WO2021008395A1 - 门禁管理方法、装置、设备及存储介质 - Google Patents

门禁管理方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2021008395A1
WO2021008395A1 PCT/CN2020/100330 CN2020100330W WO2021008395A1 WO 2021008395 A1 WO2021008395 A1 WO 2021008395A1 CN 2020100330 W CN2020100330 W CN 2020100330W WO 2021008395 A1 WO2021008395 A1 WO 2021008395A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication information
access control
user
control management
target door
Prior art date
Application number
PCT/CN2020/100330
Other languages
English (en)
French (fr)
Inventor
马鹏宇
李棉
陈海文
梁海权
林汉洁
温俊军
Original Assignee
日立楼宇技术(广州)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 日立楼宇技术(广州)有限公司 filed Critical 日立楼宇技术(广州)有限公司
Publication of WO2021008395A1 publication Critical patent/WO2021008395A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Definitions

  • This application relates to access control technology, for example, to an access control management method, device, equipment, and storage medium.
  • the access control system restricts people from entering the controlled area through the control of entering personnel, and can achieve the purpose of ensuring the safety of the controlled area.
  • the electronic access control system has higher security, better convenience and cost-effectiveness, and becomes an access control system Mainstream.
  • the way of personnel management in the access control management system is usually to authorize a certain number of access points for a person, and authorization requires separate authorization for each door, such as user A, if A needs to have doors A, B, and C.
  • authorization requires separate authorization for each door, such as user A, if A needs to have doors A, B, and C.
  • three authorization operations are required to complete authorization.
  • the workload of authorization will be very large and error-prone.
  • This application provides an access control management method, device, system, and storage medium, so as to reduce the workload of authorization and avoid authorization errors.
  • an access control management method including:
  • an access control management device including:
  • the first authentication information receiving module is set to receive the user's first authentication information
  • a passing mode determining module configured to determine the passing mode of the user based on the first authentication information, wherein the passing mode is allocated based on the identity characteristics of the user;
  • the unlocking instruction sending module is configured to send an unlocking instruction to the target door based on the judgment result that the passage mode includes the right of passage of the currently authenticated target door.
  • an access control device including:
  • One or more processors are One or more processors;
  • Memory used to store one or more programs
  • the one or more processors When the one or more programs are executed by the one or more processors, the one or more processors implement the access control management method according to the first aspect of the present application.
  • an embodiment of the present application also provides a computer-readable storage medium having a computer program stored on the computer-readable storage medium.
  • the computer program is executed by a processor, the implementation of the The access control management method described.
  • FIG. 1 is a flowchart of an access control management method provided in Embodiment 1 of this application;
  • Figure 2 is a schematic diagram of access control distribution in a region
  • FIG. 3 is a flowchart of an access control management method provided by Embodiment 2 of this application.
  • FIG. 5 is a flowchart of an access control management method provided in the fourth embodiment of this application.
  • FIG. 6 is a schematic structural diagram of an access control management device provided in Embodiment 5 of this application.
  • FIG. 1 is a flowchart of an access control management method provided in the first embodiment of this application. This embodiment can be applied to access control management.
  • the access control management device is implemented, which can be implemented in software and/or hardware and integrated into the access control management device. As shown in FIG. 1, the method of the embodiment of the present application may include the following steps:
  • S101 Receive first authentication information of a user.
  • each door is equipped with a reading device and an electronic lock, and each door is equipped with an access control controller or multiple doors with an access control controller.
  • the reading device is used for The first authentication information of the user is read and uploaded to the access controller.
  • the access controller is used for authentication. When the authentication is passed, the access controller controls the electronic lock to open.
  • the reading device may be an IC card reader.
  • the IC card reader can obtain the IC
  • the card number of the card is uploaded to the access controller, and the card number of the IC card can be associated with the user’s identity information.
  • the reading device may be a two-dimensional code scanner.
  • the two-dimensional code scanner scans the two-dimensional code,
  • the code corresponding to the two-dimensional code can be obtained and uploaded to the access controller.
  • the code corresponding to the two-dimensional code is associated with the user's identity information.
  • the identity information may include information such as the user's name, department, and position.
  • the method of swiping an IC card and scanning a two-dimensional code is taken as an example to illustrate the method of obtaining the first authentication information of the user.
  • the method for obtaining the first authentication information of the user may also be other methods, which will not be repeated in this application.
  • S102 Determine the user's travel mode based on the first authentication information.
  • FIG. 2 is a schematic diagram of the distribution of access control in an area. As shown in Figure 2, exemplarily, this area is provided with 7 doors, of which doors A, B, and G control the passage of users in the corridor area, which belongs to the public area. By default, all employees of the company can pass, and the corresponding pass mode is pass mode 001, then pass mode 001 is assigned to all employees of the company.
  • the cleaning staff only have the right to pass through doors A, B, and G; doors C and D are controlled
  • doors A, B, and G doors C and D are controlled
  • the passage mode 002 is assigned to the company’s warehouse staff, which has doors A, B, G, C and D
  • the right of passage; door E controls the user’s passage in the financial room, only financial personnel have the authority to enter the financial room, and the corresponding passage mode is 003, then the company’s financial staff is assigned the passage mode 003, which has door A, The right of passage for B, G, and E; Gate F controls the passage of users in the laboratory. Only R&D personnel have the permission to enter the laboratory.
  • the corresponding passage mode is 004, and the passage mode 004 is assigned to the company’s R&D personnel.
  • Mode 004 has the right of passage for doors A, B, G and F; the general manager of the company has the right of passage for all areas and can open all the doors in the area, and the corresponding pass mode is 005, which is assigned to the general manager of the company Pass mode 005.
  • the IC card held by the staff member can be granted a corresponding access mode according to the staff member’s identity information, without requiring separate authorization for each door.
  • the passage permission of the staff member can be adjusted to the applicable passage mode, and there is no need to adjust the authorization according to each door.
  • the user's traffic mode can be determined according to the first authentication information.
  • the employee's pass mode can be determined to be 004.
  • the above-mentioned employee's traffic mode (the corresponding relationship between the IC card number and the corresponding traffic mode) can be visually operated and set on the access control management service software to form a configuration file, and send the configuration file to Access Controller. You can also copy the configuration file directly to the access controller via a USB flash drive, or log in to the embedded network page of the access controller via a mobile device for configuration.
  • each door can be controlled by one access controller alone, or multiple doors can be controlled by one access controller.
  • Each door can be equipped with entry authentication, that is, a reading device is provided on the entry side, and the exit side does not need to be equipped with a reading device, but only an exit button. When the user wants to go out, just press the exit button to open the door.
  • Each door can also be equipped with entry authentication and exit authentication, that is, reading devices are equipped on the entry side and the exit side, and users need to be authenticated when entering and exiting the door.
  • S102 may include: acquiring an authentication period of the target door; when the receiving time of the first authentication information is within the authentication period, determining the user's passage based on the first authentication information mode.
  • S102 may include: acquiring the passage period of the target door; when the receiving time of the first authentication information is within the passage period, determining the passage of the user based on the first authentication information mode.
  • S103 Determine whether the pass mode includes the pass right of the currently authenticated target door.
  • S104 If it is determined that the passage mode includes the right of passage of the currently authenticated target door, S104 is executed; if it is determined that the passage mode does not include the right of passage of the currently authenticated target door, S105 is executed.
  • the access controller as a dual-door controller, where the access controller 1 controls doors A, B, and G, the access controller 2 controls doors C and D, and the access controller 3 controls doors E and F.
  • S104 Send an unlocking instruction to the target door.
  • the IC card reader obtains the card number of the IC card and uploads it to the access control controller 3, and the access controller 3 finds it from the configuration file according to the IC card number
  • the pass mode corresponding to the card number is pass mode 004 (the employee is a researcher), pass mode 004 has the right of passage for doors A, B, G, and F, so the access controller 3 sends an unlock command to the electronic lock of door F.
  • the electronic lock of control door F is opened, allowing the employee to enter the laboratory.
  • the IC card reader obtains the card number of the IC card and uploads it to the access control controller 3, and the access controller 3 finds it from the configuration file according to the IC card number
  • the access mode corresponding to the card number is the access mode 003 (the employee is a financial officer), and the access mode 003 has the right of access for doors A, B, G and E, but not the right of access for door F, so the access controller 3 maintains The electronic lock of door F remains locked, and the employee is denied access to the laboratory.
  • the access control management method determines a user's access mode based on the acquired first authentication information, where the access mode is assigned based on the user's identity characteristics, and the access mode includes the access right of at least one door.
  • the mode includes the right of passage of the currently authenticated target door, an unlock command is sent to the target door.
  • the user when a user is authorized for access control management, the user can be granted a corresponding access mode according to the user's identity information, without requiring separate authorization for each door.
  • it when it is necessary to change the passage authority of a staff member, it can be adjusted to the applicable passage mode. There is no need to adjust the authorization for each door, which reduces the authorization workload and avoids authorization errors.
  • FIG. 3 is a flowchart of the access control management method provided in the second embodiment of the application.
  • the embodiment of the present application is modified based on the foregoing embodiment 1, as shown in FIG. 3 As shown, the method of the embodiment of the present application may include the following steps:
  • S201 Receive first authentication information of the user.
  • each door can be set for an authentication period that needs to be authenticated. During the authentication period, the user's access authority needs to be authenticated. Only when the authentication is passed, the target door will be opened, and there is no need to perform authentication outside the authentication period.
  • Authorization authentication any user holding a registered IC card can open the target door by swiping the card.
  • S203 Determine whether the receiving time of the first authentication information is within the authentication period.
  • S204 is executed; if it is determined that the receiving time of the first authentication information is not within the authentication period, S205 is executed.
  • S204 Determine the user's travel mode based on the first authentication information.
  • the user's pass authority needs to be authenticated. Therefore, the user's pass mode is determined based on the first authentication information.
  • S205 Send an unlocking instruction to the target door.
  • S206 Determine whether the pass mode includes the pass right of the currently authenticated target door.
  • the step of S206 is executed to determine whether the access mode includes the access right of the currently authenticated target door. If it is determined that the passage mode includes the right of passage of the currently authenticated target door, execute S207; if it is determined that the passage mode does not include the right of passage of the currently authenticated target door, execute S208.
  • S207 Send an unlocking instruction to the target door.
  • the access control management method After receiving the first authentication information of the user, the authentication period of the target door is obtained, and when it is determined that the receiving time of the first authentication information is within the authentication period, the user’s identity is determined based on the first authentication information.
  • the access mode wherein the access mode is allocated based on the identity characteristics of the user, the access mode includes the access right of at least one door, and when it is determined that the access mode includes the access right of the currently authenticated target door, an unlock command is sent to the target door.
  • the user when a user is authorized for access control management, the user can be granted a corresponding access mode according to the user's identity information, without requiring separate authorization by door.
  • FIG. 4 is a flowchart of the access control management method provided in the third embodiment of this application.
  • the present embodiment is modified on the basis of the foregoing second embodiment, as shown in FIG. 4 As shown, the method of the embodiment of the present application may include the following steps:
  • S301 Receive first authentication information of the user.
  • S304 is executed; if it is determined that the receiving time of the first authentication information is not within the authentication period, S305 is executed.
  • each door can be set to pass time period.
  • the target door will be opened after the user passes the authentication; outside the pass time period, even if the user passes the authentication, the access controller will not send the target door to unlock instruction.
  • the transit time may be working hours on working days, such as 8:30-18:00 on working days, and outside working hours on working days, such as before 8:30, after 18:00, weekends and holidays , Even if the user has the right of passage for a door, the access controller will not send an unlock command to the target door. It should be noted that the above-mentioned transit period can be flexibly set according to the company's working hours and calendar.
  • S305 Send an unlocking instruction to the target door.
  • S306 Determine whether the receiving time of the first authentication information is within the pass time period.
  • S307 Determine the user's travel mode based on the first authentication information.
  • S309 Determine whether the passage mode includes the passage right of the currently authenticated target door.
  • S310 Send an unlocking instruction to the target door.
  • the access control management method After receiving the first authentication information of the user, the authentication period of the target door is obtained, and when it is determined that the receiving time of the first authentication information is within the authentication period, the user’s identity is determined based on the first authentication information.
  • the access mode wherein the access mode is allocated based on the identity characteristics of the user, the access mode includes the access right of at least one door, and when it is determined that the access mode includes the access right of the currently authenticated target door, an unlock command is sent to the target door.
  • the user when a user is authorized for access control management, the user can be granted a corresponding access mode according to the user's identity information, without requiring separate authorization by door.
  • FIG. 5 is a flowchart of the access control management method provided in the fourth embodiment of the application.
  • the embodiment of the present application is modified on the basis of the foregoing third embodiment, as shown in FIG. 5
  • the method of the embodiment of the present application may include the following steps:
  • S401 Receive first authentication information of the user.
  • S403 Determine whether the receiving time of the first authentication information is within the authentication period.
  • S404 is executed; if it is determined that the receiving time of the first authentication information is not within the authentication period, S405 is executed.
  • S405 Send an unlocking instruction to the target door.
  • S406 Determine whether the receiving time of the first authentication information is within the pass time period.
  • S406 is executed; if it is determined that the receiving time of the first authentication information is within the passable period, S407 is executed; if it is determined that the receiving time of the first authentication information is not within the passable period, S408 is executed.
  • S407 Determine the user's travel mode based on the first authentication information.
  • S409 Determine whether the pass mode includes the pass right of the currently authenticated target door.
  • S410 Determine the authentication mode of the target door at the time when the first authentication information is received.
  • different authentication methods can be set for different time periods of each door. For example, during peak hours, only the card authentication method is required, while at other times, the card plus biometric authentication (for example, fingerprint Vein recognition or iris authentication) to improve the level of security control. Only when the information obtained by the two authentication methods belong to the same user (employee), the access control controller will send an unlock command to the target door.
  • biometric authentication for example, fingerprint Vein recognition or iris authentication
  • the first authentication information and the second authentication information are used for identity verification.
  • the second authentication information is input by the user according to an authentication method.
  • a prompt may be given accordingly to remind the user (employee) to input the second authentication information
  • the second authentication information may be the user's biometric information (for example, fingerprint vein characteristic information or iris characteristic information) .
  • the identity verification is passed and an unlocking instruction is sent to the target door; if it is determined that the first authentication information and the second authentication information do not belong to the same user, It is determined that the identity verification has failed, and the control target door remains locked.
  • a prompt may also be issued to remind the user to re-enter the second authentication information.
  • the second authentication information input by the user is no longer received.
  • the access control management method After receiving the first authentication information of the user, the authentication period of the target door is obtained, and when it is determined that the receiving time of the first authentication information is within the authentication period, the user’s identity is determined based on the first authentication information.
  • the access mode wherein the access mode is assigned based on the identity characteristics of the user, the access mode includes the access right of at least one door, and when it is determined that the access mode includes the access right of the currently authenticated target door, an unlock command is sent to the target door.
  • the access mode when a user is authorized for access control management, it is only necessary to grant a corresponding access mode to the user according to the user's identity information, and there is no need to perform separate authorization by door.
  • Embodiment 5 of the present application provides an access control management device.
  • FIG. 6 is a schematic structural diagram of an access control management device provided in Embodiment 5 of this application. As shown in FIG. 6, the device may include:
  • the first authentication information receiving module 601 is configured to receive the first authentication information of the user
  • the passage mode determining module 602 is configured to determine the passage mode of the user based on the first authentication information, wherein the passage mode is allocated based on the identity characteristics of the user, and the passage mode includes passage of at least one door right;
  • the unlocking instruction sending module 603 is configured to send an unlocking instruction to the target door when it is determined that the passage mode includes the right of passage of the currently authenticated target door.
  • the access control management device also includes:
  • An authentication period obtaining module configured to obtain the authentication period of the target door after receiving the first authentication information of the user
  • the authentication period judgment module is configured to, when it is determined that the receiving time of the first authentication information is within the authentication period, send an execution instruction to the traffic mode determination module 602 to execute the determination based on the first authentication information The steps of the user's access mode; and after determining that the receiving time of the first authentication information is not within the authentication period, sending an execution instruction to the unlocking instruction sending module 603 to send an unlocking instruction to the target door.
  • the access control management device also includes:
  • a passage period acquisition module configured to obtain the passage period of the target door after the passage period of the target door is obtained
  • the passage period determination module is configured to send an execution instruction to the passage mode determination module 602 to execute the determination based on the first authentication information when it is determined that the receiving time of the first authentication information is within the passage period. Steps of the user's traffic mode;
  • the locked state maintaining module is configured to control the target door to maintain the locked state when it is determined that the receiving time of the first authentication information is not within the passage time period.
  • the access control management device also includes:
  • An authentication mode determination module configured to determine the authentication mode of the target door at the time of receiving the first authentication information when it is determined that the passage mode includes the right of passage of the target door currently authenticated;
  • the identity verification module is configured to use the first authentication information and the second authentication information to perform identity verification according to the authentication method, and the second authentication information is input by the user according to the authentication method.
  • the identity verification module is configured to send an execution instruction to the unlocking instruction sending module 603 when it is determined that the identity verification is passed, so as to send the unlocking instruction to the target door; and when it is determined that the identity verification fails, to the locked state maintaining module Send an execution instruction to control the target door to remain locked.
  • the identity verification module includes:
  • the identity verification unit is used to determine whether the first authentication information and the second authentication information belong to the same user. When the first authentication information and the second authentication information belong to the same user, the identity verification unit sends an execution instruction to the unlocking instruction sending module 603 to send an unlocking instruction to the target door; and, when the first authentication When the information and the second authentication information do not belong to the same user, the identity verification unit sends an execution instruction to the locked state maintaining module to control the target door to maintain the locked state.
  • the above-mentioned access control management device can execute the access control management method provided in any embodiment of the present application, and has the corresponding functional modules and beneficial effects of the execution method.
  • An embodiment of the present application also provides an access control device, the access control device includes: one or more processors; a storage device for storing one or more programs, when the one or more programs are used by the one or more Execution by two processors, so that the one or more processors implement the access control management method described in any embodiment of the present application.
  • the embodiment of the present application also provides a computer-readable storage medium.
  • the access control device can execute the access control management method described in the foregoing method embodiment.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • FLASH Flash memory
  • hard disk or optical disk etc.
  • a computer device which can be a robot, A personal computer, server, or network device, etc. executes the access control management method described in any embodiment of this application.
  • each unit and module included is only divided according to functional logic, as long as the corresponding function can be realized; in addition, the specific name of each functional unit is only for mutual convenience. distinguish.
  • each part of this application can be implemented by hardware, software, firmware or a combination thereof.
  • multiple steps or methods can be implemented by software or firmware stored in a memory and executed by a suitable instruction execution device.
  • a logic gate circuit for implementing logic functions on data signals Discrete logic circuits, application-specific integrated circuits with suitable combinational logic gates, programmable gate array (PGA), field programmable gate array (FPGA), etc.

Abstract

一种门禁管理方法、装置、设备及存储介质。方法包括:接收用户的第一认证信息(S101);基于第一认证信息确定用户的通行模式(S102),其中,通行模式为基于用户的身份特征分配的;基于通行模式包括当前认证的目标门的通行权的判断结果,向目标门发送开锁指令(S104)。

Description

门禁管理方法、装置、设备及存储介质
本公开要求在2019年07月17日提交中国专利局、申请号为201910646356.5的中国专利申请的优先权,以上申请的全部内容通过引用结合在本公开中。
技术领域
本申请涉及门禁技术,例如涉及一种门禁管理方法、装置、设备及存储介质。
背景技术
随着现代化技术的发展,电子门禁得到广泛的应用。门禁控制系统通过对进入的人员的控制,限制人员进入受控区域,可达到确保受控区域安全的目的,电子门禁系统有较高的安全性、较好的便捷性和性价比,而成为门禁系统的主流。
相关技术中,门禁管理系统对于人员的管理方式通常为针对一个人员进行一定数量门禁点的授权,而授权时需要每个门单独授权,比如用户甲,如果甲需要具备门A、B、C的通行模式,则需要进行三次授权操作才能完成授权。在人员数量和门数量较多的情况下,授权的工作量就会非常大,而且极易出错。
发明内容
本申请提供一种门禁管理方法、装置、系统及存储介质,以减少了授权的工作量,避免出现授权错误。
第一方面,本申请实施例提供了一种门禁管理方法,包括:
接收用户的第一认证信息;
基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的;
基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令。
第二方面,本申请实施例还提供了一种门禁管理装置,包括:
第一认证信息接收模块,被设置为接收用户的第一认证信息;
通行模式确定模块,被设置为基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的;
开锁指令发送模块,被设置为基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令。
第三方面,本申请实施例还提供了一种门禁设备,包括:
一个或多个处理器;
存储器,用于存储一个或多个程序;
当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如本申请第一方面所述的门禁管理方法。
第四方面,本申请实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,实现如本申请第一方面所述的门禁管理方法。
附图说明
图1为本申请实施例一提供的一种门禁管理方法的流程图;
图2为一区域的门禁分布示意图;
图3为本申请实施例二提供的一种门禁管理方法的流程图;
图4为本申请实施例三提供的一种门禁管理方法的流程图;
图5为本申请实施例四提供的一种门禁管理方法的流程图;
图6为本申请实施例五提供的一种门禁管理装置的结构示意图。
具体实施方式
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释本申请,而非对本申请的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与本申请相关的部分而非全部结构。
实施例一
本申请实施例一提供了一种门禁管理方法,图1为本申请实施例一提供的一种门禁管理方法的流程图,本实施例可适用于门禁管理,该方法可以由本申请实施例中的门禁管理装置来执行,该装置可采用软件和/或硬件的方式实现,并集成于门禁管理设备中,如图1所示,本申请实施例的方法可以包括如下步骤:
S101、接收用户的第一认证信息。
示例性的,在需要进行门禁管理的区域,每一个门上均配备有读取设备和电子锁,每一个门单独配备一个门禁控制器或多个门配备一个门禁控制器,读取设备用于读取用户的第一认证信息,并上传给门禁控制器,门禁控制器用于进行认证,当认证通过时,门禁控制器控制电子锁开启。当用户抵达目标门,且想要开启该目标门时,向读取设备输入第一认证信息。在本申请一实施例中,读取设备可以是IC卡读卡器,在用户将持有的IC卡接触或靠近目标门的IC卡读卡器时,IC卡读卡器就能获取该IC卡的卡号,并上传给门禁控制器,该IC卡的卡号可以关联该用户的身份信息。在本申请另一实施例中,读取设备可以是二维码扫描器,在用户将持有二维码靠近目标门的二维码扫描器时,二维码扫描器扫描该二维码,就能获取该二维码对应的编码,并上传给门禁控制器,该二维码对应的编码关联该用户的身份信息。示例性的,以公司的门禁管理为例,身份信息可以包括用户的姓名、所在部门和职位等信息。
需要说明的是,本申请实施例中,以刷IC卡和扫描二维码的方式为例,对获取用户的第一认证信息的方式进行举例说明。本领域技术人员应当理解,获取用户的第一认证信息的方式还可以是其他方式,本申请在此不再赘述。
S102、基于第一认证信息确定用户的通行模式。
示例性的,以公司的门禁管理,以刷IC卡的方式为例,对本申请进行说明。可以预先根据用户的身份信息,为每个用户匹配不同的通行模式,并为每个用户配发对应的IC卡。图2为一区域的门禁分布示意图,如图2所示,示例性的,该区域设有7扇门,其中,门A、B、G控制用户在走廊区的通行,走廊区属于公共区域,默认该公司所有员工均可以通行,对应的通行模式为通行模式001,则为该公司所有员工分配通行模式001,此外,保洁人员仅具有门A、B、G的通行权;门C、D控制用户在仓库的通行,只有仓库工作人员拥有进入仓库的权限,对应的通行模式为002,则为该公司的仓库工作人员分配通行模式002,通行模式002具有门A、B、G、C和D的通行权;门E控制用户在财务室的通行,只有财务人员拥有进入财务室的权限,对应的通行模式为003,则为该公司的财务人员分配通行模式003,通行模式003具有门A、B、G和E的通行权;门F为控制用户在实验室的通行,只有研发人员拥有进入实验室的权限,对应的通行模式为004,则为该公司的研发人员分配通行模式004,通行模式004具有门A、B、G和F的通行权;该公司的总经理拥有所有区域的通行权,能够开启该区域所有的门,对应的通行模式为005,则为该公司的总经理分配通行模式005。 如此,当需要对一工作人员进行门禁管理授权时,可以根据该工作人员的身份信息为该工作人员持有的IC卡授予对应的通行模式,无需按每个门进行单独授权。另外,当需要变更一工作人员的通行权限时,可以调整该工作人员的通行权限至适用的通行模式即可,无需再按每个门调整授权。
在获取用户的第一认证信息后,可以根据该第一认证信息确定用户的通行模式。示例性的,在获取员工持有IC卡的卡号(第一认证信息)后,如果根据该IC卡的卡号确定该位员工为研发人员,则可以确定该员工的通行模式为004。
示例性的,上述员工的通行模式(IC卡号与对应的通行模式的对应关系),可在门禁管理服务软件上进行可视化的操作和设定,形成配置文件,并通过网络将该配置文件发送至门禁控制器。也可将配置文件通过U盘直接拷贝至门禁控制器,或通过移动设备直接登录门禁控制器的内嵌的网络页面进行配置。
本申请实施例中,每扇门可以单独通过一个门禁控制器进行控制,也可以多扇门通过一个门禁控制器进行控制。每扇门可以配备进门认证,即在进门侧配备读取设备,出门侧无需配备读取设备,而只配备出门按钮,用户要出门时,只需按下出门按钮即可开门。每扇门也可以配备进门认证和出门认证,即在进门侧和出门侧均配备读取设备,用户进门和出门均需要进行认证。
在一些实施例中,S102可以包括:获取所述目标门的认证时段;当所述第一认证信息的接收时间在所述认证时段内时,基于所述第一认证信息确定所述用户的通行模式。
在一些实施例中,S102可以包括:获取所述目标门的通行时段;当所述第一认证信息的接收时间在所述通行时段内时,基于所述第一认证信息确定所述用户的通行模式。
S103、判断通行模式是否包括当前认证的目标门的通行权。
若确定通行模式包括当前认证的目标门的通行权,则执行S104;若确定通行模式不包括当前认证的目标门的通行权,则执行S105。
示例性的,以门禁控制器为双门控制器为例,其中,门禁控制器1控制门A、B和G,门禁控制器2控制门C和D,门禁控制器3控制门E和F。
S104、向目标门发送开锁指令。
示例性的,若员工在F门(目标门)刷卡,IC卡读卡器获取该IC卡的卡号,并上传给门禁控制器3,门禁控制器3根据该IC卡的卡号从配置文件查找到该 卡号对应的通行模式为通行模式为004(该员工为研发人员),通行模式004具有门A、B、G和F的通行权,因此门禁控制器3向门F的电子锁发送开锁指令,控制门F的电子锁开启,允许该员工进入实验室。
S105、控制目标门保持锁闭状态。
示例性的,若员工在F门(目标门)刷卡,IC卡读卡器获取该IC卡的卡号,并上传给门禁控制器3,门禁控制器3根据该IC卡的卡号从配置文件查找到该卡号对应的通行模式为通行模式为003(该员工为财务人员),通行模式003具有门A、B、G和E的通行权,而不具有门F的通行权,因此门禁控制器3维持门F的电子锁保持锁闭状态,拒绝该员工进入实验室。
本申请实施例提供的门禁管理方法,基于获取到的第一认证信息确定用户的通行模式,其中,通行模式为基于用户的身份特征分配的,通行模式包括至少一个门的通行权,在确定通行模式包括当前认证的目标门的通行权时,向目标门发送开锁指令。本申请实施例中,对用户进行门禁管理授权时,可以根据该用户的身份信息为该用户授予对应的通行模式,无需按每个门进行单独授权。另外,当需要变更一工作人员的通行权限时,可以调整至其适用的通行模式即可,无需再按每个门调整授权,减少了授权的工作量,避免出现授权错误。
实施例二
本申请实施例二提供了又一种门禁管理方法,图3为本申请实施例二提供的一种门禁管理方法的流程图,本申请实施例以前述实施例一为基础进行改动,如图3所示,本申请实施例的方法可以包括如下步骤:
S201、接收用户的第一认证信息。
S202、获取目标门的认证时段。
示例性的,每一扇门可以设置需要认证的认证时段,在该认证时段内,需要对用户的通行权限进行认证,只有认证通过,目标门才会开启,在认证时段以外的时间则无需进行权限认证,持已注册的IC卡的任何用户刷卡都可以开启目标门。
S203、判断第一认证信息的接收时间是否在认证时段内。
若确定第一认证信息的接收时间在认证时段内,则执行S204;若确定第一认证信息的接收时间不在认证时段内,则执行S205。
S204、基于第一认证信息确定用户的通行模式。
若确定第一认证信息的接收时间在认证时段内,则需要对用户的通行权限进行认证,因此,基于第一认证信息确定用户的通行模式。
S205、向目标门发送开锁指令。
若确定第一认证信息的接收时间不在认证时段内,则无需对用户的通行权限进行认证,向目标门发送开锁指令,控制目标门的电子锁开启。
S206、判断通行模式是否包括当前认证的目标门的通行权。
在S204、基于第一认证信息确定用户的通行模式之后,执行S206、判断通行模式是否包括当前认证的目标门的通行权的步骤。若确定通行模式包括当前认证的目标门的通行权,则执行S207;若确定通行模式不包括当前认证的目标门的通行权,则执行S208。
S207、向目标门发送开锁指令。
S208、控制目标门保持锁闭状态。
本申请实施例提供的门禁管理方法,在接收用户的第一认证信息之后,获取目标门的认证时段,在确定第一认证信息的接收时间在认证时段内时,基于第一认证信息确定用户的通行模式,其中,通行模式为基于用户的身份特征分配的,通行模式包括至少一个门的通行权,在确定通行模式包括当前认证的目标门的通行权时,向目标门发送开锁指令。本申请实施例中,对用户进行门禁管理授权时,可以根据该用户的身份信息为该用户授予对应的通行模式,无需按门进行单独授权。另外,当需要变更一工作人员的通行权限时,可以调整至其适用的通行模式即可,无需再按每个门调整,减少了授权的工作量,避免出现授权错误;此外,通过对每一扇门设置需要认证的认证时段,增强门禁管理的灵活性。
实施例三
本申请实施例三提供了又一种门禁管理方法,图4为本申请实施例三提供的一种门禁管理方法的流程图,本申请实施例以前述实施例二为基础进行改动,如图4所示,本申请实施例的方法可以包括如下步骤:
S301、接收用户的第一认证信息。
S302、获取目标门的认证时段。
S303、判断第一认证信息的接收时间是否在认证时段内。
若确定第一认证信息的接收时间在认证时段内,则执行S304;若确定第一 认证信息的接收时间不在认证时段内,则执行S305。
S304、获取目标门的通行时段。
示例性的,每一扇门可以设置通行时段,在通行时段内,用户认证通过目标门才会开启;在通行时段以外的时间,即使用户认证通过,门禁控制器也不会向目标门发送开锁指令。
示例性的,通行时段可以是工作日的上班时间,例如工作日的8:30-18:00,在工作日的上班时间以外的时间,例如8:30之前、18:00之后、周末以及节假日,即使用户拥有一个门的通行权,门禁控制器也不会向目标门发送开锁指令。需要说明的是,上述通行时段可以根据公司上班时间和日历进行灵活设定。
S305、向目标门发送开锁指令。
S306、判断第一认证信息的接收时间是否在通行时段内。
在一些实施例中,在S304之后,执行S306;若确定第一认证信息的接收时间在通行时段内,则执行S307;若确定第一认证信息的接收时间不在通行时段内,则执行S308。
S307、基于第一认证信息确定用户的通行模式。
S308、控制目标门保持锁闭状态。
S309、判断通行模式是否包括当前认证的目标门的通行权。
在一些实施例中,在S307之后,执行S309;若确定通行模式包括当前认证的目标门的通行权,则执行S310;若确定通行模式不包括当前认证的目标门的通行权,则执行S311。
S310、向目标门发送开锁指令。
S311、控制目标门保持锁闭状态。
本申请实施例提供的门禁管理方法,在接收用户的第一认证信息之后,获取目标门的认证时段,在确定第一认证信息的接收时间在认证时段内时,基于第一认证信息确定用户的通行模式,其中,通行模式为基于用户的身份特征分配的,通行模式包括至少一个门的通行权,在确定通行模式包括当前认证的目标门的通行权时,向目标门发送开锁指令。本申请实施例中,对用户进行门禁管理授权时,可以根据该用户的身份信息为该用户授予对应的通行模式,无需按门进行单独授权。另外,当需要变更一工作人员的通行权限时,可以调整至其适用的通行模式,无需再按每个门调整,减少了授权的工作量,避免出现授权错误;此外,通过对每一扇门设置需要认证的认证时段和通行时段,增强门 禁管理的灵活性。
实施例四
本申请实施例四提供了另一种门禁管理方法,图5为本申请实施例四提供的一种门禁管理方法的流程图,本申请实施例以前述实施例三为基础进行改动,如图5所示,本申请实施例的方法可以包括如下步骤:
S401、接收用户的第一认证信息。
S402、获取目标门的认证时段。
S403、判断第一认证信息的接收时间是否在认证时段内。
若确定第一认证信息的接收时间在认证时段内,则执行S404;若确定第一认证信息的接收时间不在认证时段内,则执行S405。
S404、获取目标门的通行时段。
S405、向目标门发送开锁指令。
S406、判断第一认证信息的接收时间是否在通行时段内。
在一些实施例中,在S404之后,执行S406;若确定第一认证信息的接收时间在通行时段内,则执行S407;若确定第一认证信息的接收时间不在通行时段内,则执行S408。
S407、基于第一认证信息确定用户的通行模式。
S408、控制目标门保持锁闭状态。
S409、判断通行模式是否包括当前认证的目标门的通行权。
在一些实施例中,在S407之后,执行S409;若确定通行模式包括当前认证的目标门的通行权,则执行S410;若确定通行模式不包括当前认证的目标门的通行权,则执行S411。
S410、确定目标门在第一认证信息的接收时间的认证方式。
示例性的,每一扇门的不同时间段可以设置不同的认证方式,例如,在上下班高峰期,仅需要刷卡认证方式,而在其他时段,则需要刷卡加生物特征信息认证(例如,指纹静脉识别或虹膜认证)的方式,以提高安全控制等级,只有当两种认证方式获取的信息属于同一用户(员工)时,门禁控制器才会向目标门发送开锁指令。
S411、控制目标门保持锁闭状态。
S412、按照认证方式,采用第一认证信息和第二认证信息进行身份验证。
示例性的,第二认证信息为用户根据认证方式输入的。示例性的,在S410之后,可以相应地给出提示,以提醒用户(员工)输入第二认证信息,第二认证信息可以是用户的生物特征信息(例如,指纹静脉特征信息或虹膜特征信息)。对第一认证信息和第二认证信息进行身份验证,判断第一认证信息和第二认证信息是否属于同一用户,即刷卡的IC卡号与输入的生物特征信息是否属于同一用户。
S413、当身份验证通过时,向目标门发送开锁指令。
在一些实施例中,若确定第一认证信息和第二认证信息属于同一用户,则确定身份验证通过,向目标门发送开锁指令;若确定第一认证信息和第二认证信息不属于同一用户,则确定身份验证失败,控制目标门保持锁闭状态。
可选的,在确定第一认证信息和第二认证信息不属于同一用户,则确定身份验证失败之后,还可以发出提示,以提醒用户重新输入第二认证信息,在身份验证次数达到阈值时,不再接收用户输入第二认证信息。
本申请实施例提供的门禁管理方法,在接收用户的第一认证信息之后,获取目标门的认证时段,在确定第一认证信息的接收时间在认证时段内时,基于第一认证信息确定用户的通行模式,其中,通行模式为基于用户的身份特征分配的,通行模式包括至少一个门的通行权,在确定通行模式包括当前认证的目标门的通行权时,向目标门发送开锁指令。本申请实施例中,对用户进行门禁管理授权时,只需要根据该用户的身份信息为该用户授予对应的通行模式,无需按门进行单独授权。另外,当需要变更一工作人员的通行权限时,仅需调整至其适用的通行模式即可,无需再按每个门调整,减少了授权的工作量,避免出现授权错误;本申请实施例中,通过对每一扇门设置需要认证的认证时段和通行时段,增强门禁管理的灵活性;此外,每一扇门的不同时间段可以设置不同的认证方式,以提高安全控制等级。
实施例五
本申请实施例五提供了一种门禁管理装置,图6为本申请实施例五提供的一种门禁管理装置的结构示意图,如图6所示,该装置可以包括:
第一认证信息接收模块601,用于接收用户的第一认证信息;
通行模式确定模块602,用于基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的,所述通行模式包 括至少一个门的通行权;
开锁指令发送模块603,用于在确定所述通行模式包括当前认证的目标门的通行权时,向所述目标门发送开锁指令。
可选的,门禁管理装置还包括:
认证时段获取模块,用于在接收用户的第一认证信息之后,获取所述目标门的认证时段;
认证时段判断模块,用于在确定所述第一认证信息的接收时间在所述认证时段内时,向所述通行模式确定模块602发送执行指令,以执行基于所述第一认证信息确定所述用户的通行模式的步骤;以及在确定所述第一认证信息的接收时间不在所述认证时段内,向所述开锁指令发送模块603发送执行指令,以向所述目标门发送开锁指令。
可选的,门禁管理装置还包括:
通行时段获取模块,用于在所述获取所述目标门的通行时段之后,获取所述目标门的通行时段;
通行时段判断模块,用于在确定所述第一认证信息的接收时间在所述通行时段内时,向所述通行模式确定模块602发送执行指令,以执行基于所述第一认证信息确定所述用户的通行模式的步骤;
锁闭状态保持模块,用于在确定所述第一认证信息的接收时间不在所述通行时段内时,控制所述目标门保持锁闭状态。
可选的,门禁管理装置还包括:
认证方式确定模块,用于在确定所述通行模式包括当前认证的目标门的通行权时,确定所述目标门在所述第一认证信息的接收时间的认证方式;
身份验证模块,用于按照所述认证方式,采用所述第一认证信息和第二认证信息进行身份验证,所述第二认证信息为用户根据所述认证方式输入的。身份验证模块用于在确定身份验证通过时,向所述开锁指令发送模块603发送执行指令,以向所述目标门发送开锁指令;以及在确定身份验证失败时,向所述锁闭状态保持模块发送执行指令,以控制所述目标门保持锁闭状态。
可选的,身份验证模块包括:
身份验证单元,用于判断所述第一认证信息和第二认证信息是否属于同一用户。当所述第一认证信息和第二认证信息属于同一用户时,身份验证单元向所述开锁指令发送模块603发送执行指令,以向所述目标门发送开锁指令;以 及,当所述第一认证信息和第二认证信息不属于同一用户时,身份验证单元向向所述锁闭状态保持模块发送执行指令,以控制所述目标门保持锁闭状态。
上述门禁管理装置可执行本申请任意实施例所提供的门禁管理方法,具备执行方法相应的功能模块和有益效果。
本申请实施例还提供一种门禁设备,所述门禁设备包括:一个或多个处理器;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现本申请任一实施例所述的门禁管理方法。
本申请实施例还提供一种计算机可读存储介质,所述存储介质中的指令由设备的处理器执行时,使得门禁设备能够执行如上述方法实施例所述的门禁管理方法。
需要说明的是,对于装置、设备和存储介质实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
通过以上关于实施方式的描述,所属领域的技术人员可以清楚地了解到,本申请可借助软件及必需的通用硬件来实现,当然也可以通过硬件实现,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如计算机的软盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、闪存(FLASH)、硬盘或光盘等,包括若干指令用以使得一台计算机设备(可以是机器人,个人计算机,服务器,或者网络设备等)执行本申请任意实施例所述的门禁管理方法。
值得注意的是,上述门禁管理装置中,所包括的每个单元和模块只是按照功能逻辑进行划分的,只要能够实现相应的功能即可;另外,每个功能单元的具体名称也只是为了便于相互区分。
应当理解,本申请的每个部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行装置执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现: 具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本申请的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。

Claims (11)

  1. 一种门禁管理方法,包括:
    接收用户的第一认证信息;
    基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的;
    基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令。
  2. 根据权利要求1所述的门禁管理方法,在所述接收用户的第一认证信息之后,所述门禁管理方法还包括:
    获取所述目标门的认证时段;
    基于所述第一认证信息的接收时间在所述认证时段内的判断结果,执行基于所述第一认证信息确定所述用户的通行模式的步骤。
  3. 根据权利要求2所述的门禁管理方法,在所述获取所述目标门的认证时段之后,所述门禁管理方法还包括:
    基于所述第一认证信息的接收时间不在所述认证时段内的判断结果,向所述目标门发送开锁指令。
  4. 根据权利要求1所述的门禁管理方法,在所述接收用户的第一认证信息之后,所述门禁管理方法还包括:
    获取所述目标门的通行时段;
    基于所述第一认证信息的接收时间在所述通行时段内的判断结果,执行基于所述第一认证信息确定所述用户的通行模式的步骤。
  5. 根据权利要求4所述的门禁管理方法,在所述获取所述目标门的通行时段之后,所述门禁管理方法还包括:
    基于所述第一认证信息的接收时间不在所述通行时段内的判断结果,控制所述目标门保持锁闭状态。
  6. 根据权利要求1所述的门禁管理方法,其中,所述基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令,包括:
    基于所述通行模式包括当前认证的目标门的通行权的判断结果,确定所述目标门在所述第一认证信息的接收时间的认证方式;
    按照所述认证方式,采用所述第一认证信息和第二认证信息进行身份验证,所述第二认证信息为用户根据所述认证方式输入的;
    基于身份验证通过的判断结果,向所述目标门发送开锁指令。
  7. 根据权利要求6所述的门禁管理方法,其中,所述采用所述第一认证信息和第二认证信息进行身份验证,包括:
    判断所述第一认证信息和第二认证信息是否属于同一用户;
    基于所述第一认证信息和第二认证信息属于同一用户的判断结果,确定身份验证通过。
  8. 根据权利要求7所述的门禁管理方法,所述采用所述第一认证信息和第二认证信息进行身份验证,还包括:
    基于所述第一认证信息和第二认证信息不属于同一用户的判断结果,控制所述目标门保持锁闭状态。
  9. 一种门禁管理装置,包括:
    第一认证信息接收模块,被设置为接收用户的第一认证信息;
    通行模式确定模块,被设置为基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的;
    开锁指令发送模块,被设置为基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令。
  10. 一种门禁设备,包括:
    一个或多个处理器;
    存储器,用于存储一个或多个程序;
    当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-8任一所述的门禁管理方法。
  11. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,实现如权利要求1-8任一所述的门禁管理方法。
PCT/CN2020/100330 2019-07-17 2020-07-06 门禁管理方法、装置、设备及存储介质 WO2021008395A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910646356.5A CN110379058A (zh) 2019-07-17 2019-07-17 一种门禁管理方法、装置、设备及存储介质
CN201910646356.5 2019-07-17

Publications (1)

Publication Number Publication Date
WO2021008395A1 true WO2021008395A1 (zh) 2021-01-21

Family

ID=68253728

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/100330 WO2021008395A1 (zh) 2019-07-17 2020-07-06 门禁管理方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN110379058A (zh)
WO (1) WO2021008395A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113353749A (zh) * 2021-06-23 2021-09-07 江苏威尔曼科技有限公司 生物识别智能电梯控制系统
CN114553916A (zh) * 2021-12-27 2022-05-27 广东艾科智泊科技股份有限公司 一种道闸一键配置方法及道闸一键配置终端
CN115063914A (zh) * 2022-06-08 2022-09-16 中国铁路上海局集团有限公司杭州工务段 一种基于nfc的通道门管理系统

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110379058A (zh) * 2019-07-17 2019-10-25 日立楼宇技术(广州)有限公司 一种门禁管理方法、装置、设备及存储介质
CN111179486A (zh) * 2019-12-20 2020-05-19 深圳市前海小微蜂信息科技有限公司 一种智能通行系统
CN111158251A (zh) * 2019-12-25 2020-05-15 深圳市前海小微蜂信息科技有限公司 一种办公智能管理系统
CN111360802B (zh) * 2020-03-03 2022-09-13 上海有个机器人有限公司 一种机器人通过闸机的控制方法和系统
CN113593081B (zh) * 2020-04-30 2023-05-23 深圳绿米联创科技有限公司 控制智能锁的方法、装置以及智能锁
CN111554013A (zh) * 2020-05-13 2020-08-18 日立楼宇技术(广州)有限公司 门禁通行方法、装置、设备和存储介质
CN114038100A (zh) * 2021-11-05 2022-02-11 深圳市商汤科技有限公司 一种通行核验方法、装置、电子设备及储存介质
CN115188114B (zh) * 2022-07-01 2023-09-01 日立楼宇技术(广州)有限公司 一种门禁信息同步方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030107468A1 (en) * 2001-12-07 2003-06-12 Linda Din Entry security device
US10062233B1 (en) * 2016-07-20 2018-08-28 Alarm.Com Incorporated Automatic emergency door unlock system
CN109502435A (zh) * 2018-12-11 2019-03-22 深圳中正信息科技有限公司 派梯方法、装置、计算机设备和存储介质
CN109697779A (zh) * 2018-12-27 2019-04-30 厦门中控智慧信息技术有限公司 一种门禁控制方法以及相关装置
CN109801408A (zh) * 2018-12-06 2019-05-24 安徽凯川电力保护设备有限公司 一种用于机房的门禁管理方法
CN110379058A (zh) * 2019-07-17 2019-10-25 日立楼宇技术(广州)有限公司 一种门禁管理方法、装置、设备及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102610009A (zh) * 2011-07-25 2012-07-25 宋功彬 多人管理门禁系统
US10121301B1 (en) * 2017-06-20 2018-11-06 Amazon Technologies, Inc. Web-based structure access
CN109243040B (zh) * 2018-11-20 2021-08-24 日立楼宇技术(广州)有限公司 一种门禁通行管理方法、装置、设备和存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030107468A1 (en) * 2001-12-07 2003-06-12 Linda Din Entry security device
US10062233B1 (en) * 2016-07-20 2018-08-28 Alarm.Com Incorporated Automatic emergency door unlock system
CN109801408A (zh) * 2018-12-06 2019-05-24 安徽凯川电力保护设备有限公司 一种用于机房的门禁管理方法
CN109502435A (zh) * 2018-12-11 2019-03-22 深圳中正信息科技有限公司 派梯方法、装置、计算机设备和存储介质
CN109697779A (zh) * 2018-12-27 2019-04-30 厦门中控智慧信息技术有限公司 一种门禁控制方法以及相关装置
CN110379058A (zh) * 2019-07-17 2019-10-25 日立楼宇技术(广州)有限公司 一种门禁管理方法、装置、设备及存储介质

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113353749A (zh) * 2021-06-23 2021-09-07 江苏威尔曼科技有限公司 生物识别智能电梯控制系统
CN114553916A (zh) * 2021-12-27 2022-05-27 广东艾科智泊科技股份有限公司 一种道闸一键配置方法及道闸一键配置终端
CN115063914A (zh) * 2022-06-08 2022-09-16 中国铁路上海局集团有限公司杭州工务段 一种基于nfc的通道门管理系统
CN115063914B (zh) * 2022-06-08 2024-04-05 中国铁路上海局集团有限公司杭州工务段 一种基于nfc的通道门管理系统

Also Published As

Publication number Publication date
CN110379058A (zh) 2019-10-25

Similar Documents

Publication Publication Date Title
WO2021008395A1 (zh) 门禁管理方法、装置、设备及存储介质
US11721149B2 (en) Door access control via a mobile device
JP7216101B2 (ja) アクセス制御システムおよびこれを使用したアクセス制御方法
US9508207B2 (en) Method and apparatus for network controlled access to physical spaces
US9118656B2 (en) Systems and methods for multi-factor authentication
US8193904B2 (en) Entry and exit control apparatus and entry and exit control method
US10083326B2 (en) Method of accessing a physically secured rack and computer network infrastructure
JP2010092172A (ja) セキュリティシステム、セキュリティプログラム及びセキュリティ方法
US9654470B2 (en) Multi-function smart communication card
EP3327679A1 (de) Verfahren zur zutrittskontrolle einer personengruppe mittels mehreren lesegeräten und mehreren token
US20200334344A1 (en) Modern authentication
US20160110530A1 (en) Method and a system for authenticating a user in terms of a cloud based access control system
KR101396411B1 (ko) 핀과 생체인식을 이용한 출입 관리 시스템 및 방법
JP2010044619A (ja) アクセス対象に対するアクセス制御システムおよびアクセス制御方法
KR101926709B1 (ko) 생체 인증 및 제어 장치 및 그 방법
CN108389290A (zh) 一种基于物联网的智能家居控制方法
JP2007077708A (ja) 通行制御装置
US20200026829A1 (en) Biometric access control identification card
TWI476734B (zh) Multiple access control method
JP2009169796A (ja) システム管理装置、およびセキュリティシステム
EP4148693A1 (en) An access control system and a method therein for handling access to an access-restricted physical resource
JP2015197906A (ja) 認証システム
WO2023084753A1 (ja) 認証装置、認証方法、及びプログラム
JP2009140331A (ja) アクセス制御装置
Jayashree et al. Smart Biometric Controlled Door Unlock Mechanism Using IoT

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20840425

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20840425

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 11/03/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20840425

Country of ref document: EP

Kind code of ref document: A1