WO2021008395A1 - 门禁管理方法、装置、设备及存储介质 - Google Patents
门禁管理方法、装置、设备及存储介质 Download PDFInfo
- Publication number
- WO2021008395A1 WO2021008395A1 PCT/CN2020/100330 CN2020100330W WO2021008395A1 WO 2021008395 A1 WO2021008395 A1 WO 2021008395A1 CN 2020100330 W CN2020100330 W CN 2020100330W WO 2021008395 A1 WO2021008395 A1 WO 2021008395A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication information
- access control
- user
- control management
- target door
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Definitions
- This application relates to access control technology, for example, to an access control management method, device, equipment, and storage medium.
- the access control system restricts people from entering the controlled area through the control of entering personnel, and can achieve the purpose of ensuring the safety of the controlled area.
- the electronic access control system has higher security, better convenience and cost-effectiveness, and becomes an access control system Mainstream.
- the way of personnel management in the access control management system is usually to authorize a certain number of access points for a person, and authorization requires separate authorization for each door, such as user A, if A needs to have doors A, B, and C.
- authorization requires separate authorization for each door, such as user A, if A needs to have doors A, B, and C.
- three authorization operations are required to complete authorization.
- the workload of authorization will be very large and error-prone.
- This application provides an access control management method, device, system, and storage medium, so as to reduce the workload of authorization and avoid authorization errors.
- an access control management method including:
- an access control management device including:
- the first authentication information receiving module is set to receive the user's first authentication information
- a passing mode determining module configured to determine the passing mode of the user based on the first authentication information, wherein the passing mode is allocated based on the identity characteristics of the user;
- the unlocking instruction sending module is configured to send an unlocking instruction to the target door based on the judgment result that the passage mode includes the right of passage of the currently authenticated target door.
- an access control device including:
- One or more processors are One or more processors;
- Memory used to store one or more programs
- the one or more processors When the one or more programs are executed by the one or more processors, the one or more processors implement the access control management method according to the first aspect of the present application.
- an embodiment of the present application also provides a computer-readable storage medium having a computer program stored on the computer-readable storage medium.
- the computer program is executed by a processor, the implementation of the The access control management method described.
- FIG. 1 is a flowchart of an access control management method provided in Embodiment 1 of this application;
- Figure 2 is a schematic diagram of access control distribution in a region
- FIG. 3 is a flowchart of an access control management method provided by Embodiment 2 of this application.
- FIG. 5 is a flowchart of an access control management method provided in the fourth embodiment of this application.
- FIG. 6 is a schematic structural diagram of an access control management device provided in Embodiment 5 of this application.
- FIG. 1 is a flowchart of an access control management method provided in the first embodiment of this application. This embodiment can be applied to access control management.
- the access control management device is implemented, which can be implemented in software and/or hardware and integrated into the access control management device. As shown in FIG. 1, the method of the embodiment of the present application may include the following steps:
- S101 Receive first authentication information of a user.
- each door is equipped with a reading device and an electronic lock, and each door is equipped with an access control controller or multiple doors with an access control controller.
- the reading device is used for The first authentication information of the user is read and uploaded to the access controller.
- the access controller is used for authentication. When the authentication is passed, the access controller controls the electronic lock to open.
- the reading device may be an IC card reader.
- the IC card reader can obtain the IC
- the card number of the card is uploaded to the access controller, and the card number of the IC card can be associated with the user’s identity information.
- the reading device may be a two-dimensional code scanner.
- the two-dimensional code scanner scans the two-dimensional code,
- the code corresponding to the two-dimensional code can be obtained and uploaded to the access controller.
- the code corresponding to the two-dimensional code is associated with the user's identity information.
- the identity information may include information such as the user's name, department, and position.
- the method of swiping an IC card and scanning a two-dimensional code is taken as an example to illustrate the method of obtaining the first authentication information of the user.
- the method for obtaining the first authentication information of the user may also be other methods, which will not be repeated in this application.
- S102 Determine the user's travel mode based on the first authentication information.
- FIG. 2 is a schematic diagram of the distribution of access control in an area. As shown in Figure 2, exemplarily, this area is provided with 7 doors, of which doors A, B, and G control the passage of users in the corridor area, which belongs to the public area. By default, all employees of the company can pass, and the corresponding pass mode is pass mode 001, then pass mode 001 is assigned to all employees of the company.
- the cleaning staff only have the right to pass through doors A, B, and G; doors C and D are controlled
- doors A, B, and G doors C and D are controlled
- the passage mode 002 is assigned to the company’s warehouse staff, which has doors A, B, G, C and D
- the right of passage; door E controls the user’s passage in the financial room, only financial personnel have the authority to enter the financial room, and the corresponding passage mode is 003, then the company’s financial staff is assigned the passage mode 003, which has door A, The right of passage for B, G, and E; Gate F controls the passage of users in the laboratory. Only R&D personnel have the permission to enter the laboratory.
- the corresponding passage mode is 004, and the passage mode 004 is assigned to the company’s R&D personnel.
- Mode 004 has the right of passage for doors A, B, G and F; the general manager of the company has the right of passage for all areas and can open all the doors in the area, and the corresponding pass mode is 005, which is assigned to the general manager of the company Pass mode 005.
- the IC card held by the staff member can be granted a corresponding access mode according to the staff member’s identity information, without requiring separate authorization for each door.
- the passage permission of the staff member can be adjusted to the applicable passage mode, and there is no need to adjust the authorization according to each door.
- the user's traffic mode can be determined according to the first authentication information.
- the employee's pass mode can be determined to be 004.
- the above-mentioned employee's traffic mode (the corresponding relationship between the IC card number and the corresponding traffic mode) can be visually operated and set on the access control management service software to form a configuration file, and send the configuration file to Access Controller. You can also copy the configuration file directly to the access controller via a USB flash drive, or log in to the embedded network page of the access controller via a mobile device for configuration.
- each door can be controlled by one access controller alone, or multiple doors can be controlled by one access controller.
- Each door can be equipped with entry authentication, that is, a reading device is provided on the entry side, and the exit side does not need to be equipped with a reading device, but only an exit button. When the user wants to go out, just press the exit button to open the door.
- Each door can also be equipped with entry authentication and exit authentication, that is, reading devices are equipped on the entry side and the exit side, and users need to be authenticated when entering and exiting the door.
- S102 may include: acquiring an authentication period of the target door; when the receiving time of the first authentication information is within the authentication period, determining the user's passage based on the first authentication information mode.
- S102 may include: acquiring the passage period of the target door; when the receiving time of the first authentication information is within the passage period, determining the passage of the user based on the first authentication information mode.
- S103 Determine whether the pass mode includes the pass right of the currently authenticated target door.
- S104 If it is determined that the passage mode includes the right of passage of the currently authenticated target door, S104 is executed; if it is determined that the passage mode does not include the right of passage of the currently authenticated target door, S105 is executed.
- the access controller as a dual-door controller, where the access controller 1 controls doors A, B, and G, the access controller 2 controls doors C and D, and the access controller 3 controls doors E and F.
- S104 Send an unlocking instruction to the target door.
- the IC card reader obtains the card number of the IC card and uploads it to the access control controller 3, and the access controller 3 finds it from the configuration file according to the IC card number
- the pass mode corresponding to the card number is pass mode 004 (the employee is a researcher), pass mode 004 has the right of passage for doors A, B, G, and F, so the access controller 3 sends an unlock command to the electronic lock of door F.
- the electronic lock of control door F is opened, allowing the employee to enter the laboratory.
- the IC card reader obtains the card number of the IC card and uploads it to the access control controller 3, and the access controller 3 finds it from the configuration file according to the IC card number
- the access mode corresponding to the card number is the access mode 003 (the employee is a financial officer), and the access mode 003 has the right of access for doors A, B, G and E, but not the right of access for door F, so the access controller 3 maintains The electronic lock of door F remains locked, and the employee is denied access to the laboratory.
- the access control management method determines a user's access mode based on the acquired first authentication information, where the access mode is assigned based on the user's identity characteristics, and the access mode includes the access right of at least one door.
- the mode includes the right of passage of the currently authenticated target door, an unlock command is sent to the target door.
- the user when a user is authorized for access control management, the user can be granted a corresponding access mode according to the user's identity information, without requiring separate authorization for each door.
- it when it is necessary to change the passage authority of a staff member, it can be adjusted to the applicable passage mode. There is no need to adjust the authorization for each door, which reduces the authorization workload and avoids authorization errors.
- FIG. 3 is a flowchart of the access control management method provided in the second embodiment of the application.
- the embodiment of the present application is modified based on the foregoing embodiment 1, as shown in FIG. 3 As shown, the method of the embodiment of the present application may include the following steps:
- S201 Receive first authentication information of the user.
- each door can be set for an authentication period that needs to be authenticated. During the authentication period, the user's access authority needs to be authenticated. Only when the authentication is passed, the target door will be opened, and there is no need to perform authentication outside the authentication period.
- Authorization authentication any user holding a registered IC card can open the target door by swiping the card.
- S203 Determine whether the receiving time of the first authentication information is within the authentication period.
- S204 is executed; if it is determined that the receiving time of the first authentication information is not within the authentication period, S205 is executed.
- S204 Determine the user's travel mode based on the first authentication information.
- the user's pass authority needs to be authenticated. Therefore, the user's pass mode is determined based on the first authentication information.
- S205 Send an unlocking instruction to the target door.
- S206 Determine whether the pass mode includes the pass right of the currently authenticated target door.
- the step of S206 is executed to determine whether the access mode includes the access right of the currently authenticated target door. If it is determined that the passage mode includes the right of passage of the currently authenticated target door, execute S207; if it is determined that the passage mode does not include the right of passage of the currently authenticated target door, execute S208.
- S207 Send an unlocking instruction to the target door.
- the access control management method After receiving the first authentication information of the user, the authentication period of the target door is obtained, and when it is determined that the receiving time of the first authentication information is within the authentication period, the user’s identity is determined based on the first authentication information.
- the access mode wherein the access mode is allocated based on the identity characteristics of the user, the access mode includes the access right of at least one door, and when it is determined that the access mode includes the access right of the currently authenticated target door, an unlock command is sent to the target door.
- the user when a user is authorized for access control management, the user can be granted a corresponding access mode according to the user's identity information, without requiring separate authorization by door.
- FIG. 4 is a flowchart of the access control management method provided in the third embodiment of this application.
- the present embodiment is modified on the basis of the foregoing second embodiment, as shown in FIG. 4 As shown, the method of the embodiment of the present application may include the following steps:
- S301 Receive first authentication information of the user.
- S304 is executed; if it is determined that the receiving time of the first authentication information is not within the authentication period, S305 is executed.
- each door can be set to pass time period.
- the target door will be opened after the user passes the authentication; outside the pass time period, even if the user passes the authentication, the access controller will not send the target door to unlock instruction.
- the transit time may be working hours on working days, such as 8:30-18:00 on working days, and outside working hours on working days, such as before 8:30, after 18:00, weekends and holidays , Even if the user has the right of passage for a door, the access controller will not send an unlock command to the target door. It should be noted that the above-mentioned transit period can be flexibly set according to the company's working hours and calendar.
- S305 Send an unlocking instruction to the target door.
- S306 Determine whether the receiving time of the first authentication information is within the pass time period.
- S307 Determine the user's travel mode based on the first authentication information.
- S309 Determine whether the passage mode includes the passage right of the currently authenticated target door.
- S310 Send an unlocking instruction to the target door.
- the access control management method After receiving the first authentication information of the user, the authentication period of the target door is obtained, and when it is determined that the receiving time of the first authentication information is within the authentication period, the user’s identity is determined based on the first authentication information.
- the access mode wherein the access mode is allocated based on the identity characteristics of the user, the access mode includes the access right of at least one door, and when it is determined that the access mode includes the access right of the currently authenticated target door, an unlock command is sent to the target door.
- the user when a user is authorized for access control management, the user can be granted a corresponding access mode according to the user's identity information, without requiring separate authorization by door.
- FIG. 5 is a flowchart of the access control management method provided in the fourth embodiment of the application.
- the embodiment of the present application is modified on the basis of the foregoing third embodiment, as shown in FIG. 5
- the method of the embodiment of the present application may include the following steps:
- S401 Receive first authentication information of the user.
- S403 Determine whether the receiving time of the first authentication information is within the authentication period.
- S404 is executed; if it is determined that the receiving time of the first authentication information is not within the authentication period, S405 is executed.
- S405 Send an unlocking instruction to the target door.
- S406 Determine whether the receiving time of the first authentication information is within the pass time period.
- S406 is executed; if it is determined that the receiving time of the first authentication information is within the passable period, S407 is executed; if it is determined that the receiving time of the first authentication information is not within the passable period, S408 is executed.
- S407 Determine the user's travel mode based on the first authentication information.
- S409 Determine whether the pass mode includes the pass right of the currently authenticated target door.
- S410 Determine the authentication mode of the target door at the time when the first authentication information is received.
- different authentication methods can be set for different time periods of each door. For example, during peak hours, only the card authentication method is required, while at other times, the card plus biometric authentication (for example, fingerprint Vein recognition or iris authentication) to improve the level of security control. Only when the information obtained by the two authentication methods belong to the same user (employee), the access control controller will send an unlock command to the target door.
- biometric authentication for example, fingerprint Vein recognition or iris authentication
- the first authentication information and the second authentication information are used for identity verification.
- the second authentication information is input by the user according to an authentication method.
- a prompt may be given accordingly to remind the user (employee) to input the second authentication information
- the second authentication information may be the user's biometric information (for example, fingerprint vein characteristic information or iris characteristic information) .
- the identity verification is passed and an unlocking instruction is sent to the target door; if it is determined that the first authentication information and the second authentication information do not belong to the same user, It is determined that the identity verification has failed, and the control target door remains locked.
- a prompt may also be issued to remind the user to re-enter the second authentication information.
- the second authentication information input by the user is no longer received.
- the access control management method After receiving the first authentication information of the user, the authentication period of the target door is obtained, and when it is determined that the receiving time of the first authentication information is within the authentication period, the user’s identity is determined based on the first authentication information.
- the access mode wherein the access mode is assigned based on the identity characteristics of the user, the access mode includes the access right of at least one door, and when it is determined that the access mode includes the access right of the currently authenticated target door, an unlock command is sent to the target door.
- the access mode when a user is authorized for access control management, it is only necessary to grant a corresponding access mode to the user according to the user's identity information, and there is no need to perform separate authorization by door.
- Embodiment 5 of the present application provides an access control management device.
- FIG. 6 is a schematic structural diagram of an access control management device provided in Embodiment 5 of this application. As shown in FIG. 6, the device may include:
- the first authentication information receiving module 601 is configured to receive the first authentication information of the user
- the passage mode determining module 602 is configured to determine the passage mode of the user based on the first authentication information, wherein the passage mode is allocated based on the identity characteristics of the user, and the passage mode includes passage of at least one door right;
- the unlocking instruction sending module 603 is configured to send an unlocking instruction to the target door when it is determined that the passage mode includes the right of passage of the currently authenticated target door.
- the access control management device also includes:
- An authentication period obtaining module configured to obtain the authentication period of the target door after receiving the first authentication information of the user
- the authentication period judgment module is configured to, when it is determined that the receiving time of the first authentication information is within the authentication period, send an execution instruction to the traffic mode determination module 602 to execute the determination based on the first authentication information The steps of the user's access mode; and after determining that the receiving time of the first authentication information is not within the authentication period, sending an execution instruction to the unlocking instruction sending module 603 to send an unlocking instruction to the target door.
- the access control management device also includes:
- a passage period acquisition module configured to obtain the passage period of the target door after the passage period of the target door is obtained
- the passage period determination module is configured to send an execution instruction to the passage mode determination module 602 to execute the determination based on the first authentication information when it is determined that the receiving time of the first authentication information is within the passage period. Steps of the user's traffic mode;
- the locked state maintaining module is configured to control the target door to maintain the locked state when it is determined that the receiving time of the first authentication information is not within the passage time period.
- the access control management device also includes:
- An authentication mode determination module configured to determine the authentication mode of the target door at the time of receiving the first authentication information when it is determined that the passage mode includes the right of passage of the target door currently authenticated;
- the identity verification module is configured to use the first authentication information and the second authentication information to perform identity verification according to the authentication method, and the second authentication information is input by the user according to the authentication method.
- the identity verification module is configured to send an execution instruction to the unlocking instruction sending module 603 when it is determined that the identity verification is passed, so as to send the unlocking instruction to the target door; and when it is determined that the identity verification fails, to the locked state maintaining module Send an execution instruction to control the target door to remain locked.
- the identity verification module includes:
- the identity verification unit is used to determine whether the first authentication information and the second authentication information belong to the same user. When the first authentication information and the second authentication information belong to the same user, the identity verification unit sends an execution instruction to the unlocking instruction sending module 603 to send an unlocking instruction to the target door; and, when the first authentication When the information and the second authentication information do not belong to the same user, the identity verification unit sends an execution instruction to the locked state maintaining module to control the target door to maintain the locked state.
- the above-mentioned access control management device can execute the access control management method provided in any embodiment of the present application, and has the corresponding functional modules and beneficial effects of the execution method.
- An embodiment of the present application also provides an access control device, the access control device includes: one or more processors; a storage device for storing one or more programs, when the one or more programs are used by the one or more Execution by two processors, so that the one or more processors implement the access control management method described in any embodiment of the present application.
- the embodiment of the present application also provides a computer-readable storage medium.
- the access control device can execute the access control management method described in the foregoing method embodiment.
- ROM Read-Only Memory
- RAM Random Access Memory
- FLASH Flash memory
- hard disk or optical disk etc.
- a computer device which can be a robot, A personal computer, server, or network device, etc. executes the access control management method described in any embodiment of this application.
- each unit and module included is only divided according to functional logic, as long as the corresponding function can be realized; in addition, the specific name of each functional unit is only for mutual convenience. distinguish.
- each part of this application can be implemented by hardware, software, firmware or a combination thereof.
- multiple steps or methods can be implemented by software or firmware stored in a memory and executed by a suitable instruction execution device.
- a logic gate circuit for implementing logic functions on data signals Discrete logic circuits, application-specific integrated circuits with suitable combinational logic gates, programmable gate array (PGA), field programmable gate array (FPGA), etc.
Abstract
Description
Claims (11)
- 一种门禁管理方法,包括:接收用户的第一认证信息;基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的;基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令。
- 根据权利要求1所述的门禁管理方法,在所述接收用户的第一认证信息之后,所述门禁管理方法还包括:获取所述目标门的认证时段;基于所述第一认证信息的接收时间在所述认证时段内的判断结果,执行基于所述第一认证信息确定所述用户的通行模式的步骤。
- 根据权利要求2所述的门禁管理方法,在所述获取所述目标门的认证时段之后,所述门禁管理方法还包括:基于所述第一认证信息的接收时间不在所述认证时段内的判断结果,向所述目标门发送开锁指令。
- 根据权利要求1所述的门禁管理方法,在所述接收用户的第一认证信息之后,所述门禁管理方法还包括:获取所述目标门的通行时段;基于所述第一认证信息的接收时间在所述通行时段内的判断结果,执行基于所述第一认证信息确定所述用户的通行模式的步骤。
- 根据权利要求4所述的门禁管理方法,在所述获取所述目标门的通行时段之后,所述门禁管理方法还包括:基于所述第一认证信息的接收时间不在所述通行时段内的判断结果,控制所述目标门保持锁闭状态。
- 根据权利要求1所述的门禁管理方法,其中,所述基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令,包括:基于所述通行模式包括当前认证的目标门的通行权的判断结果,确定所述目标门在所述第一认证信息的接收时间的认证方式;按照所述认证方式,采用所述第一认证信息和第二认证信息进行身份验证,所述第二认证信息为用户根据所述认证方式输入的;基于身份验证通过的判断结果,向所述目标门发送开锁指令。
- 根据权利要求6所述的门禁管理方法,其中,所述采用所述第一认证信息和第二认证信息进行身份验证,包括:判断所述第一认证信息和第二认证信息是否属于同一用户;基于所述第一认证信息和第二认证信息属于同一用户的判断结果,确定身份验证通过。
- 根据权利要求7所述的门禁管理方法,所述采用所述第一认证信息和第二认证信息进行身份验证,还包括:基于所述第一认证信息和第二认证信息不属于同一用户的判断结果,控制所述目标门保持锁闭状态。
- 一种门禁管理装置,包括:第一认证信息接收模块,被设置为接收用户的第一认证信息;通行模式确定模块,被设置为基于所述第一认证信息确定所述用户的通行模式,其中,所述通行模式为基于所述用户的身份特征分配的;开锁指令发送模块,被设置为基于所述通行模式包括当前认证的目标门的通行权的判断结果,向所述目标门发送开锁指令。
- 一种门禁设备,包括:一个或多个处理器;存储器,用于存储一个或多个程序;当所述一个或多个程序被所述一个或多个处理器执行,使得所述一个或多个处理器实现如权利要求1-8任一所述的门禁管理方法。
- 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时,实现如权利要求1-8任一所述的门禁管理方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910646356.5A CN110379058A (zh) | 2019-07-17 | 2019-07-17 | 一种门禁管理方法、装置、设备及存储介质 |
CN201910646356.5 | 2019-07-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021008395A1 true WO2021008395A1 (zh) | 2021-01-21 |
Family
ID=68253728
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/100330 WO2021008395A1 (zh) | 2019-07-17 | 2020-07-06 | 门禁管理方法、装置、设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110379058A (zh) |
WO (1) | WO2021008395A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113353749A (zh) * | 2021-06-23 | 2021-09-07 | 江苏威尔曼科技有限公司 | 生物识别智能电梯控制系统 |
CN114553916A (zh) * | 2021-12-27 | 2022-05-27 | 广东艾科智泊科技股份有限公司 | 一种道闸一键配置方法及道闸一键配置终端 |
CN115063914A (zh) * | 2022-06-08 | 2022-09-16 | 中国铁路上海局集团有限公司杭州工务段 | 一种基于nfc的通道门管理系统 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110379058A (zh) * | 2019-07-17 | 2019-10-25 | 日立楼宇技术(广州)有限公司 | 一种门禁管理方法、装置、设备及存储介质 |
CN111179486A (zh) * | 2019-12-20 | 2020-05-19 | 深圳市前海小微蜂信息科技有限公司 | 一种智能通行系统 |
CN111158251A (zh) * | 2019-12-25 | 2020-05-15 | 深圳市前海小微蜂信息科技有限公司 | 一种办公智能管理系统 |
CN111360802B (zh) * | 2020-03-03 | 2022-09-13 | 上海有个机器人有限公司 | 一种机器人通过闸机的控制方法和系统 |
CN113593081B (zh) * | 2020-04-30 | 2023-05-23 | 深圳绿米联创科技有限公司 | 控制智能锁的方法、装置以及智能锁 |
CN111554013A (zh) * | 2020-05-13 | 2020-08-18 | 日立楼宇技术(广州)有限公司 | 门禁通行方法、装置、设备和存储介质 |
CN114038100A (zh) * | 2021-11-05 | 2022-02-11 | 深圳市商汤科技有限公司 | 一种通行核验方法、装置、电子设备及储存介质 |
CN115188114B (zh) * | 2022-07-01 | 2023-09-01 | 日立楼宇技术(广州)有限公司 | 一种门禁信息同步方法、装置、设备及存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030107468A1 (en) * | 2001-12-07 | 2003-06-12 | Linda Din | Entry security device |
US10062233B1 (en) * | 2016-07-20 | 2018-08-28 | Alarm.Com Incorporated | Automatic emergency door unlock system |
CN109502435A (zh) * | 2018-12-11 | 2019-03-22 | 深圳中正信息科技有限公司 | 派梯方法、装置、计算机设备和存储介质 |
CN109697779A (zh) * | 2018-12-27 | 2019-04-30 | 厦门中控智慧信息技术有限公司 | 一种门禁控制方法以及相关装置 |
CN109801408A (zh) * | 2018-12-06 | 2019-05-24 | 安徽凯川电力保护设备有限公司 | 一种用于机房的门禁管理方法 |
CN110379058A (zh) * | 2019-07-17 | 2019-10-25 | 日立楼宇技术(广州)有限公司 | 一种门禁管理方法、装置、设备及存储介质 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102610009A (zh) * | 2011-07-25 | 2012-07-25 | 宋功彬 | 多人管理门禁系统 |
US10121301B1 (en) * | 2017-06-20 | 2018-11-06 | Amazon Technologies, Inc. | Web-based structure access |
CN109243040B (zh) * | 2018-11-20 | 2021-08-24 | 日立楼宇技术(广州)有限公司 | 一种门禁通行管理方法、装置、设备和存储介质 |
-
2019
- 2019-07-17 CN CN201910646356.5A patent/CN110379058A/zh active Pending
-
2020
- 2020-07-06 WO PCT/CN2020/100330 patent/WO2021008395A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030107468A1 (en) * | 2001-12-07 | 2003-06-12 | Linda Din | Entry security device |
US10062233B1 (en) * | 2016-07-20 | 2018-08-28 | Alarm.Com Incorporated | Automatic emergency door unlock system |
CN109801408A (zh) * | 2018-12-06 | 2019-05-24 | 安徽凯川电力保护设备有限公司 | 一种用于机房的门禁管理方法 |
CN109502435A (zh) * | 2018-12-11 | 2019-03-22 | 深圳中正信息科技有限公司 | 派梯方法、装置、计算机设备和存储介质 |
CN109697779A (zh) * | 2018-12-27 | 2019-04-30 | 厦门中控智慧信息技术有限公司 | 一种门禁控制方法以及相关装置 |
CN110379058A (zh) * | 2019-07-17 | 2019-10-25 | 日立楼宇技术(广州)有限公司 | 一种门禁管理方法、装置、设备及存储介质 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113353749A (zh) * | 2021-06-23 | 2021-09-07 | 江苏威尔曼科技有限公司 | 生物识别智能电梯控制系统 |
CN114553916A (zh) * | 2021-12-27 | 2022-05-27 | 广东艾科智泊科技股份有限公司 | 一种道闸一键配置方法及道闸一键配置终端 |
CN115063914A (zh) * | 2022-06-08 | 2022-09-16 | 中国铁路上海局集团有限公司杭州工务段 | 一种基于nfc的通道门管理系统 |
CN115063914B (zh) * | 2022-06-08 | 2024-04-05 | 中国铁路上海局集团有限公司杭州工务段 | 一种基于nfc的通道门管理系统 |
Also Published As
Publication number | Publication date |
---|---|
CN110379058A (zh) | 2019-10-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021008395A1 (zh) | 门禁管理方法、装置、设备及存储介质 | |
US11721149B2 (en) | Door access control via a mobile device | |
JP7216101B2 (ja) | アクセス制御システムおよびこれを使用したアクセス制御方法 | |
US9508207B2 (en) | Method and apparatus for network controlled access to physical spaces | |
US9118656B2 (en) | Systems and methods for multi-factor authentication | |
US8193904B2 (en) | Entry and exit control apparatus and entry and exit control method | |
US10083326B2 (en) | Method of accessing a physically secured rack and computer network infrastructure | |
JP2010092172A (ja) | セキュリティシステム、セキュリティプログラム及びセキュリティ方法 | |
US9654470B2 (en) | Multi-function smart communication card | |
EP3327679A1 (de) | Verfahren zur zutrittskontrolle einer personengruppe mittels mehreren lesegeräten und mehreren token | |
US20200334344A1 (en) | Modern authentication | |
US20160110530A1 (en) | Method and a system for authenticating a user in terms of a cloud based access control system | |
KR101396411B1 (ko) | 핀과 생체인식을 이용한 출입 관리 시스템 및 방법 | |
JP2010044619A (ja) | アクセス対象に対するアクセス制御システムおよびアクセス制御方法 | |
KR101926709B1 (ko) | 생체 인증 및 제어 장치 및 그 방법 | |
CN108389290A (zh) | 一种基于物联网的智能家居控制方法 | |
JP2007077708A (ja) | 通行制御装置 | |
US20200026829A1 (en) | Biometric access control identification card | |
TWI476734B (zh) | Multiple access control method | |
JP2009169796A (ja) | システム管理装置、およびセキュリティシステム | |
EP4148693A1 (en) | An access control system and a method therein for handling access to an access-restricted physical resource | |
JP2015197906A (ja) | 認証システム | |
WO2023084753A1 (ja) | 認証装置、認証方法、及びプログラム | |
JP2009140331A (ja) | アクセス制御装置 | |
Jayashree et al. | Smart Biometric Controlled Door Unlock Mechanism Using IoT |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20840425 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20840425 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205N DATED 11/03/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20840425 Country of ref document: EP Kind code of ref document: A1 |