CN109242424A - Method, apparatus and system are managed on a kind of visitor information line - Google Patents
Method, apparatus and system are managed on a kind of visitor information line Download PDFInfo
- Publication number
- CN109242424A CN109242424A CN201810980086.7A CN201810980086A CN109242424A CN 109242424 A CN109242424 A CN 109242424A CN 201810980086 A CN201810980086 A CN 201810980086A CN 109242424 A CN109242424 A CN 109242424A
- Authority
- CN
- China
- Prior art keywords
- visitor
- information
- data
- verification information
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Data Mining & Analysis (AREA)
- Human Computer Interaction (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
Method, apparatus and system are managed on a kind of visitor information line provided by the invention, this method is applied to local visitor's host, comprising: receive visitor's data information of visitor, and according to visitor's data information, generate the first verification information;First verification information is sent to visitor's platform, so that first verification information is pushed to the first client positioned at the visitor side by visitor's platform, so that the visitor obtains first verification information;It receives the visitor and addressing machine or the identity data of the first client typing is passed through according to first verification information;According to visitor's data information, the guest levels of the visitor are determined;It is that the identity data is distributed for the access authority by access control equipment according to the guest levels.The present invention is confirmed by the access level to visitor and is distributed with different access authority to distinguish the visitor of management different stage, while improving enterprise security manager level.
Description
Technical field
The present invention relates to current security technology area, in particular to managing method, apparatus on a kind of visitor information line
And system.
Background technique
With the rapid development of social economy, the information interchange between enterprise and enterprise and business associate are also increasingly frequent,
And it would generally be carried out during cooperation and exchange in the form visited.But at present since there is corresponding gate inhibition in each enterprise
Specification, to prevent any entrance of nonnative personnel.And the method for passing through gate inhibition is usually all to carry out visitor's letter by the security personnel on doorway
Then the registration of breath is confirmed by phone and interviewed people, then provides corresponding access card or number plate.Visiting for part is advanced
VIP visitor also needs Security Personnel to carry out accompanying entrance in certain nucleus of Entry Firm, and very influence visitor's is visiting
Impression.
Current managing caller mode is required to the third party under the line except respondent and audits and guide, and cannot be distinguished
Different guest levels cause advanced visitor in visiting enterprise by larger limitation.
Summary of the invention
In view of this, a kind of being designed to provide on visitor information line for the embodiment of the present invention manages method, apparatus and is
System is solved by receiving visitor's data information on line, and to visitor's allocation of access rights to distinguish the different visitors of management
Advanced visitor in visiting enterprise by larger limitation the problem of.
The embodiment of the present invention is achieved in that
Management method on a kind of visitor information line is applied to local visitor's host, comprising: receive visitor's data of visitor
Information, and according to visitor's data information, generate the first verification information;First verification information is sent to visitor to put down
Platform, so that first verification information is pushed to the first client positioned at the visitor side by visitor's platform, so that
The visitor obtains first verification information;Receive the visitor according to first verification information by addressing machine or
The identity data of the first client typing;According to visitor's data information, the guest levels of the visitor are determined;Root
It is that the identity data is distributed for the access authority by access control equipment according to the guest levels.
Preferably, the identity data includes below one or more: identity card data;Finger print data;Human face data.
Preferably, when including default access time in visitor's data information, the first verifying letter is generated described
After breath, further includes: receive the second verification information that the access control equipment is sent, wherein second verification information is described
The verification information that visitor is inputted by the access control equipment;Judge to receive second verification information time whether with it is described
Default access time matches and whether second verification information matches with first verification information, obtains one and sentences
Disconnected result;According to the judging result, the control instruction for controlling the access control equipment switch is generated.
Preferably, after the control instruction generated for controlling the access control equipment switch, further includes: according to institute
State the access result that control instruction obtains the visitor;The access result is synchronized to visitor's platform.
Preferably, the visitor's data information for receiving visitor includes: that reception is external by local visitor's host
Input equipment input visitor's data information.
Preferably, the visitor's data information for receiving visitor, and according to visitor's data information, it generates first and tests
The step of demonstrate,proving information, comprising: receive visitor's data information that first client is sent;Visitor's data information is sent
To visitor's platform, so that visitor's data information is pushed to the second client of respondent side by visitor's platform;
Wherein, second client is for generating for the access confirmation information for whether agreeing to the Accessor Access to be characterized;When connecing
Receive that visitor's platform issues by second client generate for characterizing the access for agreeing to the Accessor Access
When confirmation message, according to visitor's data information, first verification information is generated.
Preferably, the visitor's data information for receiving visitor includes: the second client transmission for receiving respondent side
Visitor's data information.
Preferably, visitor's platform is wechat public platform.
Managing device on a kind of visitor information line, comprising: the first verification information generation module, for receiving the visit of visitor
Objective data information, and according to visitor's data information, generate the first verification information;First verification information sending module, is used for
First verification information is sent to visitor's platform, is located at so that first verification information is pushed to by visitor's platform
First client of the visitor side, so that the visitor obtains first verification information;Identity data receiving module,
Addressing machine or the identity number of the first client typing are passed through according to first verification information for receiving the visitor
According to;Guest levels confirmation module, for determining the guest levels of the visitor according to visitor's data information;Access right
Distribution module is limited, for being that the identity data is distributed for the access authority by access control equipment according to the guest levels.
Management system on a kind of visitor information line the system comprises local visitor's host, visitor's platform, is located at visitor
The first client and addressing machine of side;Local visitor's host is used to receive visitor's data information of visitor, and according to institute
Visitor's data information is stated, the first verification information is generated;Local visitor's host is also used to send first verification information
Give visitor's platform;First verification information is pushed to institute for receiving first verification information by visitor's platform
The first client is stated, so that the visitor obtains first verification information;First client is for receiving the visit
The identity data received is sent to local visitor master according to the identity data of the first verification information typing by the person of asking
Machine;The addressing machine will be received for receiving the visitor according to the identity data of the first verification information typing
Identity data be sent to local visitor's host;Local visitor's host is also used to receive first client or the visit
Ask the identity data that machine is sent;Local visitor's host is also used to determine the visitor according to visitor's data information
Guest levels;Local visitor's host is also used to be that the identity data is distributed for passing through door according to the guest levels
Prohibit the access authority of equipment.
Compared with prior art, method, apparatus and system are managed on a kind of visitor information line of the embodiment of the present invention, wherein
This method generates the first verification information by receiving visitor's data information of visitor.Then first verification information is sent out
Visitor's platform is given, the first verification information is pushed to by the first client by visitor's platform, to inform visitor, is realized on line
Interaction;Then, then the identity data that visitor tests information by guest machine or the first client typing according to first is received, guaranteed
First verification information and identity data correspond, and identity is avoided to falsely use.Finally by visitor's data information to visitor's
Guest levels are confirmed, and are distributed for the identity data for the access authority by access control equipment according to guest levels,
Different visitor's data (i.e. different guest levels) can be achieved and match different access authority, reach the mesh for distinguishing different visitors
's.Therefore, the present invention solves the third party under the line that managing caller mode is required to except respondent in the prior art and examines
The problem of core and guidance, cannot be distinguished different guest levels, cause advanced visitor in visiting enterprise by larger limitation.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate
Appended attached drawing, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the access control system using management method and system on visitor information line that present pre-ferred embodiments provide
Structural schematic diagram.
The method flow diagram of management method on the visitor information line that Fig. 2 provides for first embodiment of the invention.
Fig. 3 is the specific steps flow chart of step S10 in Fig. 2.
The functional block diagram of managing device on the visitor information line that Fig. 4 provides for second embodiment of the invention.
Icon: 100- access control system;The local 11- visitor's host;12- visitor's platform;13- guest machine;The first client of 14-
End;The second client of 15-;16- access control equipment;Managing device on 300- visitor information line;The first verification information of 301- generates mould
Block;302- the first verification information sending module;303- identity data receiving module;304- guest levels confirmation module;305- is visited
Ask authority distribution module.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
The present invention provides a kind of application scenarios, is not construed as limiting to protection scope of the present invention, specific as follows:
As shown in Figure 1, being a kind of access control system 100 that present pre-ferred embodiments provide.Wherein, visitor of the invention letter
Management method and system can be applied in local visitor's host 11 of the access control system 100 on breath line.
Specifically, the access control system 100 includes: local visitor's host 11, visitor's platform 12, the 13, first visitor of guest machine
Family end 14, the second client 15, access control equipment 16.The local visitor host 11 simultaneously with the access control equipment 16, the visit
Passenger plane 13, wechat public platform communication connection.First client 14, second client 15 with the wechat
Public platform communication connection.Communication connection indicates that data communication or interaction can be carried out between the two.
Wherein, local visitor's host 11 is network server, database server etc..It can be wrapped in local visitor's host 11
It includes: memory, storage control, processor, Peripheral Interface, input-output unit, audio unit, display unit etc..It is described to deposit
Each element of reservoir, storage control, processor, Peripheral Interface, input-output unit, audio unit, display unit is mutual
It is directly or indirectly electrically connected, to realize the transmission or interaction of data.For example, these elements between each other can by one or
A plurality of communication bus or signal wire, which are realized, to be electrically connected.It includes at least one that method/system is managed on the visitor information line
Described local visitor's host 11 can be stored in the memory or is solidificated in the form of software or firmware (firmware)
Operating system (operating system, OS) in software function module.The processor is deposited for executing in memory
The executable module of storage.
Visitor's platform 12, visitor's platform 12 is not limited to wechat public platform, nail nail open platform, the QQ public in the present invention
Platform, mail service platform etc., with no restrictions.By above-mentioned management platform can by the dependency number of local visitor's host 11 it is believed that
It ceases and is pushed to the first client 14 or the second client 15, while the data of above-mentioned management platform and local visitor's host 11
Between can carry out data interaction or synchronization.
Access control equipment 16 can be the entrance guard device with coded lock, the entrance guard device with Fingerprint Lock, Vehicle License Plate Recognition System etc..
First embodiment
As shown in Fig. 2, being a kind of visitor's letter that can be applied to above-mentioned access control system that present pre-ferred embodiments provide
Management method on line is ceased, detailed process shown in Fig. 2 will be described in detail below.
Step S10: receiving visitor's data information of visitor, and according to visitor's data information, generates the first verifying
Information.
Step S20: being sent to visitor's platform for first verification information, so that visitor's platform is tested described first
Card information is pushed to the first client positioned at the visitor side, so that the visitor obtains first verification information.
Step S30: the visitor is received according to first verification information and passes through addressing machine or first client
The identity data of typing.
Step S40: according to visitor's data information, the guest levels of the visitor are determined.
Step S50: being that the identity data is distributed for the access authority by access control equipment according to the guest levels.
In the present embodiment, the first client in above steps can be the terminal of correspondingly received software is installed, such as
Mobile phone.Visitor's platform be wechat public platform or nail nail open platform, wherein the wechat public platform can by wechat gateway with
It is synchronous with data that local visitor's host carries out data interaction.
In step slo, visitor's data information of visitor includes but is not limited to the name of visitor, phone number, visit
Time, ID card information, driver's license information, passport that the person of asking comes to visit etc., the duration that visitor comes to visit, visitor come to visit purpose
Deng but it should at least information, such as ID card information, name of visitor's identity etc. can be characterized containing one kind.In this implementation
The mode of three kinds of reception visitor's data informations is provided in example.
The first embodiment is to receive visitor's input, visitor's data information that first client is sent, the
One client is the terminal that visitor holds, and carries out the input of visitor's data information on the terminal by visitor, and by being somebody's turn to do
Terminal (the first client) carries out being sent to corresponding wechat public platform, and passes through wechat public platform for visitor's data information
It is synchronized to local visitor's host, i.e., local visitor's host receives visitor's data information, that is, realizes the active of visitor
Reserve access request.
For the first embodiment, as shown in figure 3, further, step S10 is specifically included:
Step S11: visitor's data information that first client is sent is received.
Step S12: being sent to visitor's platform for visitor's data information, so that visitor's platform is by the visit
Objective data information is pushed to the second client of respondent side.Wherein, whether second client is used for characterization for generating
Agree to the access confirmation information of the Accessor Access.
In this step S12, visitor's data information is pushed to the second client of respondent side in visitor's platform
Later, also prompting message or reminding short message can be generated by visitor's platform, is sent to the first client and informs visitor's processing progress,
It is sent to the second client and informs respondent's backlog.
The access confirmation information that second client generates (can indicate respondent grant access person's for approval information
Reserve access request), it is also possible to refuse information (indicating that respondent disagrees the reservation access request of visitor).It, can with this
Suitable access time is efficiently reserved, process of reserving by phone under interminable line is avoided.
Step S13: when receive that visitor's platform issues is agreed to by what second client generated for characterizing
When the access confirmation information of the Accessor Access, according to visitor's data information, first verification information is generated.
In this step S13, after the access confirmation information that the second client generates is received by local visitor's host,
Local visitor's host can generate the first verification information according to visitor visitor's data information, ensure that the first verifying letter of generation
The case where validity of breath, exclusion respondent's denied access, (receives the Accessor Access of characterization refusal in local visitor's host
Access confirmation information when do not generate the first verification information), avoid the waste of local visitor's host calculating resource.
Second of embodiment is the visitor's data received through the external input equipment input of local visitor's host
Information.Specifically, administrator's (being also possible to arbitrarily not invite person) of local visitor's host can be external by local visitor's host
Input equipment, such as keyboard, mouse, touch tablet etc., visitor's data letter of the visitor invited to the input of local visitor's host
Breath is realized and actively invites access.
The third embodiment receives visitor's data information that second client is sent.Second client is by being interviewed
Person holds, and can also be realized by the second client input visitor's data information and be invited the active of visitor.
In the present invention, it if visitor is team more people, is being sent in a manner of above-mentioned three kinds to local visitor's host
It can be a plurality of information input of batch when visitor's data information.So that local visitor's host receives visitor's data of batch
Information is uniformly processed.When sending visitor's data information if the first client, also second can be sent to by visitor's platform
Client, so that the second client disposably generates the access confirmation letter whether characterization agrees to the Accessor Access to team
Breath, avoids repeatedly generating.
In step slo, first verification information can generate for local visitor's host according to visitor's data information
Two dimensional code, identifying code, bar code etc. any one or more.First verification information can also be the cell-phone number of visitor.
In step S20, visitor can be made to obtain the first verification information, the first verification information can be used for verifying respondent institute
The typing of identity data is carried out in the guest machine of enterprise.
In the case where gate inhibition is not stringent, the first verification information also can be used, directly access control equipment is verified with logical
Cross gate inhibition.I.e. visitor is lower for the requirements for access permission of general visitor or visitor, can be straight after step S20
It connects and executes gate inhibition's verifying, specifically include:
Receive the second verification information that the access control equipment is sent, wherein second verification information is the visitor
The verification information inputted by the access control equipment.The verification information can be verifying strip, access card, two dimensional code, password etc.
The information for being included.Second verification information should match or unique corresponding with the first verification information.
Judge whether the time for receiving second verification information matches and described with the default access time
Whether two verification informations match with first verification information, obtain a judging result.Wherein, judging result is concretely:
The time and the default access time for receiving second verification information match, that is, receive second verification information when
It waits within the scope of subscription time, or within a period of time before subscription time range;Default access time can be visitor
The access time reserved between respondent, or (can be the period, can be sent by the first client with the access time of reservation
To visitor's platform and it is synchronized to local visitor's host) it differs no more than 15 minutes (such as being advanced by 15 minutes);Described second tests
Card information matches (identical, or corresponding) with first verification information.In the case of this kind, just generate for controlling the door
Prohibit the control instruction of opening of device, so that access control equipment is opened.Not not generating for controlling in the case of remaining judging result volume
The control instruction that the access control equipment is opened, or generate the control instruction closed for controlling the access control equipment.
In step s 30.Guest machine may be disposed near first of gate inhibition of enterprise, be mainly used for acquiring the body of visitor
Part data, wherein identity data may include identity card data, finger print data, human face data, iris data, license plate number, passport, name
Piece etc..Guest machine, which is attended class, is arranged corresponding module, such as scanner, video camera, Vehicle License Plate Recognition System, identity card reader etc..
The gate inhibition that specifically acquisition type can be arranged according to enterprises verifies classification correlation, and acquisition is one or more, such as identity card
Data;The combination of identity card data and human face data;Identity card data and the combination of finger print data etc..The identity card data of acquisition
Can also be used in authentication-access with human face data, whether person is that registered visitor's data information is corresponding in person.It is adopted by guest machine
Collect identity data, by then passing through the collection in worksite of the first verification information confirmation, and passes through identity card data and biological characteristic
The matching of data (finger print data, human face data, iris data) acquires, the fraud that can prevent data from acquiring.
After identity data, which acquires, to be completed, guest machine will be uploaded to data collected in local visitor's host.
Another acquisition mode, the hardware devices such as camera, the fingerprint module of the first client with captured identity data,
The acquisition of identity data can also then be carried out to visitor according to the first verification information by the first client.
In step s 40, local visitor's host distributes guest levels to visitor to visitor's data information, such as can basis
Visitor's position, respondent, visitor's name in visitor's data etc. are distributed automatically, can also be carried out by administrator default or direct manually
Guest levels are set.Then step S50 is executed, local visitor's host is that the identity data is distributed for leading to according to guest levels
Cross the access authority of access control equipment.It may also set up the adjustment interface to access authority, under special circumstances flexibly to handle.
In step s 50, different identity datas can be used when through different access control equipments, such as passes through fingerprint
Fingerprint authentication will be used when gate inhibition, by the way that face verification will be used when face gate inhibition.Wherein, access authority refer specifically to visitor can
With the limitation opened or pass through the different access control equipments in accessed enterprise.For example, local visitor's host can will be received
The access authority that finger print data is set as the first fingerprint access control equipment is to pass through, then sets when the visitor reaches the first fingerprint access control
When standby gate inhibition, i.e. openable first fingerprint access control is passed through after carrying out fingerprint authentication;If received finger print data is set
The access authority of the second fingerprint access control equipment is set to as refusal, then will be unable to pass through when visitor encounters the second fingerprint access control;If
The human face data received is set as using recognition of face as the gate inhibition of verification information being to pass through, then when the visitor enters should be with
It, then can opening gate (another embodiment, when the electronics prison of enterprises installation when recognition of face is the gate inhibition of verification information
Control will generate alarm sounds information after the human face data that the region of non-gain access grabs visitor).
A kind of embodiment is also provided to the distribution of access authority in the present embodiment, receives identity in local visitor's host
After data, which is synchronized to visitor's platform, visitor's platform generates rights option and is sent to the second client, and by
The respondent of second client is configured the guest levels of visitor, finally according to guest levels to the identity number of visitor
According to the setting (can complete in the second client, also be completed in local guest machine) for the permission that accesses, then can will also incite somebody to action
The identity data that access authority is arranged is synchronized in local visitor's host issue each gate inhibition of control or monitor terminal.
In embodiment provided by the invention, control instruction is generated in local visitor's host so that the access control equipment is opened
Later, the access of the visitor can be also obtained according to the control instruction as a result, being again synchronized to the access result described
Visitor's platform.Wherein access result can characterize the access state of visitor.For example, when control instruction is that a certain gate inhibition opens,
Obtain access result are as follows: in the time that the gate inhibition opens, visitor be arrived at the gate inhibition, while can be synchronous by the access result
It to visitor's platform or saves, so that the second client is inquired, it may be appreciated that the visiting state of visitor, it is local to visit
The administrator of objective host can also carry out searching and managing.Avoid telephone interview person and the multiple telephonic communication confirmation institute of respondent in place
It sets.
In addition, the identity data as the visitor is assigned more advanced access authority, while the enterprise where respondent
The terminals such as multiple access control equipments or monitoring device are provided in industry.Visitor is by these access control equipments by obtaining after verifying
To access as a result, and after while passing through monitoring device is crawled human face data, local visitor's host can be fed back to by terminal,
Local visitor's host records the terminal position of feedback information, while recording the time, later the visitor of synchrodata
Platform.For example, whether can have by the video acquisitions Tool validation personnel such as camera when having served as channel, elevator by power
Limit, at the same prompt person whether have by permission;After someone's brush finger line, local visitor's host will receive fingerprint recording, from
And judge it is fingerprint where that people brushes in section at what time, i.e., it can get an access after verifying each time and tie
Fruit.In the case where visitor's real-time access information can be controlled, substantially increase using management method on the visitor information line
The safety of access control system improves enterprise security manager level.
In addition, display device can be arranged at relevant gate inhibition according to demand, local visitor's host is monitoring gate inhibition's dress
When setting unlatching (or when receiving the second verification information, and when being verified;Or when generating the instruction that access control device is opened),
Welcome access information is generated simultaneously, and is sent to display device.Such as generation be welcome access information be " welcome visiting ",
" welcoming xxx visiting ", " xxx is welcome to arrive our company visited exchange " etc., which can be configured, more in advance
Change.
When visitor leaves the last one access control equipment, the access result of acquisition can have been left labeled as visitor, this
Ground visitor's host is synchronous with visitor's platform data.To facilitate administrator or the respondent of local visitor's host to supervise visitor
Control understands visitor in the active state of enterprises, while also avoiding manual examination and verification or manually setting card reduction visitor's
Access impression, realizes the complete lifecycle management of on-line off-line whole process, access.The access data of storage can at any time into
Row history is called, and is not easy to lose, is easily facilitated statistics.In addition, local visitor's host also produces and sees information off, it is sent to display
Device.
It after typing identity data in the embodiment of the present invention, can be saved, when next visitor is visiting, with regard to nothing
Need typing again.
Second embodiment
Referring to Fig. 4, being that can apply management method on the visitor information line of first embodiment the present invention also provides a kind of
Managing device 300 on visitor information line.The device includes: the first verification information generation module 301, the first verification information transmission mould
Block 302, identity data receiving module 303, guest levels confirmation module 304 and access authority distribution module 305.Wherein:
First verification information generation module 301 is provided for receiving visitor's data information of visitor, and according to the visitor
Expect information, generates the first verification information.
First verification information sending module 302, for first verification information to be sent to visitor's platform, so that described
First verification information is pushed to the first client positioned at the visitor side by visitor's platform, so that the visitor obtains
Obtain first verification information.
Identity data receiving module 303 passes through addressing machine according to first verification information for receiving the visitor
Or the identity data of the first client typing.
Guest levels confirmation module 304, for determining the guest level of the visitor according to visitor's data information
Not.
Access authority distribution module 305, for being that the identity data is distributed for passing through door according to the guest levels
Prohibit the access authority of equipment.
3rd embodiment
The present invention also provides management system on a kind of visitor information line, which includes: local visitor's host, Fang Keping
Platform, the first client and addressing machine positioned at visitor side.It is specific:
Local visitor's host is used to receive visitor's data information of visitor, and according to visitor's data information,
Generate the first verification information.
Local visitor's host is also used to first verification information being sent to visitor's platform.
Visitor's platform is pushed to described for receiving first verification information, and by first verification information
One client, so that the visitor obtains first verification information.
First client is used to receive the visitor according to the identity data of the first verification information typing, and
The identity data received is sent to local visitor's host.
The addressing machine will connect for receiving the visitor according to the identity data of the first verification information typing
The identity data received is sent to local visitor's host.
The identity data that local visitor's host is also used to receive first client or the addressing machine is sent.
Local visitor's host is also used to determine the guest levels of the visitor according to visitor's data information.
Local visitor's host is also used to be that the identity data is distributed for passing through gate inhibition according to the guest levels
The access authority of equipment.
Local visitor's host in the present embodiment, visitor's platform, the first client and addressing machine positioned at visitor side
Specific effect and performed step process can be found in each step described in first embodiment, it is no longer superfluous in the present embodiment
It states.
In summary:
Method, apparatus and system are managed on a kind of visitor information line of the embodiment of the present invention, by the visit for receiving visitor
Objective data information, and generate the first verification information.Then first verification information is sent to visitor's platform, passes through visitor's platform
First verification information is pushed to the first client, to inform visitor, realizes interaction on line;Then, then visitor's root is received
Information is tested by guest machine or the identity data of the first client typing according to first, ensure that the first verification information and identity data
It corresponds, identity is avoided to falsely use.Confirm finally by guest levels of visitor's data information to visitor, and according to visit
Objective rank be identity data distribution for by the access authority of access control equipment, it can be achieved that different visitor's data (i.e. not
Same guest levels) the different access authority of matching, achieve the purpose that distinguish different visitors.Therefore, the present invention solves existing
Managing caller mode is required to the third party under the line except respondent and audits and guide in technology, and different visits cannot be distinguished
Objective rank, the problem of causing advanced visitor in visiting enterprise by larger limitation, while also improving the safety management of enterprise
It is horizontal.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including
Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. management method on a kind of visitor information line is applied to local visitor's host characterized by comprising
Visitor's data information of visitor is received, and according to visitor's data information, generates the first verification information;
First verification information is sent to visitor's platform, so that first verification information is pushed to by visitor's platform
The first client positioned at the visitor side, so that the visitor obtains first verification information;
It receives the visitor and addressing machine or the identity number of the first client typing is passed through according to first verification information
According to;
According to visitor's data information, the guest levels of the visitor are determined;
It is that the identity data is distributed for the access authority by access control equipment according to the guest levels.
2. the method according to claim 1, wherein the identity data includes below one or more:
Identity card data;
Finger print data;
Human face data.
3. the method according to claim 1, wherein when in visitor's data information including default access
Between when, after the first verification information of the generation, further includes:
Receive the second verification information that the access control equipment is sent, wherein second verification information is that the visitor passes through
The verification information of the access control equipment input;
Judge whether the time for receiving second verification information matches with the default access time and described second tests
Whether card information matches with first verification information, obtains a judging result;
According to the judging result, the control instruction for controlling the access control equipment switch is generated.
4. according to the method described in claim 3, it is characterized in that, generating described for controlling the access control equipment switch
After control instruction, further includes:
The access result of the visitor is obtained according to the control instruction;
The access result is synchronized to visitor's platform.
5. the method according to claim 1, wherein the visitor's data information for receiving visitor includes:
Receive visitor's data information by the external input equipment input of local visitor's host.
6. the method according to claim 1, wherein it is described receive visitor visitor's data information, and according to
The step of visitor's data information, the first verification information of generation, comprising:
Receive visitor's data information that first client is sent;
Visitor's data information is sent to visitor's platform, so that visitor's platform pushes away visitor's data information
Give the second client of respondent side;Wherein, second client is for generating for characterizing whether agree to the access
The access confirmation information of person's access;
When receive that visitor's platform issues agrees to that the visitor visits for characterizing by what second client generated
When the access confirmation information asked, according to visitor's data information, first verification information is generated.
7. the method according to claim 1, wherein the visitor's data information for receiving visitor includes:
Receive visitor's data information that the second client of respondent side is sent.
8. the method according to claim 1, wherein visitor's platform is wechat public platform.
9. managing device on a kind of visitor information line characterized by comprising
First verification information generation module, for receiving visitor's data information of visitor, and according to visitor's data information,
Generate the first verification information;
First verification information sending module, for first verification information to be sent to visitor's platform, so that the visitor is flat
First verification information is pushed to the first client positioned at the visitor side by platform, so that described in visitor acquisition
First verification information;
Identity data receiving module passes through addressing machine or described the according to first verification information for receiving the visitor
The identity data of one client typing;
Guest levels confirmation module, for determining the guest levels of the visitor according to visitor's data information;
Access authority distribution module, for being identity data distribution for by access control equipment according to the guest levels
Access authority.
10. management system on a kind of visitor information line, which is characterized in that the system comprises local visitor's host, visitor's platform,
The first client and addressing machine positioned at visitor side;
Local visitor's host is used to receive visitor's data information of visitor, and according to visitor's data information, generates
First verification information;
Local visitor's host is also used to first verification information being sent to visitor's platform;
Visitor's platform is pushed to first visitor for receiving first verification information, and by first verification information
Family end, so that the visitor obtains first verification information;
First client will connect for receiving the visitor according to the identity data of the first verification information typing
The identity data received is sent to local visitor's host;
The addressing machine will be received for receiving the visitor according to the identity data of the first verification information typing
Identity data be sent to local visitor's host;
The identity data that local visitor's host is also used to receive first client or the addressing machine is sent;
Local visitor's host is also used to determine the guest levels of the visitor according to visitor's data information;
Local visitor's host is also used to be that the identity data is distributed for passing through access control equipment according to the guest levels
Access authority.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810935414 | 2018-08-16 | ||
CN2018109354141 | 2018-08-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109242424A true CN109242424A (en) | 2019-01-18 |
Family
ID=65068286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810980086.7A Pending CN109242424A (en) | 2018-08-16 | 2018-08-27 | Method, apparatus and system are managed on a kind of visitor information line |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109242424A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767536A (en) * | 2019-03-01 | 2019-05-17 | 深圳市万睿智能科技有限公司 | A kind of self-service access method of entrance gate inhibition and system |
CN110070651A (en) * | 2019-04-25 | 2019-07-30 | 华翔翔能电气股份有限公司 | Visitor's passing method, access control system, terminal and the storage medium of access control system |
CN110084936A (en) * | 2019-04-28 | 2019-08-02 | 广州佳都数据服务有限公司 | Caller management method and device |
CN110322602A (en) * | 2019-06-18 | 2019-10-11 | 特斯联(北京)科技有限公司 | A kind of visitor reserves passing method, system and equipment |
CN110580762A (en) * | 2019-11-02 | 2019-12-17 | 相舆科技(上海)有限公司 | Intelligent household access control system and method |
CN111831633A (en) * | 2020-06-23 | 2020-10-27 | 武汉菲奥达物联科技有限公司 | Automatic community visitor platform extension method and device based on visitor data |
CN111915789A (en) * | 2020-08-05 | 2020-11-10 | 中国建设银行股份有限公司 | Visitor reservation management method, device, equipment and storage medium |
CN112598560A (en) * | 2020-12-24 | 2021-04-02 | 四川众望安全环保技术咨询有限公司 | Intelligent park public service platform and implementation method thereof |
CN113658364A (en) * | 2020-04-07 | 2021-11-16 | 西安艾润物联网技术服务有限责任公司 | Visitor management method, device, system and computer readable storage medium |
CN114333128A (en) * | 2021-12-30 | 2022-04-12 | 北京华能新锐控制技术有限公司 | Diversified application system of access control data |
CN114424260A (en) * | 2019-09-30 | 2022-04-29 | 亚萨合莱有限公司 | Enabling remote unlocking of a lock |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330946A (en) * | 2016-08-31 | 2017-01-11 | 广州云系信息科技有限公司 | Interactive visitor management method |
CN106408703A (en) * | 2016-08-31 | 2017-02-15 | 广州云系信息科技有限公司 | Identification method of visitor information |
CN107274516A (en) * | 2017-04-19 | 2017-10-20 | 捷开通讯(深圳)有限公司 | The method and server of access registrar, intelligent terminal and storage device |
CN108269330A (en) * | 2016-12-31 | 2018-07-10 | 中国移动通信集团辽宁有限公司 | A kind of access control method, apparatus and system |
-
2018
- 2018-08-27 CN CN201810980086.7A patent/CN109242424A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106330946A (en) * | 2016-08-31 | 2017-01-11 | 广州云系信息科技有限公司 | Interactive visitor management method |
CN106408703A (en) * | 2016-08-31 | 2017-02-15 | 广州云系信息科技有限公司 | Identification method of visitor information |
CN108269330A (en) * | 2016-12-31 | 2018-07-10 | 中国移动通信集团辽宁有限公司 | A kind of access control method, apparatus and system |
CN107274516A (en) * | 2017-04-19 | 2017-10-20 | 捷开通讯(深圳)有限公司 | The method and server of access registrar, intelligent terminal and storage device |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767536A (en) * | 2019-03-01 | 2019-05-17 | 深圳市万睿智能科技有限公司 | A kind of self-service access method of entrance gate inhibition and system |
CN110070651A (en) * | 2019-04-25 | 2019-07-30 | 华翔翔能电气股份有限公司 | Visitor's passing method, access control system, terminal and the storage medium of access control system |
CN110084936A (en) * | 2019-04-28 | 2019-08-02 | 广州佳都数据服务有限公司 | Caller management method and device |
CN110322602A (en) * | 2019-06-18 | 2019-10-11 | 特斯联(北京)科技有限公司 | A kind of visitor reserves passing method, system and equipment |
CN114424260A (en) * | 2019-09-30 | 2022-04-29 | 亚萨合莱有限公司 | Enabling remote unlocking of a lock |
US12039814B2 (en) | 2019-09-30 | 2024-07-16 | Assa Abloy Ab | Enabling remote unlock of a lock |
CN110580762A (en) * | 2019-11-02 | 2019-12-17 | 相舆科技(上海)有限公司 | Intelligent household access control system and method |
CN113658364A (en) * | 2020-04-07 | 2021-11-16 | 西安艾润物联网技术服务有限责任公司 | Visitor management method, device, system and computer readable storage medium |
CN111831633A (en) * | 2020-06-23 | 2020-10-27 | 武汉菲奥达物联科技有限公司 | Automatic community visitor platform extension method and device based on visitor data |
CN111915789A (en) * | 2020-08-05 | 2020-11-10 | 中国建设银行股份有限公司 | Visitor reservation management method, device, equipment and storage medium |
CN112598560B (en) * | 2020-12-24 | 2024-02-13 | 四川众望安全环保技术咨询有限公司 | Intelligent park public service platform and implementation method thereof |
CN112598560A (en) * | 2020-12-24 | 2021-04-02 | 四川众望安全环保技术咨询有限公司 | Intelligent park public service platform and implementation method thereof |
CN114333128A (en) * | 2021-12-30 | 2022-04-12 | 北京华能新锐控制技术有限公司 | Diversified application system of access control data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109242424A (en) | Method, apparatus and system are managed on a kind of visitor information line | |
CN104240013B (en) | A kind of access control method and access control platform | |
CN104240342B (en) | Access control method and device based on identity authentication | |
CN110148232B (en) | Visitor management system, method, device and storage medium | |
CN101996430B (en) | Method, system and device for swiping entrance guard card through short message service reservation | |
CN109003362A (en) | A kind of visitor invites passing method, device, system and storage medium | |
CN103839318B (en) | The gate control system of a kind of remote centralized certification and method | |
CN112466026A (en) | Digital visitor system and management method thereof | |
RU2622883C2 (en) | System and method for managing access to personal data | |
CN106850794A (en) | Method and apparatus, server and terminal for operating group | |
CN109461017A (en) | Method, system, the equipment, storage medium of equity are provided based on specific user | |
CN111242248B (en) | Personnel information monitoring method, device and computer storage medium | |
CN106981120A (en) | A kind of wechat Quick Response Code guest system and its application method | |
CN110728388A (en) | Appointment management system for shared meeting room | |
CN111862424A (en) | Attendance management system, method, equipment and storage medium | |
CN107564140A (en) | A kind of gate inhibition invites authorization identifying system | |
CN104240014A (en) | Door access control method and door access control platform | |
CN107578502A (en) | A kind of cell caller management method and device | |
CN110634214B (en) | Equipment control method and device of Internet of things operating system | |
CN110491008A (en) | A kind of community-based managing caller side and system, storage medium | |
CN104392723A (en) | Sharing instrument platform management method based on voiceprint recognition technology | |
CN110491007A (en) | A kind of community-based caller management method, community server and storage medium | |
CN109887134A (en) | A kind of cell legal power safety control system | |
EP3550488A1 (en) | System and method for credentialing access to restricted rooms | |
CN110930561A (en) | Control method and device of intelligent lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |
|
RJ01 | Rejection of invention patent application after publication |