WO2019128681A1 - Access control method, computer device, and readable storage medium - Google Patents
Access control method, computer device, and readable storage medium Download PDFInfo
- Publication number
- WO2019128681A1 WO2019128681A1 PCT/CN2018/119993 CN2018119993W WO2019128681A1 WO 2019128681 A1 WO2019128681 A1 WO 2019128681A1 CN 2018119993 W CN2018119993 W CN 2018119993W WO 2019128681 A1 WO2019128681 A1 WO 2019128681A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- verification
- visitor
- access control
- information
- identity
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/02—Reservations, e.g. for tickets, services or events
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Definitions
- the present application relates to the field of communications, for example, to a method of access control, a computer device, and a readable storage medium.
- Daily control of visitor entry is relatively weak, and it is mainly controlled by manpower.
- the visitor is required to register information such as the visitor's name and the visitor's address, but the property cannot screen and check the information provided by the visitor.
- identity information because some visitors are concerned about the troubles caused by the disclosure of identity information, they will deliberately provide false identity information to the property, thus bringing uncertainty and hidden danger to the security of the community.
- the present application proposes a method, a computer device and a readable storage medium for access control, which can realize the self-registration of a visitor, and the homeowner can accurately identify the visitor and control the access control at any time, thereby avoiding false information of the visitor in the traditional community access control.
- An embodiment of the present application provides a method for controlling access control, the method comprising: receiving room identification information input by a visitor, generating a corresponding verification code according to the room identification information; and obtaining a generated by the visitor according to the verification code.
- the visitor identity information is verified according to the identity verification information corresponding to the room identification information, and the access control is controlled according to the verification result.
- Another embodiment of the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the program
- a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the program
- Another embodiment of the present application provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the above-described method of access control.
- FIG. 1 is a flow chart showing a method for controlling access control according to a first embodiment of the present application
- FIG. 2 is a flowchart of a method for access control according to a second embodiment of the present application in scenario 1;
- FIG. 3 is a flowchart of a method for controlling access control in scenario 2 according to a second embodiment of the present application
- FIG. 5 is a flowchart of a method for access control according to a second embodiment of the present application in scenario 4;
- FIG. 6 is a schematic structural diagram of a computer device according to a third embodiment of the present application.
- FIG. 1 is a block diagram of a flow of a first embodiment of the present application.
- a method for access control is provided, which is based on an access control system, the method comprising receiving room identification information input by a visitor, and generating corresponding information according to the room identification information. a verification code; obtaining visitor identity information generated by the visitor according to the verification code; verifying the visitor identity information according to the identity verification information corresponding to the room identification information, and performing switch control on the access control according to the verification result.
- the visitor needs to input the identity information of the visitor through the QR code to complete the identity verification, thereby realizing the visitor entering the self-registration, thereby avoiding the situation that the visitor registers the false information, and the homeowner can accurately identify the visitor and control the access control at any time.
- it overcomes the situation that the traditional community access control, the human card does not correspond, the visitor's false information, the authority is difficult to recycle, the environmental damage caused by the hardware equipment transformation and the high transformation cost.
- the information of the homeowner is not revealed, which helps to improve the security performance of the homeowner.
- FIG. 1 is a block diagram of a method for controlling access control according to a first embodiment of the present invention. According to FIG. 1 , a method for controlling access control according to a first embodiment of the present application is based on an access control system, including steps S1 to S3.
- step S1 the room identification information input by the visitor is received, and a corresponding verification code is generated according to the room identification information.
- the form of the room identification information is not limited, and may be a room number, or may be other information that can accurately identify the room of the homeowner. Moreover, the corresponding room can be uniquely determined by the room identification information.
- the access control is connected to the verification terminal of the homeowner through the access control system, wherein the verification terminal can be a mobile terminal or a PC terminal.
- the access control obtains a corresponding verification code according to the room identification information through the access control system. And the verification code is displayed in the display window of the access control.
- the verification code includes a verification code of the verification terminal identifier (Identity, ID) of the homeowner corresponding to the room identification information, and the verification code may be in the form of a two-dimensional code or a barcode.
- step S2 visitor identity information generated by the visitor according to the verification code is obtained.
- the visitor scans the verification code through the mobile terminal to send the visitor identity information indicating the identity of the visitor in the mobile terminal of the visitor to the access control system, and initiates an authentication authentication request to the access control system. That is, the visitor scans the verification code so that the access control system can obtain the visitor identity information indicating the identity of the visitor from the mobile terminal of the visitor.
- step S3 the visitor identity information is verified according to the identity verification information corresponding to the room identification information, and the access control is switched and controlled according to the verification result.
- the access control system verifies the acquired visitor identity information according to the identity verification information corresponding to the room identification information, wherein each room identification information corresponds to one identity verification information.
- the access control system After the access control system knows the identity information of the visitor, it needs to determine whether the visitor has set a mode of not accepting the visitor. If the mode of not accepting the visitor has been set, the access control system will directly reply to the access control and the verification fails. If the mode of not accepting the visitor is not set, the visitor identity information is verified by the authentication information corresponding to the room identification information.
- the access control system controls the switch of the access control according to the verification result.
- the authentication information includes at least one of the following: an address book, a preset allowed guest list, and a preset list of prohibited visitors.
- the address book is an address book stored in the mobile terminal, and the preset access list is allowed. Pre-set guest list.
- the verification is passed, thereby opening the access control. If the visitor identity information is in the default list of forbidden visitors, the verification fails, thereby continuing to close the access control.
- the performing the switch control on the access control according to the verification result includes: sending the access control to the access control if the verification of the visitor identity information is passed according to the identity verification information corresponding to the room identification information And instructing the verification terminal of the homeowner and the verification channel of the access control to establish a verification channel of the homeowner and verifying the verification of the visitor identity information according to the identity verification information corresponding to the room identification information
- the visitor identity information is verified by the verification channel; the access control is switched on and off according to the result of the homeowner verifying the visitor identity information through the verification channel.
- the access control system sends an access control open command to the access control, and opens the access control by using the access control open command. If the verification of the visitor identity information fails by the authentication information corresponding to the room identification information, it is determined whether the visitor continues to perform verification, and when it is determined that the visitor needs to continue verification (ie, the access control system determines that the visitor identity needs to be continued) During verification, the access control system establishes a session verification channel between the visitor and the homeowner, so that the homeowner directly verifies the visitor identity information through the verification channel, thereby the visitor directly initiates text to the homeowner, Pictures, voices, videos, etc. are sufficient to indicate identity or intention to help the homeowner verify the identity of the visitor. After the verification is completed, the access control is controlled according to the verification result of the homeowner.
- the method further includes: sending an alert message to the access control or the visitor terminal to query whether the visitor continues to request verification. .
- the access control system when the verification of the visitor identity information is not passed by the identity verification information corresponding to the room identification information, the access control system sends a prompt instruction to the access control or the visitor terminal whether to perform the next verification, the access control Or if the guest terminal receives the prompt instruction, a prompt page is displayed in the display window, and the page includes "YES" and "NO". If the visitor determines to continue the verification, the visitor clicks "YES”. Then, the access control system responds to the message to establish a verification terminal of the homeowner and the session verification channel of the access control.
- the session verification channel is a video call. Through the video call, a video chat can be performed between the visitor and the homeowner to indicate the identity information or intention of the visitor. . Of course, if the visitor hits "NO", the verification process ends here.
- the guest terminal may be a handheld mobile terminal such as a mobile phone.
- the method further includes: receiving the room identification information input by the visitor, and before generating the corresponding verification code according to the room identification information, the method further includes: receiving the permission issued by the homeowner through the verification terminal
- the verification of the visitor identity information according to the authentication information corresponding to the room identification information includes: verifying the visitor identity information according to the allowed guest identity verification information; In the case, the access control open command is sent to the access control.
- the homeowner can directly send the allowable visitor identity to the access control system through the chat bot or the verification terminal.
- Verification information after the visitor enters the visitor identity information through the verification code, the access control system directly verifies the visitor identity information according to the allowable guest identity verification information, and in the case of the verification pass, the direct access control command is used to open the access control.
- the guest identity information is included in the guest identity information, so that the access control system does not need to query the identity verification information corresponding to the room identification information of the homeowner, which can effectively reduce the workflow of the access control system and improve the verification efficiency.
- the allowing guest authentication information is valid for a preset time.
- the visitor can open the access control; however, if the expiration period is exceeded, the open access control command is invalidated and the visitor cannot open the access control. Thereby, the safety performance is improved.
- the second embodiment of the present application provides a method of access control.
- the second embodiment of the present application provides an access control system, which is based on a related rich media message network, and adds a module in the network to complete access and management of the access control system.
- the access control system is used as a special rich media message terminal access system for displaying the two-dimensional code of the room, and receiving control commands such as access control opening, rejection, and alarm sent by the access control server EGS.
- Entity Guard Server which is used for user rights identification, access control, and recording, as a transit channel, responsible for message response, processing, triggering, etc.
- QR code server (QRSVR) is used to generate a two-dimensional code including a homeowner ID in a rich media message system to prevent homeowner information from being exposed.
- NAB Network Address Book
- the Instant Messaging Application Server (IMAS) when a visitor needs authentication and confirmation from the homeowner, delivers messages such as text and images.
- the second embodiment of the present application provides a method for access control, including the following: a visitor inputs a room information to be accessed at an access control, and a two-dimensional code for obtaining the room information by the EGS is displayed on the display screen. Next, the visitor uses his mobile phone to scan the QR code and initiate an authentication request to the EGS.
- the EGS After receiving the authentication request, the EGS identifies it according to the pre-set policy of the homeowner. In an embodiment, if the homeowner is set to not authorize anyone to enter, the EGS returns an authentication failure response and the access control system displays a failure message. If the homeowner is set to enter only the address book friend, the EGS queries the NAB whether the visitor matches any number in the homeowner's address book. If the visitor matches any number in the homeowner's address book, the authentication is passed and the access control is opened; The visitor does not match any number in the homeowner's address book and proceeds to the next step of identification.
- the EGS initiates a query to the own database to determine whether the visitor is a user specially set by the homeowner. If the visitor is a user specially set by the homeowner, the EMS passes the authentication and the access is opened. If the visitor is not the user set by the homeowner, go to the next step of identification.
- the next step for the above authentication is as follows: In the case that the current policy fails to match, the EGS initiates a message to the guest to directly authenticate the authentication according to the homeowner setting policy. If the visitor agrees to the authentication, the EGS establishes a session channel to the visitor and the homeowner through the IM AS, and the visitor initiates text, picture, voice, video, and the like to indicate the identity or intention by the visitor via the EGS and the IMAS. When the homeowner operates, the EGS returns information that is released or rejected to the access control system.
- FIG. 2 is a flowchart of a method for providing access control according to a second embodiment of the present application in scenario 1.
- the scene 1 is that the visitors are strangers such as takeaways and express delivery.
- the method includes steps 1 through 14.
- step 1 the takeaway, courier, etc. visitor enters the room number to be visited at the access control.
- step 2 the access control initiates a request to the QRSvr in the rich media messaging system.
- step 3 the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
- step 4 the takeaway, courier, and the like scan the QR code through the handheld terminal (eg, mobile phone).
- the handheld terminal eg, mobile phone
- step 5 the handheld terminal directly initiates an access request to the EGS, and the access request includes identity information of the guest such as a takeaway or a courier.
- step 6 the EGS carries the identity of the visitor, accesses the room identity, and initiates an authentication request to the NAB.
- step 7 the NAB is pre-set according to the homeowner, such as by querying whether the identity information of the visitor is in the address book. Thus, it is determined that the visitor is not directly allowed to enter.
- step 8 the EGS returns a question of whether to perform further authentication to the handheld terminal of the visitor according to the received command.
- step 9 the visitor clicks Yes, and the EGS transparently transmits the command to the IMAS.
- step 10 to step 11 the IM AS initiates a communication link creation request to the guest terminal and the homeowner terminal respectively, and the homeowner can directly authenticate the visitor through the link.
- step 12 after the link is created, the takeaway, express, and other visitors are uttered by voice instructions.
- step 13 the homeowner clicks on to enter, and the IMAS transparently transmits the command to the EGS.
- step 14 the EGS issues a door open command to the access control based on the received command.
- FIG. 3 is a flowchart of a method for providing access control according to a second embodiment of the present application in scenario 2.
- the scenario 2 is: the access control process in the case where the visitor is a friend of the household.
- the method includes steps 1 through 8.
- step 1 the friend visitor enters the room number to be visited at the access control.
- step 2 the access control initiates a request to the QRSvr in the rich media messaging system.
- step 3 the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
- step 4 the friend visitor scans the two-dimensional code through a handheld terminal (eg, a mobile phone).
- a handheld terminal eg, a mobile phone
- step 5 the handheld terminal directly initiates an access request to the EGS, the access request including identity information of the friend visitor.
- step 6 the EGS carries the identity of the visitor, accesses the room identifier, and authenticates to the NAB.
- step 7 the NAB finds a friend visitor in the homeowner's address book, and then determines that the friend can enter and returns the release command to the EGS.
- step 8 the EGS issues an open command to the access control based on the received command.
- FIG. 4 is a flowchart of a method for providing access control according to a second embodiment of the present application in scenario 3.
- the scenario 3 is: an access control process in which a visitor is blacklisted because of a bad behavior such as a small advertisement.
- the method includes steps 1 through 6.
- step 1 the blacklist visitor enters the room number to be visited at the access control.
- step 2 the access control initiates a request to the QRSvr in the rich media messaging system.
- step 3 the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
- step 4 the blacklist visitor scans the two-dimensional code through a handheld terminal (eg, a mobile phone).
- a handheld terminal eg, a mobile phone
- step 5 the handheld terminal directly initiates an access request to the EGS, the access request including the identity information of the blacklisted visitor.
- step 6 the EGS finds the blacklist guest in the blacklist according to the built-in blacklist management module, and determines that the user is a blacklist user, prohibiting the user from entering and sending an audible and visual alarm through the access control system.
- FIG. 5 is a flowchart of a method for access control according to a second embodiment of the present application in scenario 4.
- the scene 4 is: the visitor controls the opening of the door through the chat room mode.
- the method includes steps 1 through 11.
- step 1 the visitor communicates with the homeowner in the same chat room.
- step 2 the visitor requests the homeowner to open the door.
- step 3 the homeowner sends a command to the EGS robot in the group chat to open the temporary access permission for the visitor, and the group chat AS forwards the message to the EGS.
- step 4 the EGS records the license information and saves the validity period according to the preset configuration.
- step 5 the visitor enters the room number to be visited at the access control.
- step 6 the access control initiates a request to the QRSvr in the rich media messaging system.
- step 7 the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
- step 8 the visitor scans the two-dimensional code through a handheld terminal (eg, a mobile phone).
- a handheld terminal eg, a mobile phone
- step 9 the handheld terminal directly initiates an access request to the EGS, the access request including the identity information of the visitor.
- the EGS issues a door open command to the access control after matching the permission information.
- FIG. 6 is a computer device according to a third embodiment of the present application.
- a third embodiment of the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor executing the The following steps of the method for implementing an access control method: receiving room identification information input by a visitor, generating a corresponding verification code according to the room identification information; obtaining visitor identity information generated by a visitor according to the verification code; The identity verification information corresponding to the room identification information verifies the visitor identity information, and performs switch control on the access control according to the verification result.
- the processor when performing the switch control on the access control according to the verification result, includes: when the visitor identity information is verified according to the identity verification information corresponding to the room identification information, Sending an access control open command to the access control; establishing a verification terminal of the homeowner and the access control if the verification of the visitor identity information fails and the visitor needs to be verified according to the identity verification information corresponding to the room identification information
- the verification channel is used by the homeowner to verify the visitor identity information through the verification channel; and the access control is switched on and off according to the result of the homeowner verifying the visitor identity information through the verification channel.
- the processor after the processor performs the verification of the visitor identity information according to the identity verification information corresponding to the room identification information, the processor further performs the step of: sending an inquiry to the access control or the guest terminal to ask the visitor whether to continue the request. Verified reminder message.
- the processor before performing the receiving the room identification information input by the visitor and generating the corresponding verification code according to the room identification information, the processor further performs the following steps: receiving the allowed guest sent by the homeowner through the verification terminal Authentication information; said allowing guest authentication information to be time-sensitive;
- the processor When the processor performs the receiving the room identification information input by the visitor and generating the corresponding verification code according to the room identification information, the processor includes: verifying the visitor identity information according to the allowed guest identity verification information; In the case of passing, the access control open command is sent to the access control.
- the verification code includes: a verification code of the verification terminal ID of the homeowner corresponding to the room identification information.
- the authentication information includes at least one of the following directories: a contact list, a preset allowed guest list, and a preset list of prohibited visitors.
- a fourth embodiment of the present application provides a computer readable storage medium having a computer program stored thereon, and the program is implemented by a processor to implement the above-described method of access control.
- ROM/RAM Read Only Memory/Random Access Memory
- magnetic disk a magnetic disk
- optical disk an optical disk
- a terminal which may be a mobile phone, a computer, a server, an air conditioner, or a network device, to perform various embodiments of the present application. Said method.
Landscapes
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Lock And Its Accessories (AREA)
Abstract
An access control method, a computer device, and a readable storage medium. The method comprises: receiving room identification information input by a visitor, and generating a corresponding verification code according to the room identification information (S1); obtaining visitor identity information generated by the visitor according to the verification code (S2); and verifying the visitor identity information according to the identity verification information corresponding to the room identification information, and performing access control to allow or not allow access according to the verification result (S3).
Description
本申请要求在2017年12月26日提交中国专利局、申请号为201711433530.5的中国专利申请的优先权,该申请的全部内容通过引用结合在本申请中。The present application claims the priority of the Chinese Patent Application No. PCT Application No.
本申请涉及通信领域,例如涉及一种门禁控制的方法、计算机设备及可读存储介质。The present application relates to the field of communications, for example, to a method of access control, a computer device, and a readable storage medium.
日常对访客进入的控制比较薄弱,而且,主要是通过人力进行控制。例如要求访客登记访客名称及访问地址等信息,但是物业却无法对访客提供的信息进行甄别和核对。而且由于部分访客担心因身份信息泄露而可能带来的麻烦,会故意提供虚假身份信息给物业,这样,就给小区的安全带来了不确定性和隐患。Daily control of visitor entry is relatively weak, and it is mainly controlled by manpower. For example, the visitor is required to register information such as the visitor's name and the visitor's address, but the property cannot screen and check the information provided by the visitor. Moreover, because some visitors are worried about the troubles caused by the disclosure of identity information, they will deliberately provide false identity information to the property, thus bringing uncertainty and hidden danger to the security of the community.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
本申请提出一种门禁控制的方法、计算机设备及可读存储介质,可以实现访客进入自登记,房主可以随时精确识别访客及控制门禁,从而避免传统小区门禁中访客虚假信息等情况。The present application proposes a method, a computer device and a readable storage medium for access control, which can realize the self-registration of a visitor, and the homeowner can accurately identify the visitor and control the access control at any time, thereby avoiding false information of the visitor in the traditional community access control.
本申请的一个实施例,提供了一种门禁控制的方法,所述方法包括:接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码;获得访客根据所述验证码生成的访客身份信息;依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。An embodiment of the present application provides a method for controlling access control, the method comprising: receiving room identification information input by a visitor, generating a corresponding verification code according to the room identification information; and obtaining a generated by the visitor according to the verification code. The visitor identity information is verified according to the identity verification information corresponding to the room identification information, and the access control is controlled according to the verification result.
本申请的另一实施例,提供了一种计算机设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述程序时实现一种门禁控制的方法的以下步骤:Another embodiment of the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the program The following steps of a method of access control:
接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码;Receiving room identification information input by the visitor, and generating a corresponding verification code according to the room identification information;
获得访客根据所述验证码生成的访客身份信息;Obtaining visitor identity information generated by the visitor according to the verification code;
依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。And verifying the visitor identity information according to the identity verification information corresponding to the room identification information, and performing switch control on the access control according to the verification result.
本申请的另一实施例,提供了一种计算机可读存储介质,所述存储介质上存储有计算机程序,所述程序被处理器执行时实现上述一种门禁控制的方法。Another embodiment of the present application provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the above-described method of access control.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
图1为本申请第一实施例一种门禁控制的方法的流程框图;1 is a flow chart showing a method for controlling access control according to a first embodiment of the present application;
图2为本申请第二实施例一种门禁控制的方法处于场景1中的流程图;2 is a flowchart of a method for access control according to a second embodiment of the present application in scenario 1;
图3为本申请第二实施例一种门禁控制的方法处于场景2中的流程图;3 is a flowchart of a method for controlling access control in scenario 2 according to a second embodiment of the present application;
图4为本申请第二实施例一种门禁控制的方法处于场景3中的流程图;4 is a flowchart of a method for controlling access control in scenario 3 according to a second embodiment of the present application;
图5为本申请第二实施例一种门禁控制的方法处于场景4中的流程图;FIG. 5 is a flowchart of a method for access control according to a second embodiment of the present application in scenario 4;
图6为本申请第三实施例一种计算机设备的结构示意图。FIG. 6 is a schematic structural diagram of a computer device according to a third embodiment of the present application.
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。It is understood that the specific embodiments described herein are merely illustrative of the application and are not intended to be limiting.
在后续的描述中,使用用于表示元件的诸如“模块”、“部件”或“单元”的后缀仅为了有利于本申请的说明,其本身没有特定的意义。因此,“模块”、“部件”或“单元”可以混合地使用。In the following description, the suffixes such as "module," "component," or "unit" used to denote an element are merely illustrative for the benefit of the present application, and have no particular meaning per se. Therefore, "module", "component" or "unit" can be used in combination.
为了便于理解本申请实施例,下面通过几个具体实施例对本申请的实施过程进行详细的阐述。In order to facilitate the understanding of the embodiments of the present application, the implementation process of the present application will be described in detail below through several specific embodiments.
图1为本申请第一实施例的流程框图。根据图1所示,在本申请第一实施例中,提供了一种门禁控制的方法,其基于门禁系统,所述方法包括接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码;获得访客根据所述验证码生成的访客身份信息;依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。FIG. 1 is a block diagram of a flow of a first embodiment of the present application. According to FIG. 1 , in a first embodiment of the present application, a method for access control is provided, which is based on an access control system, the method comprising receiving room identification information input by a visitor, and generating corresponding information according to the room identification information. a verification code; obtaining visitor identity information generated by the visitor according to the verification code; verifying the visitor identity information according to the identity verification information corresponding to the room identification information, and performing switch control on the access control according to the verification result.
就此,使得访客需要通过二维码输入访客自身的身份信息以完成身份验证,实现了访客进入自登记,借此避免了访客登记虚假信息等情况,而且房主可以随时精确识别访客及控制门禁,同时,克服了传统小区门禁中,人卡不对应、 访客虚假信息、权限难以回收、硬件设备改造带来的环境破坏及改造成本较高等情况。而且,在验证过程中,并未透漏出房主的信息,有助于提高房主的安全性能。In this way, the visitor needs to input the identity information of the visitor through the QR code to complete the identity verification, thereby realizing the visitor entering the self-registration, thereby avoiding the situation that the visitor registers the false information, and the homeowner can accurately identify the visitor and control the access control at any time. At the same time, it overcomes the situation that the traditional community access control, the human card does not correspond, the visitor's false information, the authority is difficult to recycle, the environmental damage caused by the hardware equipment transformation and the high transformation cost. Moreover, during the verification process, the information of the homeowner is not revealed, which helps to improve the security performance of the homeowner.
图1为本申请第一实施例一种门禁控制的方法的流程框图,根据图1所示,本申请第一实施例提供的一种门禁控制的方法,其基于门禁系统,包括步骤S1至步骤S3。1 is a block diagram of a method for controlling access control according to a first embodiment of the present invention. According to FIG. 1 , a method for controlling access control according to a first embodiment of the present application is based on an access control system, including steps S1 to S3.
在步骤S1中,接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码。In step S1, the room identification information input by the visitor is received, and a corresponding verification code is generated according to the room identification information.
其中,在本实施例中,并不对房间识别信息的形式进行限定,其可以为房间号码,也可以为其他的可以准确识别到房主的房间的信息。而且,通过该房间识别信息可以唯一确定相应的房间。In the embodiment, the form of the room identification information is not limited, and may be a room number, or may be other information that can accurately identify the room of the homeowner. Moreover, the corresponding room can be uniquely determined by the room identification information.
此外,门禁通过门禁系统与房主的验证终端连接,其中,验证终端可以为移动终端或PC终端。In addition, the access control is connected to the verification terminal of the homeowner through the access control system, wherein the verification terminal can be a mobile terminal or a PC terminal.
当访客到达门禁处时,需要先在门禁处输入要拜访的房间识别信息,就此,门禁通过门禁系统获取依据该房间识别信息生成对应的验证码。并在门禁的显示窗口显示该验证码。例如,验证码包括所述房间识别信息对应的房主的验证终端标识(Identity,ID)的验证码,验证码的形式可以为:二维码或条形码。When the visitor arrives at the access control, the room identification information to be visited needs to be input at the access control place. In this case, the access control obtains a corresponding verification code according to the room identification information through the access control system. And the verification code is displayed in the display window of the access control. For example, the verification code includes a verification code of the verification terminal identifier (Identity, ID) of the homeowner corresponding to the room identification information, and the verification code may be in the form of a two-dimensional code or a barcode.
在步骤S2中,获得访客根据所述验证码生成的访客身份信息。In step S2, visitor identity information generated by the visitor according to the verification code is obtained.
访客通过移动终端扫描该验证码,以向门禁系统发送访客的移动终端中表明访客身份的访客身份信息,实现向门禁系统发起鉴权认证请求。即:访客扫描该验证码,使得门禁系统可以从访客的移动终端获得表明访客身份的访客身份信息。The visitor scans the verification code through the mobile terminal to send the visitor identity information indicating the identity of the visitor in the mobile terminal of the visitor to the access control system, and initiates an authentication authentication request to the access control system. That is, the visitor scans the verification code so that the access control system can obtain the visitor identity information indicating the identity of the visitor from the mobile terminal of the visitor.
在步骤S3中,依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。In step S3, the visitor identity information is verified according to the identity verification information corresponding to the room identification information, and the access control is switched and controlled according to the verification result.
门禁系统依据该房间识别信息对应的身份验证信息对获取的访客身份信息进行验证,其中,每个房间识别信息对应一个身份验证信息。The access control system verifies the acquired visitor identity information according to the identity verification information corresponding to the room identification information, wherein each room identification information corresponds to one identity verification information.
在一实施例中,门禁系统在获知访客身份信息后,先需要确定访客是否已设置不接受访客的模式。如果已设置不接受访客的模式,则该门禁系统就会直接向门禁回复验证失败。如果未设置不接受访客的模式,则通过该房间识别信息对应的身份验证信息对访客身份信息进行验证。In an embodiment, after the access control system knows the identity information of the visitor, it needs to determine whether the visitor has set a mode of not accepting the visitor. If the mode of not accepting the visitor has been set, the access control system will directly reply to the access control and the verification fails. If the mode of not accepting the visitor is not set, the visitor identity information is verified by the authentication information corresponding to the room identification information.
门禁系统根据验证结果控制门禁的开关。The access control system controls the switch of the access control according to the verification result.
在一实施例中,身份验证信息至少包括以下之一:通讯录、预设的允许访客名录及预设的禁止访客名录。In an embodiment, the authentication information includes at least one of the following: an address book, a preset allowed guest list, and a preset list of prohibited visitors.
其中,通讯录为移动终端内存储的通讯录,预设的允许访问名录。预设的禁止访客名录。The address book is an address book stored in the mobile terminal, and the preset access list is allowed. Pre-set guest list.
如果访客身份信息位于通讯录或预设的允许访客名录中,则验证通过,借此打开门禁。如果访客身份信息位于预设的禁止访客名录中,则验证不通过,借此继续关闭门禁。If the visitor identity information is in the address book or the default allowed guest directory, the verification is passed, thereby opening the access control. If the visitor identity information is in the default list of forbidden visitors, the verification fails, thereby continuing to close the access control.
在一实施例中,所述根据验证结果对门禁进行开关控制,包括:在依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证通过的情况下,向所述门禁发送门禁打开指令;在依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过且需要对访客进行验证的情况下,建立房主的验证终端与所述门禁的验证通道,以便房主通过所述验证通道对访客身份信息进行验证;根据房主通过所述验证通道对访客身份信息进行验证的结果对门禁进行开关控制。In an embodiment, the performing the switch control on the access control according to the verification result includes: sending the access control to the access control if the verification of the visitor identity information is passed according to the identity verification information corresponding to the room identification information And instructing the verification terminal of the homeowner and the verification channel of the access control to establish a verification channel of the homeowner and verifying the verification of the visitor identity information according to the identity verification information corresponding to the room identification information The visitor identity information is verified by the verification channel; the access control is switched on and off according to the result of the homeowner verifying the visitor identity information through the verification channel.
如果通过所述房间识别信息对应的身份验证信息对所述访客身份信息验证通过,门禁系统就会向所述门禁发送门禁打开指令,通过门禁打开指令打开门禁。而如果通过所述房间识别信息对应的身份验证信息对所述访客身份信息的验证不通过时,需要确定访客是否继续进行验证,在确定访客需要继续验证时(即门禁系统确定需要继续对访客身份进行验证时),门禁系统就会建立访客与房主之间的会话验证通道,以便房主通过所述验证通道直接对访客身份信息进行验证,由此,访客就会直接向房主发起文字、图片、语音、视频等足以表明身份的信息或来意,以帮助房主对访客自身的身份的验证。验证完成后,根据房主的验证结果对门禁进行开关控制。If the visitor identity information is verified by the identity verification information corresponding to the room identification information, the access control system sends an access control open command to the access control, and opens the access control by using the access control open command. If the verification of the visitor identity information fails by the authentication information corresponding to the room identification information, it is determined whether the visitor continues to perform verification, and when it is determined that the visitor needs to continue verification (ie, the access control system determines that the visitor identity needs to be continued) During verification, the access control system establishes a session verification channel between the visitor and the homeowner, so that the homeowner directly verifies the visitor identity information through the verification channel, thereby the visitor directly initiates text to the homeowner, Pictures, voices, videos, etc. are sufficient to indicate identity or intention to help the homeowner verify the identity of the visitor. After the verification is completed, the access control is controlled according to the verification result of the homeowner.
在一实施例中,在依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过之后,所述方法还包括:向门禁或访客终端发送询问访客是否继续请求验证的提醒消息。In an embodiment, after the verification of the visitor identity information fails according to the identity verification information corresponding to the room identification information, the method further includes: sending an alert message to the access control or the visitor terminal to query whether the visitor continues to request verification. .
在一实施例中,在通过所述房间识别信息对应的身份验证信息对所述访客身份信息的验证不通过时,门禁系统就会向门禁或访客终端发送是否进行下一步验证的提示指令,门禁或访客终端收到该提示指令的情况下,会在显示窗口显示提示页面,页面包括“是(YES)”及“否(NO)”,如果访客确定继续验证,访客就按击“YES”,接着,门禁系统响应该消息建立房主的验证终端与门禁的 会话验证通道,例如会话验证通道为视频通话,通过视频通话,访客与房主之间可以进行视频聊天来表明访客的身份信息或来意。当然,如果访客按击“NO”,则验证过程到此为止。其中,访客终端可以为手机等手持移动终端。In an embodiment, when the verification of the visitor identity information is not passed by the identity verification information corresponding to the room identification information, the access control system sends a prompt instruction to the access control or the visitor terminal whether to perform the next verification, the access control Or if the guest terminal receives the prompt instruction, a prompt page is displayed in the display window, and the page includes "YES" and "NO". If the visitor determines to continue the verification, the visitor clicks "YES". Then, the access control system responds to the message to establish a verification terminal of the homeowner and the session verification channel of the access control. For example, the session verification channel is a video call. Through the video call, a video chat can be performed between the visitor and the homeowner to indicate the identity information or intention of the visitor. . Of course, if the visitor hits "NO", the verification process ends here. The guest terminal may be a handheld mobile terminal such as a mobile phone.
在一实施例中,所述方法还包括:所述接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码之前,所述方法还包括:接收房主通过验证终端发出的允许访客身份验证信息;所述依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,包括:依据所述允许访客身份验证信息对所述访客身份信息进行验证;在验证通过的情况下,向所述门禁发送所述门禁打开指令。In an embodiment, the method further includes: receiving the room identification information input by the visitor, and before generating the corresponding verification code according to the room identification information, the method further includes: receiving the permission issued by the homeowner through the verification terminal The verification of the visitor identity information according to the authentication information corresponding to the room identification information includes: verifying the visitor identity information according to the allowed guest identity verification information; In the case, the access control open command is sent to the access control.
在一实施例中,如果访客与房主处于同一个聊天室中,当访客请求房主开放门禁时,如果房主同意,则房主可以通过聊天机器人或验证终端直接向门禁系统发送允许访客身份验证信息,在访客在通过验证码输入访客身份信息后,门禁系统直接依据允许访客身份验证信息对该访客身份信息进行验证,在验证通过的情况下,直接门禁指令以打开门禁。其中,允许访客身份信息中包含该访客的身份信息,使得门禁系统无需进行查询房主的房间识别信息所对应的身份验证信息,可有效减少门禁系统的工作流程且提高了验证效率。In an embodiment, if the visitor and the homeowner are in the same chat room, when the visitor requests the homeowner to open the access control, if the homeowner agrees, the homeowner can directly send the allowable visitor identity to the access control system through the chat bot or the verification terminal. Verification information, after the visitor enters the visitor identity information through the verification code, the access control system directly verifies the visitor identity information according to the allowable guest identity verification information, and in the case of the verification pass, the direct access control command is used to open the access control. The guest identity information is included in the guest identity information, so that the access control system does not need to query the identity verification information corresponding to the room identification information of the homeowner, which can effectively reduce the workflow of the access control system and improve the verification efficiency.
在一实施例中,所述允许访客身份验证信息具在预设时间内有效。在该时效期内,访客可以打开门禁;但是,如果超出该时效期,则该打开门禁指令失效,访客就无法打开门禁。借此,提高了安全性能。In an embodiment, the allowing guest authentication information is valid for a preset time. During the limitation period, the visitor can open the access control; however, if the expiration period is exceeded, the open access control command is invalidated and the visitor cannot open the access control. Thereby, the safety performance is improved.
下面结合一个具体应用示例,对本方案所述方法进行说明。The method described in the present solution will be described below in conjunction with a specific application example.
本申请第二实施例提供了一种门禁控制的方法。其中,本申请第二实施例提供了门禁系统,该门禁系统基于相关富媒体消息网络,通过在网络中新增一个模块完成门禁系统的接入、管理。其中,门禁系统,做为一种特殊的富媒体消息终端接入系统,用于展示房间的二维码,以及接收门禁管控服务器EGS发来的对门禁开启、拒绝、告警等控制指令。The second embodiment of the present application provides a method of access control. The second embodiment of the present application provides an access control system, which is based on a related rich media message network, and adds a module in the network to complete access and management of the access control system. The access control system is used as a special rich media message terminal access system for displaying the two-dimensional code of the room, and receiving control commands such as access control opening, rejection, and alarm sent by the access control server EGS.
门禁管控服务器(Entrance Guard Server,EGS),其用于用户权限识别、门禁管控、记录,做为中转通道,负责消息响应、处理、触发等。Entity Guard Server (EGS), which is used for user rights identification, access control, and recording, as a transit channel, responsible for message response, processing, triggering, etc.
二维码制码服务器(Quick Response Server,QRSVR),用于在富媒体消息系统中生成包含有房主ID的二维码,避免房主信息暴露。A QR code server (QRSVR) is used to generate a two-dimensional code including a homeowner ID in a rich media message system to prevent homeowner information from being exposed.
网络地址簿(NetworkAddressBook,NAB),其做为用户上传的网络地址簿, 负责对访客与房主之间社交关系的判断。Network Address Book (NAB), which acts as a user-uploaded network address book, is responsible for judging the social relationship between the visitor and the homeowner.
即时信息传递服务器(Instant Messaging Application Server,IMAS),当访客需要房主的认证和确认时,进行文字、图片等信息的消息传递。The Instant Messaging Application Server (IMAS), when a visitor needs authentication and confirmation from the homeowner, delivers messages such as text and images.
本申请第二实施例提供了一种门禁控制的方法,包括如下:访客在门禁处输入要访问的房间信息,门禁通过EGS获取该房间信息的二维码展示在显示屏上。接着,访客使用自己的手机扫描二维码,向EGS发起鉴权认证请求。The second embodiment of the present application provides a method for access control, including the following: a visitor inputs a room information to be accessed at an access control, and a two-dimensional code for obtaining the room information by the EGS is displayed on the display screen. Next, the visitor uses his mobile phone to scan the QR code and initiate an authentication request to the EGS.
EGS在收到鉴权认证请求后,根据房主预先设定的策略进行辨别。在一实施例中,如果房主设置为未授权任何人进入,则EGS返回鉴权失败响应,门禁系统展示失败信息。如果房主设置为仅通讯录好友可以进入,则EGS向NAB查询访客是否与房主通讯录中任意号码匹配,如果访客与房主通讯录中任意号码匹配,返回鉴权通过,门禁打开;如果访客不与房主通讯录中任意号码匹配,进入下一步鉴别。After receiving the authentication request, the EGS identifies it according to the pre-set policy of the homeowner. In an embodiment, if the homeowner is set to not authorize anyone to enter, the EGS returns an authentication failure response and the access control system displays a failure message. If the homeowner is set to enter only the address book friend, the EGS queries the NAB whether the visitor matches any number in the homeowner's address book. If the visitor matches any number in the homeowner's address book, the authentication is passed and the access control is opened; The visitor does not match any number in the homeowner's address book and proceeds to the next step of identification.
此外,如果房主设置为仅特别设置用户可以进入,则EGS向自身数据库发起查询,判断访客是否是房主特别设置的用户,如果访客是房主特别设置的用户,返回鉴权通过,门禁打开;如果访客不是房主特别设置的用户,进入上述的下一步鉴别。In addition, if the homeowner is set to enter only the special user, the EGS initiates a query to the own database to determine whether the visitor is a user specially set by the homeowner. If the visitor is a user specially set by the homeowner, the EMS passes the authentication and the access is opened. If the visitor is not the user set by the homeowner, go to the next step of identification.
针对上述的下一步鉴别如下:EGS在当前策略匹配失败的情况下,根据房主设定策略,向访客发起是否向房主直接鉴权认证的消息。如果访客同意认证,则EGS通过IM AS分别向访客、房主建立会话通道,由访客经由EGS、IMAS向房主发起文字、图片、语音、视频等足以表明身份的信息或者来意。当房主操作后,EGS向门禁系统返回放行或者拒绝的信息。The next step for the above authentication is as follows: In the case that the current policy fails to match, the EGS initiates a message to the guest to directly authenticate the authentication according to the homeowner setting policy. If the visitor agrees to the authentication, the EGS establishes a session channel to the visitor and the homeowner through the IM AS, and the visitor initiates text, picture, voice, video, and the like to indicate the identity or intention by the visitor via the EGS and the IMAS. When the homeowner operates, the EGS returns information that is released or rejected to the access control system.
图2为本申请第二实施例提供一种门禁控制的方法处于场景1中的流程图。根据图2所示:该场景1为,访客为外卖、快递等陌生人员。所述方法包括步骤1至步骤14。FIG. 2 is a flowchart of a method for providing access control according to a second embodiment of the present application in scenario 1. According to Figure 2: The scene 1 is that the visitors are strangers such as takeaways and express delivery. The method includes steps 1 through 14.
在步骤1中,外卖、快递等访客在门禁处输入要拜访的房间号码。In step 1, the takeaway, courier, etc. visitor enters the room number to be visited at the access control.
在步骤2中,门禁向富媒体消息系统中的QRSvr发起请求。In step 2, the access control initiates a request to the QRSvr in the rich media messaging system.
在步骤3中,QRSvr通过鉴权,并向门禁返回含有房间PUI的二维码。In step 3, the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
在步骤4中,外卖、快递等访客通过手持终端(如:手机)扫描二维码。In step 4, the takeaway, courier, and the like scan the QR code through the handheld terminal (eg, mobile phone).
在步骤5中,手持终端直接向EGS发起访问请求,该访问请求包括外卖、快递等访客的身份信息。In step 5, the handheld terminal directly initiates an access request to the EGS, and the access request includes identity information of the guest such as a takeaway or a courier.
在步骤6中,EGS携带访客的身份标识、访问房间标识,向NAB发起鉴权 请求。In step 6, the EGS carries the identity of the visitor, accesses the room identity, and initiates an authentication request to the NAB.
在步骤7中,NAB根据房主的的预先设置,如:通过查询访客的身份信息是否处于通讯录中。从而判定访客非直接允许进入的人。In step 7, the NAB is pre-set according to the homeowner, such as by querying whether the identity information of the visitor is in the address book. Thus, it is determined that the visitor is not directly allowed to enter.
在步骤8中,EGS根据收到指令,向访客的手持终端返回是否进行进一步鉴权的提问,当然,在本实施例中,也可以像门禁返回是否进行进一步鉴权的提问。In step 8, the EGS returns a question of whether to perform further authentication to the handheld terminal of the visitor according to the received command. Of course, in the present embodiment, it is also possible to return a question of whether to perform further authentication like the access control.
在步骤9中,访客点击Yes,EGS透传该指令到IMAS。In step 9, the visitor clicks Yes, and the EGS transparently transmits the command to the IMAS.
在步骤10~步骤11中,IM AS分别向访客终端、房主终端发起通讯链路创建请求,通过该链路,房主可以直接对访客进行验证。In step 10 to step 11, the IM AS initiates a communication link creation request to the guest terminal and the homeowner terminal respectively, and the homeowner can directly authenticate the visitor through the link.
在步骤12中,当链路创建完毕后,外卖、快递等访客通过语音说明来意。In step 12, after the link is created, the takeaway, express, and other visitors are uttered by voice instructions.
在步骤13中,房主点击允许进入,IMAS向EGS透传该指令。In step 13, the homeowner clicks on to enter, and the IMAS transparently transmits the command to the EGS.
在步骤14中,EGS根据收到指令,向门禁发出开门指令。In step 14, the EGS issues a door open command to the access control based on the received command.
图3为本申请第二实施例提供一种门禁控制的方法处于场景2中的流程图。根据图3所示:该场景2为:访客是户主好友情况下的门禁管控流程。所述方法包括步骤1至步骤8。FIG. 3 is a flowchart of a method for providing access control according to a second embodiment of the present application in scenario 2. According to FIG. 3, the scenario 2 is: the access control process in the case where the visitor is a friend of the household. The method includes steps 1 through 8.
在步骤1中,好友访客在门禁处输入要拜访的房间号码。In step 1, the friend visitor enters the room number to be visited at the access control.
在步骤2中,门禁向富媒体消息系统中的QRSvr发起请求。In step 2, the access control initiates a request to the QRSvr in the rich media messaging system.
在步骤3中,QRSvr通过鉴权,并向门禁返回含有房间PUI的二维码。In step 3, the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
在步骤4中,好友访客通过手持终端(如:手机)扫描二维码。In step 4, the friend visitor scans the two-dimensional code through a handheld terminal (eg, a mobile phone).
在步骤5中,手持终端直接向EGS发起访问请求,该访问请求包括好友访客的身份信息。In step 5, the handheld terminal directly initiates an access request to the EGS, the access request including identity information of the friend visitor.
在步骤6中,EGS携带访客的身份标识、访问房间标识,向NAB鉴权。In step 6, the EGS carries the identity of the visitor, accesses the room identifier, and authenticates to the NAB.
在步骤7中,NAB在房主的通讯录中查找到好友访客,则判定是好友可入,向EGS返回放通的指令。In step 7, the NAB finds a friend visitor in the homeowner's address book, and then determines that the friend can enter and returns the release command to the EGS.
在步骤8中,EGS根据收到指令,向门禁发出开门指令。In step 8, the EGS issues an open command to the access control based on the received command.
图4为本申请第二实施例提供一种门禁控制的方法处于场景3中的流程图。根据图4所示:该场景3为:访客因为小广告等恶劣行为被加入黑名单的门禁管控流程。所述方法包括步骤1至步骤6。FIG. 4 is a flowchart of a method for providing access control according to a second embodiment of the present application in scenario 3. According to FIG. 4, the scenario 3 is: an access control process in which a visitor is blacklisted because of a bad behavior such as a small advertisement. The method includes steps 1 through 6.
在步骤1中,黑名单访客在门禁处输入要拜访的房间号码。In step 1, the blacklist visitor enters the room number to be visited at the access control.
在步骤2中,门禁向富媒体消息系统中的QRSvr发起请求。In step 2, the access control initiates a request to the QRSvr in the rich media messaging system.
在步骤3中,QRSvr通过鉴权,并向门禁返回含有房间PUI的二维码。In step 3, the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
在步骤4中,黑名单访客通过手持终端(如:手机)扫描二维码。In step 4, the blacklist visitor scans the two-dimensional code through a handheld terminal (eg, a mobile phone).
在步骤5中,手持终端直接向EGS发起访问请求,该访问请求包括黑名单访客的身份信息。In step 5, the handheld terminal directly initiates an access request to the EGS, the access request including the identity information of the blacklisted visitor.
在步骤6中,EGS根据内置的黑名单管控模块,在黑名单中查找到该黑名单访客,则判定该用户为黑名单用户,禁止用户进入并通过门禁系统发出声光告警。In step 6, the EGS finds the blacklist guest in the blacklist according to the built-in blacklist management module, and determines that the user is a blacklist user, prohibiting the user from entering and sending an audible and visual alarm through the access control system.
图5为本申请第二实施例提供一种门禁控制的方法处于场景4中的流程图。根据图5所示:该场景4为:访客通过聊天室方式控制开门。该方法包括步骤1至步骤11。FIG. 5 is a flowchart of a method for access control according to a second embodiment of the present application in scenario 4. According to FIG. 5, the scene 4 is: the visitor controls the opening of the door through the chat room mode. The method includes steps 1 through 11.
在步骤1中,访客与房主在同一聊天室交流。In step 1, the visitor communicates with the homeowner in the same chat room.
在步骤2中,访客请求房主开放门禁。In step 2, the visitor requests the homeowner to open the door.
在步骤3中,房主在群聊中,向EGS机器人发送命令,为访客开放临时门禁权限,群聊AS向EGS转发此消息。In step 3, the homeowner sends a command to the EGS robot in the group chat to open the temporary access permission for the visitor, and the group chat AS forwards the message to the EGS.
在步骤4中,EGS记录该许可信息,并按照预设配置保存有效期。In step 4, the EGS records the license information and saves the validity period according to the preset configuration.
在步骤5中,访客在门禁处输入要拜访的房间号码。In step 5, the visitor enters the room number to be visited at the access control.
在步骤6中,门禁向富媒体消息系统中的QRSvr发起请求。In step 6, the access control initiates a request to the QRSvr in the rich media messaging system.
在步骤7中,QRSvr通过鉴权,并向门禁返回含有房间PUI的二维码。In step 7, the QRSvr passes the authentication and returns a two-dimensional code containing the room PUI to the access control.
在步骤8中,访客通过手持终端(如:手机)扫描二维码。In step 8, the visitor scans the two-dimensional code through a handheld terminal (eg, a mobile phone).
在步骤9中,手持终端直接向EGS发起访问请求,该访问请求包括访客的身份信息。In step 9, the handheld terminal directly initiates an access request to the EGS, the access request including the identity information of the visitor.
在步骤10~步骤11中,EGS在匹配许可信息后,向门禁发出开门指令。In steps 10 to 11, the EGS issues a door open command to the access control after matching the permission information.
图6为本申请第三实施例一种计算机设备。根据图6所示,本申请第三实施例提供了一种计算机设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述程序时实现一种门禁控制的方法的以下步骤:接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码;获得访客根据所述验证码生成的访客身份信息;依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。FIG. 6 is a computer device according to a third embodiment of the present application. According to FIG. 6, a third embodiment of the present application provides a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor executing the The following steps of the method for implementing an access control method: receiving room identification information input by a visitor, generating a corresponding verification code according to the room identification information; obtaining visitor identity information generated by a visitor according to the verification code; The identity verification information corresponding to the room identification information verifies the visitor identity information, and performs switch control on the access control according to the verification result.
在一实施例中,所述处理器在执行所述根据验证结果对门禁进行开关控制时,包括:在依据所述房间识别信息对应的身份验证信息对所述访客身份信息 验证通过的情况下,向所述门禁发送门禁打开指令;在依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过且需要对访客进行验证的情况下,建立房主的验证终端与所述门禁的验证通道,供房主通过所述验证通道对访客身份信息进行验证;根据房主通过所述验证通道对访客身份信息进行验证的结果对门禁进行开关控制。In an embodiment, when performing the switch control on the access control according to the verification result, the processor includes: when the visitor identity information is verified according to the identity verification information corresponding to the room identification information, Sending an access control open command to the access control; establishing a verification terminal of the homeowner and the access control if the verification of the visitor identity information fails and the visitor needs to be verified according to the identity verification information corresponding to the room identification information The verification channel is used by the homeowner to verify the visitor identity information through the verification channel; and the access control is switched on and off according to the result of the homeowner verifying the visitor identity information through the verification channel.
在一实施例中,所述处理器在执行依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过之后,还执行以下步骤:向门禁或访客终端发送询问访客是否继续请求验证的提醒消息。In an embodiment, after the processor performs the verification of the visitor identity information according to the identity verification information corresponding to the room identification information, the processor further performs the step of: sending an inquiry to the access control or the guest terminal to ask the visitor whether to continue the request. Verified reminder message.
在一实施例中,所述处理器在执行所述接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码之前,还执行以下步骤:接收房主通过验证终端发出的允许访客身份验证信息;所述允许访客身份验证信息具有时效性;In an embodiment, before performing the receiving the room identification information input by the visitor and generating the corresponding verification code according to the room identification information, the processor further performs the following steps: receiving the allowed guest sent by the homeowner through the verification terminal Authentication information; said allowing guest authentication information to be time-sensitive;
所述处理器在执行所述接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码时,包括:依据所述允许访客身份验证信息对所述访客身份信息进行验证;在验证通过的情况下,向所述门禁发送所述门禁打开指令。When the processor performs the receiving the room identification information input by the visitor and generating the corresponding verification code according to the room identification information, the processor includes: verifying the visitor identity information according to the allowed guest identity verification information; In the case of passing, the access control open command is sent to the access control.
在一实施例中,所述验证码包括:所述房间识别信息对应的房主的验证终端ID的验证码。In an embodiment, the verification code includes: a verification code of the verification terminal ID of the homeowner corresponding to the room identification information.
在一实施例中,所述身份验证信息至少包括以下名录之一:通信录、预设的允许访客名录及预设的禁止访客名录。In an embodiment, the authentication information includes at least one of the following directories: a contact list, a preset allowed guest list, and a preset list of prohibited visitors.
本申请第四实施例提供了一种计算机可读存储介质,所述存储介质上存储有计算机程序,所述程序被处理器执行时实现上述一种门禁控制的方法。A fourth embodiment of the present application provides a computer readable storage medium having a computer program stored thereon, and the program is implemented by a processor to implement the above-described method of access control.
由于在第一实施例中已经对一种门禁控制的方法进行了详细说明,所以在本实施例中不对该方法的实施过程进行重复阐述。Since the method of an access control has been described in detail in the first embodiment, the implementation of the method is not repeatedly described in the present embodiment.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个......”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It is to be understood that the term "comprises", "comprising", or any other variants thereof, is intended to encompass a non-exclusive inclusion, such that a process, method, article, or device comprising a series of elements includes those elements. It also includes other elements that are not explicitly listed, or elements that are inherent to such a process, method, article, or device. An element that is defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in the process, method, item, or device that comprises the element.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the embodiments of the present application are merely for the description, and do not represent the advantages and disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,本申请的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质例如只读存储器/随机存取存储器(Read Only Memory/Random Access Memory,ROM/RAM)、磁碟、光盘中,包括若干指令用以使得一台终端,可以是手机,计算机,服务器,空调器,或者网络设备等执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware. Based on such understanding, the technical solution of the present application, which is essential or contributes to the related art, may be embodied in the form of a software product stored in a storage medium such as a read only memory/random access memory ( The Read Only Memory/Random Access Memory (ROM/RAM), a magnetic disk, and an optical disk include instructions for causing a terminal, which may be a mobile phone, a computer, a server, an air conditioner, or a network device, to perform various embodiments of the present application. Said method.
Claims (10)
- 一种门禁控制的方法,所述方法包括:A method of access control, the method comprising:接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码;Receiving room identification information input by the visitor, and generating a corresponding verification code according to the room identification information;获得访客根据所述验证码生成的访客身份信息;Obtaining visitor identity information generated by the visitor according to the verification code;依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。And verifying the visitor identity information according to the identity verification information corresponding to the room identification information, and performing switch control on the access control according to the verification result.
- 根据权利要求1所述的方法,其中,所述根据验证结果对门禁进行开关控制,包括:The method according to claim 1, wherein the switching control of the access control according to the verification result comprises:基于依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证通过的验证结果,向所述门禁发送门禁打开指令;And sending an access control open command to the access control based on the verification result that the visitor identity information is verified according to the identity verification information corresponding to the room identification information;基于依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过且需要对所述访客进行验证的验证结果,建立房主的验证终端与所述门禁的验证通道,以便所述房主通过所述验证通道对所述访客身份信息进行验证;Establishing a verification terminal of the homeowner and the verification channel of the access control based on the verification result that the verification of the visitor identity information fails and the verification of the visitor is required according to the identity verification information corresponding to the room identification information, so as to The homeowner verifies the visitor identity information through the verification channel;根据所述房主通过所述验证通道对所述访客身份信息进行验证的结果对门禁进行开关控制。The access control is switched on and off according to the result of the homeowner verifying the visitor identity information through the verification channel.
- 根据权利要求2所述的方法,在依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过之后,所述方法还包括:The method according to claim 2, after the verification of the visitor identity information is not passed according to the identity verification information corresponding to the room identification information, the method further includes:向门禁或访客终端发送询问访客是否继续请求验证的提醒消息。Sends an alert message to the access control or guest terminal asking if the visitor continues to request verification.
- 根据权利要求1所述的方法,所述接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码之前,所述方法还包括:The method according to claim 1, wherein the method further comprises: before receiving the room identification information input by the guest, and generating a corresponding verification code according to the room identification information, the method further comprising:接收房主通过验证终端发出的允许访客身份验证信息;所述允许访客身份验证信息在预设时间内有效;Receiving the allowed guest identity verification information sent by the homeowner through the verification terminal; the allowing the guest identity verification information to be valid within a preset time;所述依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,包括:The verifying the visitor identity information according to the identity verification information corresponding to the room identification information, including:依据所述允许访客身份验证信息对所述访客身份信息进行验证;Verifying the visitor identity information according to the allowed guest identity verification information;基于验证通过的验证结果,向所述门禁发送所述门禁打开指令。The access control open command is sent to the access control based on the verification result passed by the verification.
- 根据权利要求1所述的方法,其中,所述验证码包括:所述房间识别信息对应的房主的验证终端标识ID的验证码。The method according to claim 1, wherein the verification code comprises: a verification code of the verification terminal identification ID of the homeowner corresponding to the room identification information.
- 根据权利要求1所述的方法,其中,所述身份验证信息包括以下名录之一:通信录、预设的允许访客名录及预设的禁止访客名录。The method of claim 1, wherein the authentication information comprises one of the following directories: a directory, a preset list of allowed visitors, and a predetermined list of forbidden visitors.
- 一种计算机设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述程序时实现一种门禁控制 的方法的以下步骤:A computer apparatus comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, the processor performing the program to implement the following steps of a method of access control:接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码;Receiving room identification information input by the visitor, and generating a corresponding verification code according to the room identification information;获得访客根据所述验证码生成的访客身份信息;Obtaining visitor identity information generated by the visitor according to the verification code;依据所述房间识别信息对应的身份验证信息对所述访客身份信息进行验证,根据验证结果对门禁进行开关控制。And verifying the visitor identity information according to the identity verification information corresponding to the room identification information, and performing switch control on the access control according to the verification result.
- 根据权利要求7所述的计算机设备,其中,所述处理器在执行所述根据验证结果对门禁进行开关控制时,包括:The computer device according to claim 7, wherein the processor, when performing the switching control of the access control according to the verification result, comprises:基于依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证通过的验证结果,向所述门禁发送门禁打开指令;And sending an access control open command to the access control based on the verification result that the visitor identity information is verified according to the identity verification information corresponding to the room identification information;基于依据所述房间识别信息对应的身份验证信息对所述访客身份信息验证未通过且需要对访客进行验证的验证结果,建立房主的验证终端与所述门禁的验证通道,以便所述房主通过所述验证通道对所述访客身份信息进行验证;Establishing a verification terminal of the homeowner and the verification channel of the access control based on the verification result that the verification of the visitor identity information fails and the verification of the visitor identity information is performed according to the identity verification information corresponding to the room identification information, so that the homeowner Verifying the visitor identity information through the verification channel;根据所述房主通过所述验证通道对所述访客身份信息进行验证的结果对门禁进行开关控制。The access control is switched on and off according to the result of the homeowner verifying the visitor identity information through the verification channel.
- 根据权利要求7所述的计算机设备,其中,所述处理器在执行所述接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码之前,还执行以下步骤:The computer device according to claim 7, wherein the processor performs the following steps before performing the receiving the room identification information input by the visitor and generating the corresponding verification code according to the room identification information:接收房主通过验证终端发出的允许访客身份验证信息;所述允许访客身份验证信息在预设时间内有效;Receiving the allowed guest identity verification information sent by the homeowner through the verification terminal; the allowing the guest identity verification information to be valid within a preset time;所述处理器在执行所述接收访客输入的房间识别信息,依据所述房间识别信息生成对应的验证码时,包括:The processor, when performing the receiving the room identification information input by the visitor, and generating the corresponding verification code according to the room identification information, includes:依据所述允许访客身份验证信息对所述访客身份信息进行验证;Verifying the visitor identity information according to the allowed guest identity verification information;基于验证通过的验证结果,向所述门禁发送所述门禁打开指令。The access control open command is sent to the access control based on the verification result passed by the verification.
- 一种计算机可读存储介质,所述存储介质上存储有计算机程序,所述程序被处理器执行时实现权利要求1至6中任意一项所述一种门禁控制的方法。A computer readable storage medium having stored thereon a computer program, the program being executed by a processor to implement a method of access control according to any one of claims 1 to 6.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711433530.5 | 2017-12-26 | ||
CN201711433530.5A CN109961541A (en) | 2017-12-26 | 2017-12-26 | A kind of method of access control, computer equipment and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019128681A1 true WO2019128681A1 (en) | 2019-07-04 |
Family
ID=67022161
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/119993 WO2019128681A1 (en) | 2017-12-26 | 2018-12-10 | Access control method, computer device, and readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109961541A (en) |
WO (1) | WO2019128681A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE1951140A1 (en) * | 2019-10-07 | 2021-04-08 | Amido Ab Publ | A method for forming a network connection |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110443919A (en) * | 2019-07-15 | 2019-11-12 | 广东校园卫士网络科技有限责任公司 | A kind of student's disengaging management and candid photograph analysis method based on recognition of face |
CN110298953B (en) * | 2019-07-25 | 2021-07-16 | 青岛海尔科技有限公司 | Method and device for controlling equipment in intelligent home operating system |
CN111260831A (en) * | 2020-02-25 | 2020-06-09 | 深圳桔子智能科技发展有限公司 | Intelligent door lock control device, method and system |
CN112168090B (en) * | 2020-09-02 | 2021-11-23 | 珠海格力电器股份有限公司 | Sweeper, control method thereof and control method of door control device |
CN113794741B (en) * | 2021-11-17 | 2022-04-19 | 中国南方电网有限责任公司超高压输电公司广州局 | Visitor information registration method and device, computer equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293455A (en) * | 1999-04-09 | 2000-10-20 | Yoshiro Mizuno | Handy terminal with browser |
CN106251454A (en) * | 2016-08-25 | 2016-12-21 | 张博 | A kind of gate control system based on Internet of Things and access control method |
CN106683252A (en) * | 2017-03-09 | 2017-05-17 | 徐东哲 | Community intelligent passing control system and method based on narrow band Internet of Things |
CN106710043A (en) * | 2016-12-21 | 2017-05-24 | 英业达科技有限公司 | Time-limited entrance guard management system with visitor authentication and method thereof |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204204067U (en) * | 2014-11-11 | 2015-03-11 | 上海云匠科技有限公司 | A kind of door-locking system using Quick Response Code certification |
CN104966340B (en) * | 2015-06-19 | 2017-01-18 | 深圳市幸福立方科技有限公司 | Access control system, access control method and cloud service platform |
CN105788040B (en) * | 2016-02-22 | 2018-09-21 | 国网湖北省电力有限公司咸宁供电公司 | A kind of office block visitor dynamic authorization system and management method |
CN106355709A (en) * | 2016-08-31 | 2017-01-25 | 北京厚文知识产权顾问有限公司 | Access control system and door opening method based on dynamic quick response code |
CN206411753U (en) * | 2016-12-09 | 2017-08-15 | 深圳市金源嘉电子科技有限公司 | A kind of visual door control system based on smart mobile phone |
CN107341884A (en) * | 2017-06-30 | 2017-11-10 | 王韧 | A kind of Quick Response Code intelligent access control system and its implementation |
CN107346570B (en) * | 2017-08-11 | 2023-05-23 | 广东电网有限责任公司信息中心 | Visual visiting system |
-
2017
- 2017-12-26 CN CN201711433530.5A patent/CN109961541A/en active Pending
-
2018
- 2018-12-10 WO PCT/CN2018/119993 patent/WO2019128681A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000293455A (en) * | 1999-04-09 | 2000-10-20 | Yoshiro Mizuno | Handy terminal with browser |
CN106251454A (en) * | 2016-08-25 | 2016-12-21 | 张博 | A kind of gate control system based on Internet of Things and access control method |
CN106710043A (en) * | 2016-12-21 | 2017-05-24 | 英业达科技有限公司 | Time-limited entrance guard management system with visitor authentication and method thereof |
CN106683252A (en) * | 2017-03-09 | 2017-05-17 | 徐东哲 | Community intelligent passing control system and method based on narrow band Internet of Things |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE1951140A1 (en) * | 2019-10-07 | 2021-04-08 | Amido Ab Publ | A method for forming a network connection |
WO2021071408A1 (en) * | 2019-10-07 | 2021-04-15 | AMIDO AB (publ) | A method for forming a network connection |
EP4042389A4 (en) * | 2019-10-07 | 2023-11-08 | AMIDO AB (publ) | A method for forming a network connection |
SE545729C2 (en) * | 2019-10-07 | 2023-12-19 | Amido Ab Publ | A method for forming a network connection between electronic devices in an entry handling system via a server, using identifiers and a plurality of openly displayed machine-readable codes and geo-fencing |
Also Published As
Publication number | Publication date |
---|---|
CN109961541A (en) | 2019-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019128681A1 (en) | Access control method, computer device, and readable storage medium | |
CN110121873B (en) | Access token management method, terminal and server | |
CN113611024B (en) | Visitor management method, equipment, system and computer readable storage medium | |
CN107070945B (en) | Identity login method and equipment | |
CN106096343B (en) | Message access control method and equipment | |
US9553864B2 (en) | Dual code authentication system | |
WO2017140240A1 (en) | Guest authentication method and system | |
CN103607372B (en) | The authentication method of network insertion and device | |
US20160182500A1 (en) | Systems and methods for anonymous authentication using multiple devices | |
CN105656948A (en) | Account login method and device | |
CN108597066B (en) | Visitor management method and device and computer readable storage medium | |
US9730061B2 (en) | Network authentication | |
US9185098B2 (en) | Method for user authentication | |
US20140053251A1 (en) | User account recovery | |
CN107113613A (en) | Server, mobile terminal, real-name network authentication system and method | |
CN107277812A (en) | A kind of wireless network authentication method and system based on Quick Response Code | |
CN109784024A (en) | One kind authenticating FIDO method and system based on the polyfactorial quick online identity of more authenticators | |
US20200036525A1 (en) | Method for determining approval for access to gate through network, and server and computer-readable recording media using the same | |
CN107256367A (en) | A kind of information processing method and device, terminal device and computer-readable recording medium | |
US20190364030A1 (en) | Two-step authentication method, device and corresponding computer program | |
CN107231338B (en) | Network connection method, device and device for network connection | |
AU2018101656A4 (en) | A System and Method for Facilitating the Delivery of Secure Hyperlinked Content via Mobile Messaging | |
US20140237567A1 (en) | Authentication method | |
CN106385397A (en) | Network access equipment access control and type configuration method and apparatus thereof | |
KR100320119B1 (en) | System and method for monitoring fraudulent use of id and media for storing program source thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18897534 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17/11/2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18897534 Country of ref document: EP Kind code of ref document: A1 |