WO2024060872A1 - Access control management method, verification server, access control system and readable storage medium - Google Patents

Access control management method, verification server, access control system and readable storage medium Download PDF

Info

Publication number
WO2024060872A1
WO2024060872A1 PCT/CN2023/112533 CN2023112533W WO2024060872A1 WO 2024060872 A1 WO2024060872 A1 WO 2024060872A1 CN 2023112533 W CN2023112533 W CN 2023112533W WO 2024060872 A1 WO2024060872 A1 WO 2024060872A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
access control
user
verified
user identification
Prior art date
Application number
PCT/CN2023/112533
Other languages
French (fr)
Chinese (zh)
Inventor
李世野
刘卓华
杜洪军
郑海涛
王怀亮
纪高
李国旗
于洪达
李涛
Original Assignee
京东方科技集团股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东方科技集团股份有限公司 filed Critical 京东方科技集团股份有限公司
Publication of WO2024060872A1 publication Critical patent/WO2024060872A1/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Definitions

  • the embodiments of the present disclosure relate to the field of computer technology, and in particular, to an access control management method, a verification server, an access control system, and a readable storage medium.
  • company park managers will manually check health information and/or itinerary information on-site when employees enter the park for work. There are many people during peak hours, and it is time-consuming to check health information and/or itinerary information on-site. , will cause a large number of people to gather, and the traffic efficiency is extremely low; in addition, manual on-site inspection of health information and/or itinerary information is difficult to ensure that the health information and/or itinerary information are authentic and effective.
  • Embodiments of the present disclosure provide an access control management method, a verification server, an access control system and a readable storage medium, which are used to solve the problem of low traffic efficiency and difficulty in ensuring the inspection by manually checking health information and/or itinerary information in certain places. Questions with real and valid results.
  • an embodiment of the present disclosure provides a door access management method, which is applied to a verification server, including:
  • the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtain a verification result;
  • Access control information is generated based on the verification results and sent to the access control device.
  • the verification of whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtaining the verification result includes:
  • the image recognition result includes at least one of the following: health information status and itinerary information status;
  • the image recognition result further includes: user identification information;
  • the health information status and/or itinerary information status corresponding to the user identification information to be verified meets the requirements, it also includes:
  • the user identification information in the image recognition result matches the user identification information to be verified, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements;
  • a verification result containing alarm information is generated and sent to the access control device.
  • the image recognition result obtained by identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified includes:
  • the screenshot in the pre-registration information corresponding to the user identification information to be verified is identified.
  • the pre-registration information also includes user identification information
  • Whether the pre-registration information saved on the day of query includes the pre-registration information corresponding to the user identification information to be verified includes:
  • embodiments of the present disclosure provide an access control management method, which is applied to an access control system, including:
  • the reference user information database includes reference user information that matches the access control collection information collected by the access control equipment, obtain the user identification information to be verified corresponding to the access control collection information;
  • the user identification information to be verified is sent to a verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements;
  • the pre-registration information includes a screenshot, and the screenshot includes At least one of the following: screenshots of health information and screenshots of itinerary information.
  • the access control system includes a cloud server and at least two edge servers, each edge server corresponding to at least one of the access control devices, and the method further includes:
  • the cloud server sends reference user information to the edge server.
  • the cloud server sends reference user information to the edge server, which also includes:
  • the cloud server receives the user's real-time location information sent by the user's mobile application
  • the cloud server determines the target access control device closest to the user based on the user's real-time location information
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the target access control device;
  • the cloud server analyzes the access control equipment that the user is expected to arrive on that day based on the access control equipment that the user has arrived at in history;
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day.
  • the method also includes:
  • the cloud server analyzes the estimated time that the user is expected to arrive at the access control equipment that day based on the user's historical arrival time at the access control equipment or the company's working hours;
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day, including:
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive at that day at the target time before the estimated time;
  • the cloud server determines the target distance between the user and the target access control device based on the user's real-time location information
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive that day.
  • obtaining the user identification information to be verified corresponding to the access control collection information also includes:
  • the edge server determines whether the reference user information database includes reference user information matching the access control collected information
  • the reference user information database of the edge server includes reference user information matching the access control collection information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information;
  • the access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes Reference user information that matches the access control collection information; if the cloud server reference user information database includes reference user information that matches the access control collection information, access to obtain the user identification information to be verified corresponding to the access control collection information A step of.
  • embodiments of the present disclosure provide a verification server, including:
  • the first receiving module is configured to receive and save pre-registration information sent by the user's mobile application, where the pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
  • the second receiving module is used to receive the user identification information to be verified sent by the access control system
  • a query module used to query whether the pre-registration information saved on the day includes pre-registration information corresponding to the user identification information to be verified;
  • the first verification module is used to verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and is verified if the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified. result;
  • a control module configured to generate access control information based on the verification results and send it to the access control device.
  • an access control system including:
  • the first acquisition module is used to obtain the user identification information to be verified corresponding to the access control collection information if the reference user information database includes reference user information that matches the access control collection information;
  • a sending module configured to send the user identification information to be verified to a verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements;
  • the pre-registration information includes screenshots , the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information.
  • an embodiment of the present disclosure provides a verification server, including: a processor, a memory, and a program stored on the memory and executable on the processor. When the program is executed by the processor The steps of implementing the access control management method described in the first aspect above.
  • an embodiment of the present disclosure provides an access control system, comprising: a processor, a memory, and a program stored in the memory and executable on the processor, wherein when the program is executed by the processor, the steps of the access control management method as described in the second aspect above are implemented.
  • embodiments of the present disclosure provide a computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the access control as described in the first aspect is implemented.
  • the steps of the management method; or, when the computer program is executed by the processor, the steps of the access control management method as described in the second aspect are implemented.
  • users can send screenshots containing health information and/or itinerary information to the verification server through the mobile application in advance before entering a specific place with access control equipment (such as an office building, a park, etc.) Screenshot of the pre-registration information.
  • access control equipment such as an office building, a park, etc.
  • the access control system can send the user identification information to be verified to the verification server.
  • the verification server queries whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified.
  • the verification server verifies the health information and/or itinerary information, which can ensure that the health information and/or itinerary information is authentic and valid. At the same time, it is automatically verified in combination with the access control system. Health information and/or itinerary information improves verification efficiency and access control equipment passing efficiency.
  • Figure 1 is one of the schematic flow diagrams of the access control management method according to an embodiment of the present disclosure
  • Figure 2 is a schematic flowchart of a mobile application obtaining and sending screenshots of health information and/or itinerary information according to an embodiment of the present disclosure
  • Figure 3 is a schematic flowchart of a mobile application obtaining and sending screenshots of health information and/or itinerary information according to another embodiment of the present disclosure
  • Figure 4 is one of the overall flow diagrams of the system applied in the embodiment of the present disclosure.
  • Figure 5 is the second schematic diagram of the overall flow of the system applied in the embodiment of the present disclosure.
  • Figure 6 is a schematic diagram of a health information sample management method according to an embodiment of the present disclosure.
  • Figure 7 is a schematic diagram of transmitting pre-registration information in an encrypted manner according to an embodiment of the present disclosure
  • Figure 8 is a schematic diagram of the format of an encrypted message according to an embodiment of the present disclosure.
  • Figure 9 is a second schematic flowchart of the access control management method according to the embodiment of the present disclosure.
  • Figure 10 is a schematic structural diagram of an access control management system according to an embodiment of the present disclosure.
  • Figure 11 is a schematic diagram of an input method of reference user information according to an embodiment of the present disclosure.
  • Figure 12 is a schematic flowchart of a distribution strategy for reference user information according to an embodiment of the present disclosure
  • Figure 13 is a schematic flowchart of a distribution strategy for reference user information according to another embodiment of the present disclosure.
  • Figure 14 is a schematic flowchart of a distribution strategy for reference user information according to yet another embodiment of the present disclosure.
  • Figure 15 is one of the structural schematic diagrams of the verification server according to an embodiment of the present disclosure.
  • Figure 16 is one of the structural schematic diagrams of the access control system according to the embodiment of the present disclosure.
  • Figure 17 is the second structural schematic diagram of the verification server according to the embodiment of the present disclosure.
  • Figure 18 is the second structural schematic diagram of the access control system according to the embodiment of the present disclosure.
  • Park access requires manual verification of employee epidemic prevention information and other information to see whether they are compliant, resulting in a large amount of duplication of work and low efficiency.
  • An embodiment of the present disclosure provides an access control management method, which is applied to a verification server, including:
  • Step 11 Receive and save the pre-registration information sent by the user's mobile application.
  • the pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
  • a user such as a company employee, etc.
  • a mobile application such as a mobile APP
  • It can also be called a mobile APP or mobile APP
  • the example of health information shown in Figure 2 is health information that needs to be scanned and registered. It should be understood that some health information does not need to be scanned and registered. Just click on the confirmation command to take a screenshot.
  • a mobile application is used to directly take screenshots of health information and/or itinerary information and upload them to the verification server. There is no entrance to modify the screenshots, which can reduce human intervention and ensure that screenshots of health information and/or itinerary information are not tampered with.
  • the user can also use other application software (such as the system screenshot command of the mobile phone) to take a screenshot of the health information and/or itinerary information, and upload it to the mobile application.
  • the mobile application is uploaded to the verification server.
  • the IoT platform in Figure 3 is the above-mentioned verification server.
  • Step 12 Receive the user identification information to be verified sent by the access control system
  • the user identification information to be verified includes, for example, the user's name, job number, and/or mobile phone number.
  • the access control device which can also be called the access control gate device
  • the access control device detects the access control collection information (such as face or access card information, etc.)
  • it can directly identify the access control collection information (such as Face recognition) and compare the access control collection information with the pre-saved reference user information, or send the access control collection information to the access control system for identification and comparison.
  • the access control system can determine the reference Whether the user information database includes reference user information that matches the access control collection information. If so, it means that the user is a legal user, and then the user identification information to be verified corresponding to the access control collection information (such as the user's name, job title, etc.) is obtained.
  • the reference user information database does not include reference user information that matches the access control collection information, it means that the user is not a legal user and can directly send alarm information to the access control device.
  • the access control device and the access control system can be integrated in the same device, or they can be set up separately.
  • the access control equipment mainly performs the function of collecting access control information (such as collecting faces and collecting access card information).
  • the access control equipment can also identify the collected access control information. Of course, it can also be identified by the access control system.
  • the access control system also performs the following tasks based on the identification: The access control collects information and determines the role of the user identification information to be verified.
  • Step 13 Check whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified;
  • the verification server can send alarm information to the access control system.
  • pre-registration information is uploaded on the same day and can be deleted at a designated time, for example, at 24:00 on the same day.
  • Step 14 If the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtain the verification result;
  • Whether the health information and/or itinerary information meets the requirements in the embodiment of the present invention may refer to whether the health information status and/or the itinerary information status meets the regulations of a specific place (such as a park).
  • Step 15 Generate access control information based on the verification results and send it to the access control device.
  • the first access control information can be generated to control the access control device to open the door. If the pre-registration information corresponding to the user identification information to be verified is not normal , then the second access control information can be generated to control the alarm of the access control equipment.
  • users can send screenshots containing health information and/or itinerary information to the verification server through the mobile application in advance before entering a specific place with access control equipment (such as an office building, a park, etc.) Screenshot of the pre-registration information.
  • access control equipment such as an office building, a park, etc.
  • the access control system can send the user identification information to be verified to the verification server.
  • the verification server queries whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified.
  • the verification server verifies the health information and/or itinerary information, which can ensure that the health information and/or itinerary information is authentic and valid. At the same time, it is automatically verified in combination with the access control system. Health information and/or itinerary information improves the verification efficiency and the passage efficiency of access control equipment.
  • verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtaining the verification result includes:
  • Step 141 Recognize the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result.
  • the image recognition result includes at least one of the following: health information status and itinerary information status;
  • An OCR (Optical Character Recognition, optical character recognition) recognition system can be used to identify the screenshots in the pre-registration information and obtain the image recognition result.
  • the health information status may include at least one of the following: the color of the health information, update time, health detection results, etc.
  • the itinerary information status can include at least one of the following: update time, location reached or passed within 7 days, etc.
  • the OCR recognition system can be installed on the verification server, or can be set up separately.
  • Step 142 Verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements, and obtain the verification result.
  • the image recognition result also includes: user identification information; for example, when the screenshot is a screenshot of health information, the user identification information in the image recognition result may include: user name, etc.
  • the user identification information in the image recognition result may include: the last four digits of the user's mobile phone, etc.
  • verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meets the requirements also includes:
  • the user identification information in the image recognition result matches the user identification information to be verified, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements;
  • a verification result containing alarm information is generated and sent to the access control device.
  • the health Information screenshots and/or itinerary information screenshots are screenshots of the user to be verified to verify whether the user's health information status and/or itinerary information status meets the requirements.
  • the image recognition result obtained by identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified includes:
  • Step 1411 Obtain health information samples from multiple regions
  • Step 1412 Identify the screenshots in the pre-registration information corresponding to the user identification information to be verified based on the health information samples of the multiple regions.
  • Health information samples from multiple regions can be stored in advance. Screenshots in the pre-registration information can be identified based on the pre-stored health information samples from multiple regions, thus supporting cross-regional personnel health information. Verification to solve the problem of cross-regional health information not being synchronized.
  • health information samples can be managed through the server management system WEB, such as adding, deleting, updating, etc.
  • the pre-registration information also includes user identification information (i.e. employee information in Figure 3, such as work number, mobile phone number, etc.); for example, the user's mobile terminal can Send the pre-saved or user-entered user identification information (such as work number, mobile phone number, etc.) and screenshots to the verification server; the verification server establishes an associated index of the user identification information and screenshots, and saves the user identification information and screenshots.
  • user identification information i.e. employee information in Figure 3, such as work number, mobile phone number, etc.
  • the user's mobile terminal can Send the pre-saved or user-entered user identification information (such as work number, mobile phone number, etc.) and screenshots to the verification server; the verification server establishes an associated index of the user identification information and screenshots, and saves the user identification information and screenshots.
  • the query whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified includes: querying whether the user identification information in the pre-registration information saved on the day contains the same The user identification information to be verified matches the user identification information. That is to say, when querying whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, the user identification information can be used to query.
  • the mobile application may not report user identification information, but only report screenshots.
  • the verification server may identify the screenshots in advance and obtain the user identification information in the screenshots, thereby facilitating query .
  • the user when the user reports the pre-registration information through the mobile application, the user may also report the expected arrival time at the same time, that is, the expected arrival time at the preset place.
  • the verification server saves the expected arrival time.
  • receiving the user identification information to be verified sent by the access control system it can first determine whether the reception time of the user identification information to be verified sent by the access control system is within the expected arrival time. If it is within the preset arrival time, execute the subsequent steps (that is, query whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified), otherwise an alarm message will be sent to the access control system.
  • the pre-registration information received by the verification server may be pre-registration information uploaded by the mobile application in an encrypted manner, thereby ensuring that the data cannot be tampered with and the integrity of the data is ensured.
  • Figure 8 is a schematic diagram of the format of an encrypted message message sent by a mobile application in an embodiment of the present disclosure.
  • the message message includes 5 parts.
  • the first part may be 1 byte (byte) and is used to indicate Encryption method
  • the second part can be 1 byte, used to indicate the encryption version
  • the third part is 6 bytes, reserved bytes
  • the fourth part is 4 bytes, used to indicate the length of the message message
  • the fifth part is The part is N bytes and is used to carry the encrypted message body.
  • an embodiment of the present disclosure also provides an access control management method, which is applied to the access control system.
  • the method includes:
  • Step 91 If the reference user information database includes reference user information that matches the access control collection information, obtain the user identification information to be verified corresponding to the access control collection information;
  • Step 92 Send the user identification information to be verified to the verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes screenshots, so The screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information.
  • the reference user information database is used to store pre-entered reference user information.
  • the access control collection information may be face or access control card information, etc. If the information collected by the access control is a face, the reference user information database includes the pre-entered face information of the user.
  • obtaining the user identification information to be verified corresponding to the access control collection information also includes:
  • Step 901 Obtain the access control collection information sent by the access control device
  • Step 902 Determine whether the reference user information database includes reference user information that matches the access control collection information.
  • the access control device and the access control system can be integrated in the same device, or they can be set up separately.
  • the access control equipment mainly performs the function of collecting access control information (such as collecting faces and collecting access card information).
  • the access control device sends the collected access control collection information to the access control system, and the access control system determines whether the reference user information database includes the access control collection information. Reference user information matching the information.
  • the access control device may also determine whether the reference user information database includes reference user information that matches the access control collection information.
  • the reference user information database is generally stored in the cloud server, and the communication path between the access control equipment and the remote cloud server is long. , reducing the recognition speed.
  • the access control system includes a cloud server and at least two edge servers, each of the edge servers corresponds to at least one access control device, and the edge server can be set at a location close to the access control device, or integrated with the access control device in one device.
  • the method further includes: the cloud server sending reference user information to the edge server.
  • the cloud server obtains the reference user information (such as face information) and sends the reference user information to the edge server, so that the edge server can directly compare the reference user information and the access control collection information.
  • the access control device does not If you need to communicate with the cloud server, you can communicate directly with the edge server.
  • the communication path is shortened, the communication speed is improved, the recognition speed is improved, and the pressure on the cloud server is relieved. That is to say, the above steps 901 and 902, and steps 91 and 92 can all be executed by the edge server.
  • an edge server is placed near the access control device.
  • the edge server is a physical machine deployed physically close to the access control device and can be regarded as a server directly connected to the access control device.
  • face recognition or fingerprint recognition or card swiping recognition
  • the access control device performs face comparison (or fingerprint comparison or card information comparison) through the edge server.
  • edge server If it does not exist in the edge server The corresponding face (or fingerprint or card information) will then go to the cloud server for face comparison (or fingerprint comparison or card information comparison).
  • the database data in the edge server is small and can be updated regularly, such as daily. Update, the edge server is close to the access control device, which can improve the speed of face recognition; at the same time, the storage specifications required for the edge server are not high, which can reduce costs.
  • the cloud server can deliver the user's reference user information to the corresponding edge server based on a variety of policies. Examples are given below to illustrate.
  • the cloud server sends reference user information to the edge server, which also includes:
  • the cloud server receives the user's real-time location information sent by the user's mobile application (APP);
  • the cloud server determines the target access control device closest to the user based on the user's real-time location information
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the target access control device.
  • the cloud server sends reference user information to the edge server, before which the following steps are also included:
  • the cloud server analyzes the access control equipment that the user is expected to arrive on that day based on the access control equipment that the user has arrived at in history;
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day.
  • the access control management method also includes: the cloud server analyzes the user's expected arrival time at the access control device on the day based on the user's historical arrival time at the access control device. time;
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day, including:
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive at that day at the target time (for example, 10 minutes) before the estimated time.
  • the estimated time that the user is expected to arrive at the access control device that day can be calculated, for example, in the following way:
  • the estimated time the user is expected to arrive at the access control device on the day Y*10%+(M1+M2)/2*20%+ (W1+W2+W3)/3*30%+(D1+D2+D3+D4+D5+D6+D7)/7*70%.
  • Y is the time to arrive at the access control equipment on the same day last year
  • M1 and M2 are the time to arrive at the access control equipment on the same day in the last two months respectively
  • W1, W2, and W3 are respectively the time to arrive at the access control equipment on the same day of the week in the last three weeks
  • D1 ,D2,D3,D4,D5,D6,D7 are respectively the time to arrive at the access control equipment in the previous seven days.
  • the method for calculating the estimated time of arrival of the user at the access control device on the day is not limited thereto, and for example, it may be calculated based only on the time of arrival at the access control device seven days before.
  • the access control management method also includes: the cloud server analyzes the user's expected time of the day based on the user's historical arrival time at the access control device or the company's working hours. Estimated time of arrival at the access control device;
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive at that day at the target time (for example, 10 minutes) before the estimated time.
  • the access control management method further includes: the cloud server determines the target distance between the user and the target access control device based on the user's real-time location information. ;
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
  • the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive that day.
  • the above delivery strategies can reduce the operating pressure of edge services and cloud servers, improve the recognition utilization rate of edge servers, and increase the recognition speed.
  • the step also includes:
  • the edge server determines whether the reference user information database includes reference user information that matches the access control collection information
  • the step of obtaining the user identification information to be verified corresponding to the access control collection information is entered;
  • the edge server's reference user information database does not include information that matches the access control collection information
  • the reference user information, and the access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes reference user information that matches the access control collection information; if the cloud server refers to the user information
  • the library includes reference user information that matches the access control collection information, and enters the step of obtaining the user identification information to be verified corresponding to the access control collection information.
  • the operation of comparing user information can basically be performed on the edge server, reducing the cost of the cloud server. pressure, reducing the length of the communication link between the access control device and the server, and improving the recognition response speed.
  • This embodiment of the present disclosure also provides a verification server 150, including:
  • the first receiving module 151 is used to receive and save pre-registration information sent by the user's mobile application.
  • the pre-registration information includes screenshots, and the screenshots include at least one of the following: health information screenshots and itinerary information screenshots;
  • the second receiving module 152 is used to receive the user identification information to be verified sent by the access control system
  • the query module 153 is used to query whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified;
  • the first verification module 154 is used to verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements if the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, and obtain Validation results;
  • the control module 155 is used to generate access control information according to the verification result and send it to the access control device.
  • the first verification module 154 is used to identify the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result, where the image recognition result includes at least one of the following: health Information status and itinerary information status; verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements, and obtain the verification result.
  • the image recognition result further includes: user identification information;
  • the verification server 150 also includes:
  • the second verification module is used to verify whether the user identification information in the image recognition result matches the user identification information to be verified; if the user identification information in the image recognition result matches the user identification information to be verified, If the user identification information to be verified matches, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements; if the user identification information in the image recognition result matches the user identification information to be verified, If the user identification information to be verified does not match, a verification result containing alarm information is generated and sent to the access control device.
  • the first verification module 154 is used to obtain health information samples from multiple regions; and based on the health information samples from multiple regions, verify the pre-registration information corresponding to the user identification information to be verified. Screenshot for identification.
  • the pre-registration information also includes user identification information
  • the query module 153 is used to query whether the user identification information in the pre-registration information saved on the day has user identification information that matches the user identification information to be verified.
  • an embodiment of the present disclosure also provides an access control system 160, including:
  • the first acquisition module 161 is configured to obtain the user identification information to be verified corresponding to the access control collection information if the reference user information database includes reference user information that matches the access control collection information;
  • the sending module 162 is used to send the user identification information to be verified to the verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements;
  • the pre-registration information includes Screenshots, including at least one of the following: screenshots of health information and screenshots of itinerary information.
  • the access control system 160 includes a cloud server and at least two edge servers, each of the edge servers corresponding to at least one of the access control devices;
  • the above-mentioned first obtaining module 161 and sending module 162 may be provided in the meta-server.
  • the edge server is configured to receive the reference user information sent by the cloud server and save it in the reference user information database.
  • the cloud server is configured to receive the user's real-time location information sent by the user's mobile application; determine the target access control device closest to the user based on the user's real-time location information; and store the user's Send the reference user information to the edge server corresponding to the target access control device;
  • the cloud server is used to analyze the access control devices that the user has visited in history.
  • the access control device where the user is expected to arrive on that day ; and sending the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day.
  • the cloud server is used to analyze the estimated time that the user is expected to arrive at the access control equipment that day based on the user's historical arrival time at the access control equipment or the company's working hours; at the target time before the estimated time, the The saved reference user information of the user is sent to the edge server corresponding to the access control device that the user is expected to arrive on that day;
  • the cloud server is configured to determine the target distance between the user and the target access control device based on the user's real-time location information; when the target distance is less than a preset distance, the saved user The reference user information is sent to the edge server corresponding to the access control device that the user is expected to arrive on that day.
  • the edge server is used to determine whether the reference user information library includes reference user information that matches the access control collection information; if the reference user information library of the edge server includes reference user information that matches the access control collection information. Referring to the user information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information; if the reference user information database of the edge server does not include reference user information matching the access control collection information, the The access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes reference user information that matches the access control collection information; if the cloud server reference user information library includes reference user information that matches the access control collection information, If the information matches the reference user information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information.
  • This embodiment of the present disclosure also provides a verification server 170, which includes a processor 171, a memory 172, and a computer program stored on the memory 172 and executable on the processor 171.
  • the computer program is processed by the processor 171.
  • each process of the above-mentioned embodiment of the access control management method applied to the verification server is implemented, and the same technical effect can be achieved. To avoid duplication, it will not be described again here.
  • the embodiment of the present disclosure also provides an access control system 180, which includes a processor 181, a memory 182, and a computer program stored on the memory 182 and executable on the processor 181.
  • the computer program is processed by the processor 181.
  • 181 realizes each process of the above embodiment of the access control management method applied to the access control system when executed, and can achieve the same technical effect. To avoid duplication, it will not be repeated here. Repeat.
  • Embodiments of the present disclosure also provide a computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, each process of the above-mentioned access control management method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition.
  • the computer-readable storage medium is such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
  • the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation.
  • the technical solution of the present disclosure can be embodied in the form of a software product in essence or that contributes to the existing technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of the present disclosure.

Abstract

Provided in the present disclosure are an access control management method, a verification server, an access control system and a readable storage medium. The method comprises: receiving and storing pre-registration information, which is sent by a mobile terminal application of a user, wherein the pre-registration information comprises a screenshot, and the screenshot comprises at least one of the following: a health information screenshot and a travel information screenshot; receiving user identification information to be verified, which is sent by an access control system; querying whether pre-registration information stored on the current day comprises pre-registration information corresponding to said user identification information; if the pre-registration information stored on the current day comprises the pre-registration information corresponding to said user identification information, verifying whether the pre-registration information corresponding to said user identification information meets a requirement, and obtaining a verification result; and generating access control information according to the verification result, and sending the access control information to an access control device. In the present disclosure, it is not necessary to manually check health information and/or travel information in an onsite manner, and it can be ensured that the health information and/or the travel information is real and valid; in addition, the health information and/or the travel information is automatically verified on the basis of the access control system, thereby improving the access granting efficiency of the access control device.

Description

门禁管理方法、验证服务器、门禁系统及可读存储介质Access control management method, verification server, access control system and readable storage medium
相关申请的交叉引用Cross-references to related applications
本申请主张在2022年09月20日在中国提交的中国专利申请号No.202211142452.4的优先权,其全部内容通过引用包含于此。This application claims priority to Chinese Patent Application No. 202211142452.4 filed in China on September 20, 2022, the entire content of which is incorporated herein by reference.
技术领域Technical field
本公开实施例涉及计算机技术领域,尤其涉及一种门禁管理方法、验证服务器、门禁系统及可读存储介质。The embodiments of the present disclosure relate to the field of computer technology, and in particular, to an access control management method, a verification server, an access control system, and a readable storage medium.
背景技术Background technique
某些场景下,公司园区管理人员会在员工上班进入园区时,现场人工进行健康信息和/或行程信息检查,上班高峰时间段人员较多,现场进行健康信息和/或行程信息检查较为耗时,会造成大量人员聚集,通行效率极低;此外,现场人工检查健康信息和/或行程信息,难以保证健康信息和/或行程信息信息真实有效。In some scenarios, company park managers will manually check health information and/or itinerary information on-site when employees enter the park for work. There are many people during peak hours, and it is time-consuming to check health information and/or itinerary information on-site. , will cause a large number of people to gather, and the traffic efficiency is extremely low; in addition, manual on-site inspection of health information and/or itinerary information is difficult to ensure that the health information and/or itinerary information are authentic and effective.
发明内容Contents of the invention
本公开实施例提供一种门禁管理方法、验证服务器、门禁系统及可读存储介质,用于解决在某一些场所通过人工方式检查健康信息和/或行程信息的方式通行效率低,且难以保证检查结果真实有效的问题。Embodiments of the present disclosure provide an access control management method, a verification server, an access control system and a readable storage medium, which are used to solve the problem of low traffic efficiency and difficulty in ensuring the inspection by manually checking health information and/or itinerary information in certain places. Questions with real and valid results.
为了解决上述技术问题,本公开是这样实现的:In order to solve the above technical problems, the present disclosure is implemented as follows:
第一方面,本公开实施例提供了一种门禁管理方法,应用于验证服务器,包括:In a first aspect, an embodiment of the present disclosure provides a door access management method, which is applied to a verification server, including:
接收并保存用户的移动端应用发送的预登记信息,所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图;Receive and save pre-registration information sent by the user's mobile application, where the pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
接收门禁系统发送的待验证的用户标识信息;Receive user identification information to be verified sent by the access control system;
查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息; Check whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified;
若当天保存的预登记信息中包括所述待验证的用户标识信息对应的预登记信息,验证所述待验证的用户标识信息对应的预登记信息是否符合要求并得到验证结果;If the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtain a verification result;
根据所述验证结果生成门禁控制信息,并发送给门禁设备。Access control information is generated based on the verification results and sent to the access control device.
可选的,所述验证所述待验证的用户标识信息对应的预登记信息是否符合要求并得到验证结果包括:Optionally, the verification of whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtaining the verification result includes:
对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果,所述图像识别结果包括以下至少一项:健康信息状态和行程信息状态;Recognize the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result, and the image recognition result includes at least one of the following: health information status and itinerary information status;
验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,得到验证结果。Verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements, and obtain the verification result.
可选的,所述图像识别结果还包括:用户标识信息;Optionally, the image recognition result further includes: user identification information;
所验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,之前还包括:Whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meets the requirements, it also includes:
验证所述图像识别结果中的用户标识信息与所述待验证的用户标识信息是否匹配;Verify whether the user identification information in the image recognition result matches the user identification information to be verified;
若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息匹配,则进入验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求的步骤;If the user identification information in the image recognition result matches the user identification information to be verified, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements;
若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息不匹配,生成包含报警信息的验证结果并发送给门禁设备。If the user identification information in the image recognition result does not match the user identification information to be verified, a verification result containing alarm information is generated and sent to the access control device.
可选的,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果包括:Optionally, the image recognition result obtained by identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified includes:
获取多个地区的健康信息样本;Obtain a sample of health information from multiple regions;
根据所述多个地区的健康信息样本,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别。According to the health information samples of the multiple regions, the screenshot in the pre-registration information corresponding to the user identification information to be verified is identified.
可选的,所述预登记信息还包括用户标识信息;Optionally, the pre-registration information also includes user identification information;
所述查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息包括: Whether the pre-registration information saved on the day of query includes the pre-registration information corresponding to the user identification information to be verified includes:
查询当天保存的预登记信息中的用户标识信息中是否有与所述待验证的用户标识信息匹配的用户标识信息。Query whether there is user identification information matching the user identification information to be verified among the user identification information in the pre-registration information saved on the day.
第二方面,本公开实施例提供了一种门禁管理方法,应用于门禁系统,包括:In a second aspect, embodiments of the present disclosure provide an access control management method, which is applied to an access control system, including:
若参考用户信息库中包括与门禁设备采集的门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息;If the reference user information database includes reference user information that matches the access control collection information collected by the access control equipment, obtain the user identification information to be verified corresponding to the access control collection information;
将所述待验证的用户标识信息发送给验证服务器,以使得所述验证服务器验证所述待验证的用户标识信息对应的预登记信息是否符合要求;所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图。The user identification information to be verified is sent to a verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes a screenshot, and the screenshot includes At least one of the following: screenshots of health information and screenshots of itinerary information.
可选的,所述门禁系统包括云端服务器和至少两个边缘服务器,每个所述边缘服务器对应至少一个所述门禁设备,所述方法还包括:Optionally, the access control system includes a cloud server and at least two edge servers, each edge server corresponding to at least one of the access control devices, and the method further includes:
所述云端服务器向边缘服务器发送参考用户信息。The cloud server sends reference user information to the edge server.
可选的,所述云端服务器向边缘服务器发送参考用户信息,之前还包括:Optionally, the cloud server sends reference user information to the edge server, which also includes:
所述云端服务器接收用户的移动端应用发送的用户实时位置信息;The cloud server receives the user's real-time location information sent by the user's mobile application;
所述云端服务器根据所述用户实时位置信息,确定距离所述用户最近的目标门禁设备;The cloud server determines the target access control device closest to the user based on the user's real-time location information;
所述云端服务器将保存的所述用户的参考用户信息发送给所述目标门禁设备对应的边缘服务器;The cloud server sends the saved reference user information of the user to the edge server corresponding to the target access control device;
或者or
所述云端服务器根据用户历史到达的门禁设备,分析出所述用户当天预计到达的门禁设备;The cloud server analyzes the access control equipment that the user is expected to arrive on that day based on the access control equipment that the user has arrived at in history;
所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day.
可选的,所述方法还包括:Optionally, the method also includes:
所述云端服务器根据用户历史到达门禁设备的时间或者公司的上班时间,分析出所述用户当天预计到达门禁设备的预计时间;The cloud server analyzes the estimated time that the user is expected to arrive at the access control equipment that day based on the user's historical arrival time at the access control equipment or the company's working hours;
其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括: The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day, including:
所述云端服务器在所述预计时间前的目标时间,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器;The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive at that day at the target time before the estimated time;
或者or
所述云端服务器根据所述用户实时位置信息,确定所述用户与所述目标门禁设备的目标距离;The cloud server determines the target distance between the user and the target access control device based on the user's real-time location information;
其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括:Wherein, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
所述云端服务器在所述目标距离小于预设距离时,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。When the target distance is less than the preset distance, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive that day.
可选的,所述获取所述门禁采集信息对应的待验证的用户标识信息,之前还包括:Optionally, obtaining the user identification information to be verified corresponding to the access control collection information also includes:
所述边缘服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;The edge server determines whether the reference user information database includes reference user information matching the access control collected information;
若所述边缘服务器的参考用户信息库中包括所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤;If the reference user information database of the edge server includes reference user information matching the access control collection information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information;
若所述边缘服务器的参考用户信息库中不包括与所述门禁采集信息匹配的参考用户信息,将所述门禁采集信息发送给所述云端服务器;所述云端服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;若所述云端服务器参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤。If the reference user information library of the edge server does not include reference user information matching the access control collection information, the access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes Reference user information that matches the access control collection information; if the cloud server reference user information database includes reference user information that matches the access control collection information, access to obtain the user identification information to be verified corresponding to the access control collection information A step of.
第三方面,本公开实施例提供了一种验证服务器,包括:In a third aspect, embodiments of the present disclosure provide a verification server, including:
第一接收模块,用于接收并保存用户的移动端应用发送的预登记信息,所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图;The first receiving module is configured to receive and save pre-registration information sent by the user's mobile application, where the pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
第二接收模块,用于接收门禁系统发送的待验证的用户标识信息;The second receiving module is used to receive the user identification information to be verified sent by the access control system;
查询模块,用于查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息; A query module, used to query whether the pre-registration information saved on the day includes pre-registration information corresponding to the user identification information to be verified;
第一验证模块,用于若当天保存的预登记信息中包括所述待验证的用户标识信息对应的预登记信息,验证所述待验证的用户标识信息对应的预登记信息是否符合要求,得到验证结果;The first verification module is used to verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and is verified if the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified. result;
控制模块,用于根据所述验证结果生成门禁控制信息,并发送给门禁设备。A control module, configured to generate access control information based on the verification results and send it to the access control device.
第四方面,本公开实施例提供了一种门禁系统,包括:In a fourth aspect, embodiments of the present disclosure provide an access control system, including:
第一获取模块,用于若参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息;The first acquisition module is used to obtain the user identification information to be verified corresponding to the access control collection information if the reference user information database includes reference user information that matches the access control collection information;
发送模块,用于将所述待验证的用户标识信息发送给验证服务器,以使得所述验证服务器验证所述待验证的用户标识信息对应的预登记信息是否符合要求;所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图。A sending module, configured to send the user identification information to be verified to a verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes screenshots , the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information.
第五方面,本公开实施例提供了一种验证服务器,包括:处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序,所述程序被所述处理器执行时实现如上述第一方面所述的门禁管理方法的步骤。In a fifth aspect, an embodiment of the present disclosure provides a verification server, including: a processor, a memory, and a program stored on the memory and executable on the processor. When the program is executed by the processor The steps of implementing the access control management method described in the first aspect above.
第六方面,本公开实施例提供了一种门禁系统,包括:处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序,所述程序被所述处理器执行时实现如上述第二方面所述的门禁管理方法的步骤。In the sixth aspect, an embodiment of the present disclosure provides an access control system, comprising: a processor, a memory, and a program stored in the memory and executable on the processor, wherein when the program is executed by the processor, the steps of the access control management method as described in the second aspect above are implemented.
第七方面,本公开实施例提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上述第一方面所述的门禁管理方法的步骤;或者,所述计算机程序被处理器执行时实现如上述第二方面所述的门禁管理方法的步骤。In a seventh aspect, embodiments of the present disclosure provide a computer-readable storage medium. A computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the access control as described in the first aspect is implemented. The steps of the management method; or, when the computer program is executed by the processor, the steps of the access control management method as described in the second aspect are implemented.
在本公开实施例中,用户(例如公司员工)在进入具有门禁设备的特定场所(如办公楼、园区等)之前,可预先通过移动端应用向验证服务器发送包含健康信息截图和/或行程信息截图的预登记信息,用户在达到门禁设备时,门禁系统可以向验证服务器发送待验证的用户标识信息,验证服务器查询当天保存的预登记信息中是否包括待验证的用户标识信息对应的预登记信息,如果包括,则验证待验证的用户标识信息对应的健康信息截图和/或行程信息截图是否符合要求,根据验证结果生成门禁控制信息发送给门禁设备,以允 许或不允许用户通过门禁设备。该种方式,不需要人工现场进行健康信息和/或行程信息检查,通过验证服务器验证健康信息和/或行程信息,可以保证健康信息和/或行程信息信息真实有效,同时,结合门禁系统自动验证健康信息和/或行程信息,提高了验证效率和门禁设备的通行效率。In this embodiment of the present disclosure, users (such as company employees) can send screenshots containing health information and/or itinerary information to the verification server through the mobile application in advance before entering a specific place with access control equipment (such as an office building, a park, etc.) Screenshot of the pre-registration information. When the user reaches the access control device, the access control system can send the user identification information to be verified to the verification server. The verification server queries whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified. , if included, verify whether the health information screenshots and/or itinerary information screenshots corresponding to the user identification information to be verified meet the requirements, and generate access control information based on the verification results and send it to the access control device to allow Allow or disallow users to pass through the access control device. This method does not require manual on-site inspection of health information and/or itinerary information. The verification server verifies the health information and/or itinerary information, which can ensure that the health information and/or itinerary information is authentic and valid. At the same time, it is automatically verified in combination with the access control system. Health information and/or itinerary information improves verification efficiency and access control equipment passing efficiency.
附图说明Description of drawings
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本公开的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are for the purpose of illustrating preferred embodiments only and are not to be considered limiting of the disclosure. Also throughout the drawings, the same reference characters are used to designate the same components. In the attached picture:
图1为本公开实施例的门禁管理方法的流程示意图之一;Figure 1 is one of the schematic flow diagrams of the access control management method according to an embodiment of the present disclosure;
图2为本公开一实施例的移动端应用获取并发送健康信息和/或行程信息截图的流程示意图;Figure 2 is a schematic flowchart of a mobile application obtaining and sending screenshots of health information and/or itinerary information according to an embodiment of the present disclosure;
图3为本公开另一实施例的移动端应用获取并发送健康信息和/或行程信息截图的流程示意图;Figure 3 is a schematic flowchart of a mobile application obtaining and sending screenshots of health information and/or itinerary information according to another embodiment of the present disclosure;
图4为本公开实施例应用的系统的整体流程示意图之一;Figure 4 is one of the overall flow diagrams of the system applied in the embodiment of the present disclosure;
图5为本公开实施例应用的系统的整体流程示意图之二;Figure 5 is the second schematic diagram of the overall flow of the system applied in the embodiment of the present disclosure;
图6为本公开实施例的健康信息样本的管理方法示意图;Figure 6 is a schematic diagram of a health information sample management method according to an embodiment of the present disclosure;
图7为本公开实施例的通过加密方式传输预登记信息的示意图;Figure 7 is a schematic diagram of transmitting pre-registration information in an encrypted manner according to an embodiment of the present disclosure;
图8为本公开实施例的加密报文的格式示意图;Figure 8 is a schematic diagram of the format of an encrypted message according to an embodiment of the present disclosure;
图9为本公开实施例的门禁管理方法的流程示意图之二;Figure 9 is a second schematic flowchart of the access control management method according to the embodiment of the present disclosure;
图10为本公开实施例的门禁管理系统的结构示意图;Figure 10 is a schematic structural diagram of an access control management system according to an embodiment of the present disclosure;
图11为本公开实施例的参考用户信息的输入方法示意图;Figure 11 is a schematic diagram of an input method of reference user information according to an embodiment of the present disclosure;
图12为本公开一实施例的参考用户信息的分发策略的流程示意图;Figure 12 is a schematic flowchart of a distribution strategy for reference user information according to an embodiment of the present disclosure;
图13为本公开另一实施例的参考用户信息的分发策略的流程示意图;Figure 13 is a schematic flowchart of a distribution strategy for reference user information according to another embodiment of the present disclosure;
图14为本公开又一实施例的参考用户信息的分发策略的流程示意图;Figure 14 is a schematic flowchart of a distribution strategy for reference user information according to yet another embodiment of the present disclosure;
图15为本公开实施例的验证服务器的结构示意图之一;Figure 15 is one of the structural schematic diagrams of the verification server according to an embodiment of the present disclosure;
图16为本公开实施例的门禁系统的结构示意图之一;Figure 16 is one of the structural schematic diagrams of the access control system according to the embodiment of the present disclosure;
图17为本公开实施例的验证服务器的结构示意图之二; Figure 17 is the second structural schematic diagram of the verification server according to the embodiment of the present disclosure;
图18为本公开实施例的门禁系统的结构示意图之二。Figure 18 is the second structural schematic diagram of the access control system according to the embodiment of the present disclosure.
具体实施方式Detailed ways
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, rather than all of the embodiments. Based on the embodiments in this disclosure, all other embodiments obtained by those of ordinary skill in the art without making creative efforts fall within the scope of protection of this disclosure.
在现有技术中,出于安全角度考虑,不同的园区有不同的进出规定,园区通行需要人工核验员工的防疫信息等信息是否合规,造成了大量的重复工作量且效率低。In the existing technology, for safety reasons, different parks have different entry and exit regulations. Park access requires manual verification of employee epidemic prevention information and other information to see whether they are compliant, resulting in a large amount of duplication of work and low efficiency.
请参考图1,本公开实施例提供一种门禁管理方法,应用于验证服务器,包括:Please refer to Figure 1. An embodiment of the present disclosure provides an access control management method, which is applied to a verification server, including:
步骤11:接收并保存用户的移动端应用发送的预登记信息,所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图;Step 11: Receive and save the pre-registration information sent by the user's mobile application. The pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
本公开实施例中,请参考图2,用户(例如公司员工等)如需进入特定场所(如办公楼、园区等),可以预先(例如在当天上班路上)通过移动端应用(如手机APP,也可以称为移动APP或移动端APP)对健康信息和/或行程信息截图,并通过移动端应用将包含健康信息截图和/或行程信息截图的预登记信息发送到验证服务器。图2中所举的健康信息的例子中,是需要进行扫码登记的健康信息,需要了解的是,有些健康信息并不需要扫码登记,直接点击确认指令截图即可。In this disclosed embodiment, please refer to Figure 2. If a user (such as a company employee, etc.) needs to enter a specific place (such as an office building, a park, etc.), he or she can use a mobile application (such as a mobile APP) in advance (such as on the way to work that day). It can also be called a mobile APP or mobile APP) screenshots the health information and/or itinerary information, and sends the pre-registration information containing the screenshots of the health information and/or the itinerary information to the verification server through the mobile application. The example of health information shown in Figure 2 is health information that needs to be scanned and registered. It should be understood that some health information does not need to be scanned and registered. Just click on the confirmation command to take a screenshot.
本公开实施例中,采用移动端应用直接对健康信息和/或行程信息截图并上传至验证服务器,没有修改截图的入口,可以减少人为干预,保证健康信息和/或行程信息截图不被篡改。In this disclosed embodiment, a mobile application is used to directly take screenshots of health information and/or itinerary information and upload them to the verification server. There is no entrance to modify the screenshots, which can reduce human intervention and ensure that screenshots of health information and/or itinerary information are not tampered with.
当然,在本公开的其他一些实施例中,请参考图3,用户也可以采用其他应用软件(如手机的系统截图指令)对健康信息和/或行程信息截图,并上传到移动端应用,由移动端应用上传到验证服务器。图3中的物联网平台即上述验证服务器。Of course, in some other embodiments of the present disclosure, please refer to Figure 3. The user can also use other application software (such as the system screenshot command of the mobile phone) to take a screenshot of the health information and/or itinerary information, and upload it to the mobile application. The mobile application is uploaded to the verification server. The IoT platform in Figure 3 is the above-mentioned verification server.
步骤12:接收门禁系统发送的待验证的用户标识信息; Step 12: Receive the user identification information to be verified sent by the access control system;
所述待验证的用户标识信息例如包括用户的名字、工号和/或手机号码等。The user identification information to be verified includes, for example, the user's name, job number, and/or mobile phone number.
请参考图4和图5,用户到达门禁设备(也可以称为门禁闸机设备),门禁设备检测到门禁采集信息(例如人脸或门禁卡信息等)之后,可以直接识别门禁采集信息(例如进行人脸识别)并将门禁采集信息与预先保存的参考用户信息比对,或者将门禁采集信息发送给门禁系统由门禁系统进行识别和比对,由门禁系统识别对比时,门禁系统可以判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息,如果是,说明该用户是合法用户,则获取所述门禁采集信息对应的待验证的用户标识信息(例如用户的名字、工号和/或手机号码等,即图中的员工信息),并发送给验证服务器(即图中的物联网(IoT)平台),以验证该用户的健康信息和/或行程信息是否符合要求。如果参考用户信息库中不包括与所述门禁采集信息匹配的参考用户信息,则说明该用户不是合法用户,可以直接向门禁设备发送报警信息。Please refer to Figure 4 and Figure 5. When the user reaches the access control device (which can also be called the access control gate device), after the access control device detects the access control collection information (such as face or access card information, etc.), it can directly identify the access control collection information (such as Face recognition) and compare the access control collection information with the pre-saved reference user information, or send the access control collection information to the access control system for identification and comparison. When the access control system identifies and compares, the access control system can determine the reference Whether the user information database includes reference user information that matches the access control collection information. If so, it means that the user is a legal user, and then the user identification information to be verified corresponding to the access control collection information (such as the user's name, job title, etc.) is obtained. and/or mobile phone number, etc., i.e., the employee information in the figure), and sent to the verification server (i.e., the Internet of Things (IoT) platform in the figure) to verify whether the user's health information and/or itinerary information meets the requirements. If the reference user information database does not include reference user information that matches the access control collection information, it means that the user is not a legal user and can directly send alarm information to the access control device.
在本公开实施例中,门禁设备和门禁系统可以集成在同一设备中,也可以分开设置。门禁设备主要执行采集门禁采集信息的作用(例如采集人脸,采集门禁卡信息),门禁设备还可以识别采集的门禁采集信息,当然,也可以由门禁系统识别,门禁系统还执行根据识别后的门禁采集信息,确定待验证的用户标识信息的作用。In the embodiment of the present disclosure, the access control device and the access control system can be integrated in the same device, or they can be set up separately. The access control equipment mainly performs the function of collecting access control information (such as collecting faces and collecting access card information). The access control equipment can also identify the collected access control information. Of course, it can also be identified by the access control system. The access control system also performs the following tasks based on the identification: The access control collects information and determines the role of the user identification information to be verified.
步骤13:查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息;Step 13: Check whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified;
若当天保存的预登记信息中不包括所述待验证的用户标识信息对应的预登记信息,说明用户未上传其预登记信息,此时验证服务器可以向门禁系统发送报警信息。If the pre-registration information saved on the day does not include the pre-registration information corresponding to the user identification information to be verified, it means that the user has not uploaded his pre-registration information. At this time, the verification server can send alarm information to the access control system.
由于健康信息和行程信息都要求实时性,因而,预登记信息均为当天上传,并可在指定时间删除,例如,当天24点删除。Since both health information and itinerary information require real-time performance, pre-registration information is uploaded on the same day and can be deleted at a designated time, for example, at 24:00 on the same day.
步骤14:若当天保存的预登记信息中包括所述待验证的用户标识信息对应的预登记信息,验证所述待验证的用户标识信息对应的预登记信息是否符合要求并得到验证结果;Step 14: If the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtain the verification result;
本发明实施例中的健康信息和/或行程信息是否符合要求,可以是指健康信息状态和/或行程信息状态是否符合特定场所(如园区)的规定。 Whether the health information and/or itinerary information meets the requirements in the embodiment of the present invention may refer to whether the health information status and/or the itinerary information status meets the regulations of a specific place (such as a park).
步骤15:根据所述验证结果生成门禁控制信息,并发送给门禁设备。Step 15: Generate access control information based on the verification results and send it to the access control device.
例如,如果所述待验证的用户标识信息对应的预登记信息正常,则可以生成第一门禁控制信息,用于控制门禁设备开门,如果所述待验证的用户标识信息对应的预登记信息不正常,则可以生成第二门禁控制信息,用于控制门禁设备报警。For example, if the pre-registration information corresponding to the user identification information to be verified is normal, the first access control information can be generated to control the access control device to open the door. If the pre-registration information corresponding to the user identification information to be verified is not normal , then the second access control information can be generated to control the alarm of the access control equipment.
在本公开实施例中,用户(例如公司员工)在进入具有门禁设备的特定场所(如办公楼、园区等)之前,可预先通过移动端应用向验证服务器发送包含健康信息截图和/或行程信息截图的预登记信息,用户在达到门禁设备时,门禁系统可以向验证服务器发送待验证的用户标识信息,验证服务器查询当天保存的预登记信息中是否包括待验证的用户标识信息对应的预登记信息,如果包括,则验证待验证的用户标识信息对应的健康信息截图和/或行程信息截图是否符合要求,根据验证结果生成门禁控制信息发送给门禁设备,以允许或不允许用户通过门禁设备。该种方式,不需要人工现场进行健康信息和/或行程信息检查,通过验证服务器验证健康信息和/或行程信息,可以保证健康信息和/或行程信息信息真实有效,同时,结合门禁系统自动验证健康信息和/或行程信息信息,提高了验证效率和门禁设备的通行效率。In this embodiment of the present disclosure, users (such as company employees) can send screenshots containing health information and/or itinerary information to the verification server through the mobile application in advance before entering a specific place with access control equipment (such as an office building, a park, etc.) Screenshot of the pre-registration information. When the user reaches the access control device, the access control system can send the user identification information to be verified to the verification server. The verification server queries whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified. , if included, verify whether the health information screenshots and/or itinerary information screenshots corresponding to the user identification information to be verified meet the requirements, and generate access control information based on the verification results and send it to the access control device to allow or disallow the user to pass through the access control device. This method does not require manual on-site inspection of health information and/or itinerary information. The verification server verifies the health information and/or itinerary information, which can ensure that the health information and/or itinerary information is authentic and valid. At the same time, it is automatically verified in combination with the access control system. Health information and/or itinerary information improves the verification efficiency and the passage efficiency of access control equipment.
本公开实施例中,可选的,所述验证所述待验证的用户标识信息对应的预登记信息是否符合要求并得到验证结果包括:In this disclosed embodiment, optionally, verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtaining the verification result includes:
步骤141:对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果,所述图像识别结果包括以下至少一项:健康信息状态和行程信息状态;Step 141: Recognize the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result. The image recognition result includes at least one of the following: health information status and itinerary information status;
本公开实施例中,请参考图4和图5,可以采用OCR(Optical Character Recognition,光学字符识别)识别系统(或称为OCR系统),对预登记信息中的截图进行识别,得到图像识别结果,例如,截图为健康信息截图时,所述健康信息状态可以包括以下至少一项:健康信息的颜色、更新时间、健康检测结果等。截图为行程信息截图时,行程信息状态可以包括以下至少一项:更新时间、7天内到达或途经地点等。In this disclosed embodiment, please refer to Figures 4 and 5. An OCR (Optical Character Recognition, optical character recognition) recognition system (or OCR system) can be used to identify the screenshots in the pre-registration information and obtain the image recognition result. , for example, when the screenshot is a screenshot of health information, the health information status may include at least one of the following: the color of the health information, update time, health detection results, etc. When the screenshot is a screenshot of itinerary information, the itinerary information status can include at least one of the following: update time, location reached or passed within 7 days, etc.
本公开实施例中,可选的,所述OCR识别系统可以安装在验证服务器上,也可以单独设置。 In the embodiment of the present disclosure, optionally, the OCR recognition system can be installed on the verification server, or can be set up separately.
步骤142:验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,得到验证结果。Step 142: Verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements, and obtain the verification result.
本公开实施例中,可选的,所述图像识别结果还包括:用户标识信息;例如截图为健康信息截图时,图像识别结果中的用户标识信息可以包括:用户姓名等。截图为行程信息截图时,图像识别结果中的用户标识信息可以包括:用户手机后四位等。In this embodiment of the present disclosure, optionally, the image recognition result also includes: user identification information; for example, when the screenshot is a screenshot of health information, the user identification information in the image recognition result may include: user name, etc. When the screenshot is a screenshot of itinerary information, the user identification information in the image recognition result may include: the last four digits of the user's mobile phone, etc.
可选的,所验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,之前还包括:Optionally, verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meets the requirements also includes:
验证所述图像识别结果中的用户标识信息与所述待验证的用户标识信息是否匹配;Verify whether the user identification information in the image recognition result matches the user identification information to be verified;
若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息匹配,则进入验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求的步骤;If the user identification information in the image recognition result matches the user identification information to be verified, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements;
若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息不匹配,生成包含报警信息的验证结果并发送给门禁设备。If the user identification information in the image recognition result does not match the user identification information to be verified, a verification result containing alarm information is generated and sent to the access control device.
也就是说,先验证识别出的图像识别结果中的用户标识信息(用户姓名、手机号等)是否与待验证的用户标识信息(用户姓名、手机号等)是否匹配,若匹配,说明该健康信息截图和/或行程信息截图是该待验证的用户的截图,在验证该用户的健康信息状态和/或行程信息状态是否符合要求。That is to say, first verify whether the user identification information (user name, mobile phone number, etc.) in the recognized image recognition result matches the user identification information to be verified (user name, mobile phone number, etc.). If they match, it means that the health Information screenshots and/or itinerary information screenshots are screenshots of the user to be verified to verify whether the user's health information status and/or itinerary information status meets the requirements.
本公开实施例中,可选的,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果包括:In this embodiment of the present disclosure, optionally, the image recognition result obtained by identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified includes:
步骤1411:获取多个地区的健康信息样本;Step 1411: Obtain health information samples from multiple regions;
步骤1412:根据所述多个地区的健康信息样本,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别。Step 1412: Identify the screenshots in the pre-registration information corresponding to the user identification information to be verified based on the health information samples of the multiple regions.
也就是说,请参考图6,可以预先存储多个地区的健康信息样本,根据预先存储的多个地区的健康信息样本,对预登记信息中的截图进行识别,从而可支持跨地区人员健康信息校验,解决因跨地区健康信息不能同步问题。本公开实施例中,可以通过服务端管理系统WEB对健康信息样本进行管理,例如添加、删除、更新等。 In other words, please refer to Figure 6. Health information samples from multiple regions can be stored in advance. Screenshots in the pre-registration information can be identified based on the pre-stored health information samples from multiple regions, thus supporting cross-regional personnel health information. Verification to solve the problem of cross-regional health information not being synchronized. In the embodiment of the present disclosure, health information samples can be managed through the server management system WEB, such as adding, deleting, updating, etc.
本公开实施例中,可选的,请参考图3,所述预登记信息还包括用户标识信息(即图3中的员工信息,如工号、手机号等);例如,用户的移动端可以将预先保存的或用户输入的用户标识信息(例如工号、手机号等)和截图一起发送给验证服务器;验证服务器建立用户标识信息和截图的关联索引,并保存用户标识信息和截图。In this disclosed embodiment, optionally, please refer to Figure 3. The pre-registration information also includes user identification information (i.e. employee information in Figure 3, such as work number, mobile phone number, etc.); for example, the user's mobile terminal can Send the pre-saved or user-entered user identification information (such as work number, mobile phone number, etc.) and screenshots to the verification server; the verification server establishes an associated index of the user identification information and screenshots, and saves the user identification information and screenshots.
此时,可选的,所述查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息包括:查询当天保存的预登记信息中的用户标识信息中是否有与所述待验证的用户标识信息匹配的用户标识信息。也就是说,在查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息时,可以通过用户标识信息查询。At this time, optionally, the query whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified includes: querying whether the user identification information in the pre-registration information saved on the day contains the same The user identification information to be verified matches the user identification information. That is to say, when querying whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, the user identification information can be used to query.
当然,也不排除在其他一些实施例中,移动端应用也可以不上报用户标识信息,仅上报截图,此时,验证服务器可以预先对截图进行识别,获取截图中的用户标识信息,从而便于查询。Of course, it is not excluded that in other embodiments, the mobile application may not report user identification information, but only report screenshots. In this case, the verification server may identify the screenshots in advance and obtain the user identification information in the screenshots, thereby facilitating query .
本公开实施例中,可选的,用户通过移动端应用上报预登记信息时,还可以同时上报预计到达时间,即预计到达预设场所的时间,所述验证服务器保存该预计到达时间,当接收门禁系统发送的待验证的用户标识信息时,可以首先判断接收门禁系统发送的待验证的用户标识信息的接收时间是否在预计到达时间之内,如果在所述预设到达时间之内,再执行后续的步骤(即查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息),否则会向门禁系统发送报警信息。In the embodiments of the present disclosure, optionally, when the user reports the pre-registration information through the mobile application, the user may also report the expected arrival time at the same time, that is, the expected arrival time at the preset place. The verification server saves the expected arrival time. When receiving the user identification information to be verified sent by the access control system, it can first determine whether the reception time of the user identification information to be verified sent by the access control system is within the expected arrival time. If it is within the preset arrival time, execute the subsequent steps (that is, query whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified), otherwise an alarm message will be sent to the access control system.
本公开实施例中,可选的,请参考图7,所述验证服务器接收的预登记信息可以是移动端应用采用加密方式上传的预登记信息,从而保证数据不可篡改及数据的完整性。In this disclosed embodiment, optionally, please refer to Figure 7. The pre-registration information received by the verification server may be pre-registration information uploaded by the mobile application in an encrypted manner, thereby ensuring that the data cannot be tampered with and the integrity of the data is ensured.
请参考图8,图8为本公开实施例中的移动端应用发送的加密的消息报文的格式示意图,该消息报文包括5部分,第一部分可以是1字节(byte),用于指示加密方式,第二部分可以是1字节,用于指示加密版本,第三部分为6字节,为保留字节,第四部分为4字节,用于指示消息报文的长度,第五部分为N字节,用于携带加密的消息体。Please refer to Figure 8. Figure 8 is a schematic diagram of the format of an encrypted message message sent by a mobile application in an embodiment of the present disclosure. The message message includes 5 parts. The first part may be 1 byte (byte) and is used to indicate Encryption method, the second part can be 1 byte, used to indicate the encryption version, the third part is 6 bytes, reserved bytes, the fourth part is 4 bytes, used to indicate the length of the message message, the fifth part is The part is N bytes and is used to carry the encrypted message body.
请参考表1,表1为加密后的消息报文各部分的说明。 Please refer to Table 1, which describes each part of the encrypted message.
表1
Table 1
请参考图9,本公开实施例还提供一种门禁管理方法,应用于门禁系统,所述方法包括:Referring to Figure 9, an embodiment of the present disclosure also provides an access control management method, which is applied to the access control system. The method includes:
步骤91:若参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息;Step 91: If the reference user information database includes reference user information that matches the access control collection information, obtain the user identification information to be verified corresponding to the access control collection information;
步骤92:将所述待验证的用户标识信息发送给验证服务器,以使得所述验证服务器验证所述待验证的用户标识信息对应的预登记信息是否符合要求;所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图。Step 92: Send the user identification information to be verified to the verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes screenshots, so The screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information.
本公开实施例中,参考用户信息库用于存储预先录入的参考用户信息。In the embodiment of the present disclosure, the reference user information database is used to store pre-entered reference user information.
本公开实施例中,门禁采集信息可以为人脸或门禁卡信息等。若门禁采集信息为人脸,则参考用户信息库中则包括预先录入的用户的人脸信息。In this disclosed embodiment, the access control collection information may be face or access control card information, etc. If the information collected by the access control is a face, the reference user information database includes the pre-entered face information of the user.
本公开实施例中,可选的,若参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息,之前还包括:In this disclosed embodiment, optionally, if the reference user information database includes reference user information that matches the access control collection information, obtaining the user identification information to be verified corresponding to the access control collection information also includes:
步骤901:获取门禁设备发送的门禁采集信息;Step 901: Obtain the access control collection information sent by the access control device;
步骤902:判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息。Step 902: Determine whether the reference user information database includes reference user information that matches the access control collection information.
在本公开实施例中,门禁设备和门禁系统可以集成在同一设备中,也可以分开设置。门禁设备主要执行采集门禁采集信息的作用(例如采集人脸,采集门禁卡信息)。本公开实施例中,门禁设备将采集到的门禁采集信息发送给门禁系统,由门禁系统判断参考用户信息库中是否包括与所述门禁采集信 息匹配的参考用户信息。当然,在本公开的其他一些实施例中,也可以由门禁设备判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息。In the embodiment of the present disclosure, the access control device and the access control system can be integrated in the same device, or they can be set up separately. The access control equipment mainly performs the function of collecting access control information (such as collecting faces and collecting access card information). In this disclosed embodiment, the access control device sends the collected access control collection information to the access control system, and the access control system determines whether the reference user information database includes the access control collection information. Reference user information matching the information. Of course, in some other embodiments of the present disclosure, the access control device may also determine whether the reference user information database includes reference user information that matches the access control collection information.
针对一些大的特定场所,例如公司园区,一般会有多个入口,每个入口均可以设置门禁设备,而参考用户信息库一般存储于云端服务器,门禁设备与远端的云端服务器通信路径较长,降低了识别速度。For some large specific places, such as company campuses, there are usually multiple entrances, and access control equipment can be set up at each entrance. The reference user information database is generally stored in the cloud server, and the communication path between the access control equipment and the remote cloud server is long. , reducing the recognition speed.
为解决上述问题,在本公开实施例中,请参考图10,可选的,所述门禁系统包括云端服务器和至少两个边缘服务器,每个所述边缘服务器对应至少一个所述门禁设备,所述边缘服务器可以设置在靠近门禁设备的位置,或者,与门禁设备集成在一个设备中。To solve the above problems, in an embodiment of the present disclosure, please refer to Figure 10. Optionally, the access control system includes a cloud server and at least two edge servers, each of the edge servers corresponds to at least one access control device, and the edge server can be set at a location close to the access control device, or integrated with the access control device in one device.
所述方法还包括:所述云端服务器向边缘服务器发送参考用户信息。也就是说,请参考图11,云端服务器获取参考用户信息(如人脸信息),并将参考用户信息发送给边缘服务器,从而边缘服务器可以直接比对参考用户信息和门禁采集信息,门禁设备不需要与云端服务器通信,直接和边缘服务器通信即可,通信路径缩短,提高了通信速度,提高了识别速度,缓解了云端服务器压力。也就是说,上述步骤901和步骤902、步骤91和92均可以由边缘服务器执行。The method further includes: the cloud server sending reference user information to the edge server. In other words, please refer to Figure 11. The cloud server obtains the reference user information (such as face information) and sends the reference user information to the edge server, so that the edge server can directly compare the reference user information and the access control collection information. The access control device does not If you need to communicate with the cloud server, you can communicate directly with the edge server. The communication path is shortened, the communication speed is improved, the recognition speed is improved, and the pressure on the cloud server is relieved. That is to say, the above steps 901 and 902, and steps 91 and 92 can all be executed by the edge server.
现有技术中门禁系统使用的云端服务器(盒子)规格都在:CPU采用8核16线程,内存为8G以上,硬盘为500G以上,满足此类的云端服务器(盒子)价格较高。本公开实施例中,在近门禁设备端放置边缘服务器,边缘服务器为物理上靠近门禁设备侧部署的物理机器,可看成是与门禁设备直连的服务器。当用户(如公司员工)入门进行人脸识别(或者指纹识别或刷卡识别)时,门禁设备通过边缘服务器进行人脸比对(或者指纹比对或卡信息比对),如果边缘服务器中不存在对应的人脸(或指纹或卡信息),则再到云端服务器进行人脸比对(或者指纹比对或卡信息比对),边缘服务器中的数据库数据量小,可以定期更新,例如每日更新,边缘服务器靠近门禁设备,可以提高人脸识别速度;同时对边缘服务器的要求存储规格不高,能够降低成本。The specifications of cloud servers (boxes) used in access control systems in the existing technology are: CPU with 8 cores and 16 threads, memory of more than 8G, and hard disk of more than 500G. Cloud servers (boxes) that meet this type of requirements are relatively expensive. In this disclosed embodiment, an edge server is placed near the access control device. The edge server is a physical machine deployed physically close to the access control device and can be regarded as a server directly connected to the access control device. When a user (such as a company employee) enters the house for face recognition (or fingerprint recognition or card swiping recognition), the access control device performs face comparison (or fingerprint comparison or card information comparison) through the edge server. If it does not exist in the edge server The corresponding face (or fingerprint or card information) will then go to the cloud server for face comparison (or fingerprint comparison or card information comparison). The database data in the edge server is small and can be updated regularly, such as daily. Update, the edge server is close to the access control device, which can improve the speed of face recognition; at the same time, the storage specifications required for the edge server are not high, which can reduce costs.
本公开实施例中,云端服务器可以基于多种策略,将用户的参考用户信息下发到对应的边缘服务器,下面举例进行说明。 In this disclosed embodiment, the cloud server can deliver the user's reference user information to the corresponding edge server based on a variety of policies. Examples are given below to illustrate.
在本公开的一些实施例中,可选的,请参考图10和图12,所述云端服务器向边缘服务器发送参考用户信息,之前还包括:In some embodiments of the present disclosure, optionally, please refer to Figures 10 and 12. The cloud server sends reference user information to the edge server, which also includes:
所述云端服务器接收用户的移动端应用(APP)发送的用户实时位置信息;The cloud server receives the user's real-time location information sent by the user's mobile application (APP);
所述云端服务器根据所述用户实时位置信息,确定距离所述用户最近的目标门禁设备;The cloud server determines the target access control device closest to the user based on the user's real-time location information;
所述云端服务器将保存的所述用户的参考用户信息发送给所述目标门禁设备对应的边缘服务器。The cloud server sends the saved reference user information of the user to the edge server corresponding to the target access control device.
在本公开的一些实施例中,可选的,所述云端服务器向边缘服务器发送参考用户信息,之前还包括:In some embodiments of the present disclosure, optionally, the cloud server sends reference user information to the edge server, before which the following steps are also included:
所述云端服务器根据用户历史到达的门禁设备,分析出所述用户当天预计到达的门禁设备;The cloud server analyzes the access control equipment that the user is expected to arrive on that day based on the access control equipment that the user has arrived at in history;
所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day.
本公开的一些实施例中,可选的,请参考图13,所述门禁管理方法还包括:所述云端服务器根据用户历史到达门禁设备的时间,分析出所述用户当天预计到达门禁设备的预计时间;In some embodiments of the present disclosure, optionally, please refer to Figure 13. The access control management method also includes: the cloud server analyzes the user's expected arrival time at the access control device on the day based on the user's historical arrival time at the access control device. time;
其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括:The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day, including:
所述云端服务器在所述预计时间前的目标时间(例如10分钟),将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive at that day at the target time (for example, 10 minutes) before the estimated time.
本公开实施例中,用户当天预计到达门禁设备的预计时间例如可以采用如下方式计算:
用户当天预计到达门禁设备的预计时间=Y*10%+(M1+M2)/2*20%+
(W1+W2+W3)/3*30%+(D1+D2+D3+D4+D5+D6+D7)/7*70%。
In the embodiment of the present disclosure, the estimated time that the user is expected to arrive at the access control device that day can be calculated, for example, in the following way:
The estimated time the user is expected to arrive at the access control device on the day = Y*10%+(M1+M2)/2*20%+
(W1+W2+W3)/3*30%+(D1+D2+D3+D4+D5+D6+D7)/7*70%.
其中,Y为去年同一日期到达门禁设备的时间,M1和M2分别为上两个月同一日到达门禁设备的时间,W1,W2,W3分别为上三星期同一星期几到达门禁设备的时间,D1,D2,D3,D4,D5,D6,D7分别为前七天到达门禁设备的时间。 Among them, Y is the time to arrive at the access control equipment on the same day last year, M1 and M2 are the time to arrive at the access control equipment on the same day in the last two months respectively, W1, W2, and W3 are respectively the time to arrive at the access control equipment on the same day of the week in the last three weeks, D1 ,D2,D3,D4,D5,D6,D7 are respectively the time to arrive at the access control equipment in the previous seven days.
上述10%、20%、30%、70%为权重,可以根据需要设置其数值。The above 10%, 20%, 30%, and 70% are weights, and their values can be set as needed.
当然,用户当天预计到达门禁设备的预计时间的计算方法并不限于此,例如也可以仅根据前七天到达门禁设备的时间计算。Of course, the method for calculating the estimated time of arrival of the user at the access control device on the day is not limited thereto, and for example, it may be calculated based only on the time of arrival at the access control device seven days before.
本公开的一些实施例中,可选的,请参考图14,所述门禁管理方法还包括:所述云端服务器根据用户历史到达门禁设备的时间或者公司的上班时间,分析出所述用户当天预计到达门禁设备的预计时间;In some embodiments of the present disclosure, optionally, please refer to Figure 14. The access control management method also includes: the cloud server analyzes the user's expected time of the day based on the user's historical arrival time at the access control device or the company's working hours. Estimated time of arrival at the access control device;
其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括:Wherein, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
所述云端服务器在所述预计时间前的目标时间(例如10分钟),将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive at that day at the target time (for example, 10 minutes) before the estimated time.
本公开的一些实施例中,可选的,请参考图12,所述门禁管理方法还包括:所述云端服务器根据所述用户实时位置信息,确定所述用户与所述目标门禁设备的目标距离;In some embodiments of the present disclosure, optionally, please refer to Figure 12. The access control management method further includes: the cloud server determines the target distance between the user and the target access control device based on the user's real-time location information. ;
其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括:Wherein, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
所述云端服务器在所述目标距离小于预设距离(如100米)时,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。When the target distance is less than a preset distance (such as 100 meters), the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive that day.
通过以上下发策略可以减少边缘服务及云服务器的运行压力,提高边缘服务器识别利用率,提高识别速度。The above delivery strategies can reduce the operating pressure of edge services and cloud servers, improve the recognition utilization rate of edge servers, and increase the recognition speed.
本公开实施例中,可选的,所述获取所述门禁采集信息对应的待验证的用户标识信息之前还包括:In the embodiment of the present disclosure, optionally, before obtaining the user identification information to be verified corresponding to the access control collection information, the step also includes:
所述边缘服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;The edge server determines whether the reference user information database includes reference user information that matches the access control collection information;
若所述边缘服务器的参考用户信息库中包括所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤;If the reference user information database of the edge server includes the reference user information that matches the access control collection information, the step of obtaining the user identification information to be verified corresponding to the access control collection information is entered;
若所述边缘服务器的参考用户信息库中不包括与所述门禁采集信息匹配 的参考用户信息,将所述门禁采集信息发送给所述云端服务器;所述云端服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;若所述云端服务器参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤。If the edge server's reference user information database does not include information that matches the access control collection information The reference user information, and the access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes reference user information that matches the access control collection information; if the cloud server refers to the user information The library includes reference user information that matches the access control collection information, and enters the step of obtaining the user identification information to be verified corresponding to the access control collection information.
本申请的上述实施例中,通过在门禁设备侧加入边缘服务器,通过预设下发策略云端服务器下发参考用户信息,基本可将用户信息比对的操作在边缘服务器进行,降低了云端服务器的压力,缩小了门禁设备和服务器通信链路长度,提高了识别响应速度。In the above-mentioned embodiments of the present application, by adding an edge server to the access control device side and using the preset delivery policy cloud server to deliver reference user information, the operation of comparing user information can basically be performed on the edge server, reducing the cost of the cloud server. pressure, reducing the length of the communication link between the access control device and the server, and improving the recognition response speed.
请参考图15,本公开实施例还提供一种验证服务器150,包括:Please refer to Figure 15. This embodiment of the present disclosure also provides a verification server 150, including:
第一接收模块151,用于接收并保存用户的移动端应用发送的预登记信息,所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图;The first receiving module 151 is used to receive and save pre-registration information sent by the user's mobile application. The pre-registration information includes screenshots, and the screenshots include at least one of the following: health information screenshots and itinerary information screenshots;
第二接收模块152,用于接收门禁系统发送的待验证的用户标识信息;The second receiving module 152 is used to receive the user identification information to be verified sent by the access control system;
查询模块153,用于查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息;The query module 153 is used to query whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified;
第一验证模块154,用于若当天保存的预登记信息中包括所述待验证的用户标识信息对应的预登记信息,验证所述待验证的用户标识信息对应的预登记信息是否符合要求,得到验证结果;The first verification module 154 is used to verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements if the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, and obtain Validation results;
控制模块155,用于根据所述验证结果生成门禁控制信息,并发送给门禁设备。The control module 155 is used to generate access control information according to the verification result and send it to the access control device.
可选的,所述第一验证模块154,用于对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果,所述图像识别结果包括以下至少一项:健康信息状态和行程信息状态;验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,得到验证结果。Optionally, the first verification module 154 is used to identify the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result, where the image recognition result includes at least one of the following: health Information status and itinerary information status; verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements, and obtain the verification result.
可选的,所述图像识别结果还包括:用户标识信息;Optionally, the image recognition result further includes: user identification information;
所述验证服务器150还包括:The verification server 150 also includes:
第二验证模块,用于验证所述图像识别结果中的用户标识信息与所述待验证的用户标识信息是否匹配;若所述图像识别结果中的用户标识信息与所 述待验证的用户标识信息匹配,则进入验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求的步骤;若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息不匹配,生成包含报警信息的验证结果并发送给门禁设备。The second verification module is used to verify whether the user identification information in the image recognition result matches the user identification information to be verified; if the user identification information in the image recognition result matches the user identification information to be verified, If the user identification information to be verified matches, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements; if the user identification information in the image recognition result matches the user identification information to be verified, If the user identification information to be verified does not match, a verification result containing alarm information is generated and sent to the access control device.
可选的,所述第一验证模块154,用于获取多个地区的健康信息样本;根据所述多个地区的健康信息样本,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别。Optionally, the first verification module 154 is used to obtain health information samples from multiple regions; and based on the health information samples from multiple regions, verify the pre-registration information corresponding to the user identification information to be verified. Screenshot for identification.
可选的,所述预登记信息还包括用户标识信息;Optionally, the pre-registration information also includes user identification information;
所述查询模块153,用于查询当天保存的预登记信息中的用户标识信息中是否有与所述待验证的用户标识信息匹配的用户标识信息。The query module 153 is used to query whether the user identification information in the pre-registration information saved on the day has user identification information that matches the user identification information to be verified.
请参考图16,本公开实施例还提供一种门禁系统160,包括:Referring to Figure 16, an embodiment of the present disclosure also provides an access control system 160, including:
第一获取模块161,用于若参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息;The first acquisition module 161 is configured to obtain the user identification information to be verified corresponding to the access control collection information if the reference user information database includes reference user information that matches the access control collection information;
发送模块162,用于将所述待验证的用户标识信息发送给验证服务器,以使得所述验证服务器验证所述待验证的用户标识信息对应的预登记信息是否符合要求;所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图。The sending module 162 is used to send the user identification information to be verified to the verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes Screenshots, including at least one of the following: screenshots of health information and screenshots of itinerary information.
可选的,所述门禁系统160包括云端服务器和至少两个边缘服务器,每个所述边缘服务器对应至少一个所述门禁设备;Optionally, the access control system 160 includes a cloud server and at least two edge servers, each of the edge servers corresponding to at least one of the access control devices;
可选的,上述第一获取模块161和发送模块162可以设置于所述便是元服务器中。Optionally, the above-mentioned first obtaining module 161 and sending module 162 may be provided in the meta-server.
可选的,所述边缘服务器,用于接收云端服务器发送的参考用户信息并保存到参考用户信息库中。Optionally, the edge server is configured to receive the reference user information sent by the cloud server and save it in the reference user information database.
可选的,所述云端服务器,用于接收用户的移动端应用发送的用户实时位置信息;根据所述用户实时位置信息,确定距离所述用户最近的目标门禁设备;将保存的所述用户的参考用户信息发送给所述目标门禁设备对应的边缘服务器;Optionally, the cloud server is configured to receive the user's real-time location information sent by the user's mobile application; determine the target access control device closest to the user based on the user's real-time location information; and store the user's Send the reference user information to the edge server corresponding to the target access control device;
或者or
可选的,所述云端服务器,用于根据用户历史到达的门禁设备,分析出 所述用户当天预计到达的门禁设备;将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。Optionally, the cloud server is used to analyze the access control devices that the user has visited in history. The access control device where the user is expected to arrive on that day; and sending the saved reference user information of the user to the edge server corresponding to the access control device where the user is expected to arrive on that day.
可选的,所述云端服务器,用于根据用户历史到达门禁设备的时间或者公司的上班时间,分析出所述用户当天预计到达门禁设备的预计时间;在所述预计时间前的目标时间,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器;Optionally, the cloud server is used to analyze the estimated time that the user is expected to arrive at the access control equipment that day based on the user's historical arrival time at the access control equipment or the company's working hours; at the target time before the estimated time, the The saved reference user information of the user is sent to the edge server corresponding to the access control device that the user is expected to arrive on that day;
或者or
可选的,所述云端服务器,用于根据所述用户实时位置信息,确定所述用户与所述目标门禁设备的目标距离;在所述目标距离小于预设距离时,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。Optionally, the cloud server is configured to determine the target distance between the user and the target access control device based on the user's real-time location information; when the target distance is less than a preset distance, the saved user The reference user information is sent to the edge server corresponding to the access control device that the user is expected to arrive on that day.
可选的,所述边缘服务器,用于判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;若所述边缘服务器的参考用户信息库中包括所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤;若所述边缘服务器的参考用户信息库中不包括与所述门禁采集信息匹配的参考用户信息,将所述门禁采集信息发送给所述云端服务器;所述云端服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;若所述云端服务器参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤。Optionally, the edge server is used to determine whether the reference user information library includes reference user information that matches the access control collection information; if the reference user information library of the edge server includes reference user information that matches the access control collection information. Referring to the user information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information; if the reference user information database of the edge server does not include reference user information matching the access control collection information, the The access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes reference user information that matches the access control collection information; if the cloud server reference user information library includes reference user information that matches the access control collection information, If the information matches the reference user information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information.
请参考图17,本公开实施例还提供一种验证服务器170,包括处理器171,存储器172,存储在存储器172上并可在所述处理器171上运行的计算机程序,该计算机程序被处理器171执行时实现上述应用于验证服务器的门禁管理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Please refer to Figure 17. This embodiment of the present disclosure also provides a verification server 170, which includes a processor 171, a memory 172, and a computer program stored on the memory 172 and executable on the processor 171. The computer program is processed by the processor 171. When 171 is executed, each process of the above-mentioned embodiment of the access control management method applied to the verification server is implemented, and the same technical effect can be achieved. To avoid duplication, it will not be described again here.
请参考图18,本公开实施例还提供一种门禁系统180,包括处理器181,存储器182,存储在存储器182上并可在所述处理器181上运行的计算机程序,该计算机程序被处理器181执行时实现上述应用于门禁系统的门禁管理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再 赘述。Please refer to Figure 18. The embodiment of the present disclosure also provides an access control system 180, which includes a processor 181, a memory 182, and a computer program stored on the memory 182 and executable on the processor 181. The computer program is processed by the processor 181. 181 realizes each process of the above embodiment of the access control management method applied to the access control system when executed, and can achieve the same technical effect. To avoid duplication, it will not be repeated here. Repeat.
本公开实施例还提供一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现上述门禁管理方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。Embodiments of the present disclosure also provide a computer-readable storage medium. A computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, each process of the above-mentioned access control management method embodiment is implemented, and the same can be achieved. The technical effects will not be repeated here to avoid repetition. Among them, the computer-readable storage medium is such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, in this document, the terms "comprising", "comprises" or any other variations thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or device that includes a series of elements not only includes those elements, It also includes other elements not expressly listed or inherent in the process, method, article or apparatus. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article or apparatus that includes that element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation. Based on this understanding, the technical solution of the present disclosure can be embodied in the form of a software product in essence or that contributes to the existing technology. The computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, air conditioner, or network device, etc.) to execute the methods described in various embodiments of the present disclosure.
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。 The embodiments of the present disclosure have been described above in conjunction with the accompanying drawings. However, the present disclosure is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Inspired by this disclosure, many forms can be made without departing from the purpose of this disclosure and the scope protected by the claims, all of which fall within the protection of this disclosure.

Claims (15)

  1. 一种门禁管理方法,应用于验证服务器,其特征在于,包括:An access control management method, applied to a verification server, is characterized by including:
    接收并保存用户的移动端应用发送的预登记信息,所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图;Receive and save pre-registration information sent by the user's mobile application, where the pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
    接收门禁系统发送的待验证的用户标识信息;Receive user identification information to be verified sent by the access control system;
    查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息;Check whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified;
    若当天保存的预登记信息中包括所述待验证的用户标识信息对应的预登记信息,验证所述待验证的用户标识信息对应的预登记信息是否符合要求并得到验证结果;If the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified, verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtain the verification result;
    根据所述验证结果生成门禁控制信息,并发送给门禁设备。Access control information is generated based on the verification results and sent to the access control device.
  2. 根据权利要求1所述的方法,其特征在于,所述验证所述待验证的用户标识信息对应的预登记信息是否符合要求并得到验证结果包括:The method according to claim 1, characterized in that, verifying whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and obtaining the verification result includes:
    对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果,所述图像识别结果包括以下至少一项:健康信息状态和行程信息状态;Recognize the screenshot in the pre-registration information corresponding to the user identification information to be verified to obtain an image recognition result, and the image recognition result includes at least one of the following: health information status and itinerary information status;
    验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,得到验证结果。Verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements, and obtain the verification result.
  3. 根据权利要求2所述的方法,其特征在于,The method according to claim 2, characterized in that
    所述图像识别结果还包括:用户标识信息;The image recognition result also includes: user identification information;
    所验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求,之前还包括:Verify whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meets the requirements, which also includes:
    验证所述图像识别结果中的用户标识信息与所述待验证的用户标识信息是否匹配;Verify whether the user identification information in the image recognition result matches the user identification information to be verified;
    若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息匹配,则进入验证所述待验证的用户标识信息对应的健康信息状态和/或行程信息状态是否符合要求的步骤;If the user identification information in the image recognition result matches the user identification information to be verified, then enter the step of verifying whether the health information status and/or itinerary information status corresponding to the user identification information to be verified meet the requirements;
    若所述图像识别结果中的用户标识信息与所述待验证的用户标识信息不 匹配,生成包含报警信息的验证结果并发送给门禁设备。If the user identification information in the image recognition result is different from the user identification information to be verified, Match, generate a verification result containing alarm information and send it to the access control device.
  4. 根据权利要求2所述的方法,其特征在于,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别得到图像识别结果包括:The method according to claim 2, wherein the image recognition result obtained by identifying the screenshot in the pre-registration information corresponding to the user identification information to be verified includes:
    获取多个地区的健康信息样本;Obtain a sample of health information from multiple regions;
    根据所述多个地区的健康信息样本,对所述待验证的用户标识信息对应的预登记信息中的截图进行识别。According to the health information samples of the multiple regions, the screenshot in the pre-registration information corresponding to the user identification information to be verified is identified.
  5. 根据权利要求1所述的方法,其特征在于,The method according to claim 1, characterized in that:
    所述预登记信息还包括用户标识信息;The pre-registration information also includes user identification information;
    所述查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息包括:The query of whether the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified includes:
    查询当天保存的预登记信息中的用户标识信息中是否有与所述待验证的用户标识信息匹配的用户标识信息。Query whether there is user identification information matching the user identification information to be verified among the user identification information in the pre-registration information saved on the day.
  6. 一种门禁管理方法,应用于门禁系统,其特征在于,包括:An access control management method, applied to an access control system, is characterized by including:
    若参考用户信息库中包括与门禁设备采集的门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息;If the reference user information database includes reference user information that matches the access control collection information collected by the access control equipment, obtain the user identification information to be verified corresponding to the access control collection information;
    将所述待验证的用户标识信息发送给验证服务器,以使得所述验证服务器验证所述待验证的用户标识信息对应的预登记信息是否符合要求;所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图。The user identification information to be verified is sent to the verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes a screenshot, and the screenshot includes At least one of the following: screenshots of health information and screenshots of itinerary information.
  7. 根据权利要求6所述的方法,其特征在于,所述门禁系统包括云端服务器和至少两个边缘服务器,每个所述边缘服务器对应至少一个所述门禁设备,所述方法还包括:The method of claim 6, wherein the access control system includes a cloud server and at least two edge servers, each edge server corresponding to at least one access control device, and the method further includes:
    所述云端服务器向边缘服务器发送参考用户信息。The cloud server sends reference user information to the edge server.
  8. 根据权利要求7所述的方法,其特征在于,所述云端服务器向边缘服务器发送参考用户信息,之前还包括:The method according to claim 7, characterized in that, before the cloud server sends reference user information to the edge server, it also includes:
    所述云端服务器接收用户的移动端应用发送的用户实时位置信息;The cloud server receives the user's real-time location information sent by the user's mobile application;
    所述云端服务器根据所述用户实时位置信息,确定距离所述用户最近的目标门禁设备;The cloud server determines the target access control device closest to the user based on the user's real-time location information;
    所述云端服务器将保存的所述用户的参考用户信息发送给所述目标门禁 设备对应的边缘服务器;The cloud server sends the saved reference user information of the user to the target access control The edge server corresponding to the device;
    或者or
    所述云端服务器根据用户历史到达的门禁设备,分析出所述用户当天预计到达的门禁设备;The cloud server analyzes the access control equipment that the user is expected to arrive on that day based on the access control equipment that the user has arrived at in history;
    所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。The cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day.
  9. 根据权利要求8所述的方法,其特征在于,The method according to claim 8, characterized in that
    所述方法还包括:The method also includes:
    所述云端服务器根据用户历史到达门禁设备的时间或者公司的上班时间,分析出所述用户当天预计到达门禁设备的预计时间;The cloud server analyzes the estimated time the user is expected to arrive at the access control equipment that day based on the user's historical arrival time at the access control equipment or the company's working hours;
    其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括:所述云端服务器在所述预计时间前的目标时间,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器;Wherein, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including: the cloud server sends the saved reference user information at the target time before the expected time. The user's reference user information is sent to the edge server corresponding to the access control device that the user is expected to arrive that day;
    或者or
    所述方法还包括:The method also includes:
    所述云端服务器根据所述用户实时位置信息,确定所述用户与所述目标门禁设备的目标距离;The cloud server determines the target distance between the user and the target access control device based on the user's real-time location information;
    其中,所述云端服务器将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器包括:Wherein, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive on that day, including:
    所述云端服务器在所述目标距离小于预设距离时,将保存的所述用户的参考用户信息发送给所述用户当天预计到达的门禁设备对应的边缘服务器。When the target distance is less than the preset distance, the cloud server sends the saved reference user information of the user to the edge server corresponding to the access control device that the user is expected to arrive that day.
  10. 根据权利要求7所述的方法,其特征在于,所述获取所述门禁采集信息对应的待验证的用户标识信息,之前还包括:The method according to claim 7, characterized in that said obtaining the user identification information to be verified corresponding to the access control collection information further includes:
    所述边缘服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;The edge server determines whether the reference user information database includes reference user information that matches the access control collection information;
    若所述边缘服务器的参考用户信息库中包括所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤; If the reference user information database of the edge server includes reference user information matching the access control collection information, enter the step of obtaining the user identification information to be verified corresponding to the access control collection information;
    若所述边缘服务器的参考用户信息库中不包括与所述门禁采集信息匹配的参考用户信息,将所述门禁采集信息发送给所述云端服务器;所述云端服务器判断参考用户信息库中是否包括与所述门禁采集信息匹配的参考用户信息;若所述云端服务器参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,进入获取所述门禁采集信息对应的待验证的用户标识信息的步骤。If the reference user information library of the edge server does not include reference user information matching the access control collection information, the access control collection information is sent to the cloud server; the cloud server determines whether the reference user information library includes Reference user information that matches the access control collection information; if the cloud server reference user information database includes reference user information that matches the access control collection information, access to obtain the user identification information to be verified corresponding to the access control collection information A step of.
  11. 一种验证服务器,其特征在于,包括:A verification server, characterized by including:
    第一接收模块,用于接收并保存用户的移动端应用发送的预登记信息,所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图;The first receiving module is configured to receive and save pre-registration information sent by the user's mobile application, where the pre-registration information includes screenshots, and the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information;
    第二接收模块,用于接收门禁系统发送的待验证的用户标识信息;The second receiving module is used to receive the user identification information to be verified sent by the access control system;
    查询模块,用于查询当天保存的预登记信息中是否包括所述待验证的用户标识信息对应的预登记信息;A query module, used to query whether the pre-registration information saved on the day includes pre-registration information corresponding to the user identification information to be verified;
    第一验证模块,用于若当天保存的预登记信息中包括所述待验证的用户标识信息对应的预登记信息,验证所述待验证的用户标识信息对应的预登记信息是否符合要求,得到验证结果;The first verification module is used to verify whether the pre-registration information corresponding to the user identification information to be verified meets the requirements and is verified if the pre-registration information saved on the day includes the pre-registration information corresponding to the user identification information to be verified. result;
    控制模块,用于根据所述验证结果生成门禁控制信息,并发送给门禁设备。A control module, configured to generate access control information based on the verification results and send it to the access control device.
  12. 一种门禁系统,其特征在于,包括:An access control system, characterized by including:
    第一获取模块,用于若参考用户信息库中包括与所述门禁采集信息匹配的参考用户信息,获取所述门禁采集信息对应的待验证的用户标识信息;The first acquisition module is used to obtain the user identification information to be verified corresponding to the access control collection information if the reference user information database includes reference user information that matches the access control collection information;
    发送模块,用于将所述待验证的用户标识信息发送给验证服务器,以使得所述验证服务器验证所述待验证的用户标识信息对应的预登记信息是否符合要求;所述预登记信息包括截图,所述截图包括以下至少一项:健康信息截图和行程信息截图。A sending module, configured to send the user identification information to be verified to a verification server, so that the verification server verifies whether the pre-registration information corresponding to the user identification information to be verified meets the requirements; the pre-registration information includes screenshots , the screenshots include at least one of the following: screenshots of health information and screenshots of itinerary information.
  13. 一种验证服务器,其特征在于,包括:处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序,所述程序被所述处理器执行时实现如权利要求1至5中任一项所述的门禁管理方法的步骤。 A verification server, characterized in that it includes: a processor, a memory, and a program stored in the memory and executable on the processor, wherein when the program is executed by the processor, the steps of the access control management method as described in any one of claims 1 to 5 are implemented.
  14. 一种门禁系统,其特征在于,包括:处理器、存储器及存储在所述存储器上并可在所述处理器上运行的程序,所述程序被所述处理器执行时实现如权利要求6至10中任一项所述的门禁管理方法的步骤。An access control system, characterized in that it includes: a processor, a memory, and a program stored on the memory and executable on the processor. When the program is executed by the processor, it implements claims 6 to The steps of the access control management method described in any one of 10.
  15. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至5中任一项所述的门禁管理方法的步骤;或者,所述计算机程序被处理器执行时实现如权利要求6至10中任一项所述的门禁管理方法的步骤。 A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the access control management method as described in any one of claims 1 to 5 are implemented; or, when the computer program is executed by a processor, the steps of the access control management method as described in any one of claims 6 to 10 are implemented.
PCT/CN2023/112533 2022-09-20 2023-08-11 Access control management method, verification server, access control system and readable storage medium WO2024060872A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211142452.4A CN115578815A (en) 2022-09-20 2022-09-20 Access control management method, authentication server, access control system and readable storage medium
CN202211142452.4 2022-09-20

Publications (1)

Publication Number Publication Date
WO2024060872A1 true WO2024060872A1 (en) 2024-03-28

Family

ID=84581795

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/112533 WO2024060872A1 (en) 2022-09-20 2023-08-11 Access control management method, verification server, access control system and readable storage medium

Country Status (2)

Country Link
CN (1) CN115578815A (en)
WO (1) WO2024060872A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115578815A (en) * 2022-09-20 2023-01-06 京东方科技集团股份有限公司 Access control management method, authentication server, access control system and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112133008A (en) * 2020-08-11 2020-12-25 浙江大华技术股份有限公司 Park pedestrian identification method and system and computer equipment
CN112767586A (en) * 2020-12-31 2021-05-07 深圳市商汤科技有限公司 Passage detection method and device, electronic equipment and computer readable storage medium
CN113538763A (en) * 2021-06-09 2021-10-22 青岛海信智慧生活科技股份有限公司 Entrance guard opening method, intelligent terminal and server
CN114299653A (en) * 2021-12-31 2022-04-08 上海商汤信息科技有限公司 Identity authentication method, device, system and storage medium
US20220270423A1 (en) * 2021-02-20 2022-08-25 Alan Mark Gelfand Identity-based enablement of event access control
CN115019428A (en) * 2022-06-24 2022-09-06 杭州海康威视数字技术股份有限公司 Passage management method and device based on place codes
CN115578815A (en) * 2022-09-20 2023-01-06 京东方科技集团股份有限公司 Access control management method, authentication server, access control system and readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112133008A (en) * 2020-08-11 2020-12-25 浙江大华技术股份有限公司 Park pedestrian identification method and system and computer equipment
CN112767586A (en) * 2020-12-31 2021-05-07 深圳市商汤科技有限公司 Passage detection method and device, electronic equipment and computer readable storage medium
US20220270423A1 (en) * 2021-02-20 2022-08-25 Alan Mark Gelfand Identity-based enablement of event access control
CN113538763A (en) * 2021-06-09 2021-10-22 青岛海信智慧生活科技股份有限公司 Entrance guard opening method, intelligent terminal and server
CN114299653A (en) * 2021-12-31 2022-04-08 上海商汤信息科技有限公司 Identity authentication method, device, system and storage medium
CN115019428A (en) * 2022-06-24 2022-09-06 杭州海康威视数字技术股份有限公司 Passage management method and device based on place codes
CN115578815A (en) * 2022-09-20 2023-01-06 京东方科技集团股份有限公司 Access control management method, authentication server, access control system and readable storage medium

Also Published As

Publication number Publication date
CN115578815A (en) 2023-01-06

Similar Documents

Publication Publication Date Title
WO2024060872A1 (en) Access control management method, verification server, access control system and readable storage medium
CN109243040B (en) Access control passing management method, device, equipment and storage medium
WO2021012904A1 (en) Data updating method and related device
CN111259803A (en) Campus visitor management system based on face recognition
CN105138985A (en) Real-name authentication method based on WeChat public number and system
US20170270602A1 (en) Object manager
CN113519014A (en) Gate opening/closing control device and gate opening/closing control method
CN112307444A (en) Role creation method, role creation device, computer equipment and storage medium
CN113490936A (en) Face authentication device and face authentication method
CN112907801A (en) Access control management method and device, electronic equipment and storage medium
CN114826946A (en) Unauthorized access interface detection method, device, equipment and storage medium
US10013237B2 (en) Automated approval
US20220255917A1 (en) Multi-Computer Processing System for Dynamically Evaluating and Controlling Authenticated Credentials
CN110442466B (en) Method, device, computer equipment and storage medium for preventing repeated access request
CN116881878A (en) Project data analysis management system
CN115577983A (en) Enterprise task matching method based on block chain, server and storage medium
KR102213022B1 (en) Dispatched Personnel Management System and method
CN114549221A (en) Vehicle accident loss processing method and device, computer equipment and storage medium
CN107679191B (en) Identification method, platform, equipment and system for labourious debarkation of labor employment
CN112183781A (en) Authentication method and device for elevator maintenance personnel, computer equipment and storage medium
CN112184531A (en) Method and system for realizing intelligent and non-inductive pushing of office work
CN110889763A (en) Financial management system based on big data
CN113508389A (en) Face authentication registration device and face authentication registration method
TW202026911A (en) System and method for voice control iot device
CN116229596B (en) Intelligent attendance system based on block chain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23867166

Country of ref document: EP

Kind code of ref document: A1