WO2020000894A1 - Procédé et système de gestion de contrôle d'accès ainsi que dispositifs associés - Google Patents

Procédé et système de gestion de contrôle d'accès ainsi que dispositifs associés Download PDF

Info

Publication number
WO2020000894A1
WO2020000894A1 PCT/CN2018/118417 CN2018118417W WO2020000894A1 WO 2020000894 A1 WO2020000894 A1 WO 2020000894A1 CN 2018118417 W CN2018118417 W CN 2018118417W WO 2020000894 A1 WO2020000894 A1 WO 2020000894A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
access
information
terminal device
access control
Prior art date
Application number
PCT/CN2018/118417
Other languages
English (en)
Chinese (zh)
Inventor
章效淋
Original Assignee
深圳春沐源控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳春沐源控股有限公司 filed Critical 深圳春沐源控股有限公司
Publication of WO2020000894A1 publication Critical patent/WO2020000894A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder

Definitions

  • the present invention relates to the technical field of the Internet of Things, and in particular to an access control management method, system, and related equipment.
  • the existing access control management is mainly paper registration and RF card visitor management.
  • the existing solutions have the following shortcomings: manual paper registration of personnel information by hand, complicated writing, low efficiency and waste of manpower; RF card management, some RF cards or visitor cards All access control in the community or building is universal, and guests or employees can go to places he should not visit after getting the card, and there are security loopholes.
  • Embodiments of the present invention provide an access control management method, system, and related equipment, which implement intelligent management of access control based on a two-dimensional code.
  • a first aspect of the embodiments of the present invention provides an access control management method, which is characterized in that it includes:
  • the access information including at least identity information and access area information of the target visitor;
  • the access control management device When the access control management device recognizes the target two-dimensional code displayed by the current terminal device, receives the second device identification information fed back by the current terminal device;
  • a door opening instruction is sent to the access control management device.
  • the access control management method in the embodiment of the present invention may further include:
  • the server sends navigation information to the target terminal device.
  • the access information further includes access time restriction information.
  • the access control management method in the embodiment of the present invention may further include:
  • the server When the target visitor does not leave the access area within a preset time period, the server sends a timeout access prompt message to the target terminal device.
  • the access control management method in the embodiment of the present invention may further include:
  • the access control management device When the access control management device in the area where the target visitor does not have the right to access recognizes the target two-dimensional code, it sends prompt information about the unauthorized access to the target terminal device.
  • a second aspect of the embodiments of the present invention provides an access control management system, which is characterized by including:
  • An obtaining module configured to obtain access information of a target visitor and first device identification information of a target terminal device bound to the target visitor, where the access information includes at least identity information and access area information of the target visitor;
  • a generating module configured to generate a target two-dimensional code according to the access information, and send the target two-dimensional code to the target terminal device;
  • a storage module configured to store the target two-dimensional code in association with the first device identification information
  • a receiving module configured to receive second device identification information fed back by the current terminal device when the access control management device recognizes the target two-dimensional code displayed by the current terminal device;
  • control module if the second device identification information is consistent with the first device identification information, and the access control management device is in the access area, the control module is configured to send a door opening instruction to the access control management device.
  • the access control management system in the embodiment of the present invention may further include:
  • the navigation module is configured to send navigation information to the target terminal device when the access control management device recognizes the target two-dimensional code.
  • the access information further includes access time limit information.
  • the access control management system in the embodiment of the present invention may further include:
  • a first prompting module is configured to send overtime access prompting information to the target terminal device when the target visitor does not leave the access area within a preset time period.
  • the access control management system in the embodiment of the present invention may further include:
  • the second prompting module is configured to send prompting information of unauthorized access to the target terminal device when the access control management device in the area in which the target visitor is not authorized to access recognizes the target two-dimensional code.
  • a third aspect of the embodiments of the present application provides a computer device, characterized in that the computer device includes a processor, and the processor is configured to execute any of the first aspect and the first aspect when executing a computer program stored in a memory. Steps in one possible implementation.
  • a fourth aspect of the embodiments of the present application provides a computer-readable storage medium on which a computer program is stored, characterized in that when the computer program is executed by a processor, it is implemented as any one of the first aspect and the first aspect Steps in a possible implementation.
  • the server may store the visitor information of the target visitor and the first device identification information of the target terminal device, and generate the target two-dimensional code based on the visitor information.
  • the access control management When the device recognizes the target QR code displayed by the current terminal device, the current terminal device will automatically feed back the second device identification information to the server; if the second device identification information is consistent with the first device identification information, and the access control management device is in the access area Within, the server sends a door open instruction to the access control management device.
  • the embodiment of the present invention implements multiple verifications of access rights based on the two-dimensional code and terminal device identification information, which can intelligently manage the access control based on the two-dimensional code and prevent the theft of the two-dimensional code. Compared with the existing solution, no manual registration, no need Making RF cards saves human and material resources.
  • FIG. 1 is a schematic diagram of an access control management method according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of another embodiment of an access control management method according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of an embodiment of an access control management system according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of another embodiment of an access control management system according to an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of another embodiment of an access control management system according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of a computer device according to an embodiment of the present invention.
  • Embodiments of the present invention provide an access control management method, system, and related equipment, which implement intelligent management of access control based on a two-dimensional code.
  • an embodiment of a method for access control management in the embodiment of the present invention may include:
  • the target visitor may download the client based on the user terminal device, and submit the visitor information and the first device identification information of the target terminal device bound by the target visitor to the server through the client.
  • the access information includes at least the identity information of the target visitor and the access area information.
  • the specific identity information may be ID card scanning information of the target visitor, ID card number, driver ’s license scan information, passport scan information, etc.
  • the specific identity information only needs to uniquely identify the target visitor, which is not limited here.
  • the server can determine the access right that the target visitor has the right to open according to the access area information submitted by the target visitor.
  • the client on the target terminal device can automatically obtain the first device identification information and send it to the server, where the first device identification information is a unique identification terminal device identification code, which may specifically be IMSI (International Mobile Subscriber Identity), IMEI (International Mobile device identification number), ESN (electronic serial number), MEID (mobile device ID), can be properly set according to the type of terminal device, only need to uniquely identify the terminal device, specifically not here limited.
  • IMSI International Mobile Subscriber Identity
  • IMEI International Mobile device identification number
  • ESN electronic serial number
  • MEID mobile device ID
  • the server can generate a unique target QR code based on the access information and send the target QR code to the client in the target terminal device.
  • the target terminal device can open the The target QR code can be scanned and identified by the access control management device.
  • the server stores the target QR code in association with the first device identification information.
  • the device identification information of the terminal device can be verified.
  • the access control management device recognizes the target two-dimensional code displayed by the current terminal device, receive the second device identification information fed back by the current terminal device;
  • the server may actively or passively obtain the second device identification information fed back by the current terminal device.
  • the server may obtain the location information of the terminal device through a client installed in the terminal device, and determine, based on the location information, that a terminal device that is located near the access control device and is less than a preset distance is the current terminal device, and The client sends a request message for obtaining the device identification information of the current terminal device, so that the server can receive the second device identification information fed back by the current terminal device; for example, the client on the terminal device can be set to open the target two-dimensional code at the same time , Actively sending the device identification information of the current terminal device to the server, so that the server can passively receive the second device identification information fed back by the current terminal device.
  • the server may send a door opening instruction to the access control management device to open the access control .
  • the server may send a door opening instruction to the access control management device to open the access control .
  • the server stores the visitor information of the target visitor and the first device identification information of the target terminal device, and generates a target QR code based on the visitor information.
  • the access control device When the target QR code displayed by the current terminal device is recognized, the current terminal device will automatically feed back the second device identification information to the server; if the second device identification information is consistent with the first device identification information, and the access control management device is in the access area , The server sends a door opening instruction to the access control management device.
  • the embodiment of the present invention implements multiple verifications of access rights based on the two-dimensional code and terminal device identification information, which can intelligently manage the access control based on the two-dimensional code and prevent the theft of the two-dimensional code. Compared with the existing solution, no manual registration, no need Making RF cards saves human and material resources.
  • FIG. 2 another embodiment of an access control management method in the embodiment of the present invention Can include:
  • 201 Obtain access information of a target visitor and first device identification information of a target terminal device bound by the target visitor;
  • the access control management device When the access control management device recognizes the target two-dimensional code displayed by the current terminal device, receive the second device identification information fed back by the current terminal device;
  • steps 201 to 205 in the embodiment of the present invention is similar to that described in steps 101 to 105 in the embodiment shown in FIG. 1 above. For details, refer to steps 101 to 105. To repeat.
  • the access control management device When the access control management device recognizes the target two-dimensional code, it sends navigation information to the target terminal device.
  • the server may send navigation information to the target terminal device according to the user to guide the visitor to the access area.
  • the access control management device can identify the target QR code corresponding to the target visitor.
  • the server can plan navigation information based on the current location information of the access control management device that recognizes the target QR code and the location of the area to be accessed and map information of the access area. Identify access control information and store it in association with the QR code image.
  • the client can query or receive navigation information sent by the server or stored in advance, so that the user can directly reach the access area, which saves the time for the visitor to reach the destination and improves the user experience. In order to prevent users from hanging around in the park, it brings security risks.
  • the server sends a timeout access prompt message to the target terminal device.
  • the visit of the visitor may be limited in time.
  • the server may determine the position where the visitor leaves the access control based on the QR code.
  • the access time restriction information may be added to the access information to indicate a valid access time interval.
  • the server sends a timeout access prompt message to the target terminal device to Visitors are reminded to pay attention to the time limit for access, which improves the user experience.
  • the access management device in the area recognizes the target QR code and sends it to the target terminal.
  • the device sends a prompt message of unauthorized access to remind the visitor to pay attention to the access right; a white list can also be set.
  • the target access control management device in the area that the target visitor does not have access to recognizes the target QR code if the target visitor is not in the white list, then Send a message of no access permission to the target terminal device to remind the visitor to pay attention to the access right.
  • the size of the sequence numbers of the above steps does not mean the order of execution, and the execution order of each step should be determined by its function and internal logic, and should not deal with the present invention.
  • the implementation process of the examples constitutes any limitation.
  • the above embodiment describes the access control management method in the embodiment of the present invention.
  • the following describes the server implementing the above access control management method in the embodiment of the present invention.
  • Please refer to FIG. 3, an implementation of a server in the embodiment of the present invention Examples can include:
  • An obtaining module 301 configured to obtain access information of a target visitor and first device identification information of a target terminal device bound by the target visitor, and the access information includes at least identity information and access area information of the target visitor;
  • a generating module 302 configured to generate a target two-dimensional code according to the access information, and send the target two-dimensional code to the target terminal device;
  • a storage module 303 configured to store the target two-dimensional code in association with the first device identification information
  • the receiving module 304 is configured to receive the second device identification information fed back by the current terminal device when the access control management device recognizes the target two-dimensional code displayed by the current terminal device;
  • the control module 305 is configured to send a door opening instruction to the access control management device if the second device identification information is consistent with the first device identification information and the access control management device is within the access area.
  • the server stores the visitor information of the target visitor and the first device identification information of the target terminal device, and generates a target QR code based on the visitor information.
  • the access control device When the target QR code displayed by the current terminal device is recognized, the current terminal device will automatically feed back the second device identification information to the server; if the second device identification information is consistent with the first device identification information, and the access control management device is in the access area , The server sends a door opening instruction to the access control management device.
  • the embodiment of the present invention implements multiple verifications of access rights based on the two-dimensional code and terminal device identification information, which can intelligently manage the access control based on the two-dimensional code and prevent the theft of the two-dimensional code. Compared with the existing solution, no manual registration, no need Making RF cards saves human and material resources.
  • the server in the embodiment of the present invention may further include:
  • the navigation module 306 is configured to send navigation information to the target terminal device when the access control management device recognizes the target two-dimensional code.
  • the access information further includes access time restriction information.
  • the server in the embodiment of the present invention may further include:
  • the first prompting module 307 is configured to send a timeout access prompt message to the target terminal device when the target visitor does not leave the access area within a preset time period.
  • the server in the embodiment of the present invention may further include:
  • the second prompting module 308 is configured to send prompt information about the unauthorized access to the target terminal device when the access control management device in the area that the target visitor does not have access to recognizes the target QR code.
  • the embodiment of the present application further provides a computer device 6. As shown in FIG. 6, for convenience of explanation, only the parts related to the embodiment of the present application are shown. For specific technical details not disclosed, please refer to the method of the embodiment of the present application. section.
  • the computer device 6 generally refers to a computer device having a strong processing capability such as a server.
  • the computer device 6 includes a power source 610, a memory 620, a processor 630, a wired or wireless network interface 640, and a computer program stored in the memory and executable on the processor.
  • the processor executes the computer program, the steps in the foregoing embodiments of the blockchain-based qualification authentication method are implemented, for example, steps 101 to 105 shown in FIG. 1.
  • the processor executes a computer program, the functions of each module or unit in the foregoing device embodiments are implemented.
  • the processor is specifically configured to implement the following steps:
  • the access control management device When the access control management device recognizes the target two-dimensional code displayed by the current terminal device, it receives the second device identification information fed back by the current terminal device;
  • a door opening instruction is sent to the access control management device.
  • the processor may be further configured to implement the following steps:
  • the access control management device When the access control management device recognizes the target two-dimensional code, it sends navigation information to the target terminal device.
  • the access information further includes access time limit information.
  • the processor may be further configured to implement the following steps:
  • a timeout access prompt message is sent to the target terminal device.
  • the processor may be further configured to implement the following steps:
  • the access control management device When the access control management device in the area where the target visitor does not have the right to access recognizes the target two-dimensional code, it sends a prompt message to the target terminal device without the right to access.
  • the computer device 6 may be a computing device such as a desktop computer, a notebook, a palmtop computer, and a cloud server.
  • a computer program may be divided into one or more modules / units, and one or more modules / units are stored in a memory and executed by a processor.
  • One or more modules / units may be a series of computer program instruction segments capable of performing a specific function, and the instruction segments are used to describe a computer program execution process in a computer device.
  • the computer device 6 may include more or less components than shown in the figure, or some components may be combined, or different components. Arrangements, such as computer devices, may also include input-output devices, buses, and the like.
  • the so-called processor can be a central processing unit (CPU), or other general-purpose processors, digital signal processors (DSPs), application specific integrated circuits (ASICs), ready-made Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • a general-purpose processor may be a microprocessor, or the processor may be any conventional processor.
  • the processor is a control center of a computer device, and various interfaces and lines are used to connect various parts of the entire computer device.
  • the memory may be used to store computer programs and / or modules.
  • the processor implements various functions of the computer device by running or executing the computer programs and / or modules stored in the memory and calling data stored in the memory.
  • the memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one application required by a function (such as a sound playback function, an image playback function, etc.), etc .; the storage data area may store data according to the mobile phone Use the created data (such as audio data, phone book, etc.), etc.
  • the memory may include high-speed random access memory, and may also include non-volatile memory, such as hard disks, memory, plug-in hard disks, Smart Memory Card (SMC), and Secure Digital (SD) cards.
  • non-volatile memory such as hard disks, memory, plug-in hard disks, Smart Memory Card (SMC), and Secure Digital (SD) cards.
  • Flash card Flash card
  • flash memory at least one disk storage device, flash memory device, or other volatile solid-state storage device.
  • This application also provides a computer-readable storage medium.
  • the computer-readable storage medium stores a computer program.
  • the computer program is executed by a processor, the following steps can be implemented:
  • the access control management device When the access control management device recognizes the target two-dimensional code displayed by the current terminal device, it receives the second device identification information fed back by the current terminal device;
  • a door opening instruction is sent to the access control management device.
  • the processor may be further configured to implement the following steps:
  • the access control management device When the access control management device recognizes the target two-dimensional code, it sends navigation information to the target terminal device.
  • the access information further includes access time limit information.
  • the processor may be further configured to implement the following steps:
  • a timeout access prompt message is sent to the target terminal device.
  • the processor may be further configured to implement the following steps:
  • the access control management device When the access control management device in the area where the target visitor does not have the right to access recognizes the target two-dimensional code, it sends a prompt message to the target terminal device without the right to access.
  • the disclosed systems, devices, and methods may be implemented in other ways.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, which may be electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objective of the solution of this embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above integrated unit may be implemented in the form of hardware or in the form of software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-readable storage medium.
  • the technical solution of the present invention essentially or part that contributes to the existing technology or all or part of the technical solution can be embodied in the form of a software product, which is stored in a storage medium Including a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method described in each embodiment of the present invention.
  • the foregoing storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes .

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne un procédé et un système de gestion de contrôle d'accès ainsi que des dispositifs associés, qui mettent en œuvre la gestion intelligente de contrôle d'accès sur la base d'un code bidimensionnel consistant à : acquérir des informations d'accès d'un visiteur cible et des premières informations d'identification de dispositif d'un dispositif terminal cible lié au visiteur cible (101), les informations d'accès comprenant au moins des informations d'identité du visiteur cible et des informations de région d'accès ; générer un code bidimensionnel cible conformément aux informations d'accès, et envoyer le code bidimensionnel cible au dispositif terminal cible (102) ; mémoriser de manière associative le code bidimensionnel cible et les premières informations d'identification de dispositif (103) ; lorsqu'un dispositif de gestion de contrôle d'accès identifie le code bidimensionnel cible affiché par un dispositif terminal actuel, recevoir des secondes informations d'identification de dispositif renvoyées par le dispositif terminal actuel (104) ; si les secondes informations d'identification de dispositif sont cohérentes avec les premières informations d'identification de dispositif et si le dispositif de gestion de contrôle d'accès se trouve à l'intérieur de la région d'accès, envoyer une instruction d'ouverture de porte au dispositif de gestion de contrôle d'accès (105).
PCT/CN2018/118417 2018-06-29 2018-11-30 Procédé et système de gestion de contrôle d'accès ainsi que dispositifs associés WO2020000894A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810714442.0A CN108877006A (zh) 2018-06-29 2018-06-29 一种门禁管理方法、系统及相关设备
CN201810714442.0 2018-06-29

Publications (1)

Publication Number Publication Date
WO2020000894A1 true WO2020000894A1 (fr) 2020-01-02

Family

ID=64298324

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/118417 WO2020000894A1 (fr) 2018-06-29 2018-11-30 Procédé et système de gestion de contrôle d'accès ainsi que dispositifs associés

Country Status (2)

Country Link
CN (1) CN108877006A (fr)
WO (1) WO2020000894A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792565A (zh) * 2021-11-15 2021-12-14 微晟(武汉)技术有限公司 一种二维码防盗用方法、装置、设备和介质

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108877006A (zh) * 2018-06-29 2018-11-23 深圳春沐源控股有限公司 一种门禁管理方法、系统及相关设备
CN111291111A (zh) * 2018-12-06 2020-06-16 北京京东尚科信息技术有限公司 信息的处理方法和装置
CN109754579A (zh) * 2019-01-29 2019-05-14 徐蒙蒙 一种专用于园区的智能安防控制系统及方法
CN110322598A (zh) * 2019-04-02 2019-10-11 郑州铁路职业技术学院 一种基于外事管理的信息录入系统及方法
US11282002B2 (en) 2019-06-28 2022-03-22 Advanced New Technologies Co., Ltd. Method and apparatus for secure check-in
CN110334824B (zh) * 2019-06-28 2021-03-02 创新先进技术有限公司 安全入住方法及装置
CN110717605B (zh) * 2019-10-10 2023-10-13 腾讯科技(深圳)有限公司 基于区块链的访问信息处理方法及装置
CN110782572A (zh) * 2019-10-23 2020-02-11 广东穗都建筑工程有限公司 园区安防用智能监控方法及系统
CN111915785A (zh) * 2020-07-01 2020-11-10 北京得意音通技术有限责任公司 门禁控制方法、门禁设备、存储介质、程序产品和电子设备
CN112184183A (zh) * 2020-10-26 2021-01-05 财拓云计算(上海)有限公司 自助还证方法、装置及电子设备
CN112200949B (zh) * 2020-12-02 2021-02-09 北京紫光青藤微系统有限公司 门禁启动方法、装置以及身份验证系统
CN112464210B (zh) * 2020-12-11 2024-05-14 深圳市天彦通信股份有限公司 设备管理方法及相关装置
CN114613048B (zh) * 2022-01-30 2024-05-31 云知声智能科技股份有限公司 一种封闭小区访客发卡处理系统及方法

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2348490A1 (fr) * 2009-12-22 2011-07-27 9Solutions Oy Système de contrôle d'accès
CN103955975A (zh) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 基于手机的动态二维码门禁系统
CN104780043A (zh) * 2014-01-14 2015-07-15 中国电信股份有限公司 基于二维码的门禁控制方法和系统
CN105069868A (zh) * 2015-07-21 2015-11-18 杭州晟元数据安全技术股份有限公司 一种基于手机动态安全二维码识别智能小区云系统
CN105225314A (zh) * 2015-09-18 2016-01-06 张福伟 一种基于伪随机序列的动态二维码门控系统
CN106157409A (zh) * 2016-07-05 2016-11-23 深圳市移联网络科技有限公司 智能终端与门禁间的通信方法及装置
CN108877006A (zh) * 2018-06-29 2018-11-23 深圳春沐源控股有限公司 一种门禁管理方法、系统及相关设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205541024U (zh) * 2016-03-09 2016-08-31 青岛亿联信息科技股份有限公司 一种二维码门禁系统
CN106204866A (zh) * 2016-08-31 2016-12-07 北京厚文知识产权顾问有限公司 一种基于二维码的门禁系统及开门方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2348490A1 (fr) * 2009-12-22 2011-07-27 9Solutions Oy Système de contrôle d'accès
CN104780043A (zh) * 2014-01-14 2015-07-15 中国电信股份有限公司 基于二维码的门禁控制方法和系统
CN103955975A (zh) * 2014-04-22 2014-07-30 广州闪购软件服务有限公司 基于手机的动态二维码门禁系统
CN105069868A (zh) * 2015-07-21 2015-11-18 杭州晟元数据安全技术股份有限公司 一种基于手机动态安全二维码识别智能小区云系统
CN105225314A (zh) * 2015-09-18 2016-01-06 张福伟 一种基于伪随机序列的动态二维码门控系统
CN106157409A (zh) * 2016-07-05 2016-11-23 深圳市移联网络科技有限公司 智能终端与门禁间的通信方法及装置
CN108877006A (zh) * 2018-06-29 2018-11-23 深圳春沐源控股有限公司 一种门禁管理方法、系统及相关设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113792565A (zh) * 2021-11-15 2021-12-14 微晟(武汉)技术有限公司 一种二维码防盗用方法、装置、设备和介质

Also Published As

Publication number Publication date
CN108877006A (zh) 2018-11-23

Similar Documents

Publication Publication Date Title
WO2020000894A1 (fr) Procédé et système de gestion de contrôle d'accès ainsi que dispositifs associés
CN105405296B (zh) 基于车牌识别的车辆控制进出系统及其方法
CN105678872B (zh) 一种门禁管理系统及其授权方法和门禁终端设备
CN104717223B (zh) 数据访问方法及装置
CN103581166B (zh) 位置感知认证
CN109711133A (zh) 身份信息的认证方法、装置及服务器
US8755840B2 (en) Data execution control method and system therefor
WO2017140240A1 (fr) Procédé et système d'authentification d'invité
US20190325125A1 (en) Identity credential verification techniques
WO2021073163A1 (fr) Procédé et système de contrôle de la validité d'un code qr, dispositif informatique et support d'informations
KR101507594B1 (ko) 식별 수단을 이용한 안전 출입 시스템 및 그 동작방법
EP2751733B1 (fr) Procédé et système d'autorisation d'une action au niveau d'un site
WO2019209905A1 (fr) Techniques de vérification de justificatif d'identité
CN108206803B (zh) 业务代办处理方法及装置
CN105009123A (zh) 用于请求及提供对与图像相关联的信息的存取的方法及设备
CN110086799B (zh) 身份验证方法和装置
CN109150547A (zh) 一种基于区块链的数字资产实名登记的系统和方法
CN105337974A (zh) 账号授权方法、账号登录方法、账号授权装置及客户端
CN104424676A (zh) 身份信息发送方法、装置和门禁读卡器及门禁系统
CN107113613A (zh) 服务器、移动终端、网络实名认证系统及方法
CN107742344B (zh) 门禁控制方法、系统和存储介质
JP2019028805A5 (fr)
JP2015170334A (ja) 認証情報管理システム、認証情報管理装置、及びプログラム
CN106888091A (zh) 基于eap的可信网络接入方法和系统
CN109446778A (zh) 基于人脸识别的不动产登记信息获取方法、计算机装置及计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18924081

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/05/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18924081

Country of ref document: EP

Kind code of ref document: A1