[go: up one dir, main page]

CN105389870A - Entrance guard management method and system - Google Patents

Entrance guard management method and system Download PDF

Info

Publication number
CN105389870A
CN105389870A CN201510719093.8A CN201510719093A CN105389870A CN 105389870 A CN105389870 A CN 105389870A CN 201510719093 A CN201510719093 A CN 201510719093A CN 105389870 A CN105389870 A CN 105389870A
Authority
CN
China
Prior art keywords
gate inhibition
key
virtual
rights
cluster
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510719093.8A
Other languages
Chinese (zh)
Inventor
洪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Changlian Information Technology Co Ltd
Original Assignee
Guangzhou Changlian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Changlian Information Technology Co Ltd filed Critical Guangzhou Changlian Information Technology Co Ltd
Priority to CN201510719093.8A priority Critical patent/CN105389870A/en
Publication of CN105389870A publication Critical patent/CN105389870A/en
Priority to PCT/CN2016/086211 priority patent/WO2017071249A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/40Indexing scheme relating to groups G07C9/20 - G07C9/29
    • G07C2209/41Indexing scheme relating to groups G07C9/20 - G07C9/29 with means for the generation of identity documents

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an entrance guard management method and system. The method comprises the steps that a back-end processing center receives a registration request instruction of a creator and allocates a cluster for the creator after registration conditions are met; the back-end processing center adds corresponding members to the cluster according to a received member addition instruction; the back-end processing center allocates corresponding characters to the members in the cluster according to a received character setting instruction; the back-end processing center sets entrance guard use permissions for the corresponding members in the cluster according to a received entrance guard use permission setting instruction, and each entrance guard use permission comprises virtual entrance guard serial number information and effective time information corresponding to the virtual entrance guard serial number information. According to the entrance guard management method and system, mobile management and character hierarchical management of an entrance guard are achieved, an administrator can conveniently conduct permission control on the members in the cluster, each member in the cluster can online generate a virtual key within the entrance guard use permission, the virtual keys can be shared, and great flexibility and real-time performance are achieved.

Description

A kind of access control management method and system
Technical field
The present invention relates to a kind of access control management method and system.
Background technology
At present, access control system is based on local unit or C/S model, the establishment and management of gate inhibition is by responding to card, wireless signal, operating at Main Means such as spider lines, and what gate control system was paid close attention to is using and managing of peripheral data, concentrates on especially in the related data of gate inhibition's unlatching.Implement under line is all needed to gate inhibition's control of authority and mandate, and require that personnel participate in.Such as: in hotel's scene, generally have employed induction kayser and gate control system thereof, this system is generally the standalone version windowsexe software of localization, and use sense answers card as the key of opening gate, is commonly referred to CUSTOM HOUSE HOTEL.The establishment and management of CUSTOM HOUSE HOTEL needs to use USB interface access writer, by writer more new data on CUSTOM HOUSE HOTEL.System does not have role and the authority of concern personnel itself, and the dynamic modificability of data.In the process, the management severe of gate inhibition relies on the participation of personnel, and needs extra peripheral configuration, cannot accomplish online updating, the operations such as real-time rights object, and the dynamic change for human roles and authority cannot be made and adapt to timely and adjust.
Summary of the invention
In order to overcome the deficiencies in the prior art, the object of the present invention is to provide a kind of access control management method and system, realize mobile management and role's hierarchy management, conveniently carry out control of authority, can also generating virtual key and share virtual key online, reduce handling cost.
For solving the problem, the technical solution adopted in the present invention is as follows:
Scheme one:
A kind of access control management method, comprises the following steps:
The registration request instruction of back-end processing receive centre founder, for this founder distributes at least one cluster after meeting registration condition, comprises the virtual gate inhibition corresponding with entity gate inhibition respectively in each cluster;
Back-end processing center is added instruction according to the member received and add corresponding member in the cluster of correspondence;
It is that member in corresponding cluster distributes corresponding role that back-end processing center arranges instruction according to the role received;
It is that member corresponding in the cluster of correspondence arranges gate inhibition's rights of using that back-end processing center arranges instruction according to the gate inhibition's rights of using received, and gate inhibition's rights of using comprise virtual gate inhibition's number information and correspond to information effective time of virtual gate inhibition's number information;
Wherein, user is communicated with described back-end processing center by mobile terminal or PC terminal.
Preferably, role comprises keeper, Group administrators and rank and file; Wherein, keeper has gate inhibition's rights of using of all virtual gate inhibitions and the authority of management Group administrators and rank and file; Gate inhibition's rights of using of Group administrators and member management authority are by Administrator; Gate inhibition's rights of using of rank and file are arranged by the Group administrators of keeper or correspondence.
Preferably, further comprising the steps of:
Back-end processing receive centre key generates request instruction, whether legally judges that this key generates request instruction, if so, then generates corresponding virtual key and is sent in the terminal initiating key generation request, otherwise return failure information; Whether legal rule is to judge to generate request by this key: this key generate virtual gate inhibition's number information in request and effective time information whether generate in gate inhibition's rights of using of the member of request initiating this key.
Preferably, further comprising the steps of:
Request instruction shared by back-end processing receive centre key, judges to initiate the role that this key generates the member of request instruction, if role is keeper or Group administrators, then generates corresponding virtual key and is sent to the terminal sharing target; If role is rank and file, then by the Group administrators of correspondence or keeper, the information sharing target is audited, audit and be sent to by then generating corresponding virtual key the terminal sharing target.
Preferably, described virtual key comprises two-dimensional code data or the signal data of the entity gate inhibition for opening correspondence.
Scheme two:
A kind of access control system, is applied to back-end processing center, comprises with lower module:
Creation module, for receiving the registration request instruction of founder, for this founder distributes at least one cluster after meeting registration condition, comprises the virtual gate inhibition corresponding with entity gate inhibition respectively in each cluster;
Member adds module, adds corresponding member for adding instruction according to the member received in the cluster of correspondence;
Role assignments module is that member in corresponding cluster distributes corresponding role for arranging instruction according to the role that receives;
Gate inhibition's rights of using arrange module, be that in corresponding cluster, corresponding member arranges gate inhibition's rights of using for arranging instruction according to gate inhibition's rights of using of receiving, gate inhibition's rights of using comprise virtual gate inhibition's number information and correspond to information effective time of virtual gate inhibition's number information;
Wherein, for being communicated with described back-end processing center by mobile terminal or PC terminal.
Preferably, role comprises keeper, Group administrators and rank and file; Wherein, keeper has gate inhibition's rights of using of all virtual gate inhibitions and the authority of management Group administrators and rank and file; Gate inhibition's rights of using of Group administrators and member management authority are by Administrator; Gate inhibition's rights of using of rank and file are arranged by the Group administrators of keeper or correspondence.
Preferably, also comprise with lower module:
Key generation module, for receiving key generation request, judging whether this key generates request legal, if so, then generating corresponding virtual key and being sent in the terminal initiating key generation request, otherwise returning failure information; Whether legal rule is to judge to generate request by this key: this key generate virtual gate inhibition's number information in request and effective time information whether generate in gate inhibition's rights of using of the member of request initiating this key.
Preferably, also comprise with lower module:
Key sharing module, shares request for receiving key, judges to initiate the role that this key generates the member of request, if role is keeper or Group administrators, then generates corresponding virtual key and is sent to the terminal sharing target; If role is rank and file, then by the Group administrators of correspondence or keeper, the information sharing target is audited, audit and be sent to by then generating corresponding virtual key the terminal sharing target.
Preferably, described virtual key comprises two-dimensional code data or the signal data of the entity gate inhibition for opening correspondence.
Compared to existing technology, beneficial effect of the present invention is: the mobile management and the role's hierarchy management that 1, achieve gate inhibition, facilitate supvr to carry out control of authority to the member in cluster; 2, the member in cluster can generate the virtual key in its gate inhibition's rights of using online, and virtual key can be shared, and has very large dirigibility and real-time, is no longer dependent on physical key.3, virtual key can be obtained by mobile terminal, realize the mode of mobile phone open gate inhibition.4, adopt Quick Response Code as virtual key, key can be carried out by various ways such as note, micro-letter, mails and share, improve the convenience that gate inhibition uses.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of access control management method of the present invention.
Fig. 2 is the process flow diagram of the virtual key generation method based on two-dimensional code data of the present invention.
Fig. 3 is the function structure chart of access control system of the present invention.
Embodiment
Below, by reference to the accompanying drawings and embodiment, the present invention is described further:
With reference to figure 1, a kind of access control management method, to be mainly used in back-end processing in the heart, wherein, user is communicated with described back-end processing center by mobile terminal or PC terminal, user can be founder, member in cluster or visitor, by having the terminal of network communicating function, particularly smart mobile phone, the portable mobile termianls such as Intelligent flat can carry out data communication with back-end processing center easily, and user uses different clients by the open interface that back-end processing center is corresponding, namely data communication is carried out at third-party application access back-end processing center.Method comprises the following steps:
S1: the registration request instruction of back-end processing receive centre founder, for this founder distributes at least one cluster after meeting registration condition, comprises the virtual gate inhibition corresponding with entity gate inhibition respectively in each cluster.Wherein, founder needs to meet registration condition by real-name authentication etc., the cluster distributed determines according to different entity scenes, such as hotel, an office building or an apartment, according to the structure in the structures shape cluster in different entity scenes, the entity gate inhibition namely in entity scene corresponds to the virtual gate inhibition in cluster, and, request when registering according to founder can distribute multiple different cluster as this founder, the entity scene that each cluster is corresponding different.
S2: back-end processing center is added instruction according to the member received and add corresponding member in the cluster of correspondence.Wherein, first the member of interpolation needs just can be added in cluster by being registered as registered members.
S3: it is that member in corresponding cluster distributes corresponding role that back-end processing center arranges instruction according to the role received.
Wherein, role comprises keeper, Group administrators and rank and file; Keeper has gate inhibition's rights of using of all virtual gate inhibitions and the authority of management Group administrators and rank and file; Gate inhibition's rights of using of Group administrators and member management authority are by Administrator; Gate inhibition's rights of using of rank and file are arranged by the Group administrators of keeper or correspondence.For rights management, it adopts RBAC model, can carry out horizontal and vertical expansion for Role and privilege.It should be noted that, founder is also the member in cluster, and it has the highest gate inhibition's rights of using and member management authority, can also dismiss cluster, and the virtual gate inhibition etc. in amendment cluster, can be understood as the role of super keeper; Keeper is distributed according to the member in cluster by founder, can be one or more, and the authority of keeper is only second to the authority of founder.
Gate inhibition's rights of using of Group administrators and member management authority can also be arranged by founder, such as, in the scene of an office building, the custodian of certain company needs the rooms 101 leased wherein to handle official business, and there are 9 employees in the said firm, then after the custodian of the said firm and employee's registration, the custodian of the said firm can be assigned to Group administrators, and be set to have gate inhibition's rights of using that virtual gate inhibition is numbered 101, and have the member management authority of management 9 rank and files, then this Group administrators can also distribute for 9 rank and files at one's disposal gate inhibition's rights of using that virtual gate inhibition is numbered 101.
S4: it is that member corresponding in the cluster of correspondence arranges gate inhibition's rights of using that back-end processing center arranges instruction according to the gate inhibition's rights of using received, and gate inhibition's rights of using comprise virtual gate inhibition's number information and correspond to information effective time of virtual gate inhibition's number information.Wherein, virtual gate inhibition's number information refers to the numbering of the virtual gate inhibition in cluster, and effective time, information referred to initial time and the end time that can open corresponding gate inhibition.
Whether legal S5: back-end processing receive centre key generates request instruction, judge that this key generates request instruction, if so, then generates corresponding virtual key and be sent in the terminal initiating key generation request, otherwise return failure information; Judge that this key generates the whether legal rule of request instruction and is: this key generate virtual gate inhibition's number information in request instruction and effective time information whether generate in gate inhibition's rights of using of the member of request initiating this key.
Wherein, any member in cluster all can arrange corresponding gate inhibition's rights of using, but different members may have different gate inhibition's rights of using, therefore need to judge that whether this request is legal when receiving key and generating request instruction, whether the virtual gate inhibition's number information mainly in checking request is included in virtual gate inhibition's number information of gate inhibition's rights of using of the member of the request of initiation, and whether temporal information is initiating effective time of gate inhibition's rights of using of member of request in range of information.
S6: request instruction shared by back-end processing receive centre key, judges to initiate the role that this key generates the member of request instruction, if role is keeper or Group administrators, then generates corresponding virtual key and is sent to the terminal sharing target; If role is rank and file, then by the Group administrators of correspondence or keeper, the information sharing target is audited, audit and be sent to by then generating corresponding virtual key the terminal sharing target.
Wherein, virtual key in its authority all can be shared by the member having gate inhibition's rights of using or personal management authority, such as, in the scene of office building, often have visitor to need to carry out business dealing, corresponding virtual key all can be shared, for the member having personnel's administration authority by the member now having corresponding gate inhibition's rights of using, it belongs to and can distribute the keeper of gate inhibition's rights of using for member, then it must have corresponding gate inhibition's rights of using.And, share if rank and file carries out virtual key, the Group administrators or the keeper that then need correspondence audit, concrete can be that visitor is by mobile terminal processing enter registration to the back-end visitor identity information, then rank and file shares request instruction for this visitor's identity information initiation key, corresponding Group administrators or keeper can receive visitor's identity information and share request instruction with key, then audit, examination & verification is sent to by the rear virtual key just generating correspondence shares in the terminal of target, specifically share information in request according to key and visitor's identity information generates corresponding virtual key.
Above-mentioned virtual key comprises two-dimensional code data or the signal data of the entity gate inhibition for opening correspondence.Such as, if two-dimensional code data, then the display module being sent to counterpart terminal carries out two-dimension code image display, corresponding entity gate inhibition also needs to have Quick Response Code read functions; If signal data, then this signal data is sent in corresponding signal vehicle, corresponding entity gate inhibition also needs to have signal-obtaining function, such as Bluetooth signal data, radiofrequency signal data etc.
Based on above-mentioned access control management method, hotel's entrance guard management can be widely used in, in office building entrance guard management and apartment entrance guard management, such as generate corresponding cluster based on a hotel, the managerial personnel adding this hotel are in the cluster keeper, staff is rank and file, and the member that interpolation has been registered is rank and file, then the managerial personnel in hotel can arrange corresponding gate inhibition's rights of using for rank and file, can also by registration visitor identity information for some clients do not registered, then this client is made to obtain corresponding virtual key by staff with the form sharing virtual key.
With reference to figure 2, for above-mentioned virtual key, if this virtual key is two-dimensional code data, then the invention also discloses a kind of preferably based on the virtual key generation method of two-dimensional code data, concrete virtual key method comprises the following steps:
Step 1: the request of data receiving generating virtual key, and according to the master data of request of data generating virtual key.
Step 2: information effective time in verification master data, if verification is passed through, then performs step 3, if verification is not passed through, then and back-checking failure information process ends.
Step 3: by described master data according to preset format compression in continuous print byte, production form data.
Step 4: enciphered data changed according to the system of specifying, generates system translation data.
Step 5: using the two-dimensional code data of system translation data as the final data generation correspondence of virtual key.
In step 1, request of data is initiated by needing the user of the virtual key applying for corresponding gate inhibition, and when applying for virtual key, need the effective time inputting this virtual key, include in request of data the identity information of user, virtual gate inhibition's number information and effective time information, then obtain corresponding data in a database according to identity information and virtual gate inhibition's number information respectively, by the data that obtain from database with effective time information in conjunction with the master data of generating virtual key.In addition, the step of its legitimacy of checking can also be comprised after receiving identity information and virtual gate inhibition's number information, ensure that this user has the authority of applying for virtual key, and target gate inhibition exists.Certainly, except identity information and virtual gate inhibition's number information, can also comprise other key message in request of data, several data is in conjunction with the master data of generating virtual key the most at last.
In step 2, concrete, data effective time in described verification master data comprise following verification condition: whether the form of verification data effective time is legal, and whether the initial time in verification data effective time is more than or equal to current time; That then verification is passed through, otherwise verification is not passed through if complete verification condition is.Such as, if effective time data length illegal, then verify and do not pass through, if month occur 13, then be also verify not pass through.
Master data may comprise operational character, identifier, time, the data such as gate inhibition, these data have independently byte space separately, but there are some data the space in byte not to be taken, such as operational character only may account for 4 in a byte, remaining space is also had in this byte, take less internal memory to make master data as much as possible and increase data reading performance using redundancy, therefore in step 3 each data in this master data according to preset format compression in continuous print byte, there is no the waste in space, the formatted data generated takies less space.
In step 4, mobilism process is carried out to the partial data of specifying in formatted data, mobilism process is specially: carry out reservation form cryptographic calculation, namely the data of same form and length are obtained after former data being converted, but data value changes, CRC check is carried out after retaining form cryptographic calculation, such as to identity information, virtual gate inhibition's number information and effective time these key messages of information verify, check code can be generated and the checking data integrity be kept at by check code as the later stage in a field uses after verification, can according to the integrality of the data check data in this field in decoding afterwards.Be encrypted by formatted data after mobilism process, cryptographic algorithm can utilize existing cryptographic algorithm, generates enciphered data after encryption.In steps of 5, enciphered data is changed according to the system of specifying, generate system translation data, specifically can carry out Binary Conversion.Through the process of step S3, first utilize reservation form cryptographic calculation data to be converted, and then be encrypted, make data have good security, be finally converted to into binary data, therefore, what obtain is non-clear data, which in turns increases the security of data.
With reference to figure 3, corresponding to the access control management method in above-described embodiment, the invention also discloses a kind of access control system, be applied to back-end processing center, comprise with lower module:
Creation module, for receiving the registration request instruction of founder, for this founder distributes a cluster after meeting registration condition, this cluster comprises the virtual gate inhibition corresponding with entity gate inhibition;
Member adds module, adds corresponding member in the cluster for adding instruction according to the member received;
Role assignments module is that member in cluster distributes corresponding role for arranging instruction according to the role that receives;
Gate inhibition's rights of using arrange module, be that member corresponding in cluster arranges gate inhibition's rights of using for arranging instruction according to gate inhibition's rights of using of receiving, gate inhibition's rights of using comprise virtual gate inhibition's number information and correspond to information effective time of virtual gate inhibition's number information;
Wherein, for being communicated with described back-end processing center by mobile terminal or PC terminal.
Preferably, role comprises keeper, Group administrators and rank and file; Wherein, keeper has gate inhibition's rights of using of all virtual gate inhibitions and the authority of management Group administrators and rank and file; Gate inhibition's rights of using of Group administrators and member management authority are by Administrator; Gate inhibition's rights of using of rank and file are arranged by the Group administrators of keeper or correspondence.
Preferably, also comprise with lower module:
Key generation module, for receiving key generation request, judging whether this key generates request legal, if so, then generating corresponding virtual key and being sent in the terminal initiating key generation request, otherwise returning failure information; Whether legal rule is to judge to generate request by this key: this key generate virtual gate inhibition's number information in request and effective time information whether generate in gate inhibition's rights of using of the member of request initiating this key.
Preferably, also comprise with lower module:
Key sharing module, shares request for receiving key, judges to initiate the role that this key generates the member of request, if role is keeper or Group administrators, then generates corresponding virtual key and is sent to the terminal sharing target; If role is rank and file, then by the Group administrators of correspondence or keeper, the information sharing target is audited, audit and be sent to by then generating corresponding virtual key the terminal sharing target.
Preferably, described virtual key comprises two-dimensional code data or the signal data of the entity gate inhibition for opening correspondence.
To one skilled in the art, according to technical scheme described above and design, other various corresponding change and deformation can be made, and all these change and deformation all should belong within the protection domain of the claims in the present invention.

Claims (10)

1. an access control management method, is characterized in that, comprises the following steps:
The registration request instruction of back-end processing receive centre founder, for this founder distributes at least one cluster after meeting registration condition, comprises the virtual gate inhibition corresponding with entity gate inhibition respectively in each cluster;
Back-end processing center is added instruction according to the member received and add corresponding member in the cluster of correspondence;
It is that member in corresponding cluster distributes corresponding role that back-end processing center arranges instruction according to the role received;
It is that member corresponding in the cluster of correspondence arranges gate inhibition's rights of using that back-end processing center arranges instruction according to the gate inhibition's rights of using received, and gate inhibition's rights of using comprise virtual gate inhibition's number information and correspond to information effective time of virtual gate inhibition's number information;
Wherein, user is communicated with described back-end processing center by mobile terminal or PC terminal.
2. access control management method according to claim 1, is characterized in that, role comprises keeper, Group administrators and rank and file; Wherein, keeper has gate inhibition's rights of using of all virtual gate inhibitions and the authority of management Group administrators and rank and file; Gate inhibition's rights of using of Group administrators and member management authority are by Administrator; Gate inhibition's rights of using of rank and file are arranged by the Group administrators of keeper or correspondence.
3. access control management method according to claim 2, is characterized in that, further comprising the steps of:
Back-end processing receive centre key generates request instruction, whether legally judges that this key generates request instruction, if so, then generates corresponding virtual key and is sent in the terminal initiating key generation request, otherwise return failure information; Judge that this key generates the whether legal rule of request instruction and is: this key generate virtual gate inhibition's number information in request and effective time information whether generate in gate inhibition's rights of using of the member of request instruction initiating this key.
4. access control management method according to claim 3, is characterized in that, further comprising the steps of:
Request instruction shared by back-end processing receive centre key, judges to initiate the role that this key generates the member of request instruction, if role is keeper or Group administrators, then generates corresponding virtual key and is sent to the terminal sharing target; If role is rank and file, then by the Group administrators of correspondence or keeper, the information sharing target is audited, audit and be sent to by then generating corresponding virtual key the terminal sharing target.
5. the access control management method according to claim 3 or 4, is characterized in that, described virtual key comprises two-dimensional code data or the signal data of the entity gate inhibition for opening correspondence.
6. an access control system, is characterized in that, is applied to back-end processing center, comprises with lower module:
Creation module, for receiving the registration request instruction of founder, for this founder distributes at least one cluster after meeting registration condition, comprises the virtual gate inhibition corresponding with entity gate inhibition respectively in each cluster;
Member adds module, adds corresponding member for adding instruction according to the member received in the cluster of correspondence;
Role assignments module is that member in corresponding cluster distributes corresponding role for arranging instruction according to the role that receives;
Gate inhibition's rights of using arrange module, be that in corresponding cluster, corresponding member arranges gate inhibition's rights of using for arranging instruction according to gate inhibition's rights of using of receiving, gate inhibition's rights of using comprise virtual gate inhibition's number information and correspond to information effective time of virtual gate inhibition's number information;
Wherein, for being communicated with described back-end processing center by mobile terminal or PC terminal.
7. access control system according to claim 6, is characterized in that, role comprises keeper, Group administrators and rank and file; Wherein, keeper has gate inhibition's rights of using of all virtual gate inhibitions and the authority of management Group administrators and rank and file; Gate inhibition's rights of using of Group administrators and member management authority are by Administrator; Gate inhibition's rights of using of rank and file are arranged by the Group administrators of keeper or correspondence.
8. access control system according to claim 7, is characterized in that, also comprises with lower module:
Key generation module, generating request instruction for receiving key, whether legally judging that this key generates request instruction, if so, then generates corresponding virtual key and is sent in the terminal initiating key generation request, otherwise return failure information; Judge that this key generates the whether legal rule of request instruction and is: this key generate virtual gate inhibition's number information in request instruction and effective time information whether generate in gate inhibition's rights of using of the member of request instruction initiating this key.
9. access control system according to claim 8, is characterized in that, also comprises with lower module:
Key sharing module, shares request instruction for receiving key, judges to initiate the role that this key generates the member of request instruction, if role is keeper or Group administrators, then generates corresponding virtual key and is sent to the terminal sharing target; If role is rank and file, then by the Group administrators of correspondence or keeper, the information sharing target is audited, audit and be sent to by then generating corresponding virtual key the terminal sharing target.
10. access control system according to claim 8 or claim 9, is characterized in that, described virtual key comprises two-dimensional code data for opening corresponding entity gate inhibition or signal data.
CN201510719093.8A 2015-10-28 2015-10-28 Entrance guard management method and system Pending CN105389870A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510719093.8A CN105389870A (en) 2015-10-28 2015-10-28 Entrance guard management method and system
PCT/CN2016/086211 WO2017071249A1 (en) 2015-10-28 2016-06-17 Access management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510719093.8A CN105389870A (en) 2015-10-28 2015-10-28 Entrance guard management method and system

Publications (1)

Publication Number Publication Date
CN105389870A true CN105389870A (en) 2016-03-09

Family

ID=55422114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510719093.8A Pending CN105389870A (en) 2015-10-28 2015-10-28 Entrance guard management method and system

Country Status (2)

Country Link
CN (1) CN105389870A (en)
WO (1) WO2017071249A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530460A (en) * 2016-11-01 2017-03-22 张涛 Access control authority distribution method and system
CN106534080A (en) * 2016-10-20 2017-03-22 雷飏 Object access authority management method and corresponding background system, device and user terminal
WO2017071249A1 (en) * 2015-10-28 2017-05-04 广州畅联信息科技有限公司 Access management method and system
CN106780923A (en) * 2017-01-24 2017-05-31 柳州得实科技有限公司 A kind of access permission management system
CN107483899A (en) * 2017-09-22 2017-12-15 深圳思瓦科技有限公司 A kind of intelligent doorbell and its implementation, intelligent doorbell system
CN107967732A (en) * 2017-10-31 2018-04-27 美的智慧家居科技有限公司 Intelligent door lock and voice method for burn-recording
CN108023956A (en) * 2017-12-07 2018-05-11 厦门狄耐克智能科技股份有限公司 A kind of gate inhibition's cloud service system and the method that access control equipment is registered to the system
CN108156000A (en) * 2018-02-01 2018-06-12 谢春旺 A kind of multifunctional conference management method, electronic equipment and storage medium
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN109615738A (en) * 2018-11-30 2019-04-12 深圳绿米联创科技有限公司 Door lock management method, device, electronic device and storage medium
CN109727340A (en) * 2017-10-31 2019-05-07 朱铭赫 Access control system operation method, device and system
WO2019148582A1 (en) * 2018-02-02 2019-08-08 深圳市鹰硕技术有限公司 Control method and system for intelligent school campus
CN110136302A (en) * 2018-02-02 2019-08-16 新世界发展有限公司 Access control system and control method for remote access to closing member
CN110570559A (en) * 2019-08-21 2019-12-13 杭州享钥科技有限公司 Electronic key sharing method in access control system based on mobile terminal
CN110580757A (en) * 2019-08-01 2019-12-17 深圳左邻永佳科技有限公司 access control equipment opening method and device based on graphic code and storage medium
CN110827457A (en) * 2018-07-23 2020-02-21 宁波欧依安盾安全科技有限公司 Virtual access control system based on safety competence identification
CN111464556A (en) * 2016-10-25 2020-07-28 雷飏 Portable user terminal
CN112562138A (en) * 2020-11-24 2021-03-26 北京百度网讯科技有限公司 Method, device, equipment and storage medium for managing gate
CN113888779A (en) * 2021-09-29 2022-01-04 广东好太太智能家居有限公司 User authority management method, system and device based on intelligent lock and storage medium

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110858331A (en) * 2018-08-16 2020-03-03 上海磐森文化传媒有限公司 WeChat-based hotel check-in management system and method
CN111797955A (en) * 2020-06-30 2020-10-20 福州市蔬菜科学研究所 Digital crop breeding information management system and application thereof
CN112182651B (en) * 2020-09-25 2023-06-02 合肥工业大学 Authority control method and device
CN113112662B (en) * 2021-04-15 2022-11-01 广州爽游网络科技有限公司 Method for realizing access control electronic key and access control authority management in mobile phone chat software group
CN113379952B (en) * 2021-06-15 2023-02-28 北京房江湖科技有限公司 Sharing management method and sharing management device for house key
CN114416751B (en) * 2022-03-29 2022-07-01 中建电子商务有限责任公司 RBAC optimization algorithm based on multiplication bitmap
CN116011797B (en) * 2023-03-28 2023-07-07 济南市莱芜颐和信息科技有限公司 Decentralized financial supervision and management system
CN118097827B (en) * 2024-04-01 2024-08-13 深圳凯菲尼科技有限公司 User management system and method of intelligent lock

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1336937A1 (en) * 2002-02-13 2003-08-20 Swisscom AG Access control system, access control method and devices suitable therefore
CN101630422A (en) * 2009-08-31 2010-01-20 天津工业大学 Intelligent electronic access control system
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN102646295A (en) * 2011-02-21 2012-08-22 中国移动通信集团江苏有限公司 An intelligent community security system and its method for realizing customized services
CN202838471U (en) * 2011-12-23 2013-03-27 广州格罗博信息技术有限公司 Access control system
CN103248484A (en) * 2013-04-03 2013-08-14 张泽 Door access control system and method
CN103593891A (en) * 2013-11-06 2014-02-19 周良文 Intelligent access system with instant messaging function and method
CN103679884A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Casual user authorization device and method for internet door control
CN104217473A (en) * 2013-06-03 2014-12-17 李万君 Intelligent access control system and apparatus based on plane code and NFC
CN104700479A (en) * 2015-03-10 2015-06-10 四川省宁潮科技有限公司 Door control method based on out-of-band authentication
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8844811B1 (en) * 2013-06-04 2014-09-30 April Elizabeth Rogers System and method for controlling locks
CN104464064A (en) * 2014-12-23 2015-03-25 韶关市英诺维科技设备有限公司 Application of two-dimensional code lock to home furnishing
CN104537736A (en) * 2014-12-23 2015-04-22 韶关市英诺维科技设备有限公司 Application of two-dimension code lock in business management
CN104851171A (en) * 2015-06-05 2015-08-19 成都生长线科技有限公司 Intelligent access control method, device and system
CN105389870A (en) * 2015-10-28 2016-03-09 广州畅联信息科技有限公司 Entrance guard management method and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1336937A1 (en) * 2002-02-13 2003-08-20 Swisscom AG Access control system, access control method and devices suitable therefore
CN101630422A (en) * 2009-08-31 2010-01-20 天津工业大学 Intelligent electronic access control system
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN102646295A (en) * 2011-02-21 2012-08-22 中国移动通信集团江苏有限公司 An intelligent community security system and its method for realizing customized services
CN202838471U (en) * 2011-12-23 2013-03-27 广州格罗博信息技术有限公司 Access control system
CN103248484A (en) * 2013-04-03 2013-08-14 张泽 Door access control system and method
CN104217473A (en) * 2013-06-03 2014-12-17 李万君 Intelligent access control system and apparatus based on plane code and NFC
CN103593891A (en) * 2013-11-06 2014-02-19 周良文 Intelligent access system with instant messaging function and method
CN103679884A (en) * 2013-12-02 2014-03-26 大连智慧城科技有限公司 Casual user authorization device and method for internet door control
CN104732626A (en) * 2015-01-22 2015-06-24 西安酷派软件科技有限公司 Entrance guard authorization management method and entrance guard authorization management system
CN104700479A (en) * 2015-03-10 2015-06-10 四川省宁潮科技有限公司 Door control method based on out-of-band authentication

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017071249A1 (en) * 2015-10-28 2017-05-04 广州畅联信息科技有限公司 Access management method and system
CN106534080A (en) * 2016-10-20 2017-03-22 雷飏 Object access authority management method and corresponding background system, device and user terminal
CN110677436A (en) * 2016-10-20 2020-01-10 张桂兰 Object access authority management background system, device and user terminal
CN106534080B (en) * 2016-10-20 2019-12-10 深圳市蜘蛛旅游网络技术有限公司 Object access right management method, corresponding background system, device and user terminal
CN111464556A (en) * 2016-10-25 2020-07-28 雷飏 Portable user terminal
CN106530460A (en) * 2016-11-01 2017-03-22 张涛 Access control authority distribution method and system
CN106780923A (en) * 2017-01-24 2017-05-31 柳州得实科技有限公司 A kind of access permission management system
CN107483899A (en) * 2017-09-22 2017-12-15 深圳思瓦科技有限公司 A kind of intelligent doorbell and its implementation, intelligent doorbell system
CN109727340A (en) * 2017-10-31 2019-05-07 朱铭赫 Access control system operation method, device and system
CN107967732A (en) * 2017-10-31 2018-04-27 美的智慧家居科技有限公司 Intelligent door lock and voice method for burn-recording
CN108023956B (en) * 2017-12-07 2020-08-14 厦门狄耐克智能科技股份有限公司 Access control cloud service system and method for registering access control equipment in access control cloud service system
CN108023956A (en) * 2017-12-07 2018-05-11 厦门狄耐克智能科技股份有限公司 A kind of gate inhibition's cloud service system and the method that access control equipment is registered to the system
CN108156000A (en) * 2018-02-01 2018-06-12 谢春旺 A kind of multifunctional conference management method, electronic equipment and storage medium
CN110136302A (en) * 2018-02-02 2019-08-16 新世界发展有限公司 Access control system and control method for remote access to closing member
WO2019148582A1 (en) * 2018-02-02 2019-08-08 深圳市鹰硕技术有限公司 Control method and system for intelligent school campus
CN110827457A (en) * 2018-07-23 2020-02-21 宁波欧依安盾安全科技有限公司 Virtual access control system based on safety competence identification
CN109598831A (en) * 2018-11-20 2019-04-09 北京千丁互联科技有限公司 A kind of visitor's access control system control method and its device based on image recognition
CN109615738A (en) * 2018-11-30 2019-04-12 深圳绿米联创科技有限公司 Door lock management method, device, electronic device and storage medium
CN110580757A (en) * 2019-08-01 2019-12-17 深圳左邻永佳科技有限公司 access control equipment opening method and device based on graphic code and storage medium
CN110570559A (en) * 2019-08-21 2019-12-13 杭州享钥科技有限公司 Electronic key sharing method in access control system based on mobile terminal
CN112562138A (en) * 2020-11-24 2021-03-26 北京百度网讯科技有限公司 Method, device, equipment and storage medium for managing gate
CN113888779A (en) * 2021-09-29 2022-01-04 广东好太太智能家居有限公司 User authority management method, system and device based on intelligent lock and storage medium

Also Published As

Publication number Publication date
WO2017071249A1 (en) 2017-05-04

Similar Documents

Publication Publication Date Title
CN105389870A (en) Entrance guard management method and system
Zhang et al. Secure and efficient data storage and sharing scheme for blockchain‐based mobile‐edge computing
Passerat-Palmbach et al. A blockchain-orchestrated federated learning architecture for healthcare consortia
US10785167B2 (en) Method for controlling access to a shared resource
US9031876B2 (en) Managing keys for encrypted shared documents
CN102916954B (en) Attribute-based encryption cloud computing safety access control method
CN103457733B (en) A kind of cloud computing environment data sharing method and system
CN112003886A (en) Block chain-based Internet of things data sharing system and method
CN107222303A (en) Digital publishing rights traceability system building method based on block chain and cloud platform
Peng et al. A peer-to-peer file storage and sharing system based on consortium blockchain
DE202017006897U1 (en) Systems for providing a universal decentralized solution for verifying users with cross-verification features
CN102025710A (en) Multi-application intelligent card and intelligent card multi-application management system and method
CN106789875A (en) A kind of block chain service unit, block chain service system and its communication means
CN109525570A (en) A kind of data hierarchy safety access control method of Cargo Oriented on Group client
Zhang et al. Bcst‐apts: Blockchain and cp‐abe empowered data supervision, sharing, and privacy protection scheme for secure and trusted agricultural product traceability system
CN114285867B (en) Air-railway combined transport data sharing system based on alliance chain and attribute encryption
CN110933093A (en) Block chain data sharing platform and method based on differential privacy protection technology
CN108900298A (en) Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
CN114710370B (en) Fine-grained access control method and system based on fog blockchain and attribute encryption
CN104618366B (en) A kind of network archives safety management system and method based on attribute
US9432344B2 (en) Secure storage and sharing of user objects
CN103078960B (en) Concerning security matters electronic document data exchanges and shared system
CN113111386A (en) Privacy protection method for block chain transaction data
Fukami et al. The impact of decentralized identity architecture on data exchange
Xiao et al. Blockchain‐based reliable image copyright protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160309