CN115641664A - Access control passing method, device, equipment and storage medium - Google Patents

Access control passing method, device, equipment and storage medium Download PDF

Info

Publication number
CN115641664A
CN115641664A CN202211265148.9A CN202211265148A CN115641664A CN 115641664 A CN115641664 A CN 115641664A CN 202211265148 A CN202211265148 A CN 202211265148A CN 115641664 A CN115641664 A CN 115641664A
Authority
CN
China
Prior art keywords
visitor
information
entrance guard
access control
moment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211265148.9A
Other languages
Chinese (zh)
Inventor
王磊
陈莉
史文博
刘志昂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211265148.9A priority Critical patent/CN115641664A/en
Publication of CN115641664A publication Critical patent/CN115641664A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Alarm Systems (AREA)

Abstract

The disclosure provides an entrance guard passing method which can be applied to the technical field of entrance guard control or the field of financial science and technology. The method comprises the following steps: acquiring information associated with the visitor in response to an entrance guard passing request for requesting entry into the target area, wherein the information associated with the visitor comprises visitor information of the visitor and accompanying information of an accompanying person; recording the first moment when the accompanying person passes the entrance guard under the condition that the accompanying information passes the verification; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and allowing the visitor to pass through the entrance guard to enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value. The disclosure also provides an access control device, an apparatus and a storage medium.

Description

Access control passing method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of access control technology or the field of financial technology, and more particularly, to an access control method, apparatus, device, medium, and program product.
Background
In large complex places such as office buildings, data centers and important infrastructures, electronic access control is generally adopted to replace the attendance of personnel to control the passage of personnel due to numerous internal areas and spaces. When a visitor needs to enter some area with a higher security level, a chaperone is generally required to accompany the visitor into the area.
In the course of implementing the inventive concept of the present disclosure, the inventors found that at least the following problems exist in the related art: once the accompanying person is neglected, a non-visitor person may enter with the trail, thereby resulting in low security of visitor management.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a method, apparatus, device, storage medium, and program product for entrance guard passage that improve visitor management security.
In one aspect of the present disclosure, there is provided an entrance guard passing control method, including: responding to an access control passing request for requesting to enter a target area, and acquiring information associated with a visitor, wherein the information associated with the visitor comprises visitor information of the visitor and accompanying information of an accompanying person; recording the first time when the accompanying person passes the gate in the case that the accompanying information passes the verification; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and allowing the visitor to enter the target area through the entrance guard under the condition that the time difference between the second moment and the first moment meets a preset threshold value.
According to an embodiment of the present disclosure, the method further includes: determining the visitor identification according to the visitor information; retrieving from a database authorized visitor information associated with the visitor identification in accordance with the visitor identification; comparing whether the visitor information is consistent with the authorized visitor information; and determining that the visitor information is verified if the visitor information is consistent with the authorized visitor information.
According to an embodiment of the present disclosure, the method further includes: respectively initiating the access control passing requests by the visitors and the accompanying persons; wherein, the above-mentioned visitor information still includes under the condition that passes verifying: acquiring a third moment when the visitor initiates the access control passing request; and determining that the visitor information is verified under the condition that the third time is within the authorized time period.
According to an embodiment of the present disclosure, the method further includes: acquiring the current position information of the access control; and determining that the visitor information passes verification under the condition that the current position information of the access control is consistent with the position information of the access control authorized to pass by the visitor.
According to an embodiment of the present disclosure, the method further includes: obtaining visitor information of the visitor; storing the visitor information of the visitor into a preset medium; and sending the preset medium to the visitor so that the visitor initiates the access control passing request by using the preset medium.
According to an embodiment of the present disclosure, the method further includes: generating a passing record of the accompanying person under the condition that the accompanying person passes through the entrance guard; generating a passage record of the visitor under the condition that the visitor passes through the access control; and storing the passing record of the accompanying person and the passing record of the visitor in a record log in real time.
Another aspect of the present disclosure also provides an entrance guard passing device, including: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for responding to an access control passing request for requesting to enter a target area and acquiring information associated with a visitor, and the information associated with the visitor comprises visitor information of the visitor and accompanying information of an accompanying person; the first recording module is used for recording the first moment when the accompanying person passes the entrance guard under the condition that the accompanying information passes the verification; the second recording module is used for recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and the first determining module is used for allowing the visitor to enter the target area through the entrance guard under the condition that the time difference between the second moment and the first moment meets a preset threshold value.
Another aspect of the present disclosure also provides an electronic device, including: one or more processors; the storage device is used for storing one or more programs, wherein when the one or more programs are executed by the one or more processors, the one or more processors are enabled to execute the access control method.
Another aspect of the present disclosure also provides a computer-readable storage medium having executable instructions stored thereon, which when executed by a processor, cause the processor to execute the above-mentioned access control method.
Another aspect of the present disclosure also provides a computer program product, which includes a computer program, and when the computer program is executed by a processor, the access control method is implemented.
According to the access control passing method, the access control passing device, the access control passing equipment, the access control passing medium and the program product, visitor information and accompanying person information are obtained by responding to an access control passing request; recording the first moment when the accompanying person passes the entrance guard under the condition that the accompanying information passes the verification; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and allowing the visitor to pass through the entrance guard and enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value. Because the time difference is obtained according to the first moment when the accompanying person passes through the entrance guard and the second moment when the visitor information is verified to pass, the visitor information can be released only under the condition that the time difference meets the preset threshold value, if the time difference exceeds the time threshold value, the visitor information can not be released, the situation that non-visitor persons enter a target area along with the tail can be effectively avoided, the problem that the non-visitor persons enter the target area along with the tail in case that the accompanying person fails to see in the related art is at least partially solved, the safety of visitor management is improved, and unnecessary loss brought to places is reduced or avoided.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically shows a system architecture diagram of a method, apparatus, device, medium and program product for access control according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow chart of a method for door entry passage according to an embodiment of the present disclosure;
fig. 3 schematically shows an architecture diagram of a gate entry transit system according to an embodiment of the present disclosure;
fig. 4 schematically shows a flow chart of the entrance guard passing method applied to fig. 3 according to an embodiment of the present disclosure;
fig. 5 schematically shows a flow chart of a method for entrance guard passage according to another embodiment of the present disclosure;
fig. 6 is a block diagram schematically illustrating a structure of a door entry device according to an embodiment of the present disclosure; and
fig. 7 schematically shows a block diagram of an electronic device suitable for implementing a door access method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B, and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B, and C" would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). Where a convention analogous to "at least one of A, B, or C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B, or C" would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.).
In a large complex place, due to numerous internal regions and spaces, personnel can not be arranged at the entrances and exits of each region and space, and electronic access control personnel are generally adopted for access. When the visitor enters some high security level and unattended areas and spaces, a specially-assigned person is often required to accompany the visitor. The general process of leading the visitor to enter the target area by the accompanying person can be that the passing gate inhibition is authenticated by the accompanying person, and the visitor information is manually registered and put on record. The mode needs the accompanying person to consciously fulfill the requirements of accompanying, simultaneous entering and exiting and active registration of a specially-assigned person. However, in the unattended area, once a person is careless, for example, when the person is in a time period of registration and filing, there are risks that a non-visitor person enters the unattended area at the end, or the person is brought by another accompanying person, and visitor information registration is lost, so that control management of visitors is disabled, and safety of visitor management is reduced.
In view of this, embodiments of the present disclosure provide an access control method, apparatus, device, storage medium, and program product for preventing tailgating of non-guest persons and improving security of guest management. Specifically, the method comprises the following steps: responding to an access control request for requesting to enter a target area, and acquiring information associated with a visitor, wherein the information associated with the visitor comprises visitor information of the visitor and accompanying information of an accompanying person; recording the first moment when the accompanying person passes the entrance guard under the condition that the accompanying information passes the verification; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and allowing the visitor to pass through the entrance guard to enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value.
It should be noted that the access control passing method and device determined by the embodiment of the disclosure can be applied to the technical field of access control or the technical field of financial science and technology. The access control passing method and the access control passing device determined by the embodiment of the disclosure can also be used in any fields except the technical field of access control and the field of financial science and technology. The application fields of the determined entrance guard passing method and device are not limited by the embodiment of the disclosure.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated. In the technical scheme of the disclosure, before the personal information of the user is obtained or collected, the authorization or the consent of the user is obtained.
Fig. 1 schematically shows a system architecture diagram of a door entry passage method, apparatus, device, medium, and program product according to embodiments of the present disclosure.
As shown in fig. 1, the system architecture 100 according to this embodiment may include a gate 101, a gate 102, an information recognition device 103, a network 104, and a server 105.
The gates 101, 102 may be various gates located in a public or standalone environment, including but not limited to turnstiles, wing gates, swing gates, triple-roller gates, express gates, full-height gates, and the like.
The information recognition device 103 may identify the identity of a user or visitor with a user, such as a face recognition device, a fingerprint recognition device, a two-dimensional code recognition device, an electronic card recognition device, and the like. In one embodiment, the information recognition devices 103 may be respectively disposed at two sides of a door, such as the door 101. The information recognition device 103 may also be provided on one side of a door, such as the door 102.
The network 104 is used to provide a medium for communication links between the gateways 101, 102, the information recognition device 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The server 105 may be a server that provides various services. Specifically, accompanying person and visitor person can carry out information identification simultaneously through the information identification equipment 103 of entrance guard 101 both sides, guarantee with advancing with going out. Accompanying people and visitor people can also sequentially carry out information identification through the information identification equipment 103 on the entrance guard 102 so as to ensure that the entrance and the exit are carried out within a preset time threshold. In both of the above manners, the server 105 may obtain information associated with the visitor in response to an access request for entering the target area, which is initiated by the accompanying person and the visitor, wherein the information associated with the visitor includes visitor information of the visitor and accompanying information of the accompanying person; allowing the accompanying person to pass under the condition that the accompanying information passes the verification, and recording the first moment when the accompanying person passes the entrance guard; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification, wherein the second moment can be the same as the first moment or different from the second moment; and allowing the visitor to pass through the entrance guard to enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value.
It should be noted that the access control method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the access control device provided by the embodiment of the present disclosure may be generally disposed in the server 105. The access control passing method provided by the embodiment of the disclosure can also be executed by a server or a server cluster which is different from the server 105 and can communicate with the access control 101, 102, the information identification device 103 and/or the server 105. Accordingly, the entrance guard passing device provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the entrance guards 101 and 102, the information identification device 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. Any number of access controls, information recognition devices, networks, and servers may be present, as desired.
The access control method according to the disclosed embodiment will be described in detail below with reference to fig. 2 to 5 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flow chart of a door access passage method according to an embodiment of the present disclosure.
As shown in fig. 2, the access control method of the embodiment includes operations S201 to S204.
In operation S201, information associated with a visitor is acquired in response to a door access request for requesting entry into a target area, wherein the information associated with the visitor includes visitor information of the visitor and accompanying information of an accompanying person.
In operation S202, in case that the chaperonin information passes the verification, a first time when the chaperonin passes the entrance guard is recorded.
In operation S203, in case that the guest information is authenticated, a second time when the guest information is authenticated is recorded.
In operation S204, the visitor is allowed to pass through the entrance guard to enter the target area under the condition that the time difference between the second time and the first time satisfies the preset threshold.
According to embodiments of the present disclosure, the target area may be an interior area within a large complex site, such as a room entrance inside a campus or building, or the like.
According to the embodiment of the present disclosure, the visitor information may include identity information of the visitor, a time period during which the visitor can access the target area, identity information of an escort who leads the visitor, information of an entrance guard through which the visitor can pass, and the like.
According to the embodiment of the present disclosure, the information of the accompanying person may include identity information of the accompanying person, identity information of a visitor to be accompanied, a time period of the accompanying visitor, an authority of the accompanying person through a target area access, and the like.
According to this disclosed embodiment, under the condition that accompany information passes verification, can allow the accompany person to pass through, first moment can be the moment that accompany person passes through entrance guard.
According to an embodiment of the present disclosure, the second time may be a time when the visitor information is authenticated. If the accompanying person and the visitor verify at the same time, the first moment can be the same as the second moment, the visitor and the accompanying person can advance at the same time, and if the accompanying person and the visitor enter and exit in sequence, the following of non-visitor personnel can be controlled according to the time difference.
According to the embodiment of the disclosure, the preset threshold may be a time threshold, and is used for judging a difference value between a moment when the visitor passes the verification and a moment when the accompanying person passes the entrance guard, and it can be understood that the preset threshold may be zero when the accompanying person simultaneously enters and exits; under the condition that the accompanying person and the visitor pass in and out in sequence, the preset threshold value can be adjusted adaptively according to actual conditions such as entrance guard passing sensitivity, pedestrian volume and the like.
According to the access control passing method, the access control passing device, the access control passing equipment, the access control passing medium and the program product, visitor information and accompanying person information are obtained by responding to an access control passing request; recording the first moment when the accompanying person passes the entrance guard under the condition that the accompanying information passes the verification; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and allowing the visitor to pass through the entrance guard and enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value. Because the time difference is obtained according to the first moment when the accompanying person passes through the entrance guard and the second moment when the visitor information is verified to pass, the visitor information can be released only under the condition that the time difference meets the preset threshold value, if the time difference exceeds the time threshold value, the visitor information can not be released, the situation that non-visitor persons enter a target area along with the tail can be effectively avoided, the problem that the non-visitor persons enter the target area along with the tail in case that the accompanying person fails to see the attention in the related technology is at least partially solved, the safety of visitor management is improved, and unnecessary loss brought to places is reduced or avoided.
According to the embodiment of the disclosure, the method further comprises the steps of obtaining visitor information of the visitor; storing visitor information of a visitor into a preset medium; and sending a preset medium to the visitor so that the visitor can initiate an access control passing request by using the preset medium.
According to an embodiment of the present disclosure, the preset medium may be used to carry visitor information, such as a two-dimensional code, an electronic card, a smart card, and the like.
According to the embodiment of the disclosure, before a visitor enters a park entrance or a building entrance, visitor information such as identity information of the visitor, a time period accessible by the visitor, an accompanying person with the visitor, and accessible entrance guard information can be stored in a database in advance. At the entrance guard before the entrance of the park or the building, the visitor can provide certificate information, and the identity information registered in the authorized database is compared, and under the condition that the comparison is consistent, the identity information of the visitor is considered to pass the verification. And in the case of inconsistent comparison, prompting the user to confirm again that the correct certificate information is provided. Under the condition that the identity information passes verification, the identity information of the visitor, the time period accessible by the visitor, the accompanying person with the visitor, the accessible entrance guard information and the like stored in the database can be stored into the two-dimensional code or the electronic card or the intelligent card through the identity information collector, and the two-dimensional code or the electronic card is sent to the visitor. The visitor can use the received two-dimensional code or the electronic card or the intelligent card to initiate an entrance guard passing request before the entrance guard of the target area.
According to the embodiment of the disclosure, the database can also store the identity information of the accompanying person, the identity information of the visitor to be accompanied, the time period of the accompanying visitor, the authority of the accompanying person through the target area entrance guard and other accompanying information. Operation S202 may further include the following operations: under the condition that an escorting person initiates an entrance guard passing request entering a target area before entrance guard of the target area, identity recognition needs to be carried out on the escorting person. The identity information of the accompanying person, the identity information of the visitor to be accompanied, the time period of the accompanying visitor, the authority of the accompanying person for passing the target area entrance guard and the like can be identified by an identity recognizer, such as a human face, a fingerprint, a password, a two-dimensional code, an electronic card and the like. And comparing the information of the accompanying person with the information of the accompanying person in the database, and under the condition of consistent comparison, considering that the information of the accompanying person passes verification to obtain a signal which allows the accompanying person to pass the entrance guard. In case of inconsistent comparison, the accompanying person may be prompted to reconfirm the correct accompanying information provided. And under the condition that the accompanying person passes through the entrance guard, the passing record of the accompanying person is recorded into the record log in real time. For example, the passing time of the accompanying person and the position information of the passing gate are recorded in a log.
According to an embodiment of the present disclosure, operation S203 may further include the operations of: when the visitor information is verified, the visitor information can be identified through the identity identifier. For example, visitor information is identified through a human face, fingerprints, passwords, two-dimensional codes, an electronic card and the like, the visitor information is compared with visitor information in a database, and under the condition that the visitor information is consistent in comparison, the visitor information can be considered to pass verification, and the time when the visitor information passes verification is recorded. And in case of inconsistent comparison, the visitor can be prompted to provide correct visitor information.
According to an embodiment of the present disclosure, when matching the identified guest information with the guest information in the database, the following operations may be included: determining a visitor identifier according to the visitor information; retrieving from the database, authorized guest information associated with the guest identification in accordance with the guest identification; comparing whether the visitor information is consistent with the authorized visitor information; and determining that the visitor information is verified in the case that the visitor information is consistent with the authorized visitor information.
According to embodiments of the present disclosure, the guest identification may be a guest name, a guest number, etc., included in the guest identity information. The authorized visitor information may be identity information of the visitor pre-stored in a database. And under the condition that the identified visitor identity information is consistent with the visitor information prestored in the database in comparison, the visitor information can be considered to pass the verification, and the second moment of passing the verification is recorded. If the comparison is inconsistent, the visitor can be prompted to reconfirm the correct identity information provided.
According to the embodiment of the present disclosure, when matching the identified guest information with the guest information in the database, the following operations may be further included: acquiring a third moment when the visitor initiates an entrance guard passing request; and determining that the visitor information is verified in the case that the third time is within the authorized time period.
According to the embodiment of the disclosure, both a visitor and a fellow passenger can initiate an entrance guard passing request for requesting to enter a target area. And the third moment is that the visitor initiates an entrance guard passing request. The authorized time period may be a time period during which the guest is able to access the target area. Specifically, a time period in which the visitor can access the target area may be acquired from the database based on the third time, and if the third time data is within the time period, the visitor information may be considered to be verified, and a second time at which the visitor information is verified may be recorded. If the third moment is no longer in the time period, the method can be reminded that the visitor can apply for the entrance guard passing request later or again when the method is not in the set time.
According to the embodiment of the present disclosure, when matching the identified guest information with the guest information in the database, the following operations may be further included: acquiring current position information of an entrance guard; and determining that the visitor information passes verification under the condition that the current position information of the access control is consistent with the position information of the access control passed by the authorized visitor.
According to an embodiment of the present disclosure, the current location information of the entrance may be location information of an entrance associated with an entrance passage request initiated by a visitor. The position information of the entrance guard through which the authorized visitor passes can be obtained according to the information of the entrance guard through which the visitor can pass, which is pre-stored in the database. The pre-stored information of the entrance guard through which the visitor can pass may include a serial number of the entrance guard, location information of the entrance guard, and the like. And under the condition that the current position information of the access control is consistent with the position information of the access control stored in the database, the visitor information can be considered to pass the verification, and the second moment of passing the verification is recorded. Under the condition that the current position information of the access control is inconsistent with the position information of the access control stored in the database, the visitor can be prompted to confirm that the access control passing request is initiated at the correct target area again.
Optionally, when the identified visitor identity information is compared with the visitor information pre-stored in the database to be consistent, when the third time data is within a time period in which the visitor can access the target area, and when the current position information of the access control is consistent with the position information of the access control stored in the database, when all of the three conditions are satisfied, the visitor information may be considered to pass the verification, and the second time at which the visitor information passes the verification may be recorded. If at least one or two of the three conditions are met, the visitor information is not verified, and the visitor is prompted to re-initiate an entrance guard passing request for entering the target area.
According to the embodiment of the disclosure, under the condition that the time difference between the second moment and the first moment meets the preset threshold value, the visitor can be allowed to enter the target area through the entrance guard. And under the condition that the visitor passes through the entrance guard, the passing record of the visitor is recorded into the record log in real time. For example, the passing time of the visitor and the position information of the passed entrance guard are recorded in a log, so as to inquire or manage the passing condition of the visitor in the following.
According to an embodiment of the present disclosure, in case that the guest information is not considered to be verified, the failed case may also be recorded in the log. The failed condition may include the identified visitor information and a comparison result with the visitor information stored in the database for subsequent inquiry or management of the visitor.
According to this disclosed embodiment, when the flow of people is big, entrance guard also can be normally open state, and recognition device can discern personnel through this entrance guard to in the record log, both can improve the current efficiency when the flow of people is big, can also keep the record of personnel business turn over, be convenient for follow-up data audit that carries on.
According to the embodiment of the disclosure, the visitor and the accompanying person can be effectively controlled to enter and exit simultaneously or enter and exit within a certain time threshold at the entrance guard end of an unattended area, so that the non-visitor is prevented from following. The system can also automatically record the access information, thereby strengthening the intelligent management capacity of areas and personnel and strengthening the risk management capacity of visitor personnel.
Fig. 3 schematically shows an architecture diagram of a gate entry system according to an embodiment of the present disclosure.
As shown in fig. 3, the entrance guard passing system 300 includes an information collector 301, an information identifier 302, a database 303, a controller 304, a storage log 305, and an entrance guard channel 306. The information collector 301, the information identifier 302, the database 303, the storage log 305 and the access control channel 306 are respectively electrically or signally connected with the controller 304.
According to an embodiment of the present disclosure, the information collector 301 may include one or more of a two-dimensional code recognizer, a fingerprint recognizer, a face recognizer, an iris recognizer, a card reader, and a keyboard. The information collector 301 may combine one or more of face recognition, fingerprint recognition, two-dimensional code, smart card, and other identification means according to actual deployment requirements.
According to an embodiment of the present disclosure, the information identifier 302 may include one or more of a two-dimensional code recognition module, a fingerprint recognition module, a face recognition module, an iris recognizer, a card reader, and a keyboard. The information identifier 302 may combine one or more of face recognition, fingerprint recognition, two-dimensional code, smart card, and other identification means according to actual deployment requirements.
According to an embodiment of the present disclosure, the database 303 may be used to store information data of authorized access to the target area, including visitor identity, accessible time period, accompanying person, accessible area, and the like.
According to the embodiment of the present disclosure, the controller 304 may be configured to receive, process, and send instructions, and may further control the information collector 301, the information identifier 302, the database 303, the log storage 305, and the access control channel 306 to implement a core function of the access control system.
According to an embodiment of the present disclosure, the storage log 305 may be used to store all behavior logs that attempt to pass through the access channel 306 or have passed through the access channel 306. And the information can comprise information such as visitors, access time, accompanying persons, entrance guard, passing state, verification results and the like.
According to the embodiment of the present disclosure, the access control channel 306 may be used for access control and preventing the passage of trailing personnel. The gate that the passageway was selected for use can carry out the adaptability according to actual conditions and adjust.
According to the embodiment of the disclosure, the access control system can also be suitable for access control scenes triggered by multi-person rechecking.
Fig. 4 schematically shows a flowchart applied to the access control method of fig. 3 according to an embodiment of the present disclosure.
As shown in fig. 4, the method includes operations S401 to S408.
In operation S401, the guest obtains an access permission and information is stored in an authorized database.
In operation S402, the guest information verifies the identity information collection.
In operation S403, the chaperone information is identified.
In operation S404, the controller checks whether there is an entry authority.
In operation S405, the fellow passenger enters through the entrance guard and logs are recorded.
In operation S406, guest information is identified.
In operation S407, the controller checks whether the guest enters the right.
In operation S408, the visitor enters through the entrance guard and logs.
According to an embodiment of the present disclosure, operation S402 may be implemented by the information collector 301, and operations S403 and S406 may be implemented by the information identifier 302. Operations S404 and S407 may be implemented by the controller 304. Operations S405 and S408 may be implemented by the storage log 305 and the access control channel 306.
Fig. 5 schematically shows a flow chart of a method for entrance guard passage according to another embodiment of the present disclosure.
As shown in fig. 5, the method includes S501 to S510.
In operation S501, identity information of the visitor, an accessible time period, a fellow, and accessible area information are stored in an authorized database. So that the visitor can obtain permission for the application to enter the first area. The first area may be a campus entry, a building entry, etc.
In operation S502, the visitor provides a certificate at the periphery of the first zone boundary, and completes information verification by matching authorized database registration information. And storing the visitor information through the information collector. If the information collector contains the two-dimensional code, the two-dimensional code can be used as an information carrier and sent to the visitor. If the information collector comprises an electronic card and an intelligent card identification device, the electronic card or the intelligent card can be used as an information carrier to be sent to the visitor. The information verification of operation S502 may be used for the visitor credential to obtain the unique identification information in the first area.
In operation S503, the accompanying person and the visitor enter the gate in the second area, the accompanying person performs information identification, and the information identifier identifies the person-needed information through faces, fingerprints, passwords, cards and other modes, and transmits the person information to the controller. The second zone may be a campus or a room entrance inside a building.
In operation S504, the controller retrieves information from the authorized database and matches the identified person information with the authorized information.
In operation S505, whether the matching authorized information is consistent with the person information. Operation S506 may be continuously performed in case of coincidence. In case the information is not consistent, execution may be resumed from operation S503. After the execution is started again in operation S503, if the information is not consistent within a certain number of times, the entry of an accompanying person may be rejected, and the matching result may be recorded in the storage log.
In operation S506, the controller transmits a pass permission signal to the entrance guard passage, the accompanying person may enter through the entrance guard passage, and the entry and exit records of the accompanying person are automatically stored in the storage log. It will be appreciated that the accompanying person may need to have access to the second area.
In operation S507, the visitor performs information recognition, and the information recognizer recognizes visitor information through a face, a fingerprint, a password, a card, and the like, and transmits the visitor information to the controller.
In operation S508, the controller retrieves information from the authorized database and performs matching. For example, matching the authorized visitor information with the identified visitor person information is consistent; the information identifies whether the time is within an authorized time period; whether the current access control information is consistent with the access control information of the authorized access area; whether the difference value between the first moment when the escort is checked and released at the current entrance guard position for the last time and the second moment when the visitor checks currently is within the preset time period or not. The visitor information matching here can be used for the exclusive identification information of the first area to enter and exit the access control channel of the second area.
In operation S509, whether the matching result indicates that the above conditions are all satisfied. In case that the matching results are all satisfied, operation S510 may be continuously performed. In the case where the matching results are not all satisfied, execution may be resumed from operation S507. After the execution is started again in operation S507, if the matching result still fails to indicate that all the above conditions are met within a certain number of times, the visitor may be rejected from entering and the matching result may be recorded in the storage log.
In operation S510, the controller transmits a pass permission signal to the access control passage, the visitor enters through the access control passage, and the entry and exit records of the visitor are stored in the storage log.
According to the embodiment of the disclosure, in order to deal with the emergency situation that the crowd passes through at a large flow rate, the controller can send an emergency opening signal to the entrance guard channel, the entrance guard channel is normally opened, and the information recognition device can record the personnel entering and exiting conditions into the storage log through the controller. The scene can combine the auditing and alarming modules, so that the high-flow passing efficiency can be improved, and the functions of warning in the event of personnel entering and exiting and auditing after the event can be reserved.
According to the embodiment of the disclosure, the visitor and the accompanying person can be effectively controlled to enter and exit simultaneously or enter and exit within a certain time threshold at the entrance guard end of an unattended area, so that the non-visitor is prevented from following. The system can also automatically record the access information, thereby strengthening the intelligent management capacity of areas and personnel and strengthening the risk management capacity of visitor personnel.
According to the embodiment of the present disclosure, the contents of operations S401 to S408 and operations S501 to S510 may refer to operations S201 to S204 and the related description, and are not repeated herein.
It should be noted that, unless explicitly stated that there is an execution sequence between different operations or there is an execution sequence between different operations in technical implementation, the execution sequence between multiple operations may not be sequential, or multiple operations may be executed simultaneously in the flowchart in this disclosure.
Based on the access control passing method, the disclosure also provides an access control passing device. The apparatus will be described in detail below with reference to fig. 6.
Fig. 6 schematically shows a block diagram of a door access device according to an embodiment of the present disclosure.
As shown in fig. 6, the entrance guard passing device 600 of this embodiment includes a first obtaining module 610, a first recording module 620, a second recording module 630, and a first determining module 640.
The system comprises a first obtaining module 610, configured to obtain information associated with a visitor in response to a door access request requesting to enter a target area, wherein the information associated with the visitor includes visitor information of the visitor and accompanying information of an accompanying person.
The first recording module 620 is configured to record a first moment when the accompanying person passes through the access control under the condition that the accompanying information passes through the verification.
A second recording module 630, configured to record a second time when the visitor information passes the verification if the visitor information passes the verification.
And the first determining module 640 is configured to allow the visitor to pass through the entrance guard to enter the target area under the condition that a time difference between the second time and the first time meets a preset threshold.
According to the access control passing method, the access control passing device, the access control passing equipment, the access control passing medium and the access control passing program product, visitor information and accompanying person information are obtained by responding to an access control passing request; recording the first moment when the accompanying person passes the entrance guard under the condition that the accompanying information passes the verification; recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification; and allowing the visitor to pass through the entrance guard and enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value. Because the time difference is obtained according to the first moment when the accompanying person passes through the entrance guard and the second moment when the visitor information is verified to pass, the visitor information can be released only under the condition that the time difference meets the preset threshold value, if the time difference exceeds the time threshold value, the visitor information can not be released, the situation that non-visitor persons enter a target area along with the tail can be effectively avoided, the problem that the non-visitor persons enter the target area along with the tail in case that the accompanying person fails to see the attention in the related technology is at least partially solved, the safety of visitor management is improved, and unnecessary loss brought to places is reduced or avoided.
According to the embodiment of the disclosure, the entrance guard passing device further comprises a second determining module, a retrieving module, a comparing module and a third determining module.
And the second determining module is used for determining the visitor identification according to the visitor information.
A retrieval module to retrieve from a database authorized visitor information associated with the visitor identification in accordance with the visitor identification.
A comparison module for comparing whether the visitor information is consistent with the authorized visitor information.
A third determination module for determining that the visitor information is verified if the visitor information is consistent with the authorized visitor information.
According to an embodiment of the present disclosure, the second recording module may further include an acquisition unit and a first determination unit.
And the obtaining unit is used for obtaining a third moment when the visitor initiates the access control passing request.
A first determination unit for determining that the visitor information is authenticated if the third time is within an authorized time period.
According to this disclosed embodiment, entrance guard's current device can also include: the device comprises a second obtaining module and a fourth determining module.
And the second acquisition module is used for acquiring the current position information of the access control.
And the fourth determination module is used for determining that the visitor information is verified to pass under the condition that the current position information of the access control is consistent with the position information of the access control authorized to pass by the visitor.
According to the embodiment of the disclosure, the entrance guard passing device further comprises a third obtaining module, a first storage module and a sending module.
And the third acquisition module is used for acquiring visitor information of the visitor.
The first storage module is used for storing the visitor information of the visitor into a preset medium.
And the sending module is used for sending the preset medium to the visitor so that the visitor can use the preset medium to initiate the access control passing request.
According to the embodiment of the disclosure, the entrance guard passing device further comprises a first generation module, a second generation module and a second storage module.
And the first generation module is used for generating the passage record of the accompanying person under the condition that the accompanying person passes through the entrance guard.
And the second generation module is used for generating the passage record of the visitor under the condition that the visitor passes through the entrance guard.
And the second storage module is used for storing the passage record of the accompanying person and the passage record of the visitor to a record log in real time.
According to an embodiment of the present disclosure, any plurality of the first obtaining module 610, the first recording module 620, the second recording module 630, and the first determining module 640 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first obtaining module 610, the first recording module 620, the second recording module 630, and the first determining module 640 may be at least partially implemented as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or an appropriate combination of any of them. Alternatively, at least one of the first obtaining module 610, the first recording module 620, the second recording module 630 and the first determining module 640 may be at least partially implemented as a computer program module, which, when executed, may perform a corresponding function.
It should be noted that the access control passing device portion in the embodiment of the present disclosure corresponds to the access control passing method portion in the embodiment of the present disclosure, and the description of the access control passing device portion specifically refers to the access control passing method portion, which is not described herein again.
Fig. 7 schematically shows a block diagram of an electronic device suitable for implementing a door access method according to an embodiment of the present disclosure.
As shown in fig. 7, an electronic device 700 according to an embodiment of the present disclosure includes a processor 701, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are stored. The processor 701, the ROM 702, and the RAM 703 are connected to each other by a bus 704. The processor 701 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 702 and/or the RAM 703. Note that the programs may also be stored in one or more memories other than the ROM 702 and the RAM 703. The processor 701 may also perform various operations of method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 700 may also include input/output (I/O) interface 705, which input/output (I/O) interface 705 is also connected to bus 704, according to an embodiment of the present disclosure. The electronic device 700 may also include one or more of the following components connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that the computer program read out therefrom is mounted in the storage section 708 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be embodied in the device/apparatus/system described in the above embodiments; or may exist alone without being assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 702 and/or the RAM 703 and/or one or more memories other than the ROM 702 and the RAM 703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the entrance guard passing method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 701. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program, when executed by the processor 701, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the disclosure, and these alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (10)

1. An access control passing method comprises the following steps:
acquiring information associated with a visitor in response to an entrance guard passing request for requesting entry into a target area, wherein the information associated with the visitor comprises visitor information of the visitor and accompanying information of an accompanying person;
recording the first moment when the accompanying person passes through the entrance guard under the condition that the accompanying information passes through verification;
recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification;
and allowing the visitor to pass through the entrance guard to enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value.
2. The method of claim 1, further comprising:
determining the visitor identification according to the visitor information;
retrieving from a database authorized guest information associated with the guest identification in accordance with the guest identification;
comparing whether the visitor information is consistent with the authorized visitor information;
determining that the visitor information is verified if the visitor information is consistent with the authorized visitor information.
3. The method of claim 1, further comprising: respectively initiating the access control passing requests by the visitor and the accompanying person;
wherein, the visitor information further comprises, in case of passing the visitor information verification:
acquiring a third moment when the visitor initiates the access control passing request;
determining that the guest information is verified if the third time is within an authorized time period.
4. The method of any of claims 1 to 3, further comprising:
acquiring current position information of the entrance guard;
and determining that the visitor information passes the verification under the condition that the current position information of the access control is consistent with the position information of the access control authorized to pass by the visitor.
5. The method of any of claims 1 to 3, further comprising:
obtaining visitor information of the visitor;
storing visitor information of the visitor into a preset medium;
and sending the preset medium to the visitor so that the visitor can initiate the access control passing request by using the preset medium.
6. The method of any of claims 1 to 3, further comprising:
generating a passing record of the accompanying person under the condition that the accompanying person passes through the entrance guard;
generating a pass record of the visitor under the condition that the visitor passes through the access control;
and storing the passage record of the accompanying person and the passage record of the visitor to a record log in real time.
7. An access control passing device comprising:
the system comprises a first obtaining module, a second obtaining module and a third obtaining module, wherein the first obtaining module is used for responding to an entrance guard passing request for requesting to enter a target area and obtaining information associated with a visitor, and the information associated with the visitor comprises visitor information of the visitor and accompanying information of an accompanying person;
the first recording module is used for recording the first moment when the accompanying person passes through the entrance guard under the condition that the accompanying information passes the verification;
the second recording module is used for recording a second moment when the visitor information passes the verification under the condition that the visitor information passes the verification;
and the first determining module is used for allowing the visitor to pass through the entrance guard to enter the target area under the condition that the time difference between the second moment and the first moment meets a preset threshold value.
8. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-6.
9. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any one of claims 1 to 6.
10. A computer program product comprising a computer program which, when executed by a processor, carries out the method according to any one of claims 1 to 6.
CN202211265148.9A 2022-10-17 2022-10-17 Access control passing method, device, equipment and storage medium Pending CN115641664A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211265148.9A CN115641664A (en) 2022-10-17 2022-10-17 Access control passing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211265148.9A CN115641664A (en) 2022-10-17 2022-10-17 Access control passing method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115641664A true CN115641664A (en) 2023-01-24

Family

ID=84944752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211265148.9A Pending CN115641664A (en) 2022-10-17 2022-10-17 Access control passing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115641664A (en)

Similar Documents

Publication Publication Date Title
US9552684B2 (en) Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control
US9875592B1 (en) Drone used for authentication and authorization for restricted access via an electronic lock
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
US10275957B2 (en) Methods, systems and devices for access control
CN109243040B (en) Access control passing management method, device, equipment and storage medium
JP6081859B2 (en) Entrance / exit management system and entrance / exit management method
KR102114038B1 (en) Selective unattended store system for underage monitoring and operation method of the same
US10055918B2 (en) System and method for providing secure and anonymous personal vaults
WO2018110012A1 (en) Face image processing method and face image processing device
CN110111470A (en) A kind of current data linkage control method and control device
CN213814815U (en) Access control system of national treasury
KR20220041695A (en) System and method for access control using blockchain network and computer program for the same
US20210166514A1 (en) Method and system for enhancing security of a secured area
KR20170013597A (en) Method and Apparatus for Strengthening of Security
KR101492799B1 (en) Entrance control integrated video recording system and method thereof
JP2010090677A (en) Entrance and exit area collation system, entrance and exit area collation method, and program therefor
CN110619760A (en) Guiding method and device applied to unmanned vehicle
US20200014673A1 (en) Cognitive fraud prevention
CN115641664A (en) Access control passing method, device, equipment and storage medium
KR101933769B1 (en) Smart pass authenticating system
US20180114005A1 (en) System and method for managing identity information stored in a cloud server
CN117409503A (en) Gate passing method and device and gate
CN112767073A (en) Check-in management control method and device, mobile terminal and storage medium
JP7416308B2 (en) Admission control device, admission control system, admission control method and admission control program
CN111508124A (en) Authority verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination