CN114038101A - Visitor authorization method, device and system - Google Patents

Visitor authorization method, device and system Download PDF

Info

Publication number
CN114038101A
CN114038101A CN202111338468.8A CN202111338468A CN114038101A CN 114038101 A CN114038101 A CN 114038101A CN 202111338468 A CN202111338468 A CN 202111338468A CN 114038101 A CN114038101 A CN 114038101A
Authority
CN
China
Prior art keywords
entrance guard
route
determining
transit
visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111338468.8A
Other languages
Chinese (zh)
Inventor
付鹏
李芳�
徐晨予
胡伟江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202111338468.8A priority Critical patent/CN114038101A/en
Publication of CN114038101A publication Critical patent/CN114038101A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention provides a visitor authorization method, a visitor authorization device and a visitor authorization system, belongs to the technical field of information safety, and can be applied to the technical field of finance or other technical fields. The visitor authorization method comprises the following steps: determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path; determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard; determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index; and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor. The invention can reduce the security risk of the authorization system.

Description

Visitor authorization method, device and system
Technical Field
The invention relates to the technical field of information security, in particular to a visitor authorization method, device and system.
Background
The park sets up physical entrance guard to key passage, place entry in order to guard against the security risk, authorizes to having the right to lead to personnel. The control of access generally assumes a level of control, i.e. authorized persons are allowed to pass a certain level or several levels of access. However, such setting flexibility is poor, when temporarily granting access rights to a designated place, the access rights of a target place and all the access rights on a passing route cannot be set singly, and access restrictions to unrelated places are weak, so that certain safety risks exist.
Disclosure of Invention
The embodiment of the invention mainly aims to provide a visitor authorization method, a visitor authorization device and a visitor authorization system so as to reduce the security risk of an authorization system.
In order to achieve the above object, an embodiment of the present invention provides a guest authorization method, including:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
In one embodiment, the method further comprises the following steps: and determining historical access control according to the starting place, the destination place and the visitor permission.
In one embodiment, the determining the transit entrance guard according to the historical transit times of the historical approach entrance guard includes:
sequencing the historical passing times in a descending order;
and determining the historical access control corresponding to the historical passing times before the passing threshold as the transit access control.
In one embodiment, determining the route to be selected corresponding to each transit entrance guard according to the starting location, the destination location and the location of the transit entrance guard includes:
determining a corresponding front section route according to the starting place and the place of the transit entrance guard;
determining a corresponding back-end route according to the destination point and the transit entrance guard point;
and determining a route to be selected according to the front section route and the rear section route.
In one embodiment, the method further comprises the following steps:
and determining the route corresponding to the route to be selected according to the distance between the gate inhibition in the route to be selected.
In one embodiment, the method further comprises the following steps:
and determining the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
The embodiment of the invention also provides a visitor authorization device, which comprises:
the transit entrance guard determining module is used for determining transit entrance guard according to the historical passing times of the entrance guard in the historical path;
the route module to be selected is used for determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
the path index module is used for determining the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and the certificate generation module is used for determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard and sending the authority certificate to the mobile phone client held by the visitor.
The embodiment of the invention also provides computer equipment which comprises a memory, a processor and a computer program stored on the memory and running on the processor, wherein the steps of the visitor authorization method are realized when the processor executes the computer program.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the guest authorization method.
The embodiment of the invention also provides a visitor authorization system, which comprises:
the guest authorization apparatus as described above;
and the mobile phone client is used for receiving the permission certificate from the visitor authorization device.
According to the visitor authorization method, the device and the system, the transit entrance guard is determined firstly to determine the corresponding to-be-selected route according to the location of the transit entrance guard, then the path index of each to-be-selected route is determined to determine the target entrance guard, finally the authority certificate of the target entrance guard is generated, and the authority certificate is sent to the mobile phone client held by the visitor to complete visitor authorization, so that the safety risk of an authorization system can be reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a flow chart of a guest authorization method in an embodiment of the present invention;
FIG. 2 is a flow diagram of a guest authorization method in another embodiment of the invention;
FIG. 3 is a flowchart of S102 in an embodiment of the present invention;
FIG. 4 is a block diagram of the structure of a guest authorization apparatus in an embodiment of the present invention;
FIG. 5 is a block diagram of a computer apparatus according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a guest authorization system in an embodiment of the invention;
FIG. 7 is a schematic diagram of a path change in an embodiment of the invention;
FIG. 8 is a flow chart after adjusting a visitor destination point in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
In view of the fact that the prior art has weak access restriction on unrelated places and has certain security risk, embodiments of the present invention provide a visitor authorization method and apparatus, which can reduce the security risk of an authorization system by refining access control management and a shortest path algorithm. The present invention will be described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a guest authorization method in an embodiment of the present invention. Fig. 2 is a flowchart of a guest authorization method in another embodiment of the invention. As shown in fig. 1-2, the guest authorization method includes:
s101: and determining the transit entrance guard according to the historical passing times of the entrance guard in the historical approach.
Before executing S101, the method further includes: and determining historical access control according to the starting place, the destination place and the visitor permission.
During specific implementation, the historical visitor path is retrieved according to the starting point and the destination point, the set of the entrance guards appearing on the historical visitor path is obtained, and the entrance guards which are forbidden to pass by the current visitors in the set are removed according to the visitor permissions to obtain the historical access guard.
TABLE 1
Figure BDA0003351429000000031
Figure BDA0003351429000000041
TABLE 2
Person ID Name (I) Level of security
001 Zhang San 10
002 Li Si 4
…… …… ……
TABLE 3
Person ID Name (I) Entrance guard forbidding
001 Zhang San M004,M010
…… …… ……
Table 1 is a schematic diagram of the access control level and location. Table 2 is a security level (guest permissions) schematic table. Table 3 is a notice table of people forbidding entrance guard. Registering all the access controls in the garden in the system, wherein each access control is assigned a unique ID, and the table 1 sets the minimum security level of the access control passing requirement and three-dimensional coordinates (X, Y and Z) of the access control relative to the center point of the garden in the garden; table 2 sets the security level that the visitor allows access, the higher the level, the greater the authority; table 3 sets the entrance guard ID for which the visitor prohibits passage, which is equivalent to a blacklist. And determining entrance guard forbidding access corresponding to the visitor (personnel) and entrance guard corresponding to the lowest pass level higher than the visitor authority as the entrance guard forbidding the current visitor to pass.
In one embodiment, S101 includes: sequencing the historical passing times in a descending order; and determining the historical access control corresponding to the historical passing times before the passing threshold as the transit access control. In specific implementation, the passing threshold may be 6, at this time, the first five sorted historical access accesses are taken out as transit accesses, and if the number of the former five sorted historical access accesses is less than five, the actual situation is the standard.
S102: and determining the route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard.
Before S102 is executed, all access control sets in the campus are obtained, and then the current access control which is forbidden by the visitor in all the access control sets is deleted according to the visitor permission, so that an access control set which is allowed to pass is obtained.
Fig. 3 is a flowchart of S102 in the embodiment of the present invention. As shown in fig. 3, S102 includes:
s201: and determining a corresponding front section route according to the starting place and the place of the transit entrance guard.
TABLE 4
ID1 ID2 Distance (rice)
M001 M002 1964.34
M003 M001 746.21
……
Table 4 is a schematic representation of the access control relationship. As shown in table 4, the present invention establishes an association relationship between each door access that can be directly connected, and sets a communication path distance.
In specific implementation, the shortest path from the starting point to the point of the transit entrance guard can be determined by using an a-algorithm, a freouard algorithm or a dijkstra algorithm to serve as a front-end route. For example, the starting point, the point (three-dimensional coordinates) of the transit entrance in table 1, the three-dimensional coordinates of the set of allowed-to-pass entrances, and the entrance relationship representation table are input into the a-x algorithm model as input data of the a-x algorithm model, so as to obtain the front-stage route.
S202: and determining a corresponding back-end route according to the destination point and the transit entrance guard point.
In specific implementation, the shortest path from the transit entrance guard point to the destination point can be determined by using an A-algorithm, a Floerd algorithm or a Dijkstra algorithm to serve as a back-end route. For example, the destination point, the point (three-dimensional coordinates) of the transit entrance in table 1, the three-dimensional coordinates of the set of allowed-to-pass entrances, and the entrance relation representation table are input into the a-x algorithm model as input data of the a-x algorithm model, and the subsequent route is obtained.
S203: and determining a route to be selected according to the front section route and the rear section route.
And each route to be selected corresponds to the transit entrance guard one by one.
S103: and determining the path index of each route to be selected according to the corresponding route of each route to be selected and the entrance guard congestion index.
In specific implementation, the path index of the route to be selected can be determined by the following formula:
V=∑L/100×0.75+(∑T)2×0.25;
wherein, V is a path index, Sigma L is a route, and Sigma T is an entrance guard congestion index corresponding to the route to be selected.
Before executing S103, the method further includes:
1. and determining the route corresponding to the route to be selected according to the distance between the gate inhibition in the route to be selected.
In specific implementation, the distance between the gate guards in the route to be selected can be obtained according to the table 4, and further the sum of the distances between the gate guards in the route to be selected can be used as the distance sigma L corresponding to the route to be selected.
2. And determining the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
In specific implementation, the passing records of the entrance guards corresponding to the routes to be selected in the past 5 minutes can be inquired, and the real-time congestion index of each entrance guard is calculated.
For example, when the number of passes per minute is 0, the congestion index T is 1; when the passing times per minute are more than or equal to 30, the congestion index is 10; in the interval from 0 times to 30 times, the congestion index T is calculated according to the following formula:
t ═ a/30 × (10-1) + 1; wherein a is the number of passes per minute.
The entrance guard congestion index is the sum sigma T of the real-time congestion indexes of all entrance guards.
S104: and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
In specific implementation, the invention also records a visitor passing route scheme. Every entrance guard has all configured two-dimensional code and has swept a yard equipment, and visitor's authorization device reads visitor's two-dimensional code authority voucher information through sweeping yard equipment, judges whether contain current entrance guard in the visitor voucher relevant route. If the current entrance guard is contained, the current entrance guard is released, and if the current entrance guard is not contained, the current entrance guard is forbidden.
The execution subject of the guest authorization method shown in fig. 1 may be a computer. As can be seen from the flow shown in fig. 1, in the visitor authorization method according to the embodiment of the present invention, the transit access control is determined first to determine the corresponding to-be-selected route according to the location of the transit access control, then the path index of each to-be-selected route is determined to determine the target access control, and finally the permission credential of the target access control is generated and sent to the mobile phone client held by the visitor to complete visitor authorization, so that the security risk of the authorization system can be reduced.
Based on the same inventive concept, the embodiment of the invention also provides a visitor authorization device, and as the principle of solving the problem of the device is similar to that of a visitor authorization method, the implementation of the device can refer to the implementation of the method, and repeated parts are not described again.
Fig. 4 is a block diagram of a guest authorization apparatus in an embodiment of the present invention. As shown in fig. 4, the guest authorization apparatus includes:
the transit entrance guard determining module is used for determining transit entrance guard according to the historical passing times of the entrance guard in the historical path;
the route module to be selected is used for determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
the path index module is used for determining the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and the certificate generation module is used for determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard and sending the authority certificate to the mobile phone client held by the visitor.
To sum up, the visitor authorization device of the embodiment of the invention firstly determines the transit entrance guard to determine the corresponding to-be-selected route according to the location of the transit entrance guard, then determines the path index of each to-be-selected route to determine the target entrance guard, and finally generates the authority certificate of the target entrance guard, and sends the authority certificate to the mobile phone client held by the visitor to complete visitor authorization, so that the safety risk of the authorization system can be reduced.
The embodiment of the invention also provides a specific implementation mode of the computer equipment, which can realize all the steps in the visitor authorization method in the embodiment. Fig. 5 is a block diagram of a computer device in an embodiment of the present invention, and referring to fig. 5, the computer device specifically includes the following:
a processor (processor)501 and a memory (memory) 502.
The processor 501 is used to call the computer program in the memory 502, and the processor executes the computer program to implement all the steps of the guest authorization method in the above embodiments, for example, the processor executes the computer program to implement the following steps:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
To sum up, the computer device of the embodiment of the invention firstly determines the transit entrance guard to determine the corresponding to-be-selected route according to the location of the transit entrance guard, then determines the path index of each to-be-selected route to determine the target entrance guard, and finally generates the authority certificate of the target entrance guard, and sends the authority certificate to the mobile phone client held by the visitor to complete the visitor authorization, so that the safety risk of the authorization system can be reduced.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all steps in the guest authorization method in the foregoing embodiment, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements all steps of the guest authorization method in the foregoing embodiment, for example, when the processor executes the computer program, the processor implements the following steps:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
To sum up, the computer-readable storage medium of the embodiment of the present invention first determines a transit entrance guard to determine a corresponding to-be-selected route according to a location of the transit entrance guard, then determines a path index of each to-be-selected route to determine a target entrance guard, and finally generates an authority credential of the target entrance guard, and sends the authority credential to a mobile phone client held by a visitor to complete visitor authorization, so as to reduce a security risk of an authorization system.
Based on the same inventive concept, the embodiment of the invention also provides a visitor authorization system, and as the problem solving principle of the system is similar to that of a visitor authorization method, the implementation of the system can refer to the implementation of the method, and repeated parts are not repeated.
Fig. 6 is a schematic diagram of a guest authorization system in an embodiment of the present invention. As shown in fig. 6, the guest authorization system includes:
the guest authorization apparatus as described above;
and the mobile phone client is used for receiving the permission certificate from the visitor authorization device.
Fig. 7 is a schematic diagram of a path change in an embodiment of the invention. As shown in fig. 7, the present invention can monitor and optimize the visitor path in real time. The visitor authorization device dynamically monitors validity and rationality of a visitor path scheme according to the change condition of starting and ending of an activity event in a campus, if the access permission on an access path is improved to be higher than the visitor permission, the planned path is invalid, a new path scheme is determined according to the development condition of the latest activity event, a permission certificate is generated according to a new target access, and the new permission certificate is pushed to a mobile phone client held by a visitor.
The invention can also remind and monitor visitors deviating from the path. As shown in fig. 2, if the visitor tries to pass through the unauthorized access control, the visitor authorization device will automatically push the prompt to remind the visitor of deviating from the path, and replan a new path scheme and update the visitor access control authorization by taking the current unauthorized access control as the starting point and the destination as the destination. If the number of times of the visitor trying to pass through the unauthorized access control exceeds 3 times, the visitor authorization device automatically gives an alarm to the administrator to prompt the administrator to pay attention to abnormal behaviors.
FIG. 8 is a flow chart of adjusting a visitor destination point in an embodiment of the present invention. As shown in fig. 8, when the visitor temporarily adjusts the destination, the visitor authorization apparatus automatically recovers all access permissions of the visitor, sets the visitor start position as the current location of the person, repeatedly plans a new path scheme, calculates the shortest path, and authorizes the visitor.
The specific process of the visitor authorization system of the embodiment of the invention is as follows:
1. the visitor authorization device determines historical access control according to the starting place, the destination place and the visitor permission.
2. And the visitor authorization device sorts the historical passage times of the historical passage door control in a descending order, and determines the historical passage door control corresponding to the historical passage times before the passage threshold as a transit door control.
3. And the visitor authorization device determines a corresponding front section route according to the starting place and the place of the transit entrance guard.
4. And the visitor authorization device determines a corresponding rear-section route according to the destination point and the transit entrance guard point.
5. The visitor authorization apparatus determines a route to be selected according to the front-stage route and the rear-stage route.
6. And the visitor authorization device determines the route corresponding to the route to be selected according to the distance between the gate guards in the route to be selected.
7. And the visitor authorization device determines the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
8. And the visitor authorization device determines the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index.
9. And the visitor authorization device determines the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generates an authority certificate of the target entrance guard, and sends the authority certificate to a mobile phone client held by the visitor.
10. The mobile phone client receives the permission certificate from the visitor authorization device.
In summary, the visitor authorization system of the embodiment of the invention has the following beneficial effects:
(1) fine-grained control of each access control authority allows positive passing control and negative forbidding control of visitors;
(2) the shortest access path is intelligently matched, access authority is granted according to the minimum principle, and irrelevant access control and no-permission access control are not granted, so that the safety risk is obviously reduced;
(3) flexibly adjusting the access destination and timely recovering unnecessary authority.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Those of skill in the art will further appreciate that the various illustrative logical blocks, units, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate the interchangeability of hardware and software, various illustrative components, elements, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design requirements of the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present embodiments.
The various illustrative logical blocks, or elements, or devices described in connection with the embodiments disclosed herein may be implemented or performed with a general purpose processor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A general-purpose processor may be a microprocessor, but in the alternative, the processor may be any conventional processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, e.g., a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other similar configuration.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may be stored in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. For example, a storage medium may be coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an ASIC, which may be located in a user terminal. In the alternative, the processor and the storage medium may reside in different components in a user terminal.
In one or more exemplary designs, the functions described above in connection with the embodiments of the invention may be implemented in hardware, software, firmware, or any combination of the three. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media that facilitate transfer of a computer program from one place to another. Storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, such computer-readable media can include, but is not limited to, RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store program code in the form of instructions or data structures and which can be read by a general-purpose or special-purpose computer, or a general-purpose or special-purpose processor. Additionally, any connection is properly termed a computer-readable medium, and, thus, is included if the software is transmitted from a website, server, or other remote source via a coaxial cable, fiber optic cable, twisted pair, Digital Subscriber Line (DSL), or wirelessly, e.g., infrared, radio, and microwave. Such discs (disk) and disks (disc) include compact disks, laser disks, optical disks, DVDs, floppy disks and blu-ray disks where disks usually reproduce data magnetically, while disks usually reproduce data optically with lasers. Combinations of the above may also be included in the computer-readable medium.

Claims (10)

1. A guest authorization method, comprising:
determining a transit entrance guard according to the historical passing times of the entrance guard in the historical path;
determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
determining a path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and determining the entrance guard on the route to be selected corresponding to the minimum value of the path index as a target entrance guard, generating an authority certificate of the target entrance guard, and sending the authority certificate to a mobile phone client held by the visitor.
2. The guest authorization method according to claim 1, further comprising:
and determining historical access control according to the starting place, the destination place and the visitor permission.
3. The guest authorization method of claim 1, wherein determining a transit gate based on historical transit times of a historic approach gate comprises:
sequencing the historical passing times in a descending order;
and determining the historical access control corresponding to the historical passing times before the passing threshold as the transit access control.
4. The guest authorization method according to claim 1, wherein determining the route to be selected corresponding to each transit gate according to the start location, the destination location and the location of the transit gate comprises:
determining a corresponding front section route according to the starting place and the place of the transit entrance guard;
determining a corresponding rear-section route according to the destination point and the transit entrance guard point;
and determining the route to be selected according to the front section route and the rear section route.
5. The guest authorization method according to claim 1, further comprising:
and determining the route corresponding to the route to be selected according to the distance between the gate inhibition in the route to be selected.
6. The guest authorization method according to claim 1, further comprising:
and determining the entrance guard congestion index corresponding to the route to be selected according to the passing frequency of each entrance guard in the route to be selected.
7. A guest authorization apparatus, comprising:
the transit entrance guard determining module is used for determining transit entrance guard according to the historical passing times of the entrance guard in the historical path;
the route module to be selected is used for determining a route to be selected corresponding to each transit entrance guard according to the starting point, the destination point and the transit entrance guard;
the path index module is used for determining the path index of each route to be selected according to the corresponding distance of each route to be selected and the entrance guard congestion index;
and the certificate generation module is used for determining that the entrance guard on the route to be selected corresponding to the minimum value of the path index is the target entrance guard, generating the authority certificate of the target entrance guard, and sending the authority certificate to the mobile phone client held by the visitor.
8. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, characterized in that the processor implements the steps of the guest authorization method of any of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the guest authorization method of any one of claims 1 to 6.
10. A guest authorization system, comprising:
the guest authorization apparatus of claim 7;
and the mobile phone client is used for receiving the permission certificate from the visitor authorization device.
CN202111338468.8A 2021-11-12 2021-11-12 Visitor authorization method, device and system Pending CN114038101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111338468.8A CN114038101A (en) 2021-11-12 2021-11-12 Visitor authorization method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111338468.8A CN114038101A (en) 2021-11-12 2021-11-12 Visitor authorization method, device and system

Publications (1)

Publication Number Publication Date
CN114038101A true CN114038101A (en) 2022-02-11

Family

ID=80137456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111338468.8A Pending CN114038101A (en) 2021-11-12 2021-11-12 Visitor authorization method, device and system

Country Status (1)

Country Link
CN (1) CN114038101A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115439965A (en) * 2022-09-01 2022-12-06 深圳市安信泰科技有限公司 Access control system and control method thereof
CN116363784A (en) * 2023-05-31 2023-06-30 华砺智行(武汉)科技有限公司 Intelligent management system for vehicle door forbidden

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819691A (en) * 2010-04-12 2010-09-01 西安酷派软件科技有限公司 Method and system for realizing intelligent entrance guard by navigation terminal and navigation terminal
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113570763A (en) * 2021-07-16 2021-10-29 重庆中科云从科技有限公司 Passage control method and device, machine readable medium and equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819691A (en) * 2010-04-12 2010-09-01 西安酷派软件科技有限公司 Method and system for realizing intelligent entrance guard by navigation terminal and navigation terminal
CN109410413A (en) * 2018-12-28 2019-03-01 北京百佑科技有限公司 A kind of entrance guard management system and method
CN113223224A (en) * 2021-05-12 2021-08-06 支付宝(杭州)信息技术有限公司 Traffic processing method and device
CN113570763A (en) * 2021-07-16 2021-10-29 重庆中科云从科技有限公司 Passage control method and device, machine readable medium and equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115439965A (en) * 2022-09-01 2022-12-06 深圳市安信泰科技有限公司 Access control system and control method thereof
CN116363784A (en) * 2023-05-31 2023-06-30 华砺智行(武汉)科技有限公司 Intelligent management system for vehicle door forbidden
CN116363784B (en) * 2023-05-31 2023-08-22 华砺智行(武汉)科技有限公司 Intelligent management system for vehicle door forbidden

Similar Documents

Publication Publication Date Title
CN114038101A (en) Visitor authorization method, device and system
CN110943990B (en) Big data-based data analysis system for communication security management and control
US5375244A (en) System and method for granting access to a resource
CN100533368C (en) Controlling access to an area
US7205882B2 (en) Actuating a security system using a wireless device
US20060020816A1 (en) Method and system for managing authentication attempts
CN109816906B (en) Security monitoring method and device, electronic equipment and storage medium
CN104240342A (en) Access control method and device
US9438585B2 (en) Trusted vendor access
CN110912932B (en) Power secondary system information safety operation and maintenance supervision platform
CN104283881B (en) Method for the Certificate Authority and safe handling of Internet of Things sensing equipment
CN105447927A (en) A control method for opening access control electric locks, access controllers and an access control system
CN109450869A (en) A kind of service security means of defence based on user feedback
CN106098069A (en) A kind of identity identifying method and terminal unit
CN103839309A (en) Community entrance guard method and system
US10757098B2 (en) Hybrid data managed lock system
CN109035616B (en) Parking stall sharing management and parking operation system based on Internet of things
CN101065789B (en) Logging access attempts to an area
US11055412B2 (en) Method and system for stake-based event management with ledgers
CN115019427A (en) Anti-dive-back processing method, device and equipment
JP5755475B2 (en) Entrance / exit management system and anti-passback violation cancellation method
CN112202819B (en) Distributed control authority method and device, computer equipment and storage medium
CN109552246B (en) A kind of tele-control system of shared automobile
CN113674462A (en) Access control authorization method, device and storage medium
JP2011090499A (en) Access management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination