[go: up one dir, main page]

CN107230265B - Data interaction method and system - Google Patents

Data interaction method and system Download PDF

Info

Publication number
CN107230265B
CN107230265B CN201611060585.1A CN201611060585A CN107230265B CN 107230265 B CN107230265 B CN 107230265B CN 201611060585 A CN201611060585 A CN 201611060585A CN 107230265 B CN107230265 B CN 107230265B
Authority
CN
China
Prior art keywords
information
authenticated
control device
authentication
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611060585.1A
Other languages
Chinese (zh)
Other versions
CN107230265A (en
Inventor
李东声
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Corp
Original Assignee
Tendyron Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Corp filed Critical Tendyron Corp
Priority to CN201611060585.1A priority Critical patent/CN107230265B/en
Publication of CN107230265A publication Critical patent/CN107230265A/en
Priority to PCT/CN2017/107602 priority patent/WO2018095182A1/en
Application granted granted Critical
Publication of CN107230265B publication Critical patent/CN107230265B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a data interaction method and a system, wherein the method comprises the following steps: the method comprises the steps that a first server receives first information sent by a client; the first server distributes a target user for the position information and determines the identity information of the target user; the first server sends second information to the second server; the second server receives the second information and sends the second information to the authority control device; the authority control device receives the second information and stores the second information; the authority control device detects that a first information carrier to be authenticated enters a detection range, and reads first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated; the authority control device performs first authentication on the identity information to be authenticated by using the stored identity information of the target user; and the authority control device executes authorization operation after the first authentication is passed.

Description

Data interaction method and system
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a data interaction method and system.
Background
At present, in order to improve the security of a community, entrance doors of gates of some communities and entrances of buildings in the community are generally provided with entrance guards. The owner who lives in the district uses the entrance guard card issued by the district to normally go in and out the district and the building, and the personnel without the entrance guard card can not enter the district.
With the rapid development of the internet, more and more users choose to purchase goods through the internet, make an online reservation for takeout, or apply for electrical equipment maintenance on the internet, and when a service person, such as a courier or a repairman, needs to provide service at a location in a cell with a door, the service person usually cannot enter the cell. How to enable a service person without access authority to enter a cell when providing services for users is an urgent problem to be solved, and meanwhile, the security of the management of the cell is not affected.
Disclosure of Invention
The present invention is directed to solving the above problems.
The invention mainly aims to provide a data interaction method;
another object of the present invention is to provide a data interaction system.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
in the aspect of the present invention, the scheme 1 provides a data interaction method, including: the method comprises the steps that a first server receives first information sent by a client, wherein the first information comprises position information; the first server distributes a target user for the position information and determines the identity information of the target user; the first server sends second information to the second server, wherein the second information at least comprises identity information of a target user; the second server receives the second information and sends the second information to the authority control device; the authority control device receives the second information and stores the second information; the authority control device detects that a first information carrier to be authenticated enters a detection range, and reads first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated; the authority control device performs first authentication on the identity information to be authenticated by using the stored identity information of the target user; and the authority control device executes authorization operation after the first authentication is passed.
Scheme 2, the method of scheme 1, further comprising: and after the first authentication is passed or authorization operation is executed, the authority control device deletes the stored second information or sets the state of the second information to be a failure state.
Scheme 3, the method of scheme 1, the second information further comprising: the location information; the right control device stores the second information, including: and the authority control device stores the second information when the position information in the second information is consistent with the position information of the authority control device.
Scheme 4, the method according to scheme 3, wherein before the authorization operation is performed by the authorization control device, the method further comprises: the authority control device detects that a second information carrier to be authenticated enters a detection range, and reads the second information to be authenticated, wherein the second information to be authenticated comprises: location information to be authenticated; the authority control device performs second authentication on the position information to be authenticated by using the stored position information; the authority control device executes authorization operation, specifically: and after the first authentication and the second authentication pass, executing authorization operation.
Scheme 5, the method according to scheme 1, the authority control device performing authorization operation, including: and after the first authentication is passed, the authority control device judges whether the time of timing arrival exceeds a specified time, and if not, the authorization operation is executed, wherein the timing is started when the authority control device receives second information, or the timing is started when the authority control device receives an instruction sent by a second server.
Scheme 6, the method of scheme 1, the second information further comprising location information; the second server sends the second information to an authority control device, and the second information comprises: and the second server sends the second information to the authority control device when the position of the authority control device is consistent with the position information.
Scheme 7, the method according to scheme 1, wherein before the authorization operation is performed by the authorization control device, the method further comprises: the authority control device detects that a second information carrier to be authenticated enters a detection range, and reads second information to be authenticated from the second information carrier to be authenticated, wherein the second information to be authenticated comprises: location information to be authenticated; the authority control device carries out second authentication on the position information to be authenticated by utilizing the position information of the authority control device; the authority control device executes authorization operation, including: and after the first authentication and the second authentication pass, executing authorization operation.
Scheme 8 shows that according to the method of scheme 1, the first information carrier to be authenticated is an identity card, a graphic code carrying identity information, a bar code carrying identity information, or a biological characteristic.
Scheme 9 the method of scheme 1, further comprising: and after the first authentication is passed, the authority control device sends the identity information of the target user to the client.
In another aspect of the present invention, a data interaction system is provided, including: the first server is used for receiving first information sent by a client, wherein the first information comprises position information; distributing a target user for the position information, and determining the identity information of the target user; sending second information to the second server, wherein the second information at least comprises identity information of a target user; the second server is used for receiving the second information and sending the second information to the authority control device; the authority control device is used for receiving the second information and storing the second information; detecting that a first information carrier to be authenticated enters a detection range, and reading first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated; performing first authentication on the identity information to be authenticated by using the stored identity information of the target user; and after the first authentication is passed, performing an authorization operation.
Scheme 11, the system according to scheme 10, and the authorization control device are further configured to delete the stored second information or set the state of the second information to a failure state after the first authentication is passed or an authorization operation is performed.
Scheme 12, the system of scheme 10, the second information further comprising: the location information; the authority control device is specifically configured to store the second information when the location information in the second information is consistent with the location information where the authority control device is located.
Scheme 13, the system according to scheme 12, the authority control device is further configured to detect that a second information carrier to be authenticated enters a detection range before performing an authorization operation, and read the second information to be authenticated, where the second information to be authenticated includes: location information to be authenticated; the authority control device is also used for carrying out second authentication on the position information to be authenticated by utilizing the stored position information; the authority control device executes authorization operation, and is specifically used for executing authorization operation after the first authentication and the second authentication both pass.
The system according to claim 14 or 10, wherein the authorization control device is specifically configured to determine whether a time that is reached by timing exceeds a predetermined time after the first authentication is passed, and if not, execute an authorization operation, where the timing is started when the authorization control device receives the second information, or the timing is started when the authorization control device receives an instruction sent by the second server.
Scheme 15 the system of scheme 10, the second information further comprising location information; and the second server is specifically used for sending the second information to the authority control device when the position of the authority control device is consistent with the position information.
Scheme 16, the system according to scheme 10, the authority control device is further configured to detect that a second information carrier to be authenticated enters a detection range before performing an authorization operation, and read second information to be authenticated from the second information carrier to be authenticated, where the second information to be authenticated includes: location information to be authenticated; performing second authentication on the position information to be authenticated by using the position information of the authority control device; the permission control device is specifically configured to execute an authorization operation after the first authentication and the second authentication both pass.
Scheme 17 and the system according to scheme 10, wherein the first information carrier to be authenticated is an identity card, a graphic code carrying identity information, a barcode carrying identity information, or a biometric feature.
Scheme 18, the system according to scheme 10, and the right control apparatus are further configured to send the identity information of the target user to the client after the first authentication is passed.
The technical scheme provided by the invention can be seen that, after receiving the position information sent by the client, the first server allocates the target user and sends the identity information of the target user to the second server, the target user is a person (such as a delivery person or a meal delivery person) providing service for the client located in the position information, the second server sends the identity information of the target user to the authority control device, when the target user arrives at the position of the authority control device, the first information carrier to be authenticated is placed in the detection area of the authority control device, the authority control device detects and reads the identity information to be authenticated, performs the first authentication, and if the authentication is passed, performs the authorization operation. Therefore, in a cell provided with an access control (the access control is an authority control device), even if a target user (such as a delivery person or a food delivery person and the like) does not have an access card of the cell, the scheme of the invention can be adopted to send the identity information of the target user to the second server through the first server and send the identity information to the access control through the second server, and after the target user is authenticated by the access control through the identity information of the target user and passes the authentication, the target user can obtain authorization to enter the cell.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a flowchart of a data interaction method according to embodiment 1 of the present invention;
fig. 2 is a schematic structural diagram of a data interaction system according to embodiment 2 of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "up", "down", "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention. Furthermore, the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or quantity or location.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Embodiments of the present invention will be described in further detail below with reference to the accompanying drawings.
For the convenience of understanding the present invention, the following briefly introduces possible application scenarios in the present embodiment:
scenarios to which the present embodiment is applicable include, but are not limited to: the system comprises a client, a first server, a second server and a permission control device; the client purchases a certain service (for example, online shopping, online ordering and the like) through a client, the client sends position information (for example, a delivery address) to a first server, the first server distributes a target user (for example, a courier) for the position information and sends identity information of the target user to a second server, the second server sends the identity information of the target user to an authority control device (for example, an entrance guard set at a position identified by the delivery address), the target user holds a first information carrier to be authenticated, and when the target user reaches the position of the authority control device, the authority control device performs first authentication and authorization on the target user by using the identity information of the target user.
Example 1
The present embodiment provides a data interaction method, as shown in fig. 1, the method includes the following steps:
101. the method comprises the steps that a first server receives first information sent by a client, wherein the first information comprises position information;
the first server in this embodiment may communicate with the client. The first server may be a server providing online services such as online supermarkets and online food ordering, the client may be an application program for realizing online ordering, shopping or food ordering, and the client may be installed on a device (e.g., a PC, a mobile phone, a palmtop computer, etc.) held by a user.
In this embodiment, the first information may be order information, and the location information may be an order address; for example, when shopping online, the location information is specifically a delivery address, when ordering online, the location information is specifically a delivery address, and the like. In different application scenarios, the location information may represent address information with different meanings, and is not limited herein.
In addition, the first information may further include information such as an order number, order details, an order amount, an order date, a user name for placing an order, and the like, which is not limited herein.
102. The first server distributes a target user for the position information and determines the identity information of the target user;
in this embodiment, the target user is a person who provides corresponding service for the customer located in the location information, for example, when shopping online, the target user is specifically a deliverer, when ordering online, the location information is specifically a deliverer, and the like. The target user may represent a person providing different services for different application scenarios, which is not limited herein.
The identity information of the target user in this embodiment may be identity card information or may be any kind of biometric information such as fingerprint information, palm print information, or iris information. The identity card information at least comprises an identity card number, and the identity card information can be read from an identity card, or can be read from an order graphic code or an order single linear code carrying the identity card information.
103. The first server sends second information to the second server, wherein the second information at least comprises identity information of a target user;
in this embodiment, the second server may be configured to manage the access control device, for example, in a cell with an access control, the access control device may be an access control, and the second server may be a server that can implement data interaction and management for the access control.
In this embodiment, the first server and the second server are independent servers, and the respective functions are different. The first server is used for providing network services such as online shopping and online ordering, the second server is used for performing data interaction and management on the authority control device, and the first server and the second server can be communicated through a wireless network or a wired network.
104. The second server receives the second information and sends the second information to the authority control device;
in this embodiment, the second server and the authority control device may communicate through a wired connection, such as a network connection, or may communicate through a wireless network, such as a mobile network or an intra-cell local area network.
The access control device may be a door access.
105. The authority control device receives the second information and stores the second information;
in this embodiment, the second information at least includes the identity information of the target user, and the permission control device stores the received identity information of the target user, so as to perform identity authentication on the target user by using the identity information of the target user subsequently.
106. The authority control device detects that a first information carrier to be authenticated enters a detection range, and reads first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated;
in this embodiment, the authority control device is provided with a module supporting an information reading function, for example, the module may be an identity card reading module reading identity card information, and correspondingly, the first information carrier to be authenticated is an identity card, and the read first information to be authenticated is identity card information; for example, the module is a code scanning module, correspondingly, the first information carrier to be authenticated may be an order form graphic code or an order form barcode carrying identity information, and the read first information to be authenticated may be identity information of a target user read from the order form graphic code or the order form barcode (the identity information may be, for example, identity card information such as an identity card number); for another example, the module may be a biometric reading module that reads a biometric, and accordingly, the first information carrier to be authenticated is a biometric, and the read first information to be authenticated is biometric information. The biological characteristics can be fingers, and the corresponding biological characteristic information can be fingerprints; or, the biological characteristic may be a palm, and the corresponding biological characteristic information may be a palm print; alternatively, the biometric characteristic may be an eye, and the corresponding biometric information may be an iris, etc., without limitation.
107. The authority control device performs first authentication on the identity information to be authenticated by using the stored identity information of the target user;
108. and the authority control device executes authorization operation after the first authentication is passed.
In this embodiment, the stored identity information of the target user is used to perform the first authentication on the identity information to be authenticated, which may be implemented as follows: and judging whether the stored identity information of the target user is consistent with the identity information to be authenticated, if so, passing the first authentication, and if not, failing to pass the first authentication.
In this embodiment, when the access control device is an access control device, the authorization execution operation may be as follows: and (5) unlocking the door lock.
In this embodiment, after receiving the location information sent by the client, the first server allocates a target user and sends the identity information of the target user to the second server, where the target user is a person (e.g., a delivery person or a meal delivery person) who provides service for a client located in the location information, the second server sends the identity information of the target user to the authorization control device, and when the target user arrives at the location of the authorization control device, places the first information carrier to be authenticated in the detection area of the authorization control device, and the authorization control device detects and reads the identity information to be authenticated, performs the first authentication, and performs an authorization operation if the authentication passes. Therefore, in a cell provided with an access control (the access control is an authority control device), even if a target user (such as a delivery person or a food delivery person and the like) does not have an access card of the cell, the scheme of the invention can be adopted to send the identity information of the target user to the second server through the first server and send the identity information to the access control through the second server, and after the target user is authenticated by the access control through the identity information of the target user and passes the authentication, the target user can also obtain authorization to enter the cell.
As an optional implementation manner of this embodiment, after the first authentication is passed or an authorization operation is performed, the authorization control apparatus deletes the stored second information or sets the state of the second information to be a failure state. In order to improve the security of the authorization operation, in this embodiment, after performing the authentication or the authorization operation, the stored second information is deleted, so that the second information cannot be used for the next authentication or authorization in the subsequent process, or the state of the second information is set to be a failure state, that is, the second information is failed after being used for the authentication and authorization operation, and then the second information cannot be used for the next authentication or authorization, so that the second information is prevented from being illegally reused for the authentication and authorization in the subsequent process.
As an optional implementation manner of this embodiment, to further ensure the security of the authorization operation, and also to set an age for the authorization operation, the authorization control apparatus performs the authorization operation, including: and after the first authentication is passed, the authority control device judges whether the time of timing arrival exceeds a specified time, and if not, the authorization operation is executed, wherein the timing is started when the authority control device receives second information, or the timing is started when the authority control device receives an instruction sent by a second server.
For example, the time when the authorization control device receives the second information or receives the timing start instruction transmitted by the second server is 9 am, the timing is started at this time, the predetermined time may be set to 12 am, if the time when the authorization control device times does not exceed 12 am after the first authentication is passed, the authorization operation is allowed to be executed, and if the time exceeds 12 am, the authorization operation is not executed even if the first authentication is passed.
As an optional implementation manner of this embodiment, the second information further includes: the location information. The location information can be used for performing second authentication on the target user, and the security of the authorization operation is further guaranteed.
As an optional implementation manner of this embodiment, the sending, by the second server, the second information to the authorization control apparatus includes: and the second server sends the second information to the authority control device when the position of the authority control device is consistent with the position information. In practical applications, the second server may manage a plurality of rights control devices, and the locations of different rights control devices are different. When the second server sends the second information, since the location information in the second information indicates the address where the target user provides the service (for example, the target user may be a courier, the location information may be a delivery address, and the access control device is an access control device), it may be determined whether the location information in the second information is consistent with the location information of the access control device (for example, it is determined whether the delivery address is consistent with the location of the access control device), and if so, the second information is sent to the access control device, and if not, the second information is not sent. In this embodiment, the authority control device whose position information is consistent with the position information in the second information receives the second information, and the authority control device whose position information is inconsistent with the position information in the second information does not receive the second information, so that the authority control device can authorize the target user when the position information of the target user is consistent with the position of the authority control device in the subsequent process, otherwise, the authority control device does not authorize the target user.
In the above embodiment, when the second server sends the second information to the right control device, the second server sends the second information when determining that the position information in the second information is consistent with the position of the right control device, and of course, the second server may send the second information directly to each right control device without considering the problem of whether the position information in the second information is consistent with the position of the right control device, and the right control device determines whether the position information in the second information is consistent with the position information of the right control device, and then performs the corresponding processing:
as an optional implementation manner of this embodiment, after receiving the second information, the right control apparatus may perform the following operations: and the authority control device stores the second information when the position information in the second information is consistent with the position information of the authority control device. In this embodiment, it may happen that the second information sent by the second server to the authorization control device, the location information carried by the second information is inconsistent with the location of the authorization control device, and the authorization control device stores the second information when the location information in the second information is consistent with the location information of the authorization control device, and if not, does not store the second information, so that when the subsequent authorization control device performs the second authentication by using the location information, the location of the service provided by the target user is consistent with the location information stored by the authorization control device, the authorization of the authorization control device may be obtained, otherwise, the authorization may not be obtained, and the security of the authorization operation is further ensured.
As an optional implementation manner of this embodiment, before the authorization operation is performed by the authorization control apparatus, in addition to performing a first authentication on the target user by using the identity information, the method may also perform a second authentication on the target user by using the stored location information, and the method further includes: the authority control device detects that a second information carrier to be authenticated enters a detection range, and reads the second information to be authenticated, wherein the second information to be authenticated comprises: location information to be authenticated; the authority control device performs second authentication on the position information to be authenticated by using the stored position information; at this time, the authorization control device executes authorization operation, specifically: and after the first authentication and the second authentication pass, executing authorization operation. In this embodiment, the second information carrier to be authenticated includes an order graphic code or an order barcode carrying position information, and when a target user carries a good (the goods are attached with the order graphic code or the order barcode representing the order information) to reach the position of the authority control device, the authority control device may read a delivery address from the order graphic code or the order barcode, where the delivery address is equivalent to the position information to be authenticated.
In the following, the target user is a courier, and the location information is a delivery address: for example, 8 buildings are arranged in a community, each building is provided with an entrance guard, when the entrance guard located at the 8 th building receives second information, if a delivery address in the second information is the 8 th building, the entrance guard of the 8 th building stores the second information (the second information comprises identity information and a delivery address of a courier), otherwise, the second information is not stored, subsequently, when the courier arrives at the 8 th building, if the delivery address of goods to be delivered by the courier is the 8 th building, the entrance guard of the 8 th building reads the delivery address by scanning order information, and if the result obtained by comparing the position information is that the delivery address is consistent with the previously stored delivery address, the entrance guard of the 8 th building is authorized by the courier, so that the courier enters the 8 th building; and if the delivery address of the goods to be delivered by the courier is not the 8 th floor, the 8 th floor access control reads the delivery address by scanning order information, and the delivery address is inconsistent with the previously stored delivery address according to the result obtained by comparing the position information, so that the courier cannot obtain the 8 th floor access control authorization, and cannot enter the 8 th floor.
As an optional implementation manner of this embodiment, before the authorization operation is performed by the authority control device, in addition to performing the first authentication on the target user by using the identity information, the authority control device may also perform the second authentication on the target user by using the location information of the authority control device, in this implementation manner, the authority control device does not need to store the location information in the second information, and directly performs the second authentication by using the location information of the authority control device, specifically, the method further includes: the authority control device detects that a second information carrier to be authenticated enters a detection range, and reads second information to be authenticated from the second information carrier to be authenticated, wherein the second information to be authenticated comprises: location information to be authenticated; the authority control device carries out second authentication on the position information to be authenticated by utilizing the position information of the authority control device; the authority control device executes authorization operation, including: and after the first authentication and the second authentication pass, executing authorization operation. In this embodiment, the second information carrier to be authenticated includes an order graphic code or an order barcode carrying order information, and the like, and the authorization control device can read a delivery address from the order graphic code or the order barcode, where the delivery address is equivalent to the location information to be authenticated, and since the authorization control device also has location information, if the read location information to be authenticated is consistent with the location information of the authorization control device, the second authentication is passed, and otherwise the second authentication is not passed. That is, when the authorization control device performs the second authentication by using the location information, the authorization of the authorization control device can be obtained when the location (for example, the delivery address) of the service provided by the target user is consistent with the location information of the authorization control device, otherwise, the authorization cannot be obtained, thereby further ensuring the security of the authorization operation.
It should be noted that, in this embodiment, when both the first information carrier to be authenticated and the second information carrier to be authenticated carry the identity information and the location information of the target user, the first information carrier to be authenticated and the second information carrier to be authenticated may be the same carrier, for example, both the first information carrier to be authenticated and the second information carrier to be authenticated are order graphic codes or order bar codes, and when the order graphic codes or the order bar codes carry the identity information and the location information of the target user, the authority control device may obtain the identity information of the target user and may also obtain the location information by scanning the codes. Of course, the first information carrier to be authenticated and the second information carrier to be authenticated may be different carriers, for example, the first information carrier to be authenticated is an identity card of a target user, the second information carrier to be authenticated is an order graphic code or an order barcode, and the order graphic code or the order barcode carries location information.
As an optional implementation manner of this embodiment, the method further includes: and after the first authentication is passed, the authority control device sends the identity information of the target user to the client. The right control device sends the identity information of the target user to the client so that the client can prompt the client that the target user passes the authorization, for example, after the access control passes the first authentication of the courier, the access control sends the identity information of the courier to the client so that the client can prompt the courier that the courier passes the authentication of the access control and is about to deliver goods.
Example 2
This embodiment provides a data interaction system, which can be used to execute the data interaction method in embodiment 1, as shown in fig. 2, the system includes: a first server 11, a second server 12 and a right control device 13;
the first server 11 is configured to receive first information sent by a client, where the first information includes location information; distributing a target user for the position information, and determining the identity information of the target user; sending second information to the second server, wherein the second information at least comprises identity information of a target user;
the second server 12 is configured to receive the second information and send the second information to an authority control device;
the authority control device 13 is configured to receive the second information and store the second information; detecting that a first information carrier to be authenticated enters a detection range, and reading first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated; performing first authentication on the identity information to be authenticated by using the stored identity information of the target user; and after the first authentication is passed, performing an authorization operation.
The first server in this embodiment may communicate with the client. The first server may be a server providing online services such as online supermarkets and online food ordering, the client may be an application program for realizing online ordering, shopping or food ordering, and the client may be installed on a device (e.g., a PC, a mobile phone, a palmtop computer, etc.) held by a user.
In this embodiment, the first information may be order information, and the location information may be an order address; for example, when shopping online, the location information is specifically a delivery address, when ordering online, the location information is specifically a delivery address, and the like. In different application scenarios, the location information may represent address information with different meanings, and is not limited herein.
In addition, the first information may further include information such as an order number, order details, an order amount, an order date, a user name for placing an order, and the like, which is not limited herein.
In this embodiment, the target user is a person who provides corresponding service for the customer located in the location information, for example, when shopping online, the target user is specifically a deliverer, when ordering online, the location information is specifically a deliverer, and the like. The target user may represent a person providing different services for different application scenarios, which is not limited herein.
The identity information of the target user in this embodiment may be identity card information or may be any kind of biometric information such as fingerprint information, palm print information, or iris information.
In this embodiment, the second server may be configured to manage the access control device, for example, in a cell with an access control, the access control device may be an access control, and the second server may be a server that can implement data interaction and management for the access control.
In this embodiment, the first server and the second server are independent servers, and the respective functions are different. The first server is used for providing network services such as online shopping and online ordering, the second server is used for performing data interaction and management on the authority control device, and the first server and the second server can be communicated through a wireless network or a wired network.
In this embodiment, the authority control device is provided with a module supporting an information reading function, for example, the module may be an identity card reading module reading identity card information, and correspondingly, the first information carrier to be authenticated is an identity card, and the read first information to be authenticated is identity card information; for example, the module is a code scanning module, correspondingly, the first information carrier to be authenticated can be an order graphic code or an order bar code or the like carrying identity information, and the read first information to be authenticated can be identity information of a target user read from the order graphic code or the order bar code; for another example, the module may be a biometric reading module that reads a biometric, and accordingly, the first information carrier to be authenticated is a biometric, and the read first information to be authenticated is biometric information. The biological characteristics can be fingers, and the corresponding biological characteristic information can be fingerprints; or, the biological characteristic may be a palm, and the corresponding biological characteristic information may be a palm print; alternatively, the biometric characteristic may be an eye, and the corresponding biometric information may be an iris, etc., without limitation.
In this embodiment, the stored identity information of the target user is used to perform the first authentication on the identity information to be authenticated, which may be implemented as follows: and judging whether the stored identity information of the target user is consistent with the identity information to be authenticated, if so, passing the first authentication, and if not, failing to pass the first authentication.
In this embodiment, when the access control device is an access control device, the authorization execution operation may be as follows: and (5) unlocking the door lock.
In this embodiment, after receiving the location information sent by the client, the first server allocates a target user and sends the identity information of the target user to the second server, where the target user is a person (e.g., a delivery person or a meal delivery person) who provides service for a client located in the location information, the second server sends the identity information of the target user to the authorization control device, and when the target user arrives at the location of the authorization control device, places the first information carrier to be authenticated in the detection area of the authorization control device, and the authorization control device detects and reads the identity information to be authenticated, performs the first authentication, and performs an authorization operation if the authentication passes. Therefore, in a cell provided with an access control (the access control is an authority control device), even if a target user (such as a delivery person or a food delivery person and the like) does not have an access card of the cell, the scheme of the invention can be adopted to send the identity information of the target user to the second server through the first server and send the identity information to the access control through the second server, and after the target user is authenticated by the access control through the identity information of the target user and passes the authentication, the target user can obtain authorization to enter the cell.
As an optional implementation manner of this embodiment, the authority control device is further configured to delete the stored second information or set the state of the second information to be a failure state after the first authentication is passed or an authorization operation is performed. In order to improve the security of the authorization operation, in this embodiment, after performing the authentication or the authorization operation, the stored second information is deleted, so that the second information cannot be used for the next authentication or authorization in the subsequent process, or the state of the second information is set to be a failure state, that is, the second information is failed after being used for the authentication and authorization operation, and then the second information cannot be used for the next authentication or authorization, so that the second information is prevented from being illegally reused for the authentication and authorization in the subsequent process.
As an optional implementation manner of this embodiment, to further ensure the security of the authorization operation, and may further set an age for the authorization operation, where the authorization control device is specifically configured to determine whether a time when a timer reaches exceeds a specified time after the first authentication passes, and if the time does not exceed the specified time, execute the authorization operation, where the time is started when the authorization control device receives the second information, or the time is started when the authorization control device receives an instruction sent by the second server.
As an optional implementation manner of this embodiment, the second information further includes: the location information; the location information can be used for performing second authentication on the target user, and the security of the authorization operation is further guaranteed.
As an optional implementation manner of this embodiment, the second server is specifically configured to send the second information to the authorization control apparatus when the location of the authorization control apparatus is consistent with the location information.
In practical applications, the second server may manage a plurality of rights control devices, and the locations of different rights control devices are different. When the second server sends the second information, since the location information in the second information indicates the address where the target user provides the service (for example, the target user may be a courier, the location information may be a delivery address, and the access control device is an access control device), it may be determined whether the location information in the second information is consistent with the location information of the access control device (for example, it is determined whether the delivery address is consistent with the location of the access control device), and if so, the second information is sent to the access control device, and if not, the second information is not sent. In this embodiment, the authority control device whose position information is consistent with the position information in the second information receives the second information, and the authority control device whose position information is inconsistent with the position information in the second information does not receive the second information, so that the authority control device can authorize the target user when the position information of the target user is consistent with the position of the authority control device in the subsequent process, otherwise, the authority control device does not authorize the target user.
In the above embodiment, when the second server sends the second information to the right control device, the second server sends the second information when determining that the position information in the second information is consistent with the position of the right control device, and of course, the second server may send the second information directly to each right control device without considering the problem of whether the position information in the second information is consistent with the position of the right control device, and the right control device determines whether the position information in the second information is consistent with the position information of the right control device, and then performs the corresponding processing:
as an optional implementation manner of this embodiment, the authority control device is specifically configured to store the second information when the location information in the second information is consistent with the location information where the authority control device is located. In this embodiment, it may happen that the second information sent by the second server to the authorization control device, the location information carried by the second information is inconsistent with the location of the authorization control device, and the authorization control device stores the second information when the location information in the second information is consistent with the location information of the authorization control device, and if not, does not store the second information, so that when the subsequent authorization control device performs the second authentication by using the location information, the location of the service provided by the target user is consistent with the location information stored by the authorization control device, the authorization of the authorization control device may be obtained, otherwise, the authorization may not be obtained, and the security of the authorization operation is further ensured.
As an optional implementation manner of this embodiment, before the authorization operation is performed by the authorization control apparatus, in addition to performing a first authentication on the target user by using the identity information, the authorization control apparatus may further perform a second authentication on the target user by using the stored location information, specifically, before the authorization operation is performed, the authorization control apparatus is further configured to detect that a second information carrier to be authenticated enters a detection range, and read the second information to be authenticated, where the second information to be authenticated includes: location information to be authenticated; the authority control device is also used for carrying out second authentication on the position information to be authenticated by utilizing the stored position information; the authority control device executes authorization operation, and is specifically used for executing authorization operation after the first authentication and the second authentication both pass. In this embodiment, the second information carrier to be authenticated includes an order graphic code or an order barcode carrying position information, and when a target user carries a good (the goods are attached with the order graphic code or the order barcode representing the order information) to reach the position of the authority control device, the authority control device may read a delivery address from the order graphic code or the order barcode, where the delivery address is equivalent to the position information to be authenticated.
As an optional implementation manner of this embodiment, before the authorization operation is performed by the authority control device, in addition to performing first authentication on the target user by using the identity information, the authority control device may also perform second authentication on the target user by using the location information of the authority control device, in this implementation manner, the authority control device does not need to store the location information in the second information, and directly performs second authentication by using the location information of the authority control device, specifically, the authority control device is further configured to, before the authorization operation is performed, detect that a second information carrier to be authenticated enters a detection range, and read second information to be authenticated from the second information carrier to be authenticated, where the second information to be authenticated includes: location information to be authenticated; performing second authentication on the position information to be authenticated by using the position information of the authority control device; the permission control device is specifically configured to execute an authorization operation after the first authentication and the second authentication both pass.
It should be noted that, in this embodiment, when both the first information carrier to be authenticated and the second information carrier to be authenticated carry the identity information and the location information of the target user, the first information carrier to be authenticated and the second information carrier to be authenticated may be the same carrier, for example, both the first information carrier to be authenticated and the second information carrier to be authenticated are order graphic codes or order bar codes, and when the order graphic codes or the order bar codes carry the identity information and the location information of the target user, the authority control device may obtain the identity information of the target user and may also obtain the location information by scanning the codes. Of course, the first information carrier to be authenticated and the second information carrier to be authenticated may be different carriers, for example, the first information carrier to be authenticated is an identity card of a target user, the second information carrier to be authenticated is an order graphic code or an order barcode, and the order graphic code or the order barcode carries location information.
As an optional implementation manner of this embodiment, the authority control device is further configured to send the identity information of the target user to the client after the first authentication is passed. The right control device sends the identity information of the target user to the client so that the client can prompt the client that the target user passes the authorization, for example, after the access control passes the first authentication of the courier, the access control sends the identity information of the courier to the client so that the client can prompt the courier that the courier passes the authentication of the access control and is about to deliver goods.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (14)

1. A method for data interaction, comprising:
the method comprises the steps that a first server receives first information sent by a client, wherein the first information comprises position information;
the first server allocates a target user for the position information, and determines identity information of the target user, wherein the identity information of the target user comprises: identity card information or biometric information, wherein the identity card information is read from an identity card of the target user;
the first server sends second information to a second server, wherein the second information at least comprises the identity information and the position information of the target user;
the second server receives the second information and sends the second information to the authority control device when the position of the authority control device is consistent with the position information;
the authority control device receives the second information and stores the second information when the position information in the second information is consistent with the position information of the authority control device;
the authority control device detects that a first information carrier to be authenticated enters a detection range, and reads first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated; under the condition that the first information carrier to be authenticated is an identity card, the identity information to be authenticated comprises identity card information; under the condition that the first information carrier to be authenticated is biological characteristics, the identity information to be authenticated comprises biological characteristic information;
the authority control device performs first authentication on the identity information to be authenticated by using the stored identity information of the target user;
and the authority control device executes authorization operation after the first authentication is passed.
2. The method of claim 1, further comprising: and after the first authentication is passed or authorization operation is executed, the authority control device deletes the stored second information or sets the state of the second information to be a failure state.
3. The method of claim 1, wherein before the authorization control device performs the authorization operation, the method further comprises:
the authority control device detects that a second information carrier to be authenticated enters a detection range, and reads the second information to be authenticated, wherein the second information to be authenticated comprises: location information to be authenticated;
the authority control device performs second authentication on the position information to be authenticated by using the stored position information;
the authority control device executes authorization operation, specifically: and after the first authentication and the second authentication pass, executing authorization operation.
4. The method of claim 1, wherein the authorization control device performs authorization operations comprising: and after the first authentication is passed, the authority control device judges whether the time of timing arrival exceeds a specified time, and if not, the authorization operation is executed, wherein the timing is started when the authority control device receives second information, or the timing is started when the authority control device receives an instruction sent by a second server.
5. The method of claim 1, wherein before the authorization control device performs the authorization operation, the method further comprises:
the authority control device detects that a second information carrier to be authenticated enters a detection range, and reads second information to be authenticated from the second information carrier to be authenticated, wherein the second information to be authenticated comprises: location information to be authenticated;
the authority control device carries out second authentication on the position information to be authenticated by utilizing the position information of the authority control device;
the authority control device executes authorization operation, including: and after the first authentication and the second authentication pass, executing authorization operation.
6. The method according to any one of claims 1 to 5, wherein the first information carrier to be authenticated is an identity card, a graphic code carrying identity information, a bar code carrying identity information, or a biometric feature.
7. The method according to any one of claims 1-5, further comprising: and after the first authentication is passed, the authority control device sends the identity information of the target user to the client.
8. A data interaction system, comprising:
the first server is used for receiving first information sent by a client, wherein the first information comprises position information; distributing a target user for the position information, and determining the identity information of the target user; sending second information to a second server, wherein the second information at least comprises the identity information and the position information of the target user, and the identity information of the target user comprises: identity card information or biometric information, wherein the identity card information is read from an identity card of the target user;
the second server is used for receiving the second information and sending the second information to the authority control device when the position of the authority control device is consistent with the position information;
the authority control device is used for receiving the second information and storing the second information when the position information in the second information is consistent with the position information of the authority control device; detecting that a first information carrier to be authenticated enters a detection range, and reading first information to be authenticated from the first information carrier to be authenticated, wherein the first information to be authenticated comprises identity information to be authenticated; performing first authentication on the identity information to be authenticated by using the stored identity information of the target user; after the first authentication is passed, performing an authorization operation, wherein the identity information to be authenticated comprises identity card information under the condition that the first information carrier to be authenticated is an identity card; and under the condition that the first information carrier to be authenticated is the biological characteristic, the identity information to be authenticated comprises biological characteristic information.
9. The system according to claim 8, wherein the right control device is further configured to delete the stored second information or set the state of the second information to a disabled state after the first authentication is passed or an authorization operation is performed.
10. The system of claim 8,
the permission control device is further configured to detect that a second information carrier to be authenticated enters a detection range before performing an authorization operation, and read the second information to be authenticated, where the second information to be authenticated includes: location information to be authenticated;
the authority control device is also used for carrying out second authentication on the position information to be authenticated by utilizing the stored position information;
the authority control device executes authorization operation, and is specifically used for executing authorization operation after the first authentication and the second authentication both pass.
11. The system according to claim 8, wherein the authorization control device is specifically configured to determine whether a time that is reached by timing is longer than a predetermined time after the first authentication is passed, and if not, perform the authorization operation, wherein the timing is started when the authorization control device receives the second information, or the timing is started when the authorization control device receives an instruction sent by the second server.
12. The system of claim 8,
the authority control device is further configured to detect that a second information carrier to be authenticated enters a detection range before performing an authorization operation, and read second information to be authenticated from the second information carrier to be authenticated, where the second information to be authenticated includes: location information to be authenticated; performing second authentication on the position information to be authenticated by using the position information of the authority control device;
the permission control device is specifically configured to execute an authorization operation after the first authentication and the second authentication both pass.
13. The system according to any one of claims 8 to 12, wherein the first information carrier to be authenticated is an identity card, a graphic code carrying identity information, a bar code carrying identity information, or a biometric feature.
14. The system according to any one of claims 8-12, wherein the right control device is further configured to send the identity information of the target user to the client after the first authentication is passed.
CN201611060585.1A 2016-11-25 2016-11-25 Data interaction method and system Active CN107230265B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611060585.1A CN107230265B (en) 2016-11-25 2016-11-25 Data interaction method and system
PCT/CN2017/107602 WO2018095182A1 (en) 2016-11-25 2017-10-25 Method and system for data exchange

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611060585.1A CN107230265B (en) 2016-11-25 2016-11-25 Data interaction method and system

Publications (2)

Publication Number Publication Date
CN107230265A CN107230265A (en) 2017-10-03
CN107230265B true CN107230265B (en) 2021-05-14

Family

ID=59932635

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611060585.1A Active CN107230265B (en) 2016-11-25 2016-11-25 Data interaction method and system

Country Status (1)

Country Link
CN (1) CN107230265B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018095182A1 (en) * 2016-11-25 2018-05-31 天地融科技股份有限公司 Method and system for data exchange
CN109712291B (en) * 2018-12-26 2020-11-10 巽腾(广东)科技有限公司 Opening method and device of electronic gate and server
CN109840979A (en) * 2019-03-27 2019-06-04 刘强 A kind of Internet of Things cell wisdom access control system
CN114175115A (en) * 2019-07-31 2022-03-11 多米纳斯系统有限公司 Asset management system
CN114863595A (en) * 2022-04-13 2022-08-05 北京声智科技有限公司 User right verification method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617664A (en) * 2013-11-27 2014-03-05 南通芯迎设计服务有限公司 Access control system with express mail receiving function
CN103810552A (en) * 2012-11-09 2014-05-21 西安景行数创信息科技有限公司 Snack industry meal serving scheduling system
CN104346652A (en) * 2013-07-31 2015-02-11 同程网络科技股份有限公司 E-commerce order and scenic spot access control system butt joint communication method
CN105117882A (en) * 2015-08-25 2015-12-02 深圳市唯传科技有限公司 Intelligent logistics delivery method, apparatus, and system
CN105528816A (en) * 2014-09-28 2016-04-27 中国移动通信集团辽宁有限公司 Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NL2004825C2 (en) * 2010-06-04 2011-12-06 Ubiqu B V A method of authorizing a person, an authorizing architecture and a computer program product.
CN105765615B (en) * 2013-09-09 2019-09-17 L·F·格拉泽 communication device
KR101594433B1 (en) * 2015-04-30 2016-02-16 주식회사 아이티아이씨앤씨 A system for controlling the exit and entry using Iris Recognition portable terminal and Method for controlling the exit and entry using Iris Recognition portable
CN105427414B (en) * 2015-11-03 2018-01-19 徐承柬 A kind of caller management method and system
CN105976471B (en) * 2016-05-18 2018-07-20 北京千丁互联科技有限公司 A kind of access control equipment, caller management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103810552A (en) * 2012-11-09 2014-05-21 西安景行数创信息科技有限公司 Snack industry meal serving scheduling system
CN104346652A (en) * 2013-07-31 2015-02-11 同程网络科技股份有限公司 E-commerce order and scenic spot access control system butt joint communication method
CN103617664A (en) * 2013-11-27 2014-03-05 南通芯迎设计服务有限公司 Access control system with express mail receiving function
CN105528816A (en) * 2014-09-28 2016-04-27 中国移动通信集团辽宁有限公司 Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center
CN105117882A (en) * 2015-08-25 2015-12-02 深圳市唯传科技有限公司 Intelligent logistics delivery method, apparatus, and system
CN105741395A (en) * 2016-02-03 2016-07-06 慧锐通智能科技股份有限公司 Entrance guard access method and system based on two-dimension code and face identification

Also Published As

Publication number Publication date
CN107230265A (en) 2017-10-03

Similar Documents

Publication Publication Date Title
CN107230265B (en) Data interaction method and system
US10059358B2 (en) Method and system for preventing shopping cart theft
CA2924381C (en) Access control using portable electronic devices
US9286741B2 (en) Apparatus and method for access control
EP3227866B1 (en) Improved access control using portable electronic devices
US11704955B2 (en) Radio frequency antenna and system for presence sensing and monitoring
CN109074693B (en) Virtual panel for access control system
CN108269330B (en) Access control method, device and system
EP3465643B1 (en) Automated transaction machine with associated beacon
CN103971039B (en) Access control system and method with GPS location verification
US12020525B2 (en) Property management systems
JP7482383B2 (en) Delivery management system, management server, delivery management method, and program recording medium
CN107231404B (en) Data interaction method and system
CN107231340B (en) Data interaction method and system
US10673844B2 (en) Method for providing an access code on a portable device and portable device
EP3483102A1 (en) Elevator request authorization system
JP2020115247A (en) Unlocking system for auto-locking door
WO2018095182A1 (en) Method and system for data exchange
WO2019070520A1 (en) Radio frequency antenna and system for presence sensing and monitoring
JP2010020517A (en) System and method for entry and exit control, apparatus and program for entrance and exit determination
JP2024122319A (en) User authentication system, authentication terminal, management server, business device, user terminal, and user authentication method using the user authentication system
CN117809396A (en) Intelligent door lock personnel verification method and system
KR20140105072A (en) Apparatus, Server, System, Method, and Recording Medium for M2M-based Unmanned Pawn
JP2014235633A (en) Authentication device, unauthorized access monitoring system and authentication program
CN116434389A (en) Access control method, device and system, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant