CN116935525A - Access control method, device, equipment, system and storage medium - Google Patents

Access control method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN116935525A
CN116935525A CN202311075986.4A CN202311075986A CN116935525A CN 116935525 A CN116935525 A CN 116935525A CN 202311075986 A CN202311075986 A CN 202311075986A CN 116935525 A CN116935525 A CN 116935525A
Authority
CN
China
Prior art keywords
access control
access
control system
equipment
access point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311075986.4A
Other languages
Chinese (zh)
Inventor
史哲桢
杨好
王珏莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Tianyue Technology Co ltd
Original Assignee
Shanghai Tianyue Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Tianyue Technology Co ltd filed Critical Shanghai Tianyue Technology Co ltd
Priority to CN202311075986.4A priority Critical patent/CN116935525A/en
Publication of CN116935525A publication Critical patent/CN116935525A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an access control method, an access control device, access control equipment, an access control system and a storage medium. The method comprises the following steps: detecting an access control system accessed in a plug-in mode; and synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level. According to the technical scheme, the roaming across multiple access control systems is realized, the data of multiple sets of access control systems are synchronized, the efficiency of access control data management, personnel authority management and the like is improved, the efficiency of access control is improved, the workload of workers is reduced, the management difficulty is reduced, and the resource waste is avoided.

Description

Access control method, device, equipment, system and storage medium
Technical Field
The embodiment of the invention relates to the technical field of security protection, in particular to an access control method, an access control device, an access control equipment, an access control system and a storage medium.
Background
With the development of society, the privacy awareness and property protection awareness of people are improved to a great extent, and the progress of security entrance guard technology is accelerated. At present, most security access control systems are independent and concurrent, and a worker is required to learn to use different access control systems, so that various data in the access control systems are managed in different modes, the workload of the worker is increased, the problems of resource waste and high management cost are caused, and the efficiency of access control is also influenced.
Disclosure of Invention
The invention provides an access control method, an access control device, access control equipment, an access control system and a storage medium, so that access control can be controlled rapidly and efficiently.
In a first aspect, an embodiment of the present invention provides an access control method, including:
detecting an access control system accessed in a plug-in mode;
and synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level.
In a second aspect, an embodiment of the present invention provides an access control device, which is characterized by including:
the detection module is used for detecting an access control system accessed in a plug-in mode;
and the synchronization module is used for synchronizing equipment information of access point equipment in the access control system, and the access point equipment corresponds to the mechanism level.
In a third aspect, an embodiment of the present invention provides an access control device, including:
one or more processors;
a storage means for storing one or more programs;
the access control equipment supports a plurality of access control systems to be accessed in the form of plug-ins;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the access control method as described in the first aspect.
In a fourth aspect, an embodiment of the present invention provides an access control system, including: at least one access control system, and an access control device according to the third aspect.
In a fifth aspect, an embodiment of the present invention further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor implements the access control method according to the first aspect.
The embodiment of the invention provides an access control method, an access control device, access control equipment, an access control system and a storage medium, wherein the access control system is detected to be accessed in a plug-in mode; and synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level. According to the technical scheme, the roaming across multiple access control systems is realized, the data of multiple sets of access control systems are synchronized, the efficiency of access control data management, personnel authority management and the like is improved, the efficiency of access control is improved, the workload of workers is reduced, the management difficulty is reduced, and the resource waste is avoided.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
Fig. 1 is a flowchart of an access control method according to a first embodiment of the present invention;
fig. 2 is a schematic structural diagram of an access control system accessed in a plug-in manner according to a first embodiment of the present invention;
fig. 3 is a schematic structural diagram of an access point device corresponding to a mechanism level according to a first embodiment of the present invention;
fig. 4 is a schematic structural diagram of a card issuing interface according to a first embodiment of the present invention;
fig. 5 is a schematic structural diagram of binding user information and corresponding access card information according to the first embodiment of the present invention;
fig. 6 is a schematic structural diagram of issuing set personnel rights to a corresponding access control system according to the first embodiment of the present invention;
fig. 7 is a schematic structural diagram of an access right of a newly added user to a designated mechanism or designated access point equipment according to the first embodiment of the present invention;
fig. 8 is a schematic structural diagram of deleting access rights of a user to a designated access point device according to a first embodiment of the present invention;
fig. 9 is a schematic structural diagram of a state of a device for controlling a designated access point according to a first embodiment of the present invention;
fig. 10 is a schematic structural diagram of an access control device according to a second embodiment of the present invention;
fig. 11 is a schematic structural diagram of an access control device according to a third embodiment of the present invention;
fig. 12 is a schematic structural diagram of an access control system according to a fourth embodiment of the present invention;
fig. 13 is a schematic structural diagram of another door control system according to the fourth embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof. Furthermore, embodiments of the invention and features of the embodiments may be combined with each other without conflict. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present invention are shown in the drawings.
Before discussing exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart depicts steps as a sequential process, many of the steps may be implemented in parallel, concurrently, or with other steps. Furthermore, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figures. The processes may correspond to methods, functions, procedures, subroutines, and the like.
It should be noted that the concepts of "first," "second," and the like in the embodiments of the present invention are merely used to distinguish between different devices, modules, units, or other objects, and are not intended to limit the order or interdependence of functions performed by the devices, modules, units, or other objects.
Example 1
Fig. 1 is a flowchart of an access control method according to an embodiment of the present invention, where the embodiment is applicable to a situation of fast and efficient access control. Specifically, the access control method can be executed by an access control device, and the access control device can be realized in a software and/or hardware mode and is integrated in access control management equipment. Further, the access control device includes, but is not limited to: desktop computers, notebook computers, smart phones, servers, and other electronic devices.
As shown in fig. 1, the method specifically includes the following steps:
s110, detecting an access control system accessed in a plug-in mode.
In this embodiment, a plug-in may be understood as a program written by an application program interface conforming to a certain specification. The access control system can be understood as an intelligent management system for managing access to a specific channel by a person, a vehicle or the like.
S120, synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level.
In this embodiment, the access point device may be understood as a device formed by an access point, which may control access of a person or a vehicle, and may be located in an access system. The access point may be understood as a place where a person or a vehicle with a specific authority can access, for example, a bank, an airport, or a government agency. An organization hierarchy may be understood as a tree of organization nodes. Where membership exists between institutional nodes, such as a building comprising a plurality of floors, each floor may be separated into different physical areas.
Specifically, the equipment information of the access point equipment in the synchronous access control system can synchronize the data of multiple sets of access control systems, reconstruct the data structure, form the data with the same structure and uniformly manage the data of the multiple sets of access control systems.
The access control system is firstly detected, the access control system is accessed in a plug-in mode, a plurality of access control point devices can be contained in the access control system, the device information of the access control point devices in the access control system is synchronized, and the access control point devices can be set to corresponding mechanism levels or layers according to physical places where the access control point devices are actually located.
Fig. 2 is a schematic structural diagram of an access control system accessed in a plug-in manner according to an embodiment of the present invention. As shown in fig. 2, the access control device (such as a cross-multi-access control system roaming application device) supports access of multiple access control systems in the form of plug-ins.
Fig. 3 is a schematic structural diagram of an access point device and a mechanism level according to a first embodiment of the present invention. As shown in fig. 3, the upper two access point devices correspond to the organization level 1 (e.g., organization 1), and the lower two access point devices correspond to the organization level 2 (e.g., organization 2).
Optionally, the method further comprises:
and configuring a label of the access point equipment, wherein the label comprises a main entrance, an attendance entrance and/or an attendance exit.
In one embodiment, a tag may be understood as a flag for marking the content of the access point device.
Specifically, the tag of the access point can be configured to distinguish a main entrance, an attendance entrance and an attendance exit, and the point location of the access point device can be configured to be used as the name display of the access point device in the access system.
Optionally, the method further comprises:
acquiring access control card information read by a card reader corresponding to an access control system, and binding user information with the corresponding access control card information based on a card issuing interface;
and updating the access card information and the access permission information corresponding to the user information to the corresponding access control system.
In one embodiment, a card reader is understood to be a card reading device that can read access card information. An access card may be understood as a physical card used in an access system, and the access card information may contain card number information. The card issuing interface can be understood as a software operation interface, multiple access control systems can be associated on the card issuing interface, card number information of access control cards can be read for corresponding access control systems through card reader hardware equipment of each access control system, and one access control card can be realized, and corresponding logic card number information exists in each access control system. It should be noted that the user information may correspond to one or more access card information.
Fig. 4 is a schematic structural diagram of a card issuing interface according to an embodiment of the present invention. As shown in fig. 4, the access control device (e.g. a roaming application device across multiple access control systems) may provide a unified card issuing interface, and when issuing a card to a user, the access control device may read card number information through card readers corresponding to the external access control systems, and implement association binding between the user and corresponding access control card information (e.g. card number 1, card number 2 or card number 3), and update access control card information and access permission information corresponding to the user information to the corresponding access control systems (e.g. access control system a, access control system B or access control system C).
Fig. 5 is a schematic structural diagram of binding user information and corresponding access card information according to a first embodiment of the present invention. As shown in fig. 5, the access control card information corresponding to the user information (such as the user) includes a card number 1, a card number 2 and a card number 3, the information in the card number 1 is updated to the access control system a, the information in the card number 2 is updated to the access control system B, and the information in the card number 3 is updated to the access control system C.
Optionally, the method further comprises:
based on the personnel authority setting interface, the access authorities of users in different places and the effective time range of the access authorities are set, and the set personnel authorities are issued to corresponding access control systems.
Fig. 6 is a schematic structural diagram of issuing set personnel rights to a corresponding access control system according to the first embodiment of the present invention. As shown in fig. 6, the access control device (such as a roaming application device across multiple access control systems) may provide a unified personnel authority setting interface (such as personnel authority), may set access authorities of users in different places, may set effective time ranges of the access authorities for access point devices selected by the users, and issue the set personnel authority to corresponding access control systems.
Optionally, the method further comprises:
and adding, modifying or deleting the access permission of the user to the designated mechanism or the designated access point equipment.
Fig. 7 is a schematic structural diagram of an access right of a newly added user to a designated mechanism or designated access point device according to a first embodiment of the present invention. As shown in fig. 7, the corresponding relationship of the access right of the user to the designated mechanism or the designated access point device is not added outside the rectangular frame, and the corresponding relationship of the access right of the user to the designated mechanism or the designated access point device is added in the rectangular frame.
Fig. 8 is a schematic structural diagram of deleting access rights of a user to a designated access point device according to an embodiment of the present invention. As shown in fig. 8, the oblique lines indicate the access rights of the deletion user at the designated access point device.
Optionally, the method further comprises:
and issuing a command to the designated access point equipment to control the state of the designated access point equipment, wherein the state comprises a door opening state and a door closing state.
Specifically, the state of the designated access point equipment can be controlled in a centralized manner by issuing a command to the designated access point equipment.
Fig. 9 is a schematic structural diagram illustrating a state of a designated access point device according to a first embodiment of the present invention. As shown in fig. 9, the access control device (such as a roaming application device of a cross-multi-access control system) can support centralized control of the state of the access point device, including door opening and closing control, and control the opening/closing of the access point device by issuing instructions to the access point device.
The first embodiment of the invention provides an access control method, which is used for detecting an access control system accessed in a plug-in mode; and synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level. According to the technical scheme, the roaming across multiple access control systems is realized, the data of multiple sets of access control systems are synchronized, the efficiency of access control data management, personnel authority management and the like is improved, the efficiency of access control is improved, the workload of workers is reduced, the management difficulty is reduced, and the resource waste is avoided.
Example two
Fig. 10 is a schematic structural diagram of an access control device according to a second embodiment of the present invention, where the device may execute the access control method according to the embodiment of the present invention. The entrance guard control device that this embodiment provided includes:
the detection module 210 is configured to detect an access control system that is accessed in a plug-in manner;
the synchronization module 220 is configured to synchronize equipment information of access point equipment in the access control system, where the access point equipment corresponds to the mechanism hierarchy.
The second embodiment of the invention provides an access control device, which detects an access control system accessed in a plug-in mode; and synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level. According to the technical scheme, the roaming across multiple access control systems is realized, the data of multiple sets of access control systems are synchronized, the efficiency of access control data management, personnel authority management and the like is improved, the efficiency of access control is improved, the workload of workers is reduced, the management difficulty is reduced, and the resource waste is avoided.
Optionally, the apparatus further includes:
the configuration module is used for configuring a label of the access point equipment, wherein the label comprises a main entrance, an attendance entrance and/or an attendance exit.
Optionally, the apparatus further includes:
the binding module is used for acquiring the access control card information read by the card reader corresponding to the access control system and binding the user information with the corresponding access control card information based on the card issuing interface;
and the updating module is used for updating the access control card information and the access right information corresponding to the user information to the corresponding access control system.
Optionally, the apparatus further includes:
and issuing a module. The access control system is used for setting access rights of users in different places and setting effective time ranges of the access rights based on the personnel rights setting interface, and issuing the set personnel rights to corresponding access control systems.
Optionally, the apparatus further includes:
and the modification module is used for adding, modifying or deleting the access permission of the user to the designated mechanism or the designated access point equipment.
Optionally, the apparatus further includes:
and the control module is used for issuing instructions to the designated access point equipment to control the state of the designated access point equipment, and the designated access point equipment comprises a door opening state and a door closing state.
The access control device provided by the second embodiment of the invention can be used for executing the access control method provided by any embodiment, and has corresponding functions and beneficial effects.
Example III
Fig. 11 shows a schematic diagram of the structure of an access control device 10 that may be used to implement an embodiment of the present invention. Where the access control device 10 supports multiple access systems in plug-in form, the access control device 10 is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The access management device 10 may also represent various forms of mobile equipment, such as personal digital processing, cellular telephones, smart phones, user equipment, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 11, the entrance guard management apparatus 10 includes at least one processor 11, and a memory such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc. communicatively connected to the at least one processor 11, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 can perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the entrance guard management apparatus 10 can also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
A plurality of components in the access control apparatus 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the access control device 10 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks, wireless networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the respective methods and processes described above, such as an entrance guard control method.
In some embodiments, the access control method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the access control device 10 via the ROM 12 and/or the communication unit 19. One or more steps of the methods described above may be performed when the computer program is loaded into RAM 13 and executed by processor 11. Alternatively, in other embodiments, processor 11 may be configured to perform the access control method in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described herein may be implemented on an access control device 10, the access control device 10 having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or a trackball) by which a user can provide input to the access control device 10. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
Example IV
Fig. 12 is a schematic structural diagram of an access control system according to a fourth embodiment of the present invention, where the present embodiment is applicable to a situation of fast and efficient access control. As shown in fig. 12, the entrance guard control system 40 includes: at least one access control system 401, and an access control device 10 as described in example three.
In this embodiment, the access control system 40 may be accessed by the access control system 401 in a plug-in manner, and the access control system 401 may include at least one access point device 402. The access point device 402 may include device information, and the access point device 402 may correspond to a mechanism hierarchy.
Fig. 13 is a schematic structural diagram of another door control system according to the fourth embodiment of the present invention. As shown in fig. 13, the access control system 40 further includes: at least one access point device 402.
Optionally, the access control system 40 is further configured to:
the tag of the access point device 402 is configured, the tag including a main entrance, an attendance entrance, and/or an attendance exit.
Optionally, the access control system 40 is further configured to:
acquiring access control card information read by a card reader corresponding to the access control system 401, and binding user information with the corresponding access control card information based on a card issuing interface;
and updating the access card information and the access right information corresponding to the user information to the corresponding access control system 401.
Optionally, the access control system 40 is further configured to:
based on the personnel authority setting interface, the access authorities of users in different places are set, the effective time ranges of the access authorities are set, and the set personnel authorities are issued to the corresponding access control systems 401.
Optionally, the access control system 40 is further configured to:
the user's access rights to the designated institution or designated access point device 402 are added, modified or deleted.
Optionally, the access control system 40 is further configured to:
issuing a command to the designated access point device 402 controls the state of the designated access point device 402, including the open door state and the closed door state.
The access control system provided by the fourth embodiment of the invention can be used for executing the access control method provided by any embodiment, and has corresponding functions and beneficial effects.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.

Claims (10)

1. An access control method, comprising:
detecting an access control system accessed in a plug-in mode;
and synchronizing equipment information of access point equipment in the access control system, wherein the access point equipment corresponds to the mechanism level.
2. The method as recited in claim 1, further comprising:
and configuring a tag of the access point equipment, wherein the tag comprises a main access port, an attendance access port and/or an attendance access port.
3. The method as recited in claim 1, further comprising:
acquiring access control card information read by a card reader corresponding to the access control system, and binding user information with the corresponding access control card information based on a card issuing interface;
and updating the access card information and the access permission information corresponding to the user information to the corresponding access control system.
4. The method as recited in claim 1, further comprising:
based on the personnel authority setting interface, the access authorities of users in different places and the effective time range of the access authorities are set, and the set personnel authorities are issued to corresponding access control systems.
5. The method as recited in claim 1, further comprising:
and adding, modifying or deleting the access permission of the user to the designated mechanism or the designated access point equipment.
6. The method as recited in claim 1, further comprising:
issuing a command to the designated access point equipment to control the state of the designated access point equipment, wherein the state comprises a door opening state and a door closing state.
7. An access control device, comprising:
the detection module is used for detecting an access control system accessed in a plug-in mode;
and the synchronization module is used for synchronizing equipment information of access point equipment in the access control system, and the access point equipment corresponds to the mechanism level.
8. An access control device, comprising:
one or more processors;
a storage means for storing one or more programs;
the access control equipment supports a plurality of access control systems to be accessed in a plug-in mode;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the access control method of any of claims 1-6.
9. An access control system, comprising: at least one access control system, and an access control management device as claimed in claim 8.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements the access control method as claimed in any one of claims 1-6.
CN202311075986.4A 2023-08-24 2023-08-24 Access control method, device, equipment, system and storage medium Pending CN116935525A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311075986.4A CN116935525A (en) 2023-08-24 2023-08-24 Access control method, device, equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311075986.4A CN116935525A (en) 2023-08-24 2023-08-24 Access control method, device, equipment, system and storage medium

Publications (1)

Publication Number Publication Date
CN116935525A true CN116935525A (en) 2023-10-24

Family

ID=88379210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311075986.4A Pending CN116935525A (en) 2023-08-24 2023-08-24 Access control method, device, equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN116935525A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143803A (en) * 2019-12-03 2020-05-12 广东利元亨智能装备股份有限公司 User authority control method and system based on fingerprint identification
CN213814815U (en) * 2020-07-08 2021-07-27 浙江大华技术股份有限公司 Access control system of national treasury
CN114067473A (en) * 2020-08-07 2022-02-18 比亚迪股份有限公司 Access control authority management method, device and equipment in comprehensive scheduling system
CN115514667A (en) * 2022-09-14 2022-12-23 京东方科技集团股份有限公司 Access service processing method, system, device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143803A (en) * 2019-12-03 2020-05-12 广东利元亨智能装备股份有限公司 User authority control method and system based on fingerprint identification
CN213814815U (en) * 2020-07-08 2021-07-27 浙江大华技术股份有限公司 Access control system of national treasury
CN114067473A (en) * 2020-08-07 2022-02-18 比亚迪股份有限公司 Access control authority management method, device and equipment in comprehensive scheduling system
CN115514667A (en) * 2022-09-14 2022-12-23 京东方科技集团股份有限公司 Access service processing method, system, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
EP3815342A1 (en) Adaptive user-interface assembling and rendering
CN113010325A (en) Method and device for realizing read-write lock and electronic equipment
CN107368255B (en) Unlocking method, mobile terminal and computer readable storage medium
CN112527506A (en) Device resource processing method and device, electronic device and storage medium
CN115688133A (en) Data processing method, device, equipment and storage medium
CN114490089A (en) Cloud computing resource automatic adjusting method and device, computer equipment and storage medium
CN113312560A (en) Group detection method and device and electronic equipment
CN115328621B (en) Transaction processing method, device, equipment and storage medium based on block chain
CN116935525A (en) Access control method, device, equipment, system and storage medium
CN117251228A (en) Function management method, device, computer equipment and storage medium
CN116227951A (en) Power distribution network project screening method, system, electronic equipment and storage medium
US20220269659A1 (en) Method, device and storage medium for deduplicating entity nodes in graph database
CN113703793B (en) Application installation method, device, equipment and medium for cloud mobile phone
CN115114612A (en) Access processing method, device, electronic equipment and storage medium
CN112968876A (en) Content sharing method and device, electronic equipment and storage medium
CN116566737B (en) Permission configuration method and device based on SaaS platform and related equipment
CN115981847B (en) Service grid deployment method and device, electronic equipment and storage medium
CN115345667A (en) Big data based card and ticket issuing and intercepting method, device, equipment and storage medium
CN116432169A (en) Automatic task permission control method, system and equipment based on sharing strategy
CN117742908A (en) Resource pool authority isolation-based power calculation task scheduling method and device
CN115080045A (en) Link generation method and device, computer equipment and storage medium
CN114879952A (en) Popup control method based on low-code platform and related equipment thereof
CN115080111A (en) Method, device and equipment for flow management of target application and storage medium
CN117094009A (en) Authority authentication method, authority authentication device, electronic equipment and storage medium
CN117573195A (en) Modularized gray level publishing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination