entry and exit time processing method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110974580.4A CN113763617A (en) | 2021-08-24 | 2021-08-24 | Entrance guard entrance and exit time processing method based on nesting and entrance guard system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110974580.4A CN113763617A (en) | 2021-08-24 | 2021-08-24 | Entrance guard entrance and exit time processing method based on nesting and entrance guard system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113763617A true CN113763617A (en) | 2021-12-07 |
Family
ID=78790997
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110974580.4A Pending CN113763617A (en) | 2021-08-24 | 2021-08-24 | Entrance guard entrance and exit time processing method based on nesting and entrance guard system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113763617A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115359593A (en) * | 2022-07-11 | 2022-11-18 | 北京燕山电子设备厂 | Access control management method, system, electronic device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466148A (en) * | 2008-12-30 | 2009-06-24 | 福建先创电子有限公司 | Method for scheduling carrier of carrier pool discharging-directly machine |
CN109191631A (en) * | 2018-08-08 | 2019-01-11 | 北京猎户星空科技有限公司 | Control method, device and the electronic equipment that gate inhibition opens |
CN109697779A (en) * | 2018-12-27 | 2019-04-30 | 厦门中控智慧信息技术有限公司 | A kind of access control method and relevant apparatus |
CN110046059A (en) * | 2019-04-15 | 2019-07-23 | 联芸科技(杭州)有限公司 | Read control device, reading and control method thereof and controller for memory |
CN111479272A (en) * | 2020-04-16 | 2020-07-31 | 广东好太太科技集团股份有限公司 | Method, equipment and storage medium for automatically connecting AP (Access Point) hotspots according to priorities |
CN111899381A (en) * | 2020-07-13 | 2020-11-06 | 珠海格力电器股份有限公司 | Unlocking verification method and device, door lock, door lock system and storage medium |
-
2021
- 2021-08-24 CN CN202110974580.4A patent/CN113763617A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101466148A (en) * | 2008-12-30 | 2009-06-24 | 福建先创电子有限公司 | Method for scheduling carrier of carrier pool discharging-directly machine |
CN109191631A (en) * | 2018-08-08 | 2019-01-11 | 北京猎户星空科技有限公司 | Control method, device and the electronic equipment that gate inhibition opens |
CN109697779A (en) * | 2018-12-27 | 2019-04-30 | 厦门中控智慧信息技术有限公司 | A kind of access control method and relevant apparatus |
CN110046059A (en) * | 2019-04-15 | 2019-07-23 | 联芸科技(杭州)有限公司 | Read control device, reading and control method thereof and controller for memory |
CN111479272A (en) * | 2020-04-16 | 2020-07-31 | 广东好太太科技集团股份有限公司 | Method, equipment and storage medium for automatically connecting AP (Access Point) hotspots according to priorities |
CN111899381A (en) * | 2020-07-13 | 2020-11-06 | 珠海格力电器股份有限公司 | Unlocking verification method and device, door lock, door lock system and storage medium |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115359593A (en) * | 2022-07-11 | 2022-11-18 | 北京燕山电子设备厂 | Access control management method, system, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7222361B2 (en) | Computer security with local and remote authentication | |
US20190147672A1 (en) | Systems and methods for multifactor physical authentication | |
US8756704B2 (en) | User impersonation and authentication | |
US20180046988A1 (en) | Method and system for reporting and monitoring location-related activities of mobile devices | |
US20190068588A1 (en) | Authentication system | |
US10096182B2 (en) | Using a light up feature of a mobile device to trigger door access | |
US10063540B2 (en) | Trusted status transfer between associated devices | |
US20150106150A1 (en) | System and method for managing event participant authorizations | |
US11594092B2 (en) | Multi-site building access using mobile credentials | |
US8087070B2 (en) | Predictive method for multi-party strengthening of authentication credentials with non-real time synchronization | |
US9032507B2 (en) | Access request authentication and authorization information generation | |
CN113763617A (en) | Entrance guard entrance and exit time processing method based on nesting and entrance guard system | |
US20190311303A1 (en) | System and method for credentialing access to restricted rooms | |
WO2022193615A1 (en) | Method and apparatus for deleting digital key, and device, system and storage medium | |
CN110517372B (en) | Biological characteristic information processing method and device | |
US10091177B1 (en) | Controlling access to a computerized resource of a mobile device based on whether the mobile device is within a vehicle that is currently moving | |
CN110796273A (en) | Conference management method, intelligent lock and conference management system | |
US9762570B2 (en) | Information processing system, information processing method and computer readable recording medium stored a program | |
CN109684791B (en) | Software protection method and device | |
JP2018173923A (en) | Terminal device, gate control method, gate control program and gate control system | |
CN112182521A (en) | Real estate right dynamic information query method, integrated platform and storage medium | |
WO2018095184A1 (en) | Data interaction method and system | |
JP2010095918A (en) | Expiration date renewal device, room entrance/exit control device and room entrance/exit management system | |
US20210319638A1 (en) | Information processing apparatus, information processing system, information processing method, and non-transitory storage medium | |
JP5086142B2 (en) | Authentication system, authentication method, and program executed by computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |