CN113838228A - Command issuing method and device applied to access control management system and storage medium - Google Patents
Command issuing method and device applied to access control management system and storage medium Download PDFInfo
- Publication number
- CN113838228A CN113838228A CN202110974613.5A CN202110974613A CN113838228A CN 113838228 A CN113838228 A CN 113838228A CN 202110974613 A CN202110974613 A CN 202110974613A CN 113838228 A CN113838228 A CN 113838228A
- Authority
- CN
- China
- Prior art keywords
- authorized
- user
- access control
- command issuing
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000013475 authorization Methods 0.000 claims abstract description 84
- 238000004590 computer program Methods 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The invention discloses a command issuing method applied to an access control management system, which comprises the steps of obtaining authority data of a user to be authorized; the authority data is used for identifying the authority owned by the user to be authorized; analyzing the authority data of the user to be authorized to obtain a door point to be authorized by the user to be authorized; and inquiring to obtain bound target equipment according to the door points to be authorized by the user to be authorized, generating corresponding authorization commands according to each target equipment, and respectively issuing the authorization commands to the corresponding target equipment. The invention can solve the problems of multiple operation steps, long operation time, large workload and the like when system operators issue user authorization in the existing access control management system. The invention also discloses a command issuing device and a storage medium applied to the access control management system.
Description
Technical Field
The invention relates to an intelligent access control system, in particular to a command issuing method, a device and a storage medium applied to the access control system.
Background
In order to ensure the safety of an area, for example, communities, buildings and the like are provided with access controllers at the access points, and the access controllers are used for controlling the opening and closing of the access. For an area, there may be a plurality of entrances and exits, and the access controllers of the plurality of entrances and exits are generally managed by an intelligent access management system. That is, an intelligent access control system can connect a plurality of access control units, and corresponding access control unit is issued through with authorization information to make access control unit match received information and authorization information and control opening of entrance guard.
When authorizing a user, generally, a system operator issues authorization information to an access controller according to the access controller authorized by the user, and the issuing of the authorization information of the user is completed. However, since there may be more than one authorized access controller for each user, especially for some large-scale cells, the number of access controllers is huge, and the number of access controllers to be authorized for one user is large, so that an operator needs to query the access controller to be authorized for each user first, and then sequentially send the authorization information to the corresponding access controllers. When the number of the access controllers needing to be authorized is large, the workload of system operators is increased, and meanwhile, the time of authorized operation is greatly prolonged, so that the user experience is not facilitated.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide an authorization command issuing method applied to an access control management system, which can solve the problems of complicated operation steps, long operation time, and the like of the existing access control authorization command issuing method.
The invention also aims to provide an authorization command issuing device applied to an access control management system, which can solve the problems of complicated operation steps, long operation time and the like of issuing the existing access control authorization command. The invention also aims to provide a storage medium, which can solve the problems of complex operation steps, long operation time and the like of issuing the existing access control authorization command.
One of the purposes of the invention is realized by adopting the following technical scheme:
the command issuing method applied to the access control management system comprises the following steps:
a data acquisition step: obtaining authorization information of a user to be authorized; the authorization information comprises authority data and user information; the permission data refers to the permission of the user to be authorized in the entrance guard management system and is used for identifying the entrance guard of the entrance and exit allowing the user to be authorized to pass;
and (3) analyzing: analyzing the authority data of the user to be authorized to obtain all door points to be authorized by the user to be authorized; each door point corresponds to one door control;
query and command issuing step: and inquiring to obtain one or more target devices bound by each gate point according to all gate points to be authorized by the user to be authorized, generating an authorization command which can be identified by the corresponding target device according to the device information and the authorization information of each target device, and issuing the authorization command to the corresponding target device.
Further, before the analyzing the authority data of the user to be authorized in the analyzing step, the method further includes: and carrying out validity verification on the authority data of the user to be authorized.
And further, judging whether each target device has a sub-target device, if so, issuing an authorization command corresponding to the target device, and simultaneously issuing the authorization command to the sub-target device corresponding to the target device.
Further, the target device includes a target control device and a target recognition device; the target control equipment is used for realizing access control equipment in an access control management system; the target identification device is used for receiving the terminal device identified by the user information.
Further, the target recognition device includes a face recognition device, a fingerprint recognition device, a card recognition device, a password input device, and a combination of the above devices.
Further, the authority data comprises an authority group, the authority group comprises a group of authorities, and each authority comprises an entrance area, an exit area and a time schedule of one door point; the time table is used for identifying the time distribution of the user to be authorized, which is allowed to enter and exit at the corresponding gate point; the entrance area and the exit area are respectively used for identifying the entrance and exit directions allowed by the user to be authorized at the corresponding door points.
Further, the analyzing step specifically includes: and analyzing the authority data of the user to be authorized to obtain multiple groups of authorities of the user to be authorized, obtaining the area to be authorized by the user to be authorized according to each group of authorities, and searching and obtaining all door points to be authorized by the user to be authorized according to the area to be authorized, obtained by each group of authorities, to be authorized by the user to be authorized.
Further, the data acquiring step further comprises: obtaining an authorization file, analyzing the authorization file to obtain one or more users to be authorized and authorization information of each user to be authorized, and then executing an analysis step on each user to be authorized.
The second purpose of the invention is realized by adopting the following technical scheme:
an electronic device comprises a memory, a processor and a computer program stored on the memory and running on the processor, wherein the computer program is a command issuing program, and when the processor executes the command issuing program, the steps of the command issuing method applied to the access control management system are realized.
The third purpose of the invention is realized by adopting the following technical scheme:
a computer-readable storage medium on which a computer program is stored, the computer program being a command issuing program which, when executed by a processor, implements the steps of a command issuing method applied to an access control management system as one of the objects of the present invention.
Compared with the prior art, the invention has the beneficial effects that:
according to the invention, the access control to be authorized by the user is identified according to the authority data of the user, then the corresponding target equipment bound by the access control is inquired, and finally the generated authorization command is issued to the corresponding target equipment, so that the automatic issuing of the authorization command is realized, and the problems that in the prior art, the system operator needs to firstly obtain the target equipment to be authorized by the user and then issues the generated authorization command to the corresponding target equipment respectively, so that the operation steps are complicated, the operation is complex, the issuing operation time of the authorization command is long, and the like are solved.
Drawings
Fig. 1 is a flowchart of an authorization command issuing method applied to an access control system according to the present invention;
fig. 2 is a block diagram of an authorization command issuing device applied to an access control system according to the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
According to the invention, a system operator does not need to know the target equipment for access control which needs to be authorized by the user to be authorized in advance, the corresponding target equipment is obtained only by analyzing and calculating the authority data of the user and then the generated authorization command is automatically issued to the corresponding target equipment, so that the access control authorization of the user is completed.
The invention provides a preferred embodiment, which is applied to a command issuing method of an access control management system, and as shown in fig. 1, the method comprises the following steps:
and step S1, obtaining the authorization information of the user to be authorized.
The authorization information comprises user information and user authority data. The user authority data refers to related data for identifying the passage-allowed entrance and exit of the user to be authorized. For example, for an access control, a user can pass, which indicates that the user has the right; and when the user cannot pass, no authority is represented. The user authority data can be set according to the authority of a building, a community, a cell or a passage where the user lives.
And step S2, analyzing the authority data of the user to be authorized to obtain all the gate points to be authorized by the user to be authorized.
For example, for a small area, a community or a building, a plurality of entrance/exit doors, such as a people communication entrance/exit door, a vehicle communication entrance/exit door, may be provided at an entrance/exit through which a user can pass.
The door point in this embodiment corresponds to the entrance guard of the entrance/exit. One doorway includes a plurality of doors. Every entrance guard all corresponds only access & exit.
Therefore, all the access points, namely all the accesses, which need to be authorized by the user to be authorized can be obtained when the authority data of the user to be authorized is analyzed.
Step S3, obtaining the target device bound by each gate point according to the query of each gate point authorized by the user to be authorized, and generating an authorization command that can be recognized by the corresponding target device according to the device information and the authorization information of each target device, and then issuing the authorization command to the corresponding target device.
For one door control, there are various door opening modes, such as fingerprint, password, face, switch, infrared, etc., and there are also various door control opening or closing modes, so that there may be more than one target device bound to one door point. Therefore, after the door points to be authorized by the user to be authorized are found, the target equipment bound by the corresponding door points is found according to each door point, and thus, the generated authorization command can be issued to the corresponding target equipment to finish authorization.
Preferably, the target device in this embodiment includes a target control device and a target recognition device. The target control device is a controller device for controlling an entrance guard switch. The object identification device is an identification device for identifying unlocking information. Specifically, the object recognition device may include a fingerprint recognition device, a password input device, a face recognition device, a card recognition device, an infrared recognition device, a combination of the above devices, and the like. That is, the target identification device bound to one gate point may be a single target identification device, or may be an all-in-one device integrating multiple functions.
More preferably, the authority data in the present embodiment includes an authority group. Each permission group includes a set of permissions, each permission including a pair of regions and a schedule. The schedule is used for identifying the time distribution that the user can be allowed to pass through, and can be set into a plurality of time periods or set according to the default time of the system.
The two areas are respectively an entrance area and an exit area and are used for identifying the entrance and exit directions of the entrance guard which the user can be allowed to pass through. The entering of the area means that a user can be allowed to enter the entrance guard and the entrance guard needs to enter the entrance guard at the moment; and out of the area means that the user can be allowed to get out of the door. Generally, a door has two directions of entrance and exit, and thus the entrance and exit directions of the door are indicated by setting an entrance area and an exit area. In the system, each entrance guard is bound with the own region to form a corresponding relation.
Further, step S3 further includes: and analyzing the authority data of the user to be authorized to obtain multiple groups of authorities of the user to be authorized, obtaining the area to be authorized by the user to be authorized according to each group of authorities, and searching and obtaining all door points to be authorized by the user to be authorized according to the area to be authorized, obtained by each group of authorities, to be authorized by the user to be authorized.
More preferably, step S1 in this embodiment further includes: obtaining the authorization file, analyzing to obtain one or more users to be authorized and authorization information of each authorized user according to the authorization file, and then sequentially executing steps S2-S3 for each authorized user. That is, the invention can issue the authorization commands of a plurality of users to be authorized at one time. The system operator can store the authorization information of a plurality of users needing authorization through files with corresponding formats and then upload the authorization information to the system, the system can issue an authorization command to each user to be authorized in the authorization files, large-batch user authorization is realized, and the system operator reduces the workload.
In the process of generating and issuing the authorization command of the user, the system operator does not need to obtain the target equipment to be authorized in advance, and the authorization information of the user to be authorized is directly uploaded to realize the issuing of the authorization command.
In the using process, a front-end operation interactive interface is provided for a system operator, so that the system operator can upload the authority data of a user to be authorized or an authorization file comprising the authority data of the user to be authorized to automatically issue an authorization command, the process does not need the intervention of the system operator, and the problems that in the prior art, the operation steps are complicated, the authorization operation time is long and the like caused by the fact that the system operator needs to obtain target equipment for issuing the command in advance and then issues the authorization command to the corresponding target equipment in sequence are solved.
Example two
The invention provides a command issuing device applied to an access control management system. As shown in fig. 2, an internal structure diagram of a command issuing device applied to an access control system according to an embodiment of the present invention is provided.
In this embodiment, the command issuing device applied to the access control system may be a PC (Personal Computer), or may be a terminal device such as a smartphone, a tablet Computer, or a mobile Computer. The command issuing device applied to the access control management system at least comprises: a processor 12, a communication bus 13, a network interface 14, and a memory 11.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may be an internal storage unit of a command issuing device applied to an access control system, for example, a hard disk of the command issuing device applied to the access control system in some embodiments. The memory 11 may also be an external storage device applied to a command issuing device of the access control system in other embodiments, for example, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the command issuing device applied to the access control system. Further, the memory 11 may include both an internal storage unit and an external storage device of a command issuing apparatus applied to an access control system. The memory 11 may be used not only to store application software installed in a command issuing device applied to an access control system and various types of data, such as codes of a command issuing program, but also to temporarily store data that has been output or is to be output.
The processor 12 may be a Central Processing Unit (CPU), a controller, a microcontroller, a microprocessor or other data Processing chip in some embodiments, and is used for executing program codes stored in the memory 11 or Processing data, such as executing a command issuing program.
The communication bus 13 is used to realize connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (such as a WI-FI interface), and is generally used to establish a communication connection between the command issuing device applied to the door access management system and other electronic devices.
Optionally, the command issuing device applied to the access control system may further include a user interface, where the user interface may include a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further include a standard wired interface and a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is used to display information processed in the device under command applied to the access control system and to display a visual user interface.
Fig. 2 shows only a command issuing device applied to an access control system having components 11 to 14 and a command issuing program, and it will be understood by those skilled in the art that the structure shown in fig. 2 does not constitute a limitation of the command issuing device applied to the access control system, and may include fewer or more components than those shown, or some components in combination, or a different arrangement of components.
In the embodiment of the command issuing device applied to the access control system shown in fig. 2, a command issuing program is stored in the memory 11; the processor 12 implements the following steps when executing the command issuing program stored in the memory 11:
a data acquisition step: obtaining authorization information of a user to be authorized; the authorization information comprises authority data and user information; the permission data refers to the permission of the user to be authorized in the entrance guard management system and is used for identifying the entrance guard of the entrance and exit allowing the user to be authorized to pass;
and (3) analyzing: analyzing the authority data of the user to be authorized to obtain all door points to be authorized by the user to be authorized; each door point corresponds to one door control;
query and command issuing step: and inquiring to obtain one or more target devices bound by each gate point according to all gate points to be authorized by the user to be authorized, generating an authorization command which can be identified by the corresponding target device according to the device information and the authorization information of each target device, and issuing the authorization command to the corresponding target device.
Further, before the analyzing the authority data of the user to be authorized in the analyzing step, the method further includes: and carrying out validity verification on the authority data of the user to be authorized.
And further, judging whether each target device has a sub-target device, if so, issuing an authorization command corresponding to the target device, and simultaneously issuing the authorization command to the sub-target device corresponding to the target device.
Further, the target device includes a target control device and a target recognition device; the target control equipment is used for realizing access control equipment in an access control management system; the target identification device is used for receiving the terminal device identified by the user information.
Further, the target recognition device includes a face recognition device, a fingerprint recognition device, a card recognition device, a password input device, and a combination of the above devices.
Further, the authority data comprises an authority group, the authority group comprises a group of authorities, and each authority comprises an entrance area, an exit area and a time schedule of one door point; the time table is used for identifying the time distribution of the user to be authorized, which is allowed to enter and exit at the corresponding gate point; the entrance area and the exit area are respectively used for identifying the entrance and exit directions allowed by the user to be authorized at the corresponding door points.
Further, the analyzing step specifically includes: and analyzing the authority data of the user to be authorized to obtain multiple groups of authorities of the user to be authorized, obtaining the area to be authorized by the user to be authorized according to each group of authorities, and searching and obtaining all door points to be authorized by the user to be authorized according to the area to be authorized, obtained by each group of authorities, to be authorized by the user to be authorized.
Further, the data acquiring step further comprises: obtaining an authorization file, analyzing the authorization file to obtain one or more users to be authorized and authorization information of each user to be authorized, and then executing an analysis step on each user to be authorized.
EXAMPLE III
Based on the second embodiment provided by the present invention, the present invention further provides an embodiment, which is a storage medium, where the storage medium is a computer-readable storage medium, and a computer program is stored on the storage medium, where the computer program is a command issuing program, and when the command issuing program is executed by a processor, the following steps are implemented:
a data acquisition step: obtaining authorization information of a user to be authorized; the authorization information comprises authority data and user information; the permission data refers to the permission of the user to be authorized in the entrance guard management system and is used for identifying the entrance guard of the entrance and exit allowing the user to be authorized to pass;
and (3) analyzing: analyzing the authority data of the user to be authorized to obtain all door points to be authorized by the user to be authorized; each door point corresponds to one door control;
query and command issuing step: and inquiring to obtain one or more target devices bound by each gate point according to all gate points to be authorized by the user to be authorized, generating an authorization command which can be identified by the corresponding target device according to the device information and the authorization information of each target device, and issuing the authorization command to the corresponding target device.
Further, before the analyzing the authority data of the user to be authorized in the analyzing step, the method further includes: and carrying out validity verification on the authority data of the user to be authorized.
And further, judging whether each target device has a sub-target device, if so, issuing an authorization command corresponding to the target device, and simultaneously issuing the authorization command to the sub-target device corresponding to the target device.
Further, the target device includes a target control device and a target recognition device; the target control equipment is used for realizing access control equipment in an access control management system; the target identification device is used for receiving the terminal device identified by the user information.
Further, the target recognition device includes a face recognition device, a fingerprint recognition device, a card recognition device, a password input device, and a combination of the above devices.
Further, the authority data comprises an authority group, the authority group comprises a group of authorities, and each authority comprises an entrance area, an exit area and a time schedule of one door point; the time table is used for identifying the time distribution of the user to be authorized, which is allowed to enter and exit at the corresponding gate point; the entrance area and the exit area are respectively used for identifying the entrance and exit directions allowed by the user to be authorized at the corresponding door points.
Further, the analyzing step specifically includes: and analyzing the authority data of the user to be authorized to obtain multiple groups of authorities of the user to be authorized, obtaining the area to be authorized by the user to be authorized according to each group of authorities, and searching and obtaining all door points to be authorized by the user to be authorized according to the area to be authorized, obtained by each group of authorities, to be authorized by the user to be authorized.
Further, the data acquiring step further comprises: obtaining an authorization file, analyzing the authorization file to obtain one or more users to be authorized and authorization information of each user to be authorized, and then executing an analysis step on each user to be authorized.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.
Claims (10)
1. The command issuing method applied to the access control management system is characterized by comprising the following steps of:
a data acquisition step: obtaining authorization information of a user to be authorized; the authorization information comprises authority data and user information; the permission data refers to the permission of the user to be authorized in the entrance guard management system and is used for identifying the entrance guard of the entrance and exit allowing the user to be authorized to pass;
and (3) analyzing: analyzing the authority data of the user to be authorized to obtain all door points to be authorized by the user to be authorized; each door point corresponds to one door control;
query and command issuing step: and inquiring to obtain one or more target devices bound by each gate point according to all gate points to be authorized by the user to be authorized, generating an authorization command which can be identified by the corresponding target device according to the device information and the authorization information of each target device, and issuing the authorization command to the corresponding target device.
2. The command issuing method applied to the access control management system according to claim 1, wherein before the analyzing the permission data of the user to be authorized in the analyzing step, the method further comprises: and carrying out validity verification on the authority data of the user to be authorized.
3. The command issuing method applied to the access control management system according to claim 1, wherein it is determined whether each target device has a sub-target device, and if yes, the authorization command corresponding to the target device is issued to the target device and is also issued to the sub-target device corresponding to the target device.
4. The command issuing method applied to the access control system according to claim 1, wherein the target device includes a target control device and a target recognition device; the target control equipment is used for realizing access control equipment in an access control management system; the target identification device is used for receiving the terminal device identified by the user information.
5. The command issuing method applied to the access control system according to claim 4, wherein the target recognition device comprises a face recognition device, a fingerprint recognition device, a card recognition device, a password input device, and a combination of the above devices.
6. The command issuing method applied to the access control management system according to claim 1, wherein the authority data includes an authority group, the authority group includes a set of authorities, each authority includes an entry area, an exit area and a schedule of a door point; the time table is used for identifying the time distribution of the user to be authorized, which is allowed to enter and exit at the corresponding gate point; the entrance area and the exit area are respectively used for identifying the entrance and exit directions allowed by the user to be authorized at the corresponding door points.
7. The command issuing method applied to the access control management system according to claim 6, wherein the analyzing step specifically comprises: and analyzing the authority data of the user to be authorized to obtain multiple groups of authorities of the user to be authorized, obtaining the area to be authorized by the user to be authorized according to each group of authorities, and searching and obtaining all door points to be authorized by the user to be authorized according to the area to be authorized, obtained by each group of authorities, to be authorized by the user to be authorized.
8. The method of claim 1, wherein the data obtaining step further comprises: obtaining an authorization file, analyzing the authorization file to obtain one or more users to be authorized and authorization information of each user to be authorized, and then executing an analysis step on each user to be authorized.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and running on the processor, the computer program being a command issuing program, characterized in that: the processor implements the steps of the command issuing method applied to the access control management system according to any one of claims 1 to 8 when executing the command issuing program.
10. A computer-readable storage medium having stored thereon a computer program, the computer program being a command issuing program, characterized in that: the command issuing program, when executed by the processor, implements the steps of the command issuing method applied to the access control management system of any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110974613.5A CN113838228A (en) | 2021-08-24 | 2021-08-24 | Command issuing method and device applied to access control management system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110974613.5A CN113838228A (en) | 2021-08-24 | 2021-08-24 | Command issuing method and device applied to access control management system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113838228A true CN113838228A (en) | 2021-12-24 |
Family
ID=78961127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110974613.5A Pending CN113838228A (en) | 2021-08-24 | 2021-08-24 | Command issuing method and device applied to access control management system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113838228A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114863595A (en) * | 2022-04-13 | 2022-08-05 | 北京声智科技有限公司 | User right verification method and device, electronic equipment and storage medium |
CN115240308A (en) * | 2022-09-26 | 2022-10-25 | 深圳市极致科技股份有限公司 | Access control machine authorization method, device and system, access control machine and computer storage medium |
CN116012013A (en) * | 2022-12-16 | 2023-04-25 | 广州市瑞立德信息系统有限公司 | System, method and storage medium for preventing repeated payment of integrated ticket box |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108492412A (en) * | 2018-03-14 | 2018-09-04 | 郑州工程技术学院 | A kind of management method of intelligent building, apparatus and system |
CN110276872A (en) * | 2019-06-27 | 2019-09-24 | 绿漫科技有限公司 | A kind of gate inhibition's automatic authorization method based on recognition of face |
CN112907801A (en) * | 2021-03-12 | 2021-06-04 | 珠海大横琴科技发展有限公司 | Access control management method and device, electronic equipment and storage medium |
CN113053006A (en) * | 2021-03-10 | 2021-06-29 | 神州数码融信云技术服务有限公司 | Real-time access control dynamic authorization management system of data center |
-
2021
- 2021-08-24 CN CN202110974613.5A patent/CN113838228A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108492412A (en) * | 2018-03-14 | 2018-09-04 | 郑州工程技术学院 | A kind of management method of intelligent building, apparatus and system |
CN110276872A (en) * | 2019-06-27 | 2019-09-24 | 绿漫科技有限公司 | A kind of gate inhibition's automatic authorization method based on recognition of face |
CN113053006A (en) * | 2021-03-10 | 2021-06-29 | 神州数码融信云技术服务有限公司 | Real-time access control dynamic authorization management system of data center |
CN112907801A (en) * | 2021-03-12 | 2021-06-04 | 珠海大横琴科技发展有限公司 | Access control management method and device, electronic equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
王公儒: "出入口控制系统工程实用技术", 中国铁道出版社有限公司, pages: 16 - 20 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114863595A (en) * | 2022-04-13 | 2022-08-05 | 北京声智科技有限公司 | User right verification method and device, electronic equipment and storage medium |
CN115240308A (en) * | 2022-09-26 | 2022-10-25 | 深圳市极致科技股份有限公司 | Access control machine authorization method, device and system, access control machine and computer storage medium |
CN116012013A (en) * | 2022-12-16 | 2023-04-25 | 广州市瑞立德信息系统有限公司 | System, method and storage medium for preventing repeated payment of integrated ticket box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113838228A (en) | Command issuing method and device applied to access control management system and storage medium | |
AU2016273888B2 (en) | Controlling physical access to secure areas via client devices in a networked environment | |
US20200394342A1 (en) | System and method for administering physical security access to components of a process control system | |
CN107578519A (en) | A kind of intelligent access control system and intelligent entrance guard method for unlocking | |
CN106327649A (en) | Two-dimensional code based access control system and door opening method | |
US10783338B2 (en) | Integrated access control system | |
CN106204866A (en) | A kind of gate control system based on Quick Response Code and door opening method | |
CN105378648A (en) | Self-provisioning access control | |
CN103825745B (en) | The method and system being authenticated to user are closed based on Home IOT clouds | |
CN105574968A (en) | Intelligent building visitor system | |
CN111459439B (en) | Information display method, intelligent home server and storage medium | |
CN106327647A (en) | Remotely controlled access control system | |
CN112907801A (en) | Access control management method and device, electronic equipment and storage medium | |
CN112738477A (en) | Security monitoring system | |
CN112307444A (en) | Role creation method, role creation device, computer equipment and storage medium | |
CN110675534A (en) | Visitor talkback access control system and use method thereof | |
CN114360118A (en) | Access control system based on block chain and processing method | |
CN112785766B (en) | Access control permission distribution authorization method based on block chain | |
US11869293B2 (en) | Building control systems | |
CN213659528U (en) | Multi-feature finger vein biological data recognition device and system | |
CN112163206A (en) | Data permission setting method and device, computer equipment and storage medium | |
CN106815910A (en) | Access control management method and gate control system | |
CN106296948A (en) | Gate control system based on GPS location and door opening method | |
CN107295041A (en) | Intelligent entrance guard management method, apparatus and system | |
CN114553474B (en) | Access control permission control method and device based on Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |