CN114038101A - Visitor authorization method, device and system - Google Patents
Visitor authorization method, device and system Download PDFInfo
- Publication number
- CN114038101A CN114038101A CN202111338468.8A CN202111338468A CN114038101A CN 114038101 A CN114038101 A CN 114038101A CN 202111338468 A CN202111338468 A CN 202111338468A CN 114038101 A CN114038101 A CN 114038101A
- Authority
- CN
- China
- Prior art keywords
- entrance guard
- route
- determining
- transit
- visitor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 86
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000004590 computer program Methods 0.000 claims description 15
- 238000013459 approach Methods 0.000 claims description 3
- 230000005764 inhibitory process Effects 0.000 claims description 3
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 10
- 230000008859 change Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- 240000007594 Oryza sativa Species 0.000 description 1
- 235000007164 Oryza sativa Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000007670 refining Methods 0.000 description 1
- 235000009566 rice Nutrition 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The invention provides a visitor authorization method, a visitor authorization device and a visitor authorization system, belongs to the technical field of information safety, and can be applied to the technical field of finance or other technical fields. The visitor authorization method comprises the following steps: determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path; determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard; determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index; and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor. The invention can reduce the security risk of the authorization system.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a visitor authorization method, device and system.
Background
The park sets up physical entrance guard to key passage, place entry in order to guard against the security risk, authorizes to having the right to lead to personnel. The control of access generally assumes a level of control, i.e. authorized persons are allowed to pass a certain level or several levels of access. However, such setting flexibility is poor, when temporarily granting access rights to a designated place, the access rights of a target place and all the access rights on a passing route cannot be set singly, and access restrictions to unrelated places are weak, so that certain safety risks exist.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a visitor authorization method, a visitor authorization device and a visitor authorization system so as to reduce the security risk of an authorization system.
In order to achieve the above object, an embodiment of the present invention provides a guest authorization method, including:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
In one embodiment, the method further comprises the following steps: and determining historical access control according to the starting place, the destination place and the visitor permission.
In one embodiment, the determining the transit entrance guard according to the historical transit times of the historical approach entrance guard includes:
sequencing the historical passing times in a descending order;
and determining the historical access control corresponding to the historical passing times before the passing threshold as the transit access control.
In one embodiment, determining the route to be selected corresponding to each transit entrance guard according to the starting location, the destination location and the location of the transit entrance guard includes:
determining a corresponding front section route according to the starting place and the place of the transit entrance guard;
determining a corresponding back-end route according to the destination point and the transit entrance guard point;
and determining a route to be selected according to the front section route and the rear section route.
In one embodiment, the method further comprises the following steps:
and determining the route corresponding to the route to be selected according to the distance between the gate inhibition in the route to be selected.
In one embodiment, the method further comprises the following steps:
and determining the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
The embodiment of the invention also provides a visitor authorization device, which comprises:
the transit entrance guard determining module is used for determining transit entrance guard according to the historical passing times of the entrance guard in the historical path;
the route module to be selected is used for determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
the path index module is used for determining the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and the certificate generation module is used for determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard and sending the authority certificate to the mobile phone client held by the visitor.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program stored on the memory and running on the processor, wherein the steps of the visitor authorization method are realized when the processor executes the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the guest authorization method.
The embodiment of the invention also provides a visitor authorization system, which comprises:
the guest authorization apparatus as described above;
and the mobile phone client is used for receiving the permission certificate from the visitor authorization device.
According to the visitor authorization method, the device and the system, the transit entrance guard is determined firstly to determine the corresponding to-be-selected route according to the location of the transit entrance guard, then the path index of each to-be-selected route is determined to determine the target entrance guard, finally the authority certificate of the target entrance guard is generated, and the authority certificate is sent to the mobile phone client held by the visitor to complete visitor authorization, so that the safety risk of an authorization system can be reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a guest authorization method in an embodiment of the present invention;
FIG. 2 is a flow diagram of a guest authorization method in another embodiment of the invention;
FIG. 3 is a flowchart of S102 in an embodiment of the present invention;
FIG. 4 is a block diagram of the structure of a guest authorization apparatus in an embodiment of the present invention;
FIG. 5 is a block diagram of a computer apparatus according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a guest authorization system in an embodiment of the invention;
FIG. 7 is a schematic diagram of a path change in an embodiment of the invention;
FIG. 8 is a flow chart after adjusting a visitor destination point in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
In view of the fact that the prior art has weak access restriction on unrelated places and has certain security risk, embodiments of the present invention provide a visitor authorization method and apparatus, which can reduce the security risk of an authorization system by refining access control management and a shortest path algorithm. The present invention will be described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a guest authorization method in an embodiment of the present invention. Fig. 2 is a flowchart of a guest authorization method in another embodiment of the invention. As shown in fig. 1-2, the guest authorization method includes:
s101: and determining the transit entrance guard according to the historical passing times of the entrance guard in the historical approach.
Before executing S101, the method further includes: and determining historical access control according to the starting place, the destination place and the visitor permission.
During specific implementation, the historical visitor path is retrieved according to the starting point and the destination point, the set of the entrance guards appearing on the historical visitor path is obtained, and the entrance guards which are forbidden to pass by the current visitors in the set are removed according to the visitor permissions to obtain the historical access guard.
TABLE 1
TABLE 2
Person ID | Name (I) | Level of security |
001 | Zhang San | 10 |
002 | Li Si | 4 |
…… | …… | …… |
TABLE 3
Person ID | Name (I) | Entrance guard forbidding |
001 | Zhang San | M004,M010 |
…… | …… | …… |
Table 1 is a schematic diagram of the access control level and location. Table 2 is a security level (guest permissions) schematic table. Table 3 is a notice table of people forbidding entrance guard. Registering all the access controls in the garden in the system, wherein each access control is assigned a unique ID, and the table 1 sets the minimum security level of the access control passing requirement and three-dimensional coordinates (X, Y and Z) of the access control relative to the center point of the garden in the garden; table 2 sets the security level that the visitor allows access, the higher the level, the greater the authority; table 3 sets the entrance guard ID for which the visitor prohibits passage, which is equivalent to a blacklist. And determining entrance guard forbidding access corresponding to the visitor (personnel) and entrance guard corresponding to the lowest pass level higher than the visitor authority as the entrance guard forbidding the current visitor to pass.
In one embodiment, S101 includes: sequencing the historical passing times in a descending order; and determining the historical access control corresponding to the historical passing times before the passing threshold as the transit access control. In specific implementation, the passing threshold may be 6, at this time, the first five sorted historical access accesses are taken out as transit accesses, and if the number of the former five sorted historical access accesses is less than five, the actual situation is the standard.
S102: and determining the route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard.
Before S102 is executed, all access control sets in the campus are obtained, and then the current access control which is forbidden by the visitor in all the access control sets is deleted according to the visitor permission, so that an access control set which is allowed to pass is obtained.
Fig. 3 is a flowchart of S102 in the embodiment of the present invention. As shown in fig. 3, S102 includes:
s201: and determining a corresponding front section route according to the starting place and the place of the transit entrance guard.
TABLE 4
ID1 | ID2 | Distance (rice) |
M001 | M002 | 1964.34 |
M003 | M001 | 746.21 |
…… |
Table 4 is a schematic representation of the access control relationship. As shown in table 4, the present invention establishes an association relationship between each door access that can be directly connected, and sets a communication path distance.
In specific implementation, the shortest path from the starting point to the point of the transit entrance guard can be determined by using an a-algorithm, a freouard algorithm or a dijkstra algorithm to serve as a front-end route. For example, the starting point, the point (three-dimensional coordinates) of the transit entrance in table 1, the three-dimensional coordinates of the set of allowed-to-pass entrances, and the entrance relationship representation table are input into the a-x algorithm model as input data of the a-x algorithm model, so as to obtain the front-stage route.
S202: and determining a corresponding back-end route according to the destination point and the transit entrance guard point.
In specific implementation, the shortest path from the transit entrance guard point to the destination point can be determined by using an A-algorithm, a Floerd algorithm or a Dijkstra algorithm to serve as a back-end route. For example, the destination point, the point (three-dimensional coordinates) of the transit entrance in table 1, the three-dimensional coordinates of the set of allowed-to-pass entrances, and the entrance relation representation table are input into the a-x algorithm model as input data of the a-x algorithm model, and the subsequent route is obtained.
S203: and determining a route to be selected according to the front section route and the rear section route.
And each route to be selected corresponds to the transit entrance guard one by one.
S103: and determining the path index of each route to be selected according to the corresponding route of each route to be selected and the entrance guard congestion index.
In specific implementation, the path index of the route to be selected can be determined by the following formula:
V=∑L/100×0.75+(∑T)2×0.25;
wherein, V is a path index, Sigma L is a route, and Sigma T is an entrance guard congestion index corresponding to the route to be selected.
Before executing S103, the method further includes:
1. and determining the route corresponding to the route to be selected according to the distance between the gate inhibition in the route to be selected.
In specific implementation, the distance between the gate guards in the route to be selected can be obtained according to the table 4, and further the sum of the distances between the gate guards in the route to be selected can be used as the distance sigma L corresponding to the route to be selected.
2. And determining the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
In specific implementation, the passing records of the entrance guards corresponding to the routes to be selected in the past 5 minutes can be inquired, and the real-time congestion index of each entrance guard is calculated.
For example, when the number of passes per minute is 0, the congestion index T is 1; when the passing times per minute are more than or equal to 30, the congestion index is 10; in the interval from 0 times to 30 times, the congestion index T is calculated according to the following formula:
t ═ a/30 × (10-1) + 1; wherein a is the number of passes per minute.
The entrance guard congestion index is the sum sigma T of the real-time congestion indexes of all entrance guards.
S104: and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
In specific implementation, the invention also records a visitor passing route scheme. Every entrance guard has all configured two-dimensional code and has swept a yard equipment, and visitor's authorization device reads visitor's two-dimensional code authority voucher information through sweeping yard equipment, judges whether contain current entrance guard in the visitor voucher relevant route. If the current entrance guard is contained, the current entrance guard is released, and if the current entrance guard is not contained, the current entrance guard is forbidden.
The execution subject of the guest authorization method shown in fig. 1 may be a computer. As can be seen from the flow shown in fig. 1, in the visitor authorization method according to the embodiment of the present invention, the transit access control is determined first to determine the corresponding to-be-selected route according to the location of the transit access control, then the path index of each to-be-selected route is determined to determine the target access control, and finally the permission credential of the target access control is generated and sent to the mobile phone client held by the visitor to complete visitor authorization, so that the security risk of the authorization system can be reduced.
Based on the same inventive concept, the embodiment of the invention also provides a visitor authorization device, and as the principle of solving the problem of the device is similar to that of a visitor authorization method, the implementation of the device can refer to the implementation of the method, and repeated parts are not described again.
Fig. 4 is a block diagram of a guest authorization apparatus in an embodiment of the present invention. As shown in fig. 4, the guest authorization apparatus includes:
the transit entrance guard determining module is used for determining transit entrance guard according to the historical passing times of the entrance guard in the historical path;
the route module to be selected is used for determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
the path index module is used for determining the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and the certificate generation module is used for determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard and sending the authority certificate to the mobile phone client held by the visitor.
To sum up, the visitor authorization device of the embodiment of the invention firstly determines the transit entrance guard to determine the corresponding to-be-selected route according to the location of the transit entrance guard, then determines the path index of each to-be-selected route to determine the target entrance guard, and finally generates the authority certificate of the target entrance guard, and sends the authority certificate to the mobile phone client held by the visitor to complete visitor authorization, so that the safety risk of the authorization system can be reduced.
The embodiment of the invention also provides a specific implementation mode of the computer equipment, which can realize all the steps in the visitor authorization method in the embodiment. Fig. 5 is a block diagram of a computer device in an embodiment of the present invention, and referring to fig. 5, the computer device specifically includes the following:
a processor (processor)501 and a memory (memory) 502.
The processor 501 is used to call the computer program in the memory 502, and the processor executes the computer program to implement all the steps of the guest authorization method in the above embodiments, for example, the processor executes the computer program to implement the following steps:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
To sum up, the computer device of the embodiment of the invention firstly determines the transit entrance guard to determine the corresponding to-be-selected route according to the location of the transit entrance guard, then determines the path index of each to-be-selected route to determine the target entrance guard, and finally generates the authority certificate of the target entrance guard, and sends the authority certificate to the mobile phone client held by the visitor to complete the visitor authorization, so that the safety risk of the authorization system can be reduced.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all steps in the guest authorization method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements all steps of the guest authorization method in the foregoing embodiment, for example, when the processor executes the computer program, the processor implements the following steps:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
To sum up, the computer-readable storage medium of the embodiment of the present invention first determines a transit entrance guard to determine a corresponding to-be-selected route according to a location of the transit entrance guard, then determines a path index of each to-be-selected route to determine a target entrance guard, and finally generates an authority credential of the target entrance guard, and sends the authority credential to a mobile phone client held by a visitor to complete visitor authorization, so as to reduce a security risk of an authorization system.
Based on the same inventive concept, the embodiment of the invention also provides a visitor authorization system, and as the problem solving principle of the system is similar to that of a visitor authorization method, the implementation of the system can refer to the implementation of the method, and repeated parts are not repeated.
Fig. 6 is a schematic diagram of a guest authorization system in an embodiment of the present invention. As shown in fig. 6, the guest authorization system includes:
the guest authorization apparatus as described above;
and the mobile phone client is used for receiving the permission certificate from the visitor authorization device.
Fig. 7 is a schematic diagram of a path change in an embodiment of the invention. As shown in fig. 7, the present invention can monitor and optimize the visitor path in real time. The visitor authorization device dynamically monitors validity and rationality of a visitor path scheme according to the change condition of starting and ending of an activity event in a campus, if the access permission on an access path is improved to be higher than the visitor permission, the planned path is invalid, a new path scheme is determined according to the development condition of the latest activity event, a permission certificate is generated according to a new target access, and the new permission certificate is pushed to a mobile phone client held by a visitor.
The invention can also remind and monitor visitors deviating from the path. As shown in fig. 2, if the visitor tries to pass through the unauthorized access control, the visitor authorization device will automatically push the prompt to remind the visitor of deviating from the path, and replan a new path scheme and update the visitor access control authorization by taking the current unauthorized access control as the starting point and the destination as the destination. If the number of times of the visitor trying to pass through the unauthorized access control exceeds 3 times, the visitor authorization device automatically gives an alarm to the administrator to prompt the administrator to pay attention to abnormal behaviors.
FIG. 8 is a flow chart of adjusting a visitor destination point in an embodiment of the present invention. As shown in fig. 8, when the visitor temporarily adjusts the destination, the visitor authorization apparatus automatically recovers all access permissions of the visitor, sets the visitor start position as the current location of the person, repeatedly plans a new path scheme, calculates the shortest path, and authorizes the visitor.
The specific process of the visitor authorization system of the embodiment of the invention is as follows:
1. the visitor authorization device determines historical access control according to the starting place, the destination place and the visitor permission.
2. And the visitor authorization device sorts the historical passage times of the historical passage door control in a descending order, and determines the historical passage door control corresponding to the historical passage times before the passage threshold as a transit door control.
3. And the visitor authorization device determines a corresponding front section route according to the starting place and the place of the transit entrance guard.
4. And the visitor authorization device determines a corresponding rear-section route according to the destination point and the transit entrance guard point.
5. The visitor authorization apparatus determines a route to be selected according to the front-stage route and the rear-stage route.
6. And the visitor authorization device determines the route corresponding to the route to be selected according to the distance between the gate guards in the route to be selected.
7. And the visitor authorization device determines the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
8. And the visitor authorization device determines the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index.
9. And the visitor authorization device determines the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generates an authority certificate of the target entrance guard, and sends the authority certificate to a mobile phone client held by the visitor.
10. The mobile phone client receives the permission certificate from the visitor authorization device.
In summary, the visitor authorization system of the embodiment of the invention has the following beneficial effects:
(1) fine-grained control of each access control authority allows positive passing control and negative forbidding control of visitors;
(2) the shortest access path is intelligently matched, access authority is granted according to the minimum principle, and irrelevant access control and no-permission access control are not granted, so that the safety risk is obviously reduced;
(3) flexibly adjusting the access destination and timely recovering unnecessary authority.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, or devices described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.
Claims (10)
1. A guest authorization method, comprising:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
2. The guest authorization method according to claim 1, further comprising:
and determining historical access control according to the starting place, the destination place and the visitor permission.
3. The guest authorization method of claim 1, wherein determining a transit gate based on historical transit times of a historic approach gate comprises:
sequencing the historical passing times in a descending order;
and determining the historical access control corresponding to the historical passing times before the passing threshold as the transit access control.
4. The guest authorization method according to claim 1, wherein determining the route to be selected corresponding to each transit gate according to the start location, the destination location and the location of the transit gate comprises:
determining a corresponding front section route according to the starting place and the place of the transit entrance guard;
determining a corresponding rear-section route according to the destination point and the transit entrance guard point;
and determining the route to be selected according to the front section route and the rear section route.
5. The guest authorization method according to claim 1, further comprising:
and determining the route corresponding to the route to be selected according to the distance between the gate inhibition in the route to be selected.
6. The guest authorization method according to claim 1, further comprising:
and determining the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
7. A guest authorization apparatus, comprising:
the transit entrance guard determining module is used for determining transit entrance guard according to the historical passing times of the entrance guard in the historical path;
the route module to be selected is used for determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
the path index module is used for determining the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and the certificate generation module is used for determining that the entrance guard on the route to be selected corresponding to the minimum value of the path index is the target entrance guard, generating the authority certificate of the target entrance guard, and sending the authority certificate to the mobile phone client held by the visitor.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, characterized in that the processor implements the steps of the guest authorization method of any of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the guest authorization method of any one of claims 1 to 6.
10. A guest authorization system, comprising:
the guest authorization apparatus of claim 7;
and the mobile phone client is used for receiving the permission certificate from the visitor authorization device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111338468.8A CN114038101A (en) | 2021-11-12 | 2021-11-12 | Visitor authorization method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111338468.8A CN114038101A (en) | 2021-11-12 | 2021-11-12 | Visitor authorization method, device and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114038101A true CN114038101A (en) | 2022-02-11 |
Family
ID=80137456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111338468.8A Pending CN114038101A (en) | 2021-11-12 | 2021-11-12 | Visitor authorization method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114038101A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115439965A (en) * | 2022-09-01 | 2022-12-06 | 深圳市安信泰科技有限公司 | Access control system and control method thereof |
CN116363784A (en) * | 2023-05-31 | 2023-06-30 | 华砺智行(武汉)科技有限公司 | Intelligent management system for vehicle door forbidden |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819691A (en) * | 2010-04-12 | 2010-09-01 | 西安酷派软件科技有限公司 | Method and system for realizing intelligent entrance guard by navigation terminal and navigation terminal |
CN109410413A (en) * | 2018-12-28 | 2019-03-01 | 北京百佑科技有限公司 | A kind of entrance guard management system and method |
CN113223224A (en) * | 2021-05-12 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Traffic processing method and device |
CN113570763A (en) * | 2021-07-16 | 2021-10-29 | 重庆中科云从科技有限公司 | Passage control method and device, machine readable medium and equipment |
-
2021
- 2021-11-12 CN CN202111338468.8A patent/CN114038101A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819691A (en) * | 2010-04-12 | 2010-09-01 | 西安酷派软件科技有限公司 | Method and system for realizing intelligent entrance guard by navigation terminal and navigation terminal |
CN109410413A (en) * | 2018-12-28 | 2019-03-01 | 北京百佑科技有限公司 | A kind of entrance guard management system and method |
CN113223224A (en) * | 2021-05-12 | 2021-08-06 | 支付宝(杭州)信息技术有限公司 | Traffic processing method and device |
CN113570763A (en) * | 2021-07-16 | 2021-10-29 | 重庆中科云从科技有限公司 | Passage control method and device, machine readable medium and equipment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115439965A (en) * | 2022-09-01 | 2022-12-06 | 深圳市安信泰科技有限公司 | Access control system and control method thereof |
CN116363784A (en) * | 2023-05-31 | 2023-06-30 | 华砺智行(武汉)科技有限公司 | Intelligent management system for vehicle door forbidden |
CN116363784B (en) * | 2023-05-31 | 2023-08-22 | 华砺智行(武汉)科技有限公司 | Intelligent management system for vehicle door forbidden |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114038101A (en) | Visitor authorization method, device and system | |
CN110943990B (en) | Big data-based data analysis system for communication security management and control | |
US5375244A (en) | System and method for granting access to a resource | |
CN100533368C (en) | Controlling access to an area | |
US7205882B2 (en) | Actuating a security system using a wireless device | |
US20060020816A1 (en) | Method and system for managing authentication attempts | |
CN109816906B (en) | Security monitoring method and device, electronic equipment and storage medium | |
CN104240342A (en) | Access control method and device | |
US9438585B2 (en) | Trusted vendor access | |
CN110912932B (en) | Power secondary system information safety operation and maintenance supervision platform | |
CN104283881B (en) | Method for the Certificate Authority and safe handling of Internet of Things sensing equipment | |
CN105447927A (en) | A control method for opening access control electric locks, access controllers and an access control system | |
CN109450869A (en) | A kind of service security means of defence based on user feedback | |
CN106098069A (en) | A kind of identity identifying method and terminal unit | |
CN103839309A (en) | Community entrance guard method and system | |
US10757098B2 (en) | Hybrid data managed lock system | |
CN109035616B (en) | Parking stall sharing management and parking operation system based on Internet of things | |
CN101065789B (en) | Logging access attempts to an area | |
US11055412B2 (en) | Method and system for stake-based event management with ledgers | |
CN115019427A (en) | Anti-dive-back processing method, device and equipment | |
JP5755475B2 (en) | Entrance / exit management system and anti-passback violation cancellation method | |
CN112202819B (en) | Distributed control authority method and device, computer equipment and storage medium | |
CN109552246B (en) | A kind of tele-control system of shared automobile | |
CN113674462A (en) | Access control authorization method, device and storage medium | |
JP2011090499A (en) | Access management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |