CN115578815A - Access control management method, authentication server, access control system and readable storage medium - Google Patents

Access control management method, authentication server, access control system and readable storage medium Download PDF

Info

Publication number
CN115578815A
CN115578815A CN202211142452.4A CN202211142452A CN115578815A CN 115578815 A CN115578815 A CN 115578815A CN 202211142452 A CN202211142452 A CN 202211142452A CN 115578815 A CN115578815 A CN 115578815A
Authority
CN
China
Prior art keywords
information
access control
user
verified
user identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211142452.4A
Other languages
Chinese (zh)
Inventor
李世野
刘卓华
杜洪军
郑海涛
王怀亮
纪高
李国旗
于洪达
李涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN202211142452.4A priority Critical patent/CN115578815A/en
Publication of CN115578815A publication Critical patent/CN115578815A/en
Priority to PCT/CN2023/112533 priority patent/WO2024060872A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

The present disclosure provides an access control management method, a verification server, an access control system and a readable storage medium, the method comprising: receiving and storing pre-registration information sent by a mobile terminal application of a user, wherein the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following items: a health information screenshot and a journey information screenshot; receiving user identification information to be verified, which is sent by an access control system; inquiring whether pre-registration information corresponding to user identification information to be verified is included in the pre-registration information stored on the same day; if so, verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirements or not and obtaining a verification result; and generating access control information according to the verification result, and sending the access control information to the access control equipment. According to the method and the system, the health information and/or the travel information do not need to be checked on site manually, the health information and/or the travel information can be guaranteed to be real and effective, meanwhile, the health information and/or the travel information are automatically verified by combining an access control system, and the passing efficiency of the access control equipment is improved.

Description

Access control management method, authentication server, access control system and readable storage medium
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to an access control management method, a verification server, an access control system and a readable storage medium.
Background
Under certain scenes, when workers enter the park area on duty, management personnel in the company park can manually check the health information and/or the travel information on site, more workers are needed in the peak time period on duty, the time for checking the health information and/or the travel information on site is long, a large amount of workers can be gathered, and the passing efficiency is extremely low; in addition, the health information and/or the trip information are checked manually on site, and it is difficult to ensure that the health information and/or the trip information are real and effective.
Disclosure of Invention
The embodiment of the disclosure provides an access control management method, a verification server, an access control system and a readable storage medium, which are used for solving the problems that the passing efficiency is low in a mode of manually checking health information and/or travel information in some places, and the checking result is difficult to guarantee to be real and effective.
In order to solve the technical problem, the present disclosure is implemented as follows:
in a first aspect, an embodiment of the present disclosure provides an access control management method, applied to a verification server, including:
receiving and storing pre-registration information sent by a mobile terminal application of a user, wherein the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following items: a health information screenshot and a journey information screenshot;
receiving user identification information to be verified, which is sent by an access control system;
inquiring whether pre-registration information stored in the current day includes pre-registration information corresponding to the user identification information to be verified;
if the pre-registration information stored in the current day comprises the pre-registration information corresponding to the user identification information to be verified, verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirements or not and obtaining a verification result;
and generating access control information according to the verification result, and sending the access control information to the access control equipment.
Optionally, the verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirement and obtains a verification result includes:
identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image identification result, wherein the image identification result comprises at least one of the following items: a health information status and a trip information status;
and verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet the requirements or not to obtain a verification result.
Optionally, the image recognition result further includes: user identification information;
verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet requirements, wherein the method further comprises the following steps:
verifying whether the user identification information in the image recognition result is matched with the user identification information to be verified;
if the user identification information in the image recognition result is matched with the user identification information to be verified, entering a step of verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet the requirements;
and if the user identification information in the image recognition result is not matched with the user identification information to be verified, generating a verification result containing alarm information and sending the verification result to the access control equipment.
Optionally, the step of recognizing the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result includes:
acquiring health information samples of a plurality of regions;
and identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified according to the health information samples of the plurality of regions.
Optionally, the pre-registration information further includes user identification information;
the inquiring whether the pre-registration information stored on the current day includes the pre-registration information corresponding to the user identification information to be verified includes:
and inquiring whether the user identification information matched with the user identification information to be verified exists in the user identification information in the pre-registration information stored on the current day.
In a second aspect, an embodiment of the present disclosure provides an access control method, applied to an access control system, including:
if the reference user information base comprises reference user information matched with access control acquisition information acquired by access control equipment, acquiring user identification information to be verified corresponding to the access control acquisition information;
sending the user identification information to be verified to a verification server so that the verification server verifies whether pre-registration information corresponding to the user identification information to be verified meets requirements or not; the pre-registration information comprises a screenshot, the screenshot comprising at least one of: a health information screenshot and a trip information screenshot.
Optionally, the access control system includes a cloud server and at least two edge servers, each edge server corresponds to at least one access control device, and the method further includes:
and the cloud server sends the reference user information to the edge server.
Optionally, the cloud server sends the reference user information to the edge server, and the method further includes:
the cloud server receives user real-time position information sent by a mobile terminal application of a user;
the cloud server determines a target access control device closest to the user according to the real-time position information of the user;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the target access control equipment;
or
The cloud server analyzes the access control equipment expected to arrive by the user on the same day according to the access control equipment historically arrived by the user;
and the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day.
Optionally, the method further includes:
the cloud server analyzes the estimated time of the user to reach the access control equipment on the same day according to the historical time of the user to reach the access control equipment or the working time of a company;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day, and the edge server comprises:
the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day at the target time before the expected time;
or
The cloud server determines a target distance between the user and the target access control equipment according to the real-time position information of the user;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day, and the edge server comprises:
and when the target distance is smaller than a preset distance, the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day.
Optionally, the obtaining of the user identification information to be verified corresponding to the access control acquisition information further includes:
the edge server judges whether reference user information matched with the access control acquisition information is included in a reference user information base;
if the reference user information base of the edge server comprises reference user information matched with the access control acquisition information, entering a step of acquiring user identification information to be verified corresponding to the access control acquisition information;
if the reference user information base of the edge server does not comprise the reference user information matched with the access control acquisition information, the access control acquisition information is sent to the cloud server; the cloud server judges whether reference user information matched with the access control acquisition information is included in a reference user information base; and if the cloud server reference user information base comprises reference user information matched with the access control acquisition information, entering a step of acquiring user identification information to be verified corresponding to the access control acquisition information.
In a third aspect, an embodiment of the present disclosure provides an authentication server, including:
the system comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving and storing pre-registration information sent by a mobile terminal application of a user, the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following items: a health information screenshot and a journey information screenshot;
the second receiving module is used for receiving the user identification information to be verified, which is sent by the access control system;
the query module is used for querying whether the pre-registration information stored on the current day includes the pre-registration information corresponding to the user identification information to be verified;
the first verification module is used for verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirement or not if the pre-registration information stored in the current day comprises the pre-registration information corresponding to the user identification information to be verified, and obtaining a verification result;
and the control module is used for generating access control information according to the verification result and sending the access control information to the access control equipment.
In a fourth aspect, an embodiment of the present disclosure provides an access control system, including:
the first acquisition module is used for acquiring user identification information to be verified corresponding to the access control acquisition information if the reference user information base comprises reference user information matched with the access control acquisition information;
the sending module is used for sending the user identification information to be verified to a verification server so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirement; the pre-registration information includes a screenshot, the screenshot including at least one of: a health information screenshot and a trip information screenshot.
In a fifth aspect, an embodiment of the present disclosure provides an authentication server, including: a processor, a memory and a program stored on the memory and operable on the processor, wherein the program, when executed by the processor, performs the steps of the access control management method according to the first aspect.
In a sixth aspect, an embodiment of the present disclosure provides an access control system, including: a processor, a memory and a program stored on the memory and operable on the processor, wherein the program, when executed by the processor, implements the steps of the access control method according to the second aspect.
In a seventh aspect, an embodiment of the present disclosure provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the steps of the access control management method according to the first aspect; alternatively, the computer program, when executed by a processor, implements the steps of the access control method according to the second aspect.
In the embodiment of the disclosure, before a user (for example, a company employee) enters a specific place (for example, an office building, a park, and the like) with an access control device, a pre-registration message including a health information screenshot and/or a travel information screenshot may be sent to a verification server in advance through a mobile terminal application, when the user reaches the access control device, an access control system may send user identification information to be verified to the verification server, the verification server queries whether pre-registration information corresponding to the user identification information to be verified is included in the pre-registration message stored on the same day, if the pre-registration information is included, it is verified whether the health information screenshot and/or the travel information screenshot corresponding to the user identification information to be verified meets requirements, and access control information is generated according to a verification result and sent to the access control device, so that the user is allowed or not allowed to pass through the access control device. According to the mode, the health information and/or the travel information are/is verified through the verification server without manual site examination, the health information and/or the travel information can be guaranteed to be real and effective, meanwhile, the health information and/or the travel information are/is automatically verified by combining the access control system, and the verification efficiency and the passing efficiency of the access control equipment are improved.
Drawings
Various additional advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the disclosure. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic flow chart of a method for access control management according to an embodiment of the disclosure;
fig. 2 is a schematic flow diagram illustrating a process of acquiring and sending a screenshot of health information and/or travel information by a mobile terminal application according to an embodiment of the present disclosure;
fig. 3 is a schematic flow chart of acquiring and sending a screenshot of health information and/or travel information by a mobile application according to another embodiment of the present disclosure;
FIG. 4 is a general flow diagram of a system to which embodiments of the present disclosure are applied;
FIG. 5 is a second schematic flow chart of a system according to an embodiment of the present disclosure;
FIG. 6 is a schematic diagram illustrating a method for managing health information samples according to an embodiment of the disclosure;
FIG. 7 is a schematic diagram illustrating the transmission of pre-registration information by encryption according to an embodiment of the disclosure;
fig. 8 is a schematic diagram of a format of an encrypted message according to an embodiment of the present disclosure;
fig. 9 is a second schematic flow chart of the access control method according to the embodiment of the disclosure;
fig. 10 is a schematic structural diagram of an access control system according to an embodiment of the present disclosure;
FIG. 11 is a schematic diagram of an input method of reference user information according to an embodiment of the disclosure;
fig. 12 is a flowchart illustrating a distribution policy with reference to user information according to an embodiment of the disclosure;
fig. 13 is a flowchart illustrating a distribution policy with reference to user information according to another embodiment of the present disclosure;
fig. 14 is a flowchart illustrating a distribution policy with reference to user information according to still another embodiment of the present disclosure;
fig. 15 is a schematic structural diagram of an authentication server according to an embodiment of the present disclosure;
fig. 16 is a schematic structural diagram of an access control system according to an embodiment of the disclosure;
fig. 17 is a second schematic structural diagram of an authentication server according to a second embodiment of the disclosure;
fig. 18 is a second schematic structural diagram of the access control system according to the embodiment of the disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
In the prior art, different parks have different access regulations from the safety perspective, and the passing of the parks needs to manually check whether information such as epidemic prevention information of employees is in compliance, so that a large amount of repeated workload is caused, and the efficiency is low.
Referring to fig. 1, an embodiment of the present disclosure provides an access control management method applied to an authentication server, including:
step 11: receiving and storing pre-registration information sent by a mobile terminal application of a user, wherein the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following items: a health information screenshot and a journey information screenshot;
in the embodiment of the present disclosure, referring to fig. 2, if a user (e.g., a company employee, etc.) needs to enter a specific location (e.g., an office building, a campus, etc.), a user may capture a screenshot of health information and/or travel information through a mobile application (e.g., a mobile APP, which may also be referred to as a mobile APP or a mobile APP) in advance (e.g., on the work road on the same day), and send pre-registration information including the screenshot of health information and/or the screenshot of travel information to a verification server through the mobile application. In the example of the health information illustrated in fig. 2, the health information needs to be registered by scanning a code, and it should be understood that some health information does not need to be registered by scanning a code, and a confirmation instruction screenshot may be clicked directly.
In the embodiment of the disclosure, the mobile terminal application is adopted to directly capture the screenshot of the health information and/or the trip information and upload the screenshot to the verification server, and the screenshot entry is not modified, so that the human intervention can be reduced, and the health information and/or the trip information screenshot is ensured not to be tampered.
Of course, in some other embodiments of the present disclosure, please refer to fig. 3, the user may also use other application software (for example, a system screenshot instruction of a mobile phone) to screenshot the health information and/or the travel information, and upload the screenshot to the mobile terminal application, and upload the screenshot to the verification server by the mobile terminal application. The platform of the internet of things in fig. 3 is the authentication server.
Step 12: receiving user identification information to be verified, which is sent by an access control system;
the user identification information to be verified includes, for example, a name, a job number, a mobile phone number, and/or the like of the user.
Referring to fig. 4 and 5, after a user arrives at an access control device (also referred to as an access control gate device), the access control device may directly recognize access control collected information (e.g., face or access card information) and compare the access control collected information with pre-stored reference user information, or send the access control collected information to an access control system for recognition and comparison by the access control system, when the access control system recognizes and compares the access control collected information with the pre-stored reference user information, the access control system may determine whether reference user information matching the access control collected information is included in a reference user information base, and if the reference user information is a legal user, obtain user identification information to be verified corresponding to the access control collected information (e.g., a name, a work number, and/or a mobile phone number of the user, i.e., employee information in a graph) and send the user identification information to a verification server (i.e., an internet of things (IoT) platform in the graph) to verify whether the health information and/or travel information of the user meets requirements. And if the reference user information base does not contain the reference user information matched with the access control acquisition information, the user is not a legal user, and alarm information can be directly sent to the access control equipment.
In the embodiment of the disclosure, the access control device and the access control system can be integrated in the same device or can be separately arranged. The entrance guard equipment mainly carries out the effect of gathering entrance guard information (for example, gather people's face, gather entrance guard card information), and entrance guard equipment can also discern the entrance guard information of gathering, certainly, also can be discerned by access control system, and access control system still carries out the effect according to the entrance guard information of gathering after the discernment, the user identification information who confirms waiting to verify.
Step 13: inquiring whether pre-registration information corresponding to the user identification information to be verified is included in pre-registration information stored on the current day;
if the pre-registration information stored on the same day does not include the pre-registration information corresponding to the user identification information to be verified, it indicates that the user does not upload the pre-registration information, and at this time, the verification server may send alarm information to the access control system.
Since both health information and trip information require real-time, the pre-registered information is uploaded on the same day and can be deleted at a specified time, for example, 24 o' clock of the day.
Step 14: if the pre-registration information stored in the current day comprises the pre-registration information corresponding to the user identification information to be verified, verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirement or not and obtaining a verification result;
whether the health information and/or the trip information meet the requirements in the embodiment of the invention may refer to whether the health information state and/or the trip information state meet the regulations of a specific place (such as a park).
Step 15: and generating access control information according to the verification result, and sending the access control information to the access control equipment.
For example, if the pre-registration information corresponding to the user identification information to be verified is normal, first access control information may be generated for controlling the access device to open the door, and if the pre-registration information corresponding to the user identification information to be verified is abnormal, second access control information may be generated for controlling the access device to alarm.
In the embodiment of the disclosure, before a user (for example, a company employee) enters a specific place (for example, an office building, a park, and the like) with an access control device, a pre-registration message including a health information screenshot and/or a travel information screenshot may be sent to a verification server in advance through a mobile terminal application, when the user reaches the access control device, an access control system may send user identification information to be verified to the verification server, the verification server queries whether pre-registration information corresponding to the user identification information to be verified is included in the pre-registration message stored on the same day, if the pre-registration information is included, it is verified whether the health information screenshot and/or the travel information screenshot corresponding to the user identification information to be verified meets requirements, and access control information is generated according to a verification result and sent to the access control device, so that the user is allowed or not allowed to pass through the access control device. According to the mode, the health information and/or the travel information are/is verified through the verification server without manual site examination, the health information and/or the travel information can be guaranteed to be real and effective, meanwhile, the health information and/or the travel information are/is automatically verified by combining the access control system, and the verification efficiency and the passing efficiency of the access control equipment are improved.
In this embodiment of the present disclosure, optionally, the verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirement and obtains a verification result includes:
step 141: identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image identification result, wherein the image identification result comprises at least one of the following items: a health information status and a trip information status;
in the embodiment of the present disclosure, please refer to fig. 4 and fig. 5, an OCR (Optical Character Recognition) Recognition system (or referred to as an OCR system) may be adopted to recognize a screenshot in the pre-registered information, and obtain an image Recognition result, for example, when the screenshot is a screenshot of health information, the health information status may include at least one of the following: color of health information, update time, health detection results, etc. When the screenshot is a trip information screenshot, the trip information state may include at least one of: update time, arrival or transit points within 7 days, etc.
In the embodiment of the present disclosure, optionally, the OCR recognition system may be installed on the verification server, or may be separately provided.
Step 142: and verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet requirements or not to obtain a verification result.
In this embodiment of the present disclosure, optionally, the image recognition result further includes: user identification information; for example, when the screenshot is a health information screenshot, the user identification information in the image recognition result may include: user name, etc. When the screenshot is a trip information screenshot, the user identification information in the image recognition result may include: the last four digits of the user's handset, etc.
Optionally, verifying whether the health information state and/or the trip information state corresponding to the user identification information to be verified meet/meet requirements, before further including:
verifying whether the user identification information in the image recognition result is matched with the user identification information to be verified;
if the user identification information in the image recognition result is matched with the user identification information to be verified, entering a step of verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet the requirements;
and if the user identification information in the image recognition result is not matched with the user identification information to be verified, generating a verification result containing alarm information and sending the verification result to the access control equipment.
That is to say, it is verified whether the user identification information (user name, mobile phone number, etc.) in the recognized image recognition result matches with the user identification information to be verified (user name, mobile phone number, etc.), and if so, it is indicated that the health information screenshot and/or the travel information screenshot is the screenshot of the user to be verified, and whether the health information state and/or the travel information state of the user meet the requirements is verified.
In this embodiment of the present disclosure, optionally, identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image identification result includes:
step 1411: acquiring health information samples of a plurality of regions;
step 1412: and identifying the screenshot in the pre-registered information corresponding to the user identification information to be verified according to the health information samples of the plurality of regions.
That is, referring to fig. 6, health information samples of multiple regions may be stored in advance, and screenshots in the pre-registered information may be identified according to the pre-stored health information samples of multiple regions, so that verification of health information of cross-region personnel may be supported, and the problem that the cross-region health information cannot be synchronized is solved. In the embodiment of the present disclosure, the health information sample may be managed, for example, added, deleted, updated, and the like, through the server management system WEB.
In this disclosure, optionally, please refer to fig. 3, where the pre-registration information further includes user identification information (i.e., employee information in fig. 3, such as a job number and a mobile phone number); for example, the mobile terminal of the user may send the user identification information (e.g., job number, mobile phone number, etc.) which is saved in advance or input by the user, and the screenshot together to the authentication server; the authentication server establishes an associated index of the user identification information and the screenshot, and stores the user identification information and the screenshot.
At this time, optionally, the querying whether the pre-registration information stored on the current day includes the pre-registration information corresponding to the user identification information to be verified includes: and inquiring whether the user identification information matched with the user identification information to be verified exists in the user identification information in the pre-registration information stored on the current day. That is, when inquiring whether the pre-registration information stored on the day includes the pre-registration information corresponding to the user identification information to be verified, the user identification information can be used for inquiring.
Certainly, it is not excluded that in some other embodiments, the mobile terminal application may only report the screenshot without reporting the user identifier information, and at this time, the verification server may identify the screenshot in advance to obtain the user identifier information in the screenshot, thereby facilitating query.
In this embodiment of the disclosure, optionally, when the user reports the pre-registration information through the mobile terminal application, the user may also report the expected arrival time, that is, the time expected to arrive at the preset place, and the verification server stores the expected arrival time, and when receiving the user identification information to be verified sent by the access control system, the verification server may first determine whether the reception time of the user identification information to be verified sent by the access control system is within the expected arrival time, and if the reception time is within the preset arrival time, perform the subsequent step (i.e., query whether the pre-registration information stored on the same day includes the pre-registration information corresponding to the user identification information to be verified), otherwise, send alarm information to the access control system.
In this disclosure, optionally, referring to fig. 7, the pre-registration information received by the verification server may be pre-registration information uploaded by the mobile application in an encryption manner, so as to ensure that data cannot be tampered and integrity of the data.
Referring to fig. 8, fig. 8 is a schematic diagram of a format of an encrypted message sent by a mobile application in an embodiment of the present disclosure, where the message includes 5 portions, a first portion may be 1 byte (byte) for indicating an encryption manner, a second portion may be 1 byte for indicating an encryption version, a third portion is 6 bytes for keeping bytes, a fourth portion is 4 bytes for indicating a length of the message, and a fifth portion is N bytes for carrying an encrypted message body.
Referring to table 1, table 1 is a description of each part of an encrypted message.
TABLE 1
Figure RE-GDA0003967239510000111
Figure RE-GDA0003967239510000121
Referring to fig. 9, an embodiment of the present disclosure further provides an access control method applied to an access control system, where the method includes:
step 91: if the reference user information base comprises reference user information matched with the access control acquisition information, acquiring user identification information to be verified corresponding to the access control acquisition information;
and step 92: sending the user identification information to be verified to a verification server so that the verification server verifies whether pre-registration information corresponding to the user identification information to be verified meets requirements or not; the pre-registration information comprises a screenshot, the screenshot comprising at least one of: a health information screenshot and a trip information screenshot.
In the embodiment of the disclosure, the reference user information base is used for storing pre-entered reference user information.
In the embodiment of the disclosure, the access control acquisition information may be face or access control card information and the like. And if the access control acquisition information is a face, the reference user information base comprises face information of the user which is input in advance.
In this disclosure, optionally, if the reference user information base includes reference user information matched with the access control acquisition information, obtaining user identification information to be verified corresponding to the access control acquisition information, the method further includes:
step 901: acquiring access control acquisition information sent by access control equipment;
step 902: and judging whether reference user information matched with the access control acquisition information is included in a reference user information base.
In the embodiment of the disclosure, the access control device and the access control system can be integrated in the same device or can be separately arranged. The entrance guard equipment mainly performs the function of collecting entrance guard collected information (such as collecting human faces and collecting entrance guard card information). In the embodiment of the disclosure, the access control device sends the acquired access control acquisition information to the access control system, and the access control system judges whether the reference user information base includes the reference user information matched with the access control acquisition information. Of course, in some other embodiments of the present disclosure, the access control device may also determine whether the reference user information base includes reference user information matched with the access control acquisition information.
To some big specific places, for example the company garden, generally have a plurality of entrances, every entry all can set up entrance guard's equipment, and generally save in the cloud end server in the reference user information base, entrance guard's equipment is longer with the cloud end server communication path of distal end, has reduced recognition speed.
In order to solve the above problem, in the embodiment of the present disclosure, please refer to fig. 10, optionally, the access control system includes a cloud server and at least two edge servers, where each edge server corresponds to at least one access control device, and the edge servers may be disposed at positions close to the access control devices, or integrated with the access control devices in one device.
The method further comprises the following steps: and the cloud server sends the reference user information to the edge server. That is to say, please refer to fig. 11, the cloud server obtains the reference user information (such as the face information) and sends the reference user information to the edge server, so that the edge server can directly compare the reference user information with the access acquisition information, the access control device does not need to communicate with the cloud server, and directly communicates with the edge server, the communication path is shortened, the communication speed is increased, the recognition speed is increased, and the pressure of the cloud server is relieved. That is, the above steps 901 and 902, and the steps 91 and 92 may be performed by the edge server.
The access control system uses high in the clouds server (box) specification among the prior art all is in: the CPU adopts 8-core 16 threads, the memory is more than 8G, the hard disk is more than 500G, and the high price of the cloud server (box) is met. In the embodiment of the disclosure, an edge server is placed at a near-access control device side, and the edge server is a physical machine physically disposed close to the access control device side and can be regarded as a server directly connected to the access control device. When a user (such as a company employee) enters a door to perform face identification (or fingerprint identification or card swiping identification), the entrance guard equipment performs face comparison (or fingerprint comparison or card information comparison) through the edge server, if no corresponding face (or fingerprint or card information) exists in the edge server, then the face comparison (or fingerprint comparison or card information comparison) is performed on the cloud server, the data volume of a database in the edge server is small, and the database can be updated regularly, for example, the database is updated every day, the edge server is close to the entrance guard equipment, and the face identification speed can be improved; meanwhile, the storage specification required by the edge server is not high, and the cost can be reduced.
In the embodiment of the present disclosure, the cloud server may issue the reference user information of the user to the corresponding edge server based on multiple policies, which is described in the following example.
In some embodiments of the present disclosure, optionally, referring to fig. 10 and 12, the cloud server sends the reference user information to the edge server, where before, the method further includes:
the cloud server receives user real-time position information sent by a mobile terminal Application (APP) of a user;
the cloud server determines a target access control device closest to the user according to the real-time position information of the user;
and the cloud server sends the stored reference user information of the user to an edge server corresponding to the target access control equipment.
In some embodiments of the present disclosure, optionally, the cloud server sends the reference user information to the edge server, where before the sending further includes:
the cloud server analyzes the access control equipment expected to arrive by the user on the same day according to the access control equipment historically arrived by the user;
and the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day.
In some embodiments of the present disclosure, optionally, referring to fig. 13, the access control method further includes: the cloud server analyzes the estimated time of the user estimated to arrive at the access control equipment on the same day according to the historical arrival time of the user at the access control equipment;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the door control device expected to arrive by the user on the same day, and the edge server comprises:
and the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day at a target time (for example, 10 minutes) before the expected time.
In the embodiment of the present disclosure, the estimated time of the user estimated to arrive at the access control device on the same day may be calculated, for example, in the following manner:
the expected arrival time of the user at the access device on the day = Y10% + (M1 + M2)/2 + 20% + (W1 + W2+ W3)/3 + 30% + (D1 + D2+ D3+ D4+ D5+ D6+ D7)/7 + 70%.
Wherein, Y is the time of arriving at the access control device on the same date in the last year, M1 and M2 are the time of arriving at the access control device on the same day in the last two months respectively, W1, W2 and W3 are the time of arriving at the access control device on the same day in the last three weeks respectively, and D1, D2, D3, D4, D5, D6 and D7 are the time of arriving at the access control device on the first seven days respectively.
The above 10%, 20%, 30%, and 70% are weights, and their values may be set as necessary.
Of course, the calculation method of the estimated time of the user estimated to arrive at the access control device on the same day is not limited to this, and may be calculated only according to the time of arrival at the access control device on the first seven days, for example.
In some embodiments of the present disclosure, optionally, please refer to fig. 14, where the access control method further includes: the cloud server analyzes the estimated time of the user estimated to arrive at the access control equipment on the same day according to the time of the user historically arriving at the access control equipment or the working time of a company;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the door control device expected to arrive by the user on the same day, and the edge server comprises:
and the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day at a target time (for example, 10 minutes) before the expected time.
In some embodiments of the present disclosure, optionally, please refer to fig. 12, the access control method further includes: the cloud server determines a target distance between the user and the target access control equipment according to the real-time position information of the user;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day, and the edge server comprises:
and when the target distance is less than a preset distance (such as 100 meters), the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day.
By the adoption of the issued strategy, the operation pressure of the edge service and the cloud server can be reduced, the identification utilization rate of the edge server is improved, and the identification speed is improved.
In this disclosure, optionally, before obtaining the user identification information to be verified corresponding to the access control acquisition information, the method further includes:
the edge server judges whether reference user information matched with the access control acquisition information is included in a reference user information base or not;
if the reference user information base of the edge server comprises reference user information matched with the access control acquisition information, entering a step of acquiring user identification information to be verified corresponding to the access control acquisition information;
if the reference user information base of the edge server does not contain the reference user information matched with the access control acquisition information, the access control acquisition information is sent to the cloud server; the cloud server judges whether reference user information matched with the access control acquisition information is included in a reference user information base; and if the cloud server reference user information base comprises reference user information matched with the access control acquisition information, entering a step of acquiring to-be-verified user identification information corresponding to the access control acquisition information.
In the above embodiment of this application, through adding marginal server at entrance guard's equipment side, send the policy cloud end server through predetermineeing and send reference user information, can carry out the operation that user information compares at marginal server basically, reduced the pressure of cloud end server, reduced entrance guard's equipment and server communication link length, improved discernment response speed.
Referring to fig. 15, an embodiment of the present disclosure further provides an authentication server 150, including:
a first receiving module 151, configured to receive and store pre-registration information sent by a mobile application of a user, where the pre-registration information includes a screenshot, and the screenshot includes at least one of the following: a health information screenshot and a journey information screenshot;
the second receiving module 152 is configured to receive user identification information to be verified, which is sent by the access control system;
the query module 153 is configured to query whether pre-registration information stored on the current day includes pre-registration information corresponding to the user identification information to be verified;
a first verification module 154, configured to verify, if the pre-registration information stored in the current day includes pre-registration information corresponding to the user identification information to be verified, whether the pre-registration information corresponding to the user identification information to be verified meets a requirement, and obtain a verification result;
and the control module 155 is configured to generate access control information according to the verification result, and send the access control information to the access control device.
Optionally, the first verification module 154 is configured to recognize a screenshot in pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result, where the image recognition result includes at least one of the following: a health information status and a trip information status; and verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet the requirements or not to obtain a verification result.
Optionally, the image recognition result further includes: user identification information;
the authentication server 150 further includes:
the second verification module is used for verifying whether the user identification information in the image recognition result is matched with the user identification information to be verified; if the user identification information in the image recognition result is matched with the user identification information to be verified, entering a step of verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet the requirements; and if the user identification information in the image recognition result is not matched with the user identification information to be verified, generating a verification result containing alarm information and sending the verification result to the access control equipment.
Optionally, the first verification module 154 is configured to obtain health information samples of multiple regions; and identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified according to the health information samples of the plurality of regions.
Optionally, the pre-registration information further includes user identification information;
the query module 153 is configured to query whether there is user identification information that matches the user identification information to be verified in the user identification information in the pre-registration information stored on the current day.
Referring to fig. 16, an embodiment of the present disclosure further provides an access control system 160, including:
a first obtaining module 161, configured to obtain user identification information to be verified corresponding to the access control acquisition information if the reference user information base includes reference user information that matches the access control acquisition information;
a sending module 162, configured to send the user identification information to be verified to a verification server, so that the verification server verifies whether pre-registration information corresponding to the user identification information to be verified meets requirements; the pre-registration information comprises a screenshot, the screenshot comprising at least one of: a health information screenshot and a trip information screenshot.
Optionally, the access control system 160 includes a cloud server and at least two edge servers, where each edge server corresponds to at least one access control device;
optionally, the first obtaining module 161 and the sending module 162 may be disposed in the meta server.
Optionally, the edge server is configured to receive reference user information sent by the cloud server and store the reference user information in a reference user information base.
Optionally, the cloud server is configured to receive user real-time location information sent by a mobile end application of a user; determining a target access control device closest to the user according to the real-time position information of the user; sending the stored reference user information of the user to an edge server corresponding to the target access control equipment;
or
Optionally, the cloud server is configured to analyze, according to the access control device that the user historically arrives, the access control device that the user expects to arrive on the same day; and sending the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day.
Optionally, the cloud server is configured to analyze the estimated time that the user is estimated to arrive at the access control device on the same day according to the historical arrival time of the user at the access control device or the working hour of the company; at the target time before the predicted time, sending the stored reference user information of the user to an edge server corresponding to the entrance guard equipment predicted to arrive by the user on the same day;
or alternatively
Optionally, the cloud server is configured to determine a target distance between the user and the target access control device according to the real-time location information of the user; and when the target distance is smaller than a preset distance, sending the stored reference user information of the user to an edge server corresponding to the access control equipment which the user expects to arrive at on the same day.
Optionally, the edge server is configured to determine whether a reference user information base includes reference user information matched with the access control acquisition information; if the reference user information base of the edge server comprises reference user information matched with the access control acquisition information, entering a step of acquiring user identification information to be verified corresponding to the access control acquisition information; if the reference user information base of the edge server does not contain the reference user information matched with the access control acquisition information, the access control acquisition information is sent to the cloud server; the cloud server judges whether reference user information matched with the access control acquisition information is included in a reference user information base or not; and if the cloud server reference user information base comprises reference user information matched with the access control acquisition information, entering a step of acquiring to-be-verified user identification information corresponding to the access control acquisition information.
Referring to fig. 17, an embodiment of the present disclosure further provides an authentication server 170, which includes a processor 171, a memory 172, and a computer program stored in the memory 172 and capable of running on the processor 171, where the computer program, when executed by the processor 171, implements the processes of the above-mentioned embodiment of the access control management method applied to the authentication server, and can achieve the same technical effects, and in order to avoid repetition, the details are not repeated here.
Referring to fig. 18, an access control system 180 according to an embodiment of the present disclosure further includes a processor 181, a memory 182, and a computer program stored in the memory 182 and capable of running on the processor 181, where the computer program, when executed by the processor 181, implements the processes of the above-mentioned access control management method embodiment applied to the access control system, and can achieve the same technical effects, and therefore, in order to avoid repetition, the descriptions thereof are omitted here.
The embodiment of the present disclosure further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the embodiment of the access control method, and can achieve the same technical effect, and in order to avoid repetition, the detailed description is omitted here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes several instructions for enabling a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the methods according to the embodiments of the present disclosure.
While the present disclosure has been described with reference to the embodiments illustrated in the drawings, which are intended to be illustrative rather than restrictive, it will be apparent to those of ordinary skill in the art in light of the present disclosure that many more modifications may be made without departing from the spirit of the disclosure and the scope of the appended claims.

Claims (15)

1. An access control management method is applied to an authentication server, and is characterized by comprising the following steps:
receiving and storing pre-registration information sent by a mobile terminal application of a user, wherein the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following items: a health information screenshot and a journey information screenshot;
receiving user identification information to be verified, which is sent by an access control system;
inquiring whether pre-registration information corresponding to the user identification information to be verified is included in pre-registration information stored on the current day;
if the pre-registration information stored in the current day comprises the pre-registration information corresponding to the user identification information to be verified, verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirement or not and obtaining a verification result;
and generating access control information according to the verification result, and sending the access control information to the access control equipment.
2. The method according to claim 1, wherein the verifying whether the pre-registration information corresponding to the user identification information to be verified meets requirements and obtains a verification result comprises:
identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image identification result, wherein the image identification result comprises at least one of the following items: a health information status and a trip information status;
and verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet requirements or not to obtain a verification result.
3. The method of claim 2,
the image recognition result further includes: user identification information;
verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet requirements, wherein the method comprises the following steps:
verifying whether the user identification information in the image recognition result is matched with the user identification information to be verified;
if the user identification information in the image recognition result is matched with the user identification information to be verified, entering a step of verifying whether the health information state and/or the travel information state corresponding to the user identification information to be verified meet the requirements or not;
and if the user identification information in the image recognition result is not matched with the user identification information to be verified, generating a verification result containing alarm information and sending the verification result to the access control equipment.
4. The method of claim 2, wherein identifying the screenshot in the pre-registered information corresponding to the user identification information to be verified to obtain an image identification result comprises:
acquiring health information samples of a plurality of regions;
and identifying the screenshot in the pre-registered information corresponding to the user identification information to be verified according to the health information samples of the plurality of regions.
5. The method of claim 1,
the pre-registration information further comprises user identification information;
the inquiring whether the pre-registration information stored on the current day includes the pre-registration information corresponding to the user identification information to be verified includes:
and inquiring whether user identification information matched with the user identification information to be verified exists in the user identification information in the pre-registration information stored on the current day.
6. The utility model provides an access control management method, is applied to access control system, its characterized in that includes:
if the reference user information base comprises reference user information matched with access control acquisition information acquired by access control equipment, acquiring user identification information to be verified corresponding to the access control acquisition information;
sending the user identification information to be verified to a verification server so that the verification server verifies whether pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information comprises a screenshot, the screenshot comprising at least one of: a health information screenshot and a trip information screenshot.
7. The method of claim 6, wherein the access control system comprises a cloud server and at least two edge servers, each edge server corresponding to at least one access control device, the method further comprising:
and the cloud server sends the reference user information to the edge server.
8. The method of claim 7, wherein the cloud server sends the reference user information to the edge server, and further comprising:
the cloud server receives user real-time position information sent by a mobile terminal application of a user;
the cloud server determines a target access control device closest to the user according to the real-time position information of the user;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the target access control equipment;
or
The cloud server analyzes the access control equipment expected to arrive by the user on the same day according to the access control equipment historically arrived by the user;
and the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day.
9. The method of claim 8,
the method further comprises the following steps:
the cloud server analyzes the estimated time of the user to reach the access control equipment on the same day according to the historical time of the user to reach the access control equipment or the working time of a company;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day, and the edge server comprises: the cloud server sends the stored reference user information of the user to an edge server corresponding to the access control equipment expected to arrive by the user on the same day at the target time before the expected time;
or
The method further comprises the following steps:
the cloud server determines a target distance between the user and the target access control equipment according to the real-time position information of the user;
the cloud server sends the stored reference user information of the user to an edge server corresponding to the door control device expected to arrive by the user on the same day, and the edge server comprises:
and when the target distance is smaller than a preset distance, the cloud server sends the stored reference user information of the user to an edge server corresponding to the expected arrival access control equipment of the user on the same day.
10. The method according to claim 7, wherein the obtaining of the user identification information to be verified corresponding to the access control acquisition information further comprises:
the edge server judges whether reference user information matched with the access control acquisition information is included in a reference user information base;
if the reference user information base of the edge server comprises reference user information matched with the access control acquisition information, entering a step of acquiring user identification information to be verified corresponding to the access control acquisition information;
if the reference user information base of the edge server does not contain the reference user information matched with the access control acquisition information, the access control acquisition information is sent to the cloud server; the cloud server judges whether reference user information matched with the access control acquisition information is included in a reference user information base; and if the cloud server reference user information base comprises reference user information matched with the access control acquisition information, entering a step of acquiring user identification information to be verified corresponding to the access control acquisition information.
11. An authentication server, comprising:
the system comprises a first receiving module, a second receiving module and a third receiving module, wherein the first receiving module is used for receiving and storing pre-registration information sent by a mobile terminal application of a user, the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following items: a health information screenshot and a journey information screenshot;
the second receiving module is used for receiving the user identification information to be verified, which is sent by the access control system;
the query module is used for querying whether the pre-registration information stored on the current day includes the pre-registration information corresponding to the user identification information to be verified;
the first verification module is used for verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirements or not if the pre-registration information stored in the current day comprises the pre-registration information corresponding to the user identification information to be verified, and obtaining a verification result;
and the control module is used for generating access control information according to the verification result and sending the access control information to the access control equipment.
12. An access control system, comprising:
the first acquisition module is used for acquiring user identification information to be verified corresponding to the access control acquisition information if the reference user information base comprises reference user information matched with the access control acquisition information;
the sending module is used for sending the user identification information to be verified to a verification server so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements or not; the pre-registration information includes a screenshot, the screenshot including at least one of: a health information screenshot and a trip information screenshot.
13. An authentication server, comprising: processor, memory and program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the access control management method according to any of claims 1 to 5.
14. An access control system, comprising: processor, memory and program stored on the memory and executable on the processor, which when executed by the processor, implement the steps of the access control management method according to any one of claims 6 to 10.
15. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the access control management method according to any one of claims 1 to 5; alternatively, the computer program when executed by a processor implements the steps of the access control method of any one of claims 6 to 10.
CN202211142452.4A 2022-09-20 2022-09-20 Access control management method, authentication server, access control system and readable storage medium Pending CN115578815A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202211142452.4A CN115578815A (en) 2022-09-20 2022-09-20 Access control management method, authentication server, access control system and readable storage medium
PCT/CN2023/112533 WO2024060872A1 (en) 2022-09-20 2023-08-11 Access control management method, verification server, access control system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211142452.4A CN115578815A (en) 2022-09-20 2022-09-20 Access control management method, authentication server, access control system and readable storage medium

Publications (1)

Publication Number Publication Date
CN115578815A true CN115578815A (en) 2023-01-06

Family

ID=84581795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211142452.4A Pending CN115578815A (en) 2022-09-20 2022-09-20 Access control management method, authentication server, access control system and readable storage medium

Country Status (2)

Country Link
CN (1) CN115578815A (en)
WO (1) WO2024060872A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024060872A1 (en) * 2022-09-20 2024-03-28 京东方科技集团股份有限公司 Access control management method, verification server, access control system and readable storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112133008A (en) * 2020-08-11 2020-12-25 浙江大华技术股份有限公司 Park pedestrian identification method and system and computer equipment
CN112767586A (en) * 2020-12-31 2021-05-07 深圳市商汤科技有限公司 Passage detection method and device, electronic equipment and computer readable storage medium
CA3209075A1 (en) * 2021-02-20 2022-08-25 Alan Mark GELFAND Identity-based enablement of event access control
CN113538763B (en) * 2021-06-09 2023-10-27 青岛海信智慧生活科技股份有限公司 Entrance guard opening method, intelligent terminal and server
CN114299653A (en) * 2021-12-31 2022-04-08 上海商汤信息科技有限公司 Identity authentication method, device, system and storage medium
CN115019428A (en) * 2022-06-24 2022-09-06 杭州海康威视数字技术股份有限公司 Passage management method and device based on place codes
CN115578815A (en) * 2022-09-20 2023-01-06 京东方科技集团股份有限公司 Access control management method, authentication server, access control system and readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024060872A1 (en) * 2022-09-20 2024-03-28 京东方科技集团股份有限公司 Access control management method, verification server, access control system and readable storage medium

Also Published As

Publication number Publication date
WO2024060872A1 (en) 2024-03-28

Similar Documents

Publication Publication Date Title
CN108501980B (en) Monitoring method of track circuit equipment and terminal equipment
CN107239934B (en) Real-name system service and management system for construction workers
CN113330491B (en) Electronic gate opening method and device and server
WO2021012904A1 (en) Data updating method and related device
CN113837030B (en) Personnel intelligent management and control method and system for epidemic situation prevention and control and computer equipment
CN111552680A (en) Construction method and device of business fraud identification database and computer equipment
WO2024060872A1 (en) Access control management method, verification server, access control system and readable storage medium
CN111985646A (en) Service processing method and device
CN112489280A (en) Transformer substation personal safety monitoring method, system, terminal and storage medium
CN114826946B (en) Unauthorized access interface detection method, device, equipment and storage medium
CN111652781A (en) Service processing method, device, equipment and storage medium based on community codes
CN114358464A (en) Operation risk assessment method and device, electronic equipment and storage medium
CN116644825A (en) Big data-based outpatient information inquiry reservation management system
CN109801394B (en) Staff attendance checking method and device, electronic equipment and readable storage medium
CN115907898A (en) Method for recommending financial products to reinsurance client and related equipment
CN115577983A (en) Enterprise task matching method based on block chain, server and storage medium
CN114549221A (en) Vehicle accident loss processing method and device, computer equipment and storage medium
CN113850923B (en) Attendance checking statistical method, device, equipment and computer readable storage medium
KR102213022B1 (en) Dispatched Personnel Management System and method
CN113095155A (en) Check-in management method, device, system and computer readable storage medium
CN107679191B (en) Identification method, platform, equipment and system for labourious debarkation of labor employment
CN112509199A (en) Visitor management system for health data acquisition based on big data
CN110175784A (en) Auto metal halide lamp risk control method, apparatus and system
CN116229596B (en) Intelligent attendance system based on block chain
CN111080220A (en) Attendance result determination method and device, attendance system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination