CN114038099B - Access control authorization method, device, system, electronic equipment and storage medium - Google Patents
Access control authorization method, device, system, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114038099B CN114038099B CN202111165085.5A CN202111165085A CN114038099B CN 114038099 B CN114038099 B CN 114038099B CN 202111165085 A CN202111165085 A CN 202111165085A CN 114038099 B CN114038099 B CN 114038099B
- Authority
- CN
- China
- Prior art keywords
- access control
- information
- user terminal
- service
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/38—Individual registration on entry or exit not involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
Description
技术领域Technical Field
本公开涉及通信技术领域,尤其涉及门禁授权方法、装置、系统、电子设备及存储介质。The present disclosure relates to the field of communication technology, and in particular to a door access authorization method, device, system, electronic device and storage medium.
背景技术Background Art
随着科学技术的不断提高,我国城市中越来越多的住宅小区、商业楼宇及政企办公场所都安装了门禁系统以加强对出入人员的管理,在强化了这些场所的安全措施的同时,门禁系统也为一些临时访问人员例如快递员、外卖配送员或者上门维修人员等带来了不便。然而如果随意将门禁权限开放给这些人员,又会威胁到对住宅小区、商业楼宇及政企办公场所内人员的安全性。基于此,如何即方便上门服务人员等临时访问人员能够方便进入目的区域又保障了目的区域内的人们的安全性成为了亟需解决的技术问题。With the continuous improvement of science and technology, more and more residential communities, commercial buildings and government and enterprise offices in my country's cities have installed access control systems to strengthen the management of people entering and leaving. While strengthening the security measures of these places, the access control system has also brought inconvenience to some temporary visitors such as couriers, takeaway deliverymen or door-to-door maintenance personnel. However, if the access control rights are opened to these people at will, it will threaten the safety of people in residential communities, commercial buildings and government and enterprise offices. Based on this, how to facilitate temporary visitors such as door-to-door service personnel to enter the destination area conveniently and ensure the safety of people in the destination area has become a technical problem that needs to be solved urgently.
发明内容Summary of the invention
为克服相关技术中存在的问题,本公开提供一种门禁授权方法、装置、系统电子设备及存储介质,所述技术方案如下:In order to overcome the problems existing in the related art, the present disclosure provides a door access authorization method, device, system electronic device and storage medium, and the technical solution is as follows:
根据本公开实施例的第一方面,提供一种门禁授权方法,应用于第一用户终端,所述方法包括:According to a first aspect of an embodiment of the present disclosure, a door access authorization method is provided, which is applied to a first user terminal, and the method includes:
从第一服务终端接收门禁权限信息,其中,所述门禁权限信息是由所述第一服务终端从第二用户终端接收到的,或者所述门禁权限信息是所述第一服务终端根据从所述第二用户终端接收到的门禁生成权限动态生成的;Receiving access control authority information from the first service terminal, wherein the access control authority information is received by the first service terminal from the second user terminal, or the access control authority information is dynamically generated by the first service terminal according to the access control generation authority received from the second user terminal;
基于所述门禁权限信息,解锁待访问门禁。Based on the access control authority information, unlock the access control to be accessed.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
向所述第一服务终端发送所述第一用户终端的注册信息;Sending registration information of the first user terminal to the first service terminal;
接收所述第一服务终端对所述注册信息进行验证所生成的第一验证结果;receiving a first verification result generated by the first service terminal verifying the registration information;
所述从第一服务终端接收门禁权限信息,包括:The receiving access control authority information from the first service terminal includes:
响应于所述第一验证结果指示验证成功,从所述第一服务终端接收所述门禁权限信息。In response to the first verification result indicating successful verification, the access control authority information is received from the first service terminal.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
向所述第一服务终端发送解锁信息;Sending unlocking information to the first service terminal;
接收所述第一服务终端对所述解锁信息进行验证所生成的第二验证结果;receiving a second verification result generated by the first service terminal verifying the unlocking information;
所述基于所述门禁权限信息,解锁待访问门禁,包括:The unlocking of the access control to be accessed based on the access control authority information includes:
响应于所述第二验证结果指示验证成功,基于所述门禁权限信息,解锁所述待访问门禁。In response to the second verification result indicating successful verification, the door to be accessed is unlocked based on the door access authority information.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
响应于所述第二验证结果指示验证失败,从所述第一服务终端接收第一门禁权限禁用信息,其中,所述第一门禁权限禁用信息是所述第一服务终端根据所述第二验证结果指示验证失败而生成的。In response to the second verification result indicating a verification failure, first access control permission disabling information is received from the first service terminal, wherein the first access control permission disabling information is generated by the first service terminal according to the second verification result indicating a verification failure.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
从所述第一服务终端接收到第二门禁权限禁用信息,所述第二门禁权限禁用信息是所述第一服务终端根据从所述第二用户终端接收到的服务订单完成指令而生成的。Second access control permission disabling information is received from the first service terminal, where the second access control permission disabling information is generated by the first service terminal according to a service order completion instruction received from the second user terminal.
根据本公开实施例的第二方面,提供一种门禁授权方法,应用于第一服务终端,所述方法包括:According to a second aspect of an embodiment of the present disclosure, a door access authorization method is provided, which is applied to a first service terminal, and the method includes:
接收第二用户终端发送的服务订单信息;Receiving service order information sent by the second user terminal;
根据所述服务订单信息,确定门禁权限信息;Determine access control authority information according to the service order information;
基于所述服务订单信息,确定为所述第二用户终端服务的第一用户终端;Based on the service order information, determining a first user terminal serving the second user terminal;
将所述门禁权限信息发送给所述第一用户终端,其中,所述门禁权限信息用于所述第一用户终端基于所述门禁权限信息解锁待访问门禁。The access control authority information is sent to the first user terminal, wherein the access control authority information is used by the first user terminal to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述服务订单信息包括门禁生成权限,所述方法还包括:In some embodiments, the service order information includes access control generation authority, and the method further includes:
所述基于所述服务订单信息,确定门禁权限信息,包括:The determining of access control authority information based on the service order information includes:
根据所述服务订单信息中包括的所述门禁生成权限,生成所述门禁权限信息。The access control authority information is generated according to the access control generation authority included in the service order information.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
响应于接收到所述第二用户终端发送的服务订单完成指令,向所述第二用户终端发送第二门禁权限禁用信息。In response to receiving the service order completion instruction sent by the second user terminal, second access control authority disabling information is sent to the second user terminal.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
接收第一用户终端发送的第一用户终端的注册信息;Receiving registration information of the first user terminal sent by the first user terminal;
对所述注册信息进行验证,生成第一验证结果;Verifying the registration information and generating a first verification result;
所述基于所述服务订单信息,确定为所述第二用户终端服务的第一用户终端,包括:The determining, based on the service order information, the first user terminal serving the second user terminal includes:
基于所述服务订单信息,从所述第一验证结果指示验证成功对应的第一用户终端中,确定出为所述第二用户终端提供服务的所述第一用户终端。Based on the service order information, the first user terminal that provides service to the second user terminal is determined from the first user terminals corresponding to the first verification result indicating successful verification.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
接收所述第一用户终端发送的解锁信息;Receiving unlocking information sent by the first user terminal;
对所述解锁信息进行验证,生成第二验证结果;Verifying the unlocking information and generating a second verification result;
响应于所述第二验证结果指示验证失败,向所述第一用户终端发送的第一门禁权限禁用信息,以禁止所述第一用户终端解锁所述待访问门禁。In response to the second verification result indicating a verification failure, first access control permission disabling information is sent to the first user terminal to prohibit the first user terminal from unlocking the access control to be accessed.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
响应于接收到所述第二用户终端发送的服务订单完成指令,向所述第一用户终端发送第二门禁权限禁用信息,以指示所述第一用户终端禁止解锁所述待访问门禁。In response to receiving the service order completion instruction sent by the second user terminal, second access control permission disabling information is sent to the first user terminal to instruct the first user terminal to prohibit unlocking the access control to be accessed.
根据本公开实施例的第三方面,提供一种门禁授权方法,应用于第二用户终端,所述方法包括:According to a third aspect of an embodiment of the present disclosure, a door access authorization method is provided, which is applied to a second user terminal, and the method includes:
向第一服务终端发送所述服务订单信息,所述服务订单信息用于供所述第一服务终端确定为所述第二用户终端提供服务的第一用户终端以及门禁权限信息,所述门禁权限信息用于供所述第一用户终端基于所述门禁权限信息解锁待访问门禁。The service order information is sent to the first service terminal, and the service order information is used by the first service terminal to determine the first user terminal and access control authority information that provide services to the second user terminal, and the access control authority information is used by the first user terminal to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
向所述第一服务终端发送服务订单完成指令,其中,所述服务订单完成指令,用于供所述第一服务终端向所述第一用户终端发送第二门禁权限禁用信息。A service order completion instruction is sent to the first service terminal, wherein the service order completion instruction is used for the first service terminal to send second access control authority disabling information to the first user terminal.
在一些实施例中,所述向第一服务终端发送所述服务订单信息之前,所述方法还包括:In some embodiments, before sending the service order information to the first service terminal, the method further includes:
向第二服务终端发送门禁权限的申请请求;Sending an application request for access control authority to the second service terminal;
接收所述第二服务终端基于所述申请请求发送的门禁生成权限,其中,所述门禁生成权限用于生成所述门禁权限信息。Receive the access control generation authority sent by the second service terminal based on the application request, wherein the access control generation authority is used to generate the access control authority information.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
将所述门禁生成权限发送给所述第一服务终端。The access control generation authority is sent to the first service terminal.
在一些实施例中,所述发送所述门禁生成权限,包括:In some embodiments, the sending the access control generation permission includes:
响应于所述服务订单信息生成,将所述门禁生成权限发送给所述第一服务终端。In response to the service order information being generated, the access control generation authority is sent to the first service terminal.
在一些实施例中,所述向所述第一服务终端发送所述服务订单信息,包括:In some embodiments, sending the service order information to the first service terminal includes:
响应于所述服务订单信息生成,基于所述门禁生成权限生成所述门禁权限信息;In response to the service order information being generated, generating the access control authority information based on the access control generation authority;
将所述门禁权限信息携带在所述服务订单信息中发送给所述第一服务终端。The access control authority information is carried in the service order information and sent to the first service terminal.
根据本公开实施例的第四方面,提供一种门禁授权方法,应用于第二服务终端,所述方法包括:According to a fourth aspect of an embodiment of the present disclosure, a door access authorization method is provided, which is applied to a second service terminal, and the method includes:
接收第一用户终端的门禁权限信息,其中,所述门禁权限信息为第一服务终端接收到第二用户终端发送的服务订单信息发送至所述第一用户终端的;Receiving access control authority information of a first user terminal, wherein the access control authority information is sent from a first service terminal to the first user terminal after receiving service order information sent by a second user terminal;
对所述第一用户终端的门禁权限信息进行验证,得到第三验证结果;Verifying the access control authority information of the first user terminal to obtain a third verification result;
响应于所述第三验证结果指示验证成功,则将门禁开启密钥发送至所述第一用户终端。In response to the third verification result indicating successful verification, the access control unlocking key is sent to the first user terminal.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
接收第二用户终端发送的门禁权限的申请信息;Receiving access control permission application information sent by a second user terminal;
基于所述申请信息,向所述第二用户终端发送所述门禁生成权限,其中,所述门禁生成权限用于供所述第二用户终端生成所述门禁权限信息,或者供所述第二用户终端发送给第一服务终端生成所述门禁权限信息。Based on the application information, the access control generation authority is sent to the second user terminal, wherein the access control generation authority is used for the second user terminal to generate the access control authority information, or for the second user terminal to send to the first service terminal to generate the access control authority information.
根据本公开实施例的第五方面,提供一种门禁授权装置,应用于第一用户终端;所述装置包括:According to a fifth aspect of an embodiment of the present disclosure, a door access authorization device is provided, which is applied to a first user terminal; the device includes:
第一接收模块,用于从第一服务终端接收门禁权限信息,其中,所述门禁权限信息是由所述第一服务终端从第二用户终端接收到的,或者所述门禁权限信息是所述第一服务终端根据从所述第二用户终端接收到的门禁生成权限动态生成的;A first receiving module is used to receive access control authority information from a first service terminal, wherein the access control authority information is received by the first service terminal from a second user terminal, or the access control authority information is dynamically generated by the first service terminal according to the access control generation authority received from the second user terminal;
解锁模块,用于基于所述门禁权限信息,解锁待访问门禁。The unlocking module is used to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第一发送模块,用于向所述第一服务终端发送所述第一用户终端的注册信息;A first sending module, configured to send registration information of the first user terminal to the first service terminal;
第二接收模块,用于接收所述第一服务终端对所述注册信息进行验证所生成的第一验证结果;A second receiving module, configured to receive a first verification result generated by the first service terminal verifying the registration information;
所述第一接收模块,还用于:The first receiving module is further used for:
响应于所述第一验证结果指示验证成功,从所述第一服务终端接收所述门禁权限信息。In response to the first verification result indicating successful verification, the access control authority information is received from the first service terminal.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第二发送模块,用于向所述第一服务终端发送解锁信息;A second sending module, used to send unlocking information to the first service terminal;
第三接收模块,用于接收所述第一服务终端对所述解锁信息进行验证所生成的第二验证结果;A third receiving module, configured to receive a second verification result generated by the first service terminal verifying the unlocking information;
所述解锁模块,还用于:The unlocking module is further used for:
响应于所述第二验证结果指示验证成功,基于所述门禁权限信息,解锁所述待访问门禁。In response to the second verification result indicating successful verification, the door to be accessed is unlocked based on the door access authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第四接收模块,用于响应于所述第二验证结果指示验证失败,从所述第一服务终端接收第一门禁权限禁用信息,其中,所述第一门禁权限禁用信息是所述第一服务终端根据所述第二验证结果指示验证失败而生成的。The fourth receiving module is used to receive first access control permission disabling information from the first service terminal in response to the second verification result indicating verification failure, wherein the first access control permission disabling information is generated by the first service terminal according to the second verification result indicating verification failure.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第五接收模块,用于从所述第一服务终端接收到第二门禁权限禁用信息,所述第二门禁权限禁用信息是所述第一服务终端根据从所述第二用户终端接收到的服务订单完成指令而生成的。The fifth receiving module is used to receive second access control permission disabling information from the first service terminal, where the second access control permission disabling information is generated by the first service terminal according to the service order completion instruction received from the second user terminal.
根据本公开实施例的第六方面,提供一种门禁授权装置,应用于第一服务终端,所述装置包括:According to a sixth aspect of an embodiment of the present disclosure, a door access authorization device is provided, which is applied to a first service terminal, and the device includes:
第六接收模块,用于接收第二用户终端发送的服务订单信息;A sixth receiving module, configured to receive service order information sent by a second user terminal;
第一确定模块,用于根据所述服务订单信息,确定门禁权限信息;A first determining module, used to determine access control authority information according to the service order information;
第二确定模块,用于基于所述服务订单信息,确定为所述第二用户终端服务的第一用户终端;A second determining module, configured to determine, based on the service order information, a first user terminal serving the second user terminal;
第三发送模块,用于将所述门禁权限信息发送给所述第一用户终端,其中,所述门禁权限信息用于所述第一用户终端基于所述门禁权限信息解锁待访问门禁。The third sending module is used to send the access control authority information to the first user terminal, wherein the access control authority information is used by the first user terminal to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述服务订单信息包括门禁生成权限,所述装置还包括:In some embodiments, the service order information includes access control generation authority, and the device further includes:
所述第一确定模块,还用于:The first determining module is further used for:
根据所述服务订单信息中包括的所述门禁生成权限,生成所述门禁权限信息。The access control authority information is generated according to the access control generation authority included in the service order information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第七接收模块,用于接收第一用户终端发送的第一用户终端的注册信息;A seventh receiving module, configured to receive registration information of the first user terminal sent by the first user terminal;
第一生成验证模块,用于对所述注册信息进行验证,生成第一验证结果;A first generation verification module, used to verify the registration information and generate a first verification result;
所述第二确定模块,还用于:The second determining module is further used for:
基于所述服务订单信息,从所述第一验证结果指示验证成功对应的第一用户终端中,确定出为所述第二用户终端提供服务的所述第一用户终端。Based on the service order information, the first user terminal that provides service to the second user terminal is determined from the first user terminals corresponding to the first verification result indicating successful verification.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第八接收模块,用于接收所述第一用户终端发送的解锁信息;an eighth receiving module, configured to receive unlocking information sent by the first user terminal;
第二生成验证模块,用于对所述解锁信息进行验证,生成第二验证结果;A second generation verification module, used to verify the unlocking information and generate a second verification result;
第四发送模块,用于响应于所述第二验证结果指示验证失败,向所述第一用户终端发送的第一门禁权限禁用信息,以禁止所述第一用户终端解锁所述待访问门禁。A fourth sending module is used for sending first access control permission disabling information to the first user terminal in response to the second verification result indicating that the verification fails, so as to prohibit the first user terminal from unlocking the access control to be accessed.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第五发送模块,用于响应于接收到所述第二用户终端发送的服务订单完成指令,向所述第一用户终端发送第二门禁权限禁用信息,以指示所述第一用户终端禁止解锁所述待访问门禁。A fifth sending module is used to send second access control permission disabling information to the first user terminal in response to receiving the service order completion instruction sent by the second user terminal, so as to instruct the first user terminal to prohibit unlocking the access control to be accessed.
根据本公开实施例的第七方面,提供一种门禁授权装置,应用于第二用户终端,其中,所述第二用户终端对应待访问门禁的被访问端;所述装置包括:According to a seventh aspect of an embodiment of the present disclosure, a door access authorization device is provided, which is applied to a second user terminal, wherein the second user terminal corresponds to an access terminal to be accessed by a door access control system; the device includes:
第六发送模块,用于向第一服务终端发送所述服务订单信息,所述服务订单信息用于供所述第一服务终端确定为所述第二用户终端提供服务的第一用户终端以及门禁权限信息,所述门禁权限信息用于供所述第一用户终端基于所述门禁权限信息解锁待访问门禁。The sixth sending module is used to send the service order information to the first service terminal, and the service order information is used for the first service terminal to determine the first user terminal and access control authority information that provide services to the second user terminal, and the access control authority information is used for the first user terminal to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第七发送模块,用于向所述第一服务终端发送服务订单完成指令,其中,所述服务订单完成指令,用于供所述第一服务终端向所述第一用户终端发送第二门禁权限禁用信息。A seventh sending module is used to send a service order completion instruction to the first service terminal, wherein the service order completion instruction is used for the first service terminal to send second access control authority disabling information to the first user terminal.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第八发送模块,用于向第二服务终端发送门禁权限的申请请求;An eighth sending module, used to send an application request for access control authority to the second service terminal;
第九接收模块,用于接收所述第二服务终端基于所述申请请求发送的门禁生成权限,其中,所述门禁生成权限用于生成所述门禁权限信息。A ninth receiving module is configured to receive a door access control generation authority sent by the second service terminal based on the application request, wherein the door access control generation authority is used to generate the door access control authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第九发送模块,用于将所述门禁生成权限发送给所述第一服务终端。A ninth sending module is used to send the access control generation authority to the first service terminal.
在一些实施例中,所述第十发送模块,还用于:In some embodiments, the tenth sending module is further used to:
响应于所述服务订单信息生成,将所述门禁生成权限发送给所述第一服务终端。In response to the service order information being generated, the access control generation authority is sent to the first service terminal.
在一些实施例中,所述第六发送模块,还用于:In some embodiments, the sixth sending module is further used to:
响应于所述服务订单信息生成,基于所述门禁生成权限生成所述门禁权限信息;In response to the service order information being generated, generating the access control authority information based on the access control generation authority;
将所述门禁权限信息携带在所述服务订单信息中发送给所述第一服务终端。The access control authority information is carried in the service order information and sent to the first service terminal.
根据本公开实施例的第八方面,提供一种门禁授权装置,应用于第二服务终端,所述装置包括:According to an eighth aspect of an embodiment of the present disclosure, a door access authorization device is provided, which is applied to a second service terminal, and the device includes:
第十接收模块,用于接收第一用户终端的门禁权限信息,其中,所述门禁权限信息为第一服务终端接收到第二用户终端发送的服务订单信息发送至所述第一用户终端的;a tenth receiving module, configured to receive access control authority information of the first user terminal, wherein the access control authority information is sent from the first service terminal to the first user terminal after the first service terminal receives service order information sent by the second user terminal;
第三验证生成模块,用于对所述第一用户终端的门禁权限信息进行验证,得到第三验证结果;A third verification generating module, used to verify the access control authority information of the first user terminal to obtain a third verification result;
第十发送模块,用于响应于所述第三验证结果指示验证成功,则将门禁开启密钥发送至所述第一用户终端。A tenth sending module is used to send a door access opening key to the first user terminal in response to the third verification result indicating successful verification.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第十一接收模块,用于接收第二用户终端发送的门禁权限的申请信息;An eleventh receiving module, configured to receive application information for access control authority sent by a second user terminal;
第十一发送模块,用于基于所述申请信息,向所述第二用户终端发送所述门禁生成权限,其中,所述门禁生成权限用于供所述第二用户终端生成所述门禁权限信息,或者供所述第二用户终端发送给第一服务终端生成所述门禁权限信息。An eleventh sending module is used to send the access control generation authority to the second user terminal based on the application information, wherein the access control generation authority is used for the second user terminal to generate the access control authority information, or for the second user terminal to send to the first service terminal to generate the access control authority information.
根据本公开实施例的第九方面,提供一种门禁授权系统,包括:上市任意所述的应用于第一用户终端的门禁授权装置、上述任意所述的应用于第一服务终端的门禁授权装置、上述任意所述的应用于第二用户终端的门禁授权装置以及上述任意所述的应用于第二服务终端的门禁授权装置。According to the ninth aspect of an embodiment of the present disclosure, a access control authorization system is provided, comprising: any of the access control authorization devices listed on the market and applied to a first user terminal, any of the access control authorization devices listed above and applied to a first service terminal, any of the access control authorization devices listed above and applied to a second user terminal, and any of the access control authorization devices listed above and applied to a second service terminal.
根据本公开实施例的第十方面,提供一种电子设备,包括:According to a tenth aspect of an embodiment of the present disclosure, there is provided an electronic device, including:
处理器;processor;
用于存储处理器可执行指令的存储器;a memory for storing processor-executable instructions;
其中,所述处理器被配置为:实现时执行上述任意实施例所述的方法步骤。The processor is configured to: execute the method steps described in any of the above embodiments when implemented.
根据本公开实施例的第五方面,提供一种计算机可读存储介质,其上存储有计算机程序,当所述存储介质中的指令由电子设备的处理器执行时,使得电子设备能够执行实现上述任意实施例所述的方法步骤。According to a fifth aspect of an embodiment of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored. When the instructions in the storage medium are executed by a processor of an electronic device, the electronic device is enabled to perform the method steps described in any of the above embodiments.
本公开的实施例提供的技术方案可以包括以下有益效果:The technical solution provided by the embodiments of the present disclosure may have the following beneficial effects:
本公开实施例提供的门禁授权方法,应用于第一用户终端,即由待访问门禁的访问端的终端执行,从第一服务终端接收门禁权限信息,其中,所述门禁权限信息是由所述第一服务终端从第二用户终端接收到的,或者所述门禁权限信息是所述第一服务终端根据从所述第二用户终端接收到的门禁生成权限动态生成的,如此,这里的门禁权限信息由第一服务终端提供,而第一服务终端的门禁权限信息又由第二用户终端,即被访问端提供的,或者第二用户终端提供的门禁生成权限动态生成;然后,第一用户终端能够根据门禁权限信息,解锁待访问门禁。如此,本公开实施例中,一方面由于门禁权限信息直接由第一服务器授予第一用户终端,因此,在第一用户终端访问时可以不需要被访问端以及门禁的管理人员的参与,不仅可以提高服务效率,而且可以为各方用户,例如被访问端以及门禁的管理端等带来方便;另一方面由于该门禁权限信息可以由第一服务端从第二用户终端接收到的,相当于是第二用户终端授予的,而非第一服务终端随意分配的,从而保证了门禁的安全性。故,本公开实施例提供的门禁授权方法,能够即方便上门服务人员等临时访问人员能够方便访问,提高服务效率,同时也由于该门禁权限信息是由第一服务终端经由第二用户终端的允许得到的,而非随意获取的,因此保障类待访问门禁的门禁安全性。The access control authorization method provided by the embodiment of the present disclosure is applied to a first user terminal, that is, executed by a terminal at an access end of a access control to be accessed, and receives access control authority information from a first service terminal, wherein the access control authority information is received by the first service terminal from a second user terminal, or the access control authority information is dynamically generated by the first service terminal based on the access control generation authority received from the second user terminal. In this way, the access control authority information here is provided by the first service terminal, and the access control authority information of the first service terminal is provided by the second user terminal, that is, the accessed end, or dynamically generated by the access control generation authority provided by the second user terminal; then, the first user terminal can unlock the access control to be accessed based on the access control authority information. Thus, in the embodiment of the present disclosure, on the one hand, since the access control authority information is directly granted to the first user terminal by the first server, the participation of the accessed terminal and the access control administrator is not required when the first user terminal accesses, which can not only improve service efficiency, but also bring convenience to all parties, such as the accessed terminal and the access control administrator; on the other hand, since the access control authority information can be received by the first service terminal from the second user terminal, it is equivalent to being granted by the second user terminal, rather than arbitrarily allocated by the first service terminal, thereby ensuring the security of the access control. Therefore, the access control authorization method provided by the embodiment of the present disclosure can facilitate temporary visitors such as door-to-door service personnel to access the door conveniently and improve service efficiency. At the same time, since the access control authority information is obtained by the first service terminal through the permission of the second user terminal, rather than being obtained arbitrarily, the access control security of the access control to be accessed is guaranteed.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。It is to be understood that the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and, together with the description, serve to explain the principles of the invention.
图1是根据一示例性实施例示出的一种门禁授权方法的流程图;FIG1 is a flow chart of a method for access control authorization according to an exemplary embodiment;
图2是根据一示例性实施例示出的一种门禁授权方法的另一流程图;FIG2 is another flow chart of a method for access control authorization according to an exemplary embodiment;
图3是根据一示例性实施例示出的另一种门禁授权方法的流程图;FIG3 is a flow chart of another access control authorization method according to an exemplary embodiment;
图4是根据一示例性实施例示出的另一种门禁授权方法的又一流程图;FIG4 is another flow chart of another access control authorization method according to an exemplary embodiment;
图5是根据一示例性实施例示出的另一种门禁授权方法的再一流程图;FIG5 is another flow chart of another access control authorization method according to an exemplary embodiment;
图6是根据一示例性实施例示出的又一种门禁授权方法的流程图;FIG6 is a flow chart of another access control authorization method according to an exemplary embodiment;
图7是根据一示例性实施例示出的又一种门禁授权方法的另一流程图;FIG7 is another flow chart of yet another access control authorization method according to an exemplary embodiment;
图8是根据一示例性实施例示出的再一种门禁授权方法的流程图;FIG8 is a flow chart of another access control authorization method according to an exemplary embodiment;
图9是根据一示例性具体实施例示出的一种门禁授权方法的流程图;FIG9 is a flow chart of a method for access control authorization according to an exemplary embodiment;
图10是根据一示例性实施例示出的一种门禁授权装置的框图;FIG10 is a block diagram of a door access authorization device according to an exemplary embodiment;
图11是根据一示例性实施例示出的另一种门禁授权装置的框图;FIG11 is a block diagram of another access control authorization device according to an exemplary embodiment;
图12是根据一示例性实施例示出的又一种门禁授权装置的框图;FIG12 is a block diagram of another access control authorization device according to an exemplary embodiment;
图13是根据一示例性实施例示出的再一种门禁授权装置的框图;FIG13 is a block diagram of yet another access control authorization device according to an exemplary embodiment;
图14是根据一示例性实施例示出的一种门禁授权系统框图;FIG14 is a block diagram of a door access authorization system according to an exemplary embodiment;
图15是根据一示例性实施例示出的一种终端的框图;FIG15 is a block diagram of a terminal according to an exemplary embodiment;
图16是根据一示例性实施例示出的一种服务器的框图。Fig. 16 is a block diagram of a server according to an exemplary embodiment.
具体实施方式DETAILED DESCRIPTION
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are shown in the accompanying drawings. When the following description refers to the drawings, the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Instead, they are merely examples of devices and methods consistent with some aspects of the present invention as detailed in the appended claims.
需要说明的是,当前社会生活、快递、外卖、维修或者家政等上门服务,都需要这些服务人员通过社区的门禁,才能来到被服务对象的家里。然后现有的社区通常是以下几种情况:It should be noted that currently, door-to-door services such as social life, express delivery, take-out, repair or housekeeping require these service personnel to pass through the community's access control before they can reach the home of the service recipient. Then the existing communities are usually in the following situations:
第一种,开放型社区,上门服务人员可任意进出、服务效率最高,但是安全性最差;The first type is an open community, where door-to-door service personnel can enter and exit at will, which has the highest service efficiency but the worst security;
第二种,封闭社区,物业的保安来验证上门服务人员的可靠性,服务效率最低,安全性适中;The second type is a closed community, where the property security guard verifies the reliability of the door-to-door service personnel. The service efficiency is the lowest and the security is moderate.
第三种,业主通过物业的门禁授权软件给配送员授予门禁权限信息,服务效率最高,安全性也较高;The third method is for the owner to grant the delivery person access control information through the property's access control authorization software, which has the highest service efficiency and higher security.
第四种,服务地点放在社区外,比如业务出社区取快递等,服务效率最低,但安全性最高。The fourth type is where the service location is outside the community, such as picking up express parcels outside the community. This has the lowest service efficiency but the highest security.
从以上几种情况可以看出,对于上门服务业务而言,由于需要考虑到被服务区域,例如某小区或者某办公楼的安全性,通常会在通过设置门禁而阻挡非授权人员的进入。然而在保证了安全性的同时又会使得上门服务人员、或者物业保安或者业务自身带来不便,例如需要人工对上门服务人员进行验证以及给予门禁权限等。From the above situations, we can see that for door-to-door service, since the security of the service area, such as a community or an office building, is taken into consideration, access control is usually set up to prevent unauthorized personnel from entering. However, while ensuring security, it will cause inconvenience to the door-to-door service personnel, property security, or the service itself, such as the need for manual verification of the door-to-door service personnel and granting access control permissions.
本公开实施例示例性的应用的场景例如可以为:包括物业、业主、上门服务人员以及服务商家之间的信息交互场景。本公开实施例旨在兼顾门禁的安全性以及各个相关方之间的便利性。The exemplary application scenarios of the embodiments of the present disclosure may be, for example, information interaction scenarios between property management, owners, door-to-door service personnel, and service providers. The embodiments of the present disclosure are intended to take into account both the security of access control and the convenience of various related parties.
图1是根据一示例性实施例示出的一种门禁授权方法的流程图,所述方法应用于第一用户终端,该方法可以包括以下步骤:FIG1 is a flow chart of a method for access control authorization according to an exemplary embodiment. The method is applied to a first user terminal. The method may include the following steps:
步骤11:从第一服务终端接收门禁权限信息,其中,所述门禁权限信息是由所述第一服务终端从第二用户终端接收到的,或者所述门禁权限信息是所述第一服务终端根据从所述第二用户终端接收到的门禁生成权限动态生成的;Step 11: receiving access control authority information from the first service terminal, wherein the access control authority information is received by the first service terminal from the second user terminal, or the access control authority information is dynamically generated by the first service terminal according to the access control generation authority received from the second user terminal;
这里,第一用户终端可以访问门禁,或者说是第一用户终端是访问门禁的人员持有的用户终端。该第一用户终端包括但不限于:手机、平板或者智能手表等终端。这里,访问门禁的人员可以理解为提供服务的商家分配的上门服务人员,包括但不限于:配送员、快递员、维修人员或者保洁人员等。Here, the first user terminal can access the access control, or the first user terminal is a user terminal held by a person who accesses the access control. The first user terminal includes but is not limited to: a mobile phone, a tablet or a smart watch. Here, the person who accesses the access control can be understood as a door-to-door service person assigned by the merchant providing the service, including but not limited to: a delivery person, a courier, a maintenance person or a cleaning person.
这里,第一服务终端,可以是提供服务的商家端所提供的服务器或者云端等。可以理解的是,提供服务的商家端,例如可以是美团外卖、或者快递应用、或者某些家政应用等。Here, the first service terminal may be a server or cloud provided by a merchant end providing services, etc. It is understandable that the merchant end providing services may be, for example, Meituan Takeaway, or a courier application, or some housekeeping applications, etc.
这里,第二用户终端可以在第一服务终端下单,且要求第一服务终端为提供服务。示例性的,第二用户终端可以为业主、住户或者办公楼宇内的办公人员所持有的用户终端。第二用户终端包括但不限于:手机、平板或者电脑等能够进行网络下单的终端。Here, the second user terminal can place an order at the first service terminal and require the first service terminal to provide services. Exemplarily, the second user terminal can be a user terminal held by an owner, a resident, or an office worker in an office building. The second user terminal includes but is not limited to: a mobile phone, a tablet, or a computer, etc., which can place an order online.
示例性的,从第一服务终端接收门禁权限信息,可以包括:Exemplarily, receiving access control authority information from the first service terminal may include:
响应于第一服务终端接收到第二用户终端发送的服务订单信息,从第一服务终端接收门禁权限信息,其中,所述门禁权限信息为所述第二用户终端提供给所述第一服务终端,或者,所述第一服务终端基于所述第二用户终端提供的门禁生成权限动态生成的。In response to the first service terminal receiving service order information sent by the second user terminal, access control authority information is received from the first service terminal, wherein the access control authority information is provided by the second user terminal to the first service terminal, or is dynamically generated by the first service terminal based on the access control authority provided by the second user terminal.
这里,待访问门禁是指被允许访问的例如社区大门、单元门、电梯、车库入口、快递柜门或者单体房门等。在一些实施例中,待访问门禁是指与第二用户终端相关联的门禁。例如,与第二用户终端所在的位置确定的单栋楼的门禁,和/或第二用户终端所在楼层确定的电梯楼层的门禁等。如此,可以保证社区内其他门禁系统的安全性。Here, the access control to be accessed refers to a community gate, a unit door, an elevator, a garage entrance, a courier cabinet door, or a single room door that is allowed to be accessed. In some embodiments, the access control to be accessed refers to the access control associated with the second user terminal. For example, the access control of a single building determined by the location of the second user terminal, and/or the access control of an elevator floor determined by the floor where the second user terminal is located. In this way, the security of other access control systems in the community can be guaranteed.
在一些实施例中,不同的服务订单信息对应的待访问门禁不同,例如,如果是外卖订单,对应的待访问门禁则可以不包括单体房门,但如果是家政服务订单,对应的待访问门禁则可以包括单体房门。因此,在一些实施例中,根据服务订单信息中包含的服务订单类型确定所述待访问门禁。In some embodiments, different service order information corresponds to different door-to-access gates. For example, if it is a takeaway order, the corresponding door-to-access gate may not include a single door, but if it is a housekeeping service order, the corresponding door-to-access gate may include a single door. Therefore, in some embodiments, the door-to-access gate is determined according to the service order type included in the service order information.
可以理解的是,门禁权限信息包括:一个或多个待访问门禁的门禁权限信息。It is understandable that the access control authority information includes: access control authority information of one or more access control points to be accessed.
这里,服务订单信息是指第二用户终端的用户或者说被访问端在第一服务终端对应的商家端购买的服务,而生成的服务订单信息。需要说明的是,第二用户终端或者说被访问端在第一服务终端对应的商家端购买服务,包括但不限于:第二用户终端或者说被访问端在第一服务终端对应的商家端提供的网站或者应用程序上购买的服务,或者,第二用户终端或者说被访问端在第一服务终端对应的商家端的线下购买的服务。Here, the service order information refers to the service order information generated by the user of the second user terminal or the visited terminal purchasing the service at the merchant terminal corresponding to the first service terminal. It should be noted that the second user terminal or the visited terminal purchasing the service at the merchant terminal corresponding to the first service terminal includes but is not limited to: the second user terminal or the visited terminal purchasing the service on the website or application provided by the merchant terminal corresponding to the first service terminal, or the second user terminal or the visited terminal purchasing the service offline at the merchant terminal corresponding to the first service terminal.
可以理解的是,该服务订单信息包括但不限于:第二用户终端指示的所要提供服务的地址信息。如此,第一服务终端能够基于服务订单信息确定出所要服务的地址信息,从而按照该地址信息为所述第二用户终端的用户指派对应的上门服务人员。It is understandable that the service order information includes but is not limited to: the address information of the service to be provided indicated by the second user terminal. In this way, the first service terminal can determine the address information of the service to be provided based on the service order information, and assign the corresponding door-to-door service personnel to the user of the second user terminal according to the address information.
门禁权限信息,包括:能够用于解锁待访问门禁的权限信息。该门禁权限信息,例如可以是用于解锁待访问门禁的二维码、或者,可以是用于解锁待访问门禁的验证码、或者可以是用于解锁待访问门禁的生物特征信息等。需要说明的是,第一用户终端能够基于门禁权限信息获得开启门禁的密钥等。总之,利用门禁权限信息即可对待访问门禁进行解锁,从而通过所述待访问门禁。The access control authority information includes: authority information that can be used to unlock the access control to be accessed. The access control authority information can be, for example, a QR code for unlocking the access control to be accessed, or a verification code for unlocking the access control to be accessed, or biometric information for unlocking the access control to be accessed. It should be noted that the first user terminal can obtain a key for opening the access control based on the access control authority information. In short, the access control to be accessed can be unlocked using the access control authority information, thereby passing through the access control to be accessed.
步骤12:基于所述门禁权限信息,解锁所述待访问门禁。Step 12: Unlock the access control door based on the access control authority information.
在一些实施例中,门禁权限信息,可以直接为能够解锁所述待访问门禁的密钥信息。示例性的,该密钥信息为共享匿名密钥,例如NFC门禁卡。这里,该门禁权限信息可以为表征NFC的数字信息,以供第二用户终端能够基于表征NFC的数字信息生成NFC门禁卡,解锁所述待访问门禁。In some embodiments, the access control authority information may be directly key information that can unlock the access control to be accessed. Exemplarily, the key information is a shared anonymous key, such as an NFC access control card. Here, the access control authority information may be digital information representing NFC, so that the second user terminal can generate an NFC access control card based on the digital information representing NFC to unlock the access control to be accessed.
在另一些实施例中,所述基于所述门禁权限信息,解锁所述待访问门禁,包括:In some other embodiments, unlocking the door to be accessed based on the door access authority information includes:
基于所述门禁权限信息,向第二服务终端发送门禁权限信息;Based on the access control authority information, sending the access control authority information to the second service terminal;
接收所述的第二服务终端对所述门禁权限信息的验证结果指示验证成功所生成的待访问门禁密钥;Receiving the access control key to be accessed generated by the second service terminal indicating successful verification of the access control authority information;
基于待访问门禁密钥,解锁所述待访问门禁。Unlock the door to be accessed based on the door key.
需要说明的是,该待访问门禁密钥,可以为单独对称密钥,即不同的用户对应的密钥不同。如此,可以追踪密钥的使用,且保证门禁的安全性。这里,待访问门禁密钥可以为二维码或者一次性验证码等。It should be noted that the access control key to be accessed can be a separate symmetric key, that is, different users have different keys. In this way, the use of the key can be tracked and the security of the access control can be ensured. Here, the access control key to be accessed can be a QR code or a one-time verification code, etc.
在一些实施例中,所述门禁权限信息具有时效性,即所述第一服务商下发的门禁权限信息只有在预设时段才有效。示例性的,该预设时段可以为服务订单信息所指示的服务时段。需要说明的是,不同类型的服务订单信息所指示的服务时段有所差异,例如如果是外卖内的服务订单信息,预设时段则可以设置为下单后的两个小时;如果是家政类的服务订单信息,预设时段则可以是一个月或者一年等。进一步地,同一类型不同服务内容的服务订单信息所指示的服务时段也有所差异,例如如果同是家政服务,钟点工家政的服务时段显然比常驻家政服务时段短,故,钟点工家政服务对应的预设时段比常驻家政服务对应的预设时段要短。In some embodiments, the access control authority information is time-sensitive, that is, the access control authority information issued by the first service provider is only valid during a preset period of time. Exemplarily, the preset period of time may be the service period indicated by the service order information. It should be noted that the service periods indicated by different types of service order information are different. For example, if it is a takeaway service order information, the preset period of time can be set to two hours after the order is placed; if it is a housekeeping service order information, the preset period of time can be one month or one year, etc. Furthermore, the service periods indicated by service order information of the same type but different service contents are also different. For example, if both are housekeeping services, the service period of hourly housekeeping is obviously shorter than that of permanent housekeeping services. Therefore, the preset period of time corresponding to hourly housekeeping services is shorter than the preset period of time corresponding to permanent housekeeping services.
本公开实施例中,通过对门禁权限信息进行时效限制,可以提高待访问门禁的门禁安全性。In the disclosed embodiment, by imposing a time limit on the access control authority information, the access control security of the access control to be accessed can be improved.
以上门服务人员为配送员为例,相关技术中,配送员抵达门禁处,跟物业保安上报到访的楼号和目的,经保安允许后通过门禁;或者,配送员抵达门禁处,通过保安与业主或者门禁内的人员通话确认后,允许配送员通过门禁。显然,这两种方式会给物业增加人力成本以及不利于配送员的快速通行。相关技术中,还可以通过业主或者门禁内的人员事先将密码或者门禁卡给配送员,配送员抵达门禁后使用密码或者门禁卡验证后通过门禁;或者业主或者门禁内的人员通过门禁管理等应用程序,生成二维码给配送员,二维码具有时效性,配送员在通过门禁时出示二维码,验证权限后通过门禁;再或者,业主或者门禁内的人员通过门禁管理等应用程序,填写配送员的手机号码、姓名等信息,发放短信验证码,之后配送员在通过门禁时验证码验证权限后通过。显然,这三种方式虽然不需要物业保安的参与,但是需要业主或者门禁内的人员为配送员的每次通过门禁做授权操作,一旦因为一些特殊原因未能预先为配送员的通行做好授权操作则会耽误配送员的服务时间,影响服务效率。因此,相关技术提供这些方案都无法在保障门禁安全的同时又能为各相关方人员提供便利。Taking the door-to-door service personnel as the deliveryman as an example, in the related technology, the deliveryman arrives at the access control, reports the building number and purpose of the visit to the property security, and passes through the access control after the security guard allows; or, the deliveryman arrives at the access control, and the security guard confirms with the owner or the person in the access control, and then allows the deliveryman to pass through the access control. Obviously, these two methods will increase the labor cost of the property and are not conducive to the deliveryman's quick passage. In the related technology, the owner or the person in the access control can also give the deliveryman a password or access card in advance, and the deliveryman can pass through the access control after the password or access card is verified after arriving at the access control; or the owner or the person in the access control generates a QR code for the deliveryman through applications such as access control management, and the QR code is time-sensitive. The deliveryman presents the QR code when passing through the access control, and passes through the access control after verifying the authority; or, the owner or the person in the access control fills in the deliveryman's mobile phone number, name and other information through applications such as access control management, and sends a text message verification code, and then the deliveryman passes through the access control after the verification code verifies the authority. Obviously, although these three methods do not require the participation of property security, they require the owner or the personnel in the access control to authorize the deliveryman every time he passes through the access control. If the deliveryman is not authorized in advance due to some special reasons, the deliveryman's service time will be delayed and the service efficiency will be affected. Therefore, these solutions provided by relevant technologies cannot provide convenience for all relevant parties while ensuring the security of access control.
本公开实施例中,第一用户终端,能够从第一服务终端接收门禁权限信息,且利用该门禁权限信息,解锁待访问门禁。如此,一方面能够保证待访问门禁的门禁安全性的同时不需要物业的参与、也不需要门禁内的人员为上门服务人员进行针对门禁权限信息的授权操作,为物业和业主等提供了方便。In the disclosed embodiment, the first user terminal can receive access control authority information from the first service terminal, and use the access control authority information to unlock the access control to be accessed. In this way, on the one hand, the access control security of the access control to be accessed can be guaranteed, while at the same time, the property management does not need to be involved, and the personnel in the access control do not need to authorize the access control authority information for the door-to-door service personnel, which provides convenience for the property management and owners.
此外,由于不需要物业保安等的参与,还可以减少人力成本,且由于业主等不需要每次都为配送员提供门禁权限信息,也可以减少因为业主等因遗漏为配送员提供门禁权限信息而造成配送员的等候以及服务的不及时性现象,提高了服务效率。同时,由于不需要业主进行授权操作,还可以减少因为业主无法准确判断所授权对象的可靠性而带来的不安全性,进一步提高了门禁的安全性。In addition, since the participation of property security and others is not required, labor costs can be reduced. Since owners and others do not need to provide access control permission information to delivery personnel every time, it can also reduce the waiting time of delivery personnel and the untimely service caused by owners and others omitting to provide access control permission information to delivery personnel, thereby improving service efficiency. At the same time, since the owner does not need to perform authorization operations, it can also reduce the insecurity caused by the owner's inability to accurately judge the reliability of the authorized object, further improving the security of access control.
综上,本公开实施例提供的门禁授权方法,兼顾了门禁安全性以及用户的便利性,同时还提高了服务效率。In summary, the access control authorization method provided by the embodiments of the present disclosure takes into account both access control security and user convenience, while also improving service efficiency.
在一些示例性实施例中,请参阅图2,所述方法还包括:In some exemplary embodiments, referring to FIG. 2 , the method further includes:
步骤21:向所述第一服务终端发送第一用户终端的注册信息;Step 21: Sending registration information of the first user terminal to the first service terminal;
步骤22:接收所述第一服务终端对所述注册信息进行验证所生成的第一验证结果;Step 22: receiving a first verification result generated by the first service terminal verifying the registration information;
所述步骤11,即所述所述从第一服务终端接收门禁权限信息,包括:The step 11, namely, receiving access control authority information from the first service terminal, includes:
步骤111:响应于所述第一验证结果指示验证成功,从第一服务终端接收门禁权限信息。Step 111: In response to the first verification result indicating successful verification, receiving access control authority information from the first service terminal.
这里,注册信息包括:注册时第一用户终端提供的用户信息。示例性的,注册信息但不限于:用户姓名、年龄、证件号码或者用户的生物认证信息等。可以理解的是,生物认证信息可以包括但不限于:用户的指纹信息、掌纹信息、虹膜信息或者人脸信息等。Here, the registration information includes: user information provided by the first user terminal during registration. Exemplary, but not limited to: user name, age, ID number or user's biometric authentication information. It is understandable that the biometric authentication information may include but is not limited to: user's fingerprint information, palm print information, iris information or face information.
在一些实施例中,所述第一服务终端对所述注册信息进行验证,包括:第一服务终端对注册信息进行实名制验证。该注册信息要求第一用户终端提供实名制信息,以保证上门服务人员的可追踪性和安全性。In some embodiments, the first service terminal verifies the registration information, including: the first service terminal verifies the registration information in real name. The registration information requires the first user terminal to provide real name information to ensure the traceability and security of the door-to-door service personnel.
本实施例中,只有在第一服务终端注册的第一用户终端才会被配发门禁权限信息,如此,可以保证被授予门禁权限信息的第一用户终端的可靠性,进一步保证了待访问门禁的门禁安全性。In this embodiment, only the first user terminal registered with the first service terminal will be issued access control authority information, so that the reliability of the first user terminal granted with access control authority information can be guaranteed, and the access control security of the door to be accessed can be further guaranteed.
在另一些实施例中,所述方法还包括:In some other embodiments, the method further comprises:
向所述第一服务终端发送解锁信息;Sending unlocking information to the first service terminal;
接收所述第一服务终端对所述解锁信息进行验证所生成的第二验证结果;receiving a second verification result generated by the first service terminal verifying the unlocking information;
响应于基于所述门禁权限信息,解锁待访问门禁,包括:In response to the door control authority information, unlocking the door to be accessed includes:
响应于所述第二验证结果指示验证成功,基于所述门禁权限信息,解锁所述待访问门禁。In response to the second verification result indicating successful verification, the door to be accessed is unlocked based on the door access authority information.
这里,解锁信息,可以是在第一用户终端每次使用门禁权限信息之前向第一服务终端发送的。或者是,在第一用户终端首次使用门禁权限信息之前,自动触发发送至第一服务终端的。总之,解锁信息是用于向第一服务终端请求使用所述门禁权限信息。Here, the unlock information may be sent to the first service terminal before the first user terminal uses the access control authority information each time. Alternatively, the unlock information may be automatically triggered and sent to the first service terminal before the first user terminal uses the access control authority information for the first time. In short, the unlock information is used to request the first service terminal to use the access control authority information.
这里,解锁信息包括但不限于:第一用户终端提供的用户姓名、性别、年龄、证件号码或者生物特征信息等。该生物特征信息包括但不限于:解锁请求时第一用户终端提供的人脸信息、指纹信息、掌纹信息、或者虹膜信息等。Here, the unlocking information includes but is not limited to: user name, gender, age, ID number or biometric information provided by the first user terminal. The biometric information includes but is not limited to: face information, fingerprint information, palm print information, or iris information provided by the first user terminal when requesting unlocking.
可以理解的是,若解锁信息与注册信息不匹配,则确定第二验证结果指示验证失败;相反,若解锁信息与注册信息匹配,则确定第二验证结果指示验证成功。It is understandable that if the unlocking information does not match the registration information, then the second verification result is determined to indicate a verification failure; conversely, if the unlocking information matches the registration information, then the second verification result is determined to indicate a verification success.
示例性的,接收所述第一服务终端对所述解锁信息进行验证所生成的第二验证结果,包括:Exemplarily, receiving a second verification result generated by the first service terminal verifying the unlocking information includes:
接收所述第一服务终端对解锁信息与注册信息的匹配结果生成的第二验证结果。A second verification result generated by the first service terminal based on the matching result between the unlocking information and the registration information is received.
本公开实施例中,通过对解锁信息进行验证,以确定解锁时的用户信息与注册时的用户信息的一致性,从而保证上门服务人员的可靠性,进而保证待访问门禁的门禁安全性。此外,本公开实施例,通过对解锁信息进行验证,还可以减少门禁授权信息在使用前被盗取而带来的危险性,从而进一步保证了待访问门禁的门禁安全性。In the disclosed embodiment, the unlocking information is verified to determine the consistency between the user information at the time of unlocking and the user information at the time of registration, thereby ensuring the reliability of the door-to-door service personnel, and further ensuring the access security of the door to be accessed. In addition, in the disclosed embodiment, the unlocking information is verified to reduce the danger of the access authorization information being stolen before use, thereby further ensuring the access security of the door to be accessed.
在另一些实施例中,所述方法还包括:In some other embodiments, the method further comprises:
响应于所述第二验证结果指示验证失败,从所述第一服务终端接收第一门禁权限禁用信息,其中,所述第一门禁权限禁用信息是所述第一服务终端根据所述第二验证结果指示验证失败而生成的。In response to the second verification result indicating a verification failure, first access control permission disabling information is received from the first service terminal, wherein the first access control permission disabling information is generated by the first service terminal according to the second verification result indicating a verification failure.
这里,所述第二验证结果指示验证失败,意味着第一用户终端解锁信息与注册信息不匹配,也就意味着解锁时待进入人员并非商家认证过的人员,因此安全性不高。如此,本实施例中,在第二验证结果指示验证失败的情况下,通过从第一服务终端接收第一门禁权限禁用信息,从而禁用所接收到的门禁权限信息,可以保证门禁安全性。Here, the second verification result indicates that the verification failed, which means that the unlocking information of the first user terminal does not match the registration information, which means that the person waiting to enter when unlocking is not a person authenticated by the merchant, so the security is not high. Thus, in this embodiment, when the second verification result indicates that the verification failed, by receiving the first access control permission disabling information from the first service terminal, the received access control permission information is disabled, and the access control security can be ensured.
在一些实施例中,从第一服务终端接收第一门禁权限禁用信息,可以包括:In some embodiments, receiving first access control permission disabling information from the first service terminal may include:
从第一服务终端接收针对门禁权限信息的第一禁止指令,从而禁用掉原本的门禁权限信息,或者,从第一服务终端接收针对门禁权限信息的第一替换信息,从而替换掉原本的门禁权限信息。A first prohibition instruction for the access control authority information is received from the first service terminal, thereby disabling the original access control authority information, or a first replacement information for the access control authority information is received from the first service terminal, thereby replacing the original access control authority information.
本公开实施例中,通过将第二验证结果失败对应的第一用户终端获取的门禁权限信息进行禁用,以禁止解锁所述待访问门禁,如此,可以减少门禁授权信息的被盗取而带来的危险性,从而保证门禁范围内的安全性。In the embodiment of the present disclosure, the access control authority information obtained by the first user terminal corresponding to the failure of the second verification result is disabled to prohibit unlocking the access control to be accessed. In this way, the risk of the access control authorization information being stolen can be reduced, thereby ensuring the security within the access control range.
在另一些实施例中,所述基于所述门禁权限信息,所述方法还包括:In some other embodiments, based on the access control authority information, the method further includes:
从所述第一服务终端接收到第二门禁权限禁用信息,所述第二门禁权限禁用信息是所述第一服务终端根据从所述第二用户终端接收到的服务订单完成指令而生成的。Second access control permission disabling information is received from the first service terminal, where the second access control permission disabling information is generated by the first service terminal according to a service order completion instruction received from the second user terminal.
示例性的,从所述第一服务终端接收到第二门禁权限禁用信息,包括:Exemplarily, receiving the second access control permission disabling information from the first service terminal includes:
响应于所述第一服务终端接收到所述第二用户终端发送的服务订单完成指令,从所述第一服务终端接收到第二门禁权限禁用信息。In response to the first service terminal receiving the service order completion instruction sent by the second user terminal, second access control authority disabling information is received from the first service terminal.
可以理解的是,第一服务终端接收到所述第二用户终端发送的服务订单完成指令,表明服务订单信息对应的服务已经完成,此时如果第一用户终端内的门禁权限信息如果仍然可以解锁待访问门禁的话,显然会对待访问门禁范围内的安全性受到威胁。本实施例中,通过响应于所述第一服务终端接收到所述第二用户终端发送的服务订单完成指令,禁用所述门禁权限信息,可以使得在服务订单信息完成服务后,不再允许第一用户终端对门禁权限信息的使用,从而保证待访问门禁范围内的安全性。It is understandable that the first service terminal receives the service order completion instruction sent by the second user terminal, indicating that the service corresponding to the service order information has been completed. At this time, if the access control authority information in the first user terminal can still unlock the access control to be accessed, the security within the access control range to be accessed will obviously be threatened. In this embodiment, by disabling the access control authority information in response to the first service terminal receiving the service order completion instruction sent by the second user terminal, the first user terminal is no longer allowed to use the access control authority information after the service order information completes the service, thereby ensuring the security within the access control range to be accessed.
在一些实施例中,从第一服务终端接收第一门禁权限禁用信息,可以包括:In some embodiments, receiving first access control permission disabling information from the first service terminal may include:
从第一服务终端接收针对门禁权限信息的第二禁止指令,从而禁用掉原本的门禁权限信息,或者,从第一服务终端接收针对门禁权限信息的第二替换信息,从而替换掉原本的门禁权限信息。A second prohibition instruction for the access control authority information is received from the first service terminal, thereby disabling the original access control authority information, or second replacement information for the access control authority information is received from the first service terminal, thereby replacing the original access control authority information.
这里的第二禁止指令与第一禁止指令可以相同,也可以不同。这里的第二替换信息与第一替换信息可以相同,也可以不同。The second prohibition instruction here may be the same as or different from the first prohibition instruction. The second replacement information here may be the same as or different from the first replacement information.
本公开实施例还提供一种门禁授权方法,请参阅图3,图3是根据一示例性实施例示出的另一种门禁授权方法的流程图,所述方法应用于第一服务终端,其中,所述第一服务终端对应提供服务的商家端;如图所示,所述方法包括:The embodiment of the present disclosure further provides a method for access control authorization. Please refer to FIG3, which is a flow chart of another method for access control authorization according to an exemplary embodiment. The method is applied to a first service terminal, wherein the first service terminal corresponds to a merchant terminal providing services. As shown in the figure, the method includes:
步骤31:接收第二用户终端发送的服务订单信息;Step 31: receiving service order information sent by the second user terminal;
步骤32:根据所述服务订单信息,确定门禁权限信息;Step 32: Determine access control authority information according to the service order information;
步骤33:基于所述服务订单信息,确定为所述第二用户终端服务的第一用户终端;Step 33: Based on the service order information, determine the first user terminal serving the second user terminal;
步骤34:将所述门禁权限信息发送给所述第一用户终端,其中,所述门禁权限信息能够为所述第一用户终端基于所述门禁权限信息解锁所述待访问门禁,所述门禁权限信息用于所述第一用户终端基于所述门禁权限信息解锁待访问门禁。Step 34: Send the access control authority information to the first user terminal, wherein the access control authority information can be used by the first user terminal to unlock the access control to be accessed based on the access control authority information, and the access control authority information is used by the first user terminal to unlock the access control to be accessed based on the access control authority information.
示例性的,根据所述服务订单信息,确定门禁权限信息,可以包括:Exemplarily, determining access control authority information according to the service order information may include:
根据服务订单信息中的用户标识,确定出与所述服务订单信息具有相同用户标识对应的门禁权限信息。According to the user identifier in the service order information, the access control authority information corresponding to the user identifier having the same identity as the service order information is determined.
如前述所说,该服务订单信息包括但不限于:第二用户终端指示的所要提供服务的地址信息。如此,第一服务终端能够基于服务订单信息确定出所要服务的地址信息,从而按照该地址信息为所述第二用户终端的用户指派对应的上门服务人员。As mentioned above, the service order information includes but is not limited to: the address information of the service to be provided indicated by the second user terminal. In this way, the first service terminal can determine the address information of the service to be provided based on the service order information, and assign the corresponding door-to-door service personnel to the user of the second user terminal according to the address information.
可以理解的是,若第二用户终端向第一服务终端提供门禁权限信息,第一服务终端会记录下提供门禁权限信息的用户标识,待该用户标识的第二用户终端发送服务订单信息时,能够基于该用户标识对应的门禁权限信息提供给为第二用户终端提供服务的第一用户终端,以便第一用户终端的配送员等能够方便进入到第二用户终端的用户所在的待访问门禁内。It can be understood that if the second user terminal provides access control authority information to the first service terminal, the first service terminal will record the user identifier who provides the access control authority information. When the second user terminal with the user identifier sends the service order information, the access control authority information corresponding to the user identifier can be provided to the first user terminal that provides service for the second user terminal, so that the delivery person of the first user terminal can easily enter the access control area to be accessed where the user of the second user terminal is located.
本公开实施例中,商家端,也就是第一服务终端在接收到第二用户终端发送的服务订单信息后,会根据所接收到的服务订单信息确定出第二用户终端对应的门禁权限信息,以及为第二用户终端服务的第一用户终端,如此,再将门禁权限信息发送给第一用户终端,从而可以使得第一用户终端,即待访问门禁的访问端,例如配送员等能够基于商家给的门禁权限信息顺利通过待访问门禁。如此,不需要第二用户终端的用户,例如业主等在配送员到达前每次进行门禁权限的允许,或者,也不需要例如物业保安的询问等工作。因此,本公开实施例中,一方面由于仍然会对进入待访问门禁的人员设置有门禁,从而保证了被访问端的安全性,另一方面由于该门禁权限信息不需要进行繁琐的门禁授权流程,为门禁系统的相关人员,例如被访问端的用户、被访问端的物业管理人员以及访问端的用户都提供了方便,且提高了服务效率。故,兼顾了门禁安全性以及用户的便利性,同时还提高了服务效率。In the disclosed embodiment, after receiving the service order information sent by the second user terminal, the merchant end, that is, the first service terminal, will determine the access control authority information corresponding to the second user terminal and the first user terminal serving the second user terminal according to the received service order information, and then send the access control authority information to the first user terminal, so that the first user terminal, that is, the access end of the access control to be accessed, such as the delivery person, can smoothly pass the access control to be accessed based on the access control authority information given by the merchant. In this way, the user of the second user terminal, such as the owner, does not need to allow the access control authority every time before the delivery person arrives, or, for example, the inquiry of the property security guard is not required. Therefore, in the disclosed embodiment, on the one hand, since the access control is still set for the personnel entering the access control to be accessed, the security of the accessed end is guaranteed, and on the other hand, since the access control authority information does not need to carry out the cumbersome access control authorization process, it provides convenience for the relevant personnel of the access control system, such as the user of the accessed end, the property management personnel of the accessed end, and the user of the access end, and improves the service efficiency. Therefore, the security of the access control and the convenience of the user are taken into account, and the service efficiency is also improved.
在另一些实施例中,所述服务订单信息包括门禁生成权限,所述基于所述服务订单信息,确定门禁权限信息,包括:In some other embodiments, the service order information includes access control generation authority, and determining the access control authority information based on the service order information includes:
根据所述服务订单信息中包括的所述门禁生成权限,生成所述门禁权限信息。The access control authority information is generated according to the access control generation authority included in the service order information.
这里,门禁生成权限,是指能够用于生成门禁权限信息的权限。例如,可以用于生成门禁验证码的权限,或者生成门禁二维码的权限等。示例性的,该门禁生成权限,可以包括:用于生成门禁权限信息的应用程序的账号密码等。如此,第一服务终端在具备门禁生成权限后,能够实时地生成门禁权限信息,以减少因第二用户终端提供的门禁权限信息过期而导致的服务效率低等问题。Here, the access control generation permission refers to the permission that can be used to generate access control permission information. For example, it can be used to generate access control verification codes, or to generate access control QR codes, etc. Exemplarily, the access control generation permission can include: the account password of the application used to generate access control permission information, etc. In this way, after the first service terminal has the access control generation permission, it can generate access control permission information in real time to reduce the problem of low service efficiency caused by the expiration of access control permission information provided by the second user terminal.
本实施例中,第二用户终端会将门禁权限信息跟随服务订单信息一起发送给第一服务终端,如此,第一服务终端能够从服务订单信息中解析出门禁权限信息来,以便将该门禁权限信息分配给为第二用户终端服务的第一用户终端,方便第一用户终端对应的上门服务人员进出待访问门禁。In this embodiment, the second user terminal will send the access control authority information along with the service order information to the first service terminal. In this way, the first service terminal can parse the access control authority information from the service order information so as to assign the access control authority information to the first user terminal serving the second user terminal, thereby facilitating the door-to-door service personnel corresponding to the first user terminal to enter and exit the access control.
此外,第二用户终端提供给第一服务终端的是门禁生成权限,如此,能够使得第一服务终端自行生成门禁权限信息,如此,能够适应于非固定型门禁权限信息的待访问门禁,提高这一类非固定门禁权限信息的待访问门禁的交互人员的方便性。In addition, the second user terminal provides the first service terminal with access control generation authority, so that the first service terminal can generate access control authority information by itself, so that it can adapt to the access control to be accessed with non-fixed access control authority information, thereby improving the convenience of people interacting with the access control to be accessed with this type of non-fixed access control authority information.
在另一些实施例中,所述方法还包括:In some other embodiments, the method further comprises:
在接收所述第二用户终端发送的服务订单信息之前,接收所述第二用户终端提供的所述门禁生成权限;Before receiving the service order information sent by the second user terminal, receiving the access control generation authority provided by the second user terminal;
本实施例中,第二用户终端在发送服务订单之前,向第一用户终端提供门禁生成权限,以便后续在该第一服务终端下单时可以减少门禁权限的输入等操作。In this embodiment, before sending a service order, the second user terminal provides the first user terminal with access control generation authority, so that the input of access control authority and other operations can be reduced when placing an order at the first service terminal later.
在另一些实施例中,所述方法还包括:In some other embodiments, the method further comprises:
响应于接收到所述第二用户终端发送的服务订单完成指令,向所述第二用户终端发送第二门禁权限禁用信息。In response to receiving the service order completion instruction sent by the second user terminal, second access control authority disabling information is sent to the second user terminal.
本实施例中,为了确保待访问门禁的安全性,在第一服务终端接收到所述第二用户终端发送的服务订单完成指令时,即表明该服务订单已经服务完毕,不需要再进入到待访问门禁,故通过向所述第二用户终端发送第二门禁权限禁用信息,减少门禁权限信息的恶意分配以及被盗等风险,以确保待访问门禁的安全性。In this embodiment, in order to ensure the security of the access control to be accessed, when the first service terminal receives the service order completion instruction sent by the second user terminal, it means that the service order has been completed and there is no need to enter the access control to be accessed. Therefore, by sending the second access control authority disable information to the second user terminal, the risks of malicious distribution and theft of access control authority information are reduced to ensure the security of the access control to be accessed.
在另一些实施例中,请参阅图4,图4是根据一示例性实施例示出的另一种门禁授权方法的又一流程图,如图4所示,所述方法还包括:In some other embodiments, please refer to FIG. 4, which is another flow chart of another access control authorization method according to an exemplary embodiment. As shown in FIG. 4, the method further includes:
步骤41:接收第一用户终端发送的第一用户终端的注册信息;Step 41: receiving registration information of a first user terminal sent by a first user terminal;
步骤42:对所述注册信息进行验证,生成第一验证结果;Step 42: Verify the registration information and generate a first verification result;
步骤33,即所述基于所述服务订单信息,确定为所述第二用户终端服务的第一用户终端,可以包括:Step 33, i.e., determining the first user terminal serving the second user terminal based on the service order information, may include:
步骤331:基于所述服务订单信息,从所述第一验证结果指示验证成功对应的第一用户终端中,确定出为所述第二用户终端提供服务的所述第一用户终端。Step 331: Based on the service order information, determine the first user terminal that provides service to the second user terminal from the first user terminals corresponding to the first verification result indicating successful verification.
这里的注册信息即为上述实施例所述的注册信息。The registration information here is the registration information described in the above embodiment.
示例性的,对所述注册信息进行验证,生成第一验证结果,包括:Exemplarily, verifying the registration information to generate a first verification result includes:
对所述注册信息进行实名制验证,生成第一验证结果。The registration information is verified by real name to generate a first verification result.
如此,被分配的第一用户终端都是实名制的用户终端,如此,可以保证待访问门禁的安全性的同时方便对第一用户终端进行追踪。In this way, the allocated first user terminals are all real-name user terminals, so that the security of the access control system to be accessed can be ensured while facilitating the tracking of the first user terminals.
本实施例中,只有在第一服务终端注册的第一用户终端才会被配发门禁权限信息,如此,可以进一步保证待访问门禁的门禁安全性。In this embodiment, only the first user terminal registered with the first service terminal will be allocated access control authority information, so that the access control security of the door to be accessed can be further guaranteed.
在另一些实施例中,请参阅图5,图5是根据一示例性实施例示出的另一种门禁授权方法的再一流程图,如图5所示,所述方法还包括:In some other embodiments, please refer to FIG. 5, which is another flow chart of another access control authorization method according to an exemplary embodiment. As shown in FIG. 5, the method further includes:
步骤61:接收所述第一用户终端发送的解锁信息;Step 61: receiving unlocking information sent by the first user terminal;
步骤62:对所述解锁信息进行验证,生成第二验证结果;Step 62: Verify the unlocking information and generate a second verification result;
步骤63:响应于所述第二验证结果指示验证失败,向所述第一用户终端发送的第一门禁权限禁用信息,以禁止所述第一用户终端解锁所述待访问门禁。Step 63: In response to the second verification result indicating a verification failure, first access control permission disabling information is sent to the first user terminal to prohibit the first user terminal from unlocking the access control.
可以理解的是,这里的解锁信息,可以是在第一用户终端使用门禁权限信息之前需要向第一服务终端发送的。或者是,在第一用户终端首次使用门禁权限信息之前,自动触发发送至第一服务终端的。总之,解锁信息是用于向第一服务终端请求使用所述门禁权限信息的请求信息。It is understandable that the unlock information here may be required to be sent to the first service terminal before the first user terminal uses the access control authority information. Or, it may be automatically triggered to be sent to the first service terminal before the first user terminal uses the access control authority information for the first time. In short, the unlock information is a request information for requesting the first service terminal to use the access control authority information.
示例性的,所述对所述解锁信息中所述第二用户信息进行验证,生成第二验证结果,包括:Exemplarily, the verifying the second user information in the unlocking information to generate a second verification result includes:
对所述解锁信息与注册信息进行匹配,若匹配成功,则生成的第二验证结果指示验证成功,或者,若匹配失败,则生成的第二验证结果指示验证失败。The unlocking information is matched with the registration information, and if the match is successful, the generated second verification result indicates that the verification is successful, or if the match fails, the generated second verification result indicates that the verification fails.
本公开实施例中,通过对解锁信息进行验证,以确定解锁时的用户信息与注册时的用户信息的一致性,从而保证上门服务人员的可靠性,进而保证待访问门禁的门禁安全性。此外,本公开实施例,通过对解锁信息进行验证,还可以减少门禁授权信息的被盗取而带来的危险性,从而保证待访问门禁的门禁安全性,进而保证了待访问门禁的门禁内人员或业主的安全。In the disclosed embodiment, the unlocking information is verified to determine the consistency between the user information at the time of unlocking and the user information at the time of registration, thereby ensuring the reliability of the door-to-door service personnel, and further ensuring the security of the door to be accessed. In addition, in the disclosed embodiment, the danger of theft of the door authorization information can be reduced by verifying the unlocking information, thereby ensuring the security of the door to be accessed, and further ensuring the safety of the person or owner inside the door to be accessed.
本公开实施例还提供一种门禁授权方法,请参阅图6,图6是根据一示例性实施例示出的又一种门禁授权方法的流程图,所述方法应用于第二用户终端,如图所示,所述方法包括:The embodiment of the present disclosure further provides a method for access control authorization. Please refer to FIG6 , which is a flow chart of another method for access control authorization according to an exemplary embodiment. The method is applied to a second user terminal. As shown in the figure, the method includes:
步骤61:向第一服务终端发送所述服务订单信息,所述服务订单信息用于供所述第一服务终端确定为所述第二用户终端提供服务的第一用户终端以及门禁权限信息,所述门禁权限信息用于供所述第一用户终端基于所述门禁权限信息解锁待访问门禁。Step 61: Send the service order information to the first service terminal, where the service order information is used by the first service terminal to determine the first user terminal and access control authority information that provide service to the second user terminal, where the access control authority information is used by the first user terminal to unlock the access control to be accessed based on the access control authority information.
其中,第二用户终端,即为上述实施例所述的用户终端。The second user terminal is the user terminal described in the above embodiment.
其中,所述第一服务终端为提供服务的商家的服务器或者云端;其中,所述第一用户终端可以访问门禁,例如,为快递员或者配送员的手机终端。The first service terminal is a server or cloud of a merchant providing services; the first user terminal can access access control, for example, it is a mobile phone terminal of a courier or delivery person.
示例性的,所述步骤61,即向第一服务终端发送所述服务订单信息,还包括:Exemplarily, the step 61, i.e. sending the service order information to the first service terminal, further includes:
响应于服务订单信息生成,向第一服务终端发送所述服务订单信息。In response to the service order information being generated, the service order information is sent to the first service terminal.
本公开实施例中,第二用户终端,也就是业主或者待访问门禁内的人员只需要在第一服务终端下单,既可以自动由第一服务终端将待访问门禁的门禁权限信息发送给为第二用户终端提供服务的第一用户终端,方便上门服务人员进出待访问门禁的同时,减少了被访问端的操作,例如可以减少与物业保安的确认,或者每次的门禁权限信息发送等,同时也可以减少物业保安的工作。因此,本公开实施例兼顾了门禁安全性和便利性。In the embodiment of the present disclosure, the second user terminal, that is, the owner or the person in the access control to be accessed, only needs to place an order at the first service terminal, and the first service terminal can automatically send the access control authority information of the access control to be accessed to the first user terminal providing services for the second user terminal, which is convenient for the door-to-door service personnel to enter and exit the access control to be accessed, while reducing the operations of the accessed terminal, such as reducing the confirmation with the property security, or sending the access control authority information each time, and also reducing the work of the property security. Therefore, the embodiment of the present disclosure takes into account both the security and convenience of the access control.
在另一些实施例中,所述方法还包括:In some other embodiments, the method further comprises:
向所述第一服务终端发送服务订单完成指令,其中,所述服务订单完成指令,用于供所述第一服务终端向所述第一用户终端发送第二门禁权限禁用信息。A service order completion instruction is sent to the first service terminal, wherein the service order completion instruction is used for the first service terminal to send second access control authority disabling information to the first user terminal.
本公开实施例中,通过向所述第一服务终端发送服务订单完成指令,可以触发第一服务终端基于服务订单完成指令向第一用户终端发送发送第二门禁权限禁用信息,从而为禁用第一用户终端的门禁权限信息提供时机,有利于第一用户终端及时禁用所述门禁权限信息,保证待访问门禁的门禁安全性。In the disclosed embodiment, by sending a service order completion instruction to the first service terminal, the first service terminal can be triggered to send a second access control authority disabling information to the first user terminal based on the service order completion instruction, thereby providing an opportunity to disable the access control authority information of the first user terminal, which is beneficial for the first user terminal to disable the access control authority information in time and ensure the access control security of the access control to be accessed.
在另一些实施例中,请参阅图7,图7是根据一示例性实施例示出的又一种门禁授权方法的另一流程图,如图7所示,所述步骤61,即所述向第一服务终端发送所述服务订单信息之前,所述方法还包括:In some other embodiments, please refer to FIG. 7, which is another flow chart of another access control authorization method according to an exemplary embodiment. As shown in FIG. 7, in step 61, that is, before sending the service order information to the first service terminal, the method further includes:
步骤71:向第二服务终端发送门禁权限的申请请求;Step 71: Sending a request for access control authority to the second service terminal;
步骤72:接收所述第二服务终端基于所述申请请求发送的门禁生成权限,其中,所述门禁生成权限用于生成所述门禁权限信息。Step 72: receiving the access control generation authority sent by the second service terminal based on the application request, wherein the access control generation authority is used to generate the access control authority information.
这里,第二服务终端可以为例如物业提供的服务器或者云端。所述第二服务终端可以提供管理待访问门禁的应用程序或者网站等。Here, the second service terminal may be, for example, a server or a cloud provided by a property. The second service terminal may provide an application or website for managing the access control to be accessed.
示例性的,申请请求包括:第二用户终端对应的被访问端的身份信息等,能够证明第二用户终端对应的被访问端为待访问门禁内的人员或者业务的身份的相关信息。示例性的,申请请求包括:第二用户终端对应的被访问端的购房合同或者房产证信息。Exemplarily, the application request includes: identity information of the visited terminal corresponding to the second user terminal, etc., and related information that can prove that the visited terminal corresponding to the second user terminal is the person or business to be accessed within the access control. Exemplarily, the application request includes: purchase contract or property certificate information of the visited terminal corresponding to the second user terminal.
本公开实施例中,只有通过向第二用户终端发送了门禁权限申请请求的第一用户终端才拥有下发门禁生成权限的权限。如此一来,可以减少恶意下发门禁生成权限而导致的门禁不安全现象。In the disclosed embodiment, only the first user terminal that has sent the access control permission application request to the second user terminal has the permission to issue the access control generation permission. In this way, the access control insecurity caused by maliciously issuing the access control generation permission can be reduced.
在另一些实施例中,所述方法还包括:In some other embodiments, the method further comprises:
将门禁生成权限发送给所述第一服务终端。The access control generation authority is sent to the first service terminal.
这里,当第二用户终端获得门禁生成权限后,为了方便后续的上门服务,可以将门禁生成权限发送给第一服务终端,例如,美团外卖等。如此,在后续下单时便直接由第一服务终端根据门禁生成权限为其生成门禁授权信息并下发给对应的上门服务人员。Here, when the second user terminal obtains the access control generation authority, in order to facilitate the subsequent door-to-door service, the access control generation authority can be sent to the first service terminal, such as Meituan Waimai, etc. In this way, when placing an order later, the first service terminal directly generates access control authorization information for it according to the access control generation authority and sends it to the corresponding door-to-door service personnel.
然而,为了保证待访问门禁的门禁安全性,减少被盗风险,以及保证门禁生成权限的实时性,在另一些实施例中,所述响应于所述服务订单信息生成,向所述第一服务终端发送所述服务订单信息,可以包括:However, in order to ensure the security of the access control to be accessed, reduce the risk of theft, and ensure the real-time nature of the access control generation authority, in other embodiments, in response to the generation of the service order information, sending the service order information to the first service terminal may include:
响应于所述服务订单信息生成,将所述门禁生成权限发送给所述第一服务终端。In response to the service order information being generated, the access control generation authority is sent to the first service terminal.
如此,只有在服务订单信息生成时,才将所述门禁生成权限发送给对应的所述第一服务终端,以减少门禁权限信息或者门禁生成权限的被盗风险,提高待访问门禁的门禁安全性。In this way, the access control generation authority is sent to the corresponding first service terminal only when the service order information is generated, so as to reduce the risk of theft of access control authority information or access control generation authority and improve the access control security of the access control to be accessed.
在另一些实施例中,所述响应于所述服务订单信息生成,向所述第一服务终端发送所述服务订单信息,可以包括:In some other embodiments, in response to the service order information being generated, sending the service order information to the first service terminal may include:
响应于所述服务订单信息生成,基于所述门禁生成权限生成所述门禁权限信息;In response to the service order information being generated, generating the access control authority information based on the access control generation authority;
将所述门禁权限信息携带在所述服务订单信息中发送给所述第一服务终端。The access control authority information is carried in the service order information and sent to the first service terminal.
本实施例中,通过仅将门禁权限信息发送给第一服务终端,可以减少第一服务终端对门禁生成权限的滥用,在提高服务效率以及服务便利性的同时,提高待访问门禁的门禁安全性。In this embodiment, by only sending the access control authority information to the first service terminal, the abuse of the access control generation authority by the first service terminal can be reduced, and the access control security of the access control to be accessed can be improved while improving service efficiency and service convenience.
本公开实施例还提供一种门禁授权方法,请参阅图8,图8是根据一示例性实施例示出的再一种门禁授权方法的流程图,所述方法应用于第二服务终端,如图8所示,所述方法包括:The embodiment of the present disclosure further provides a method for access control authorization. Please refer to FIG8 , which is a flow chart of another method for access control authorization according to an exemplary embodiment. The method is applied to a second service terminal. As shown in FIG8 , the method includes:
步骤91:接收第一用户终端的门禁权限信息,其中,所述门禁权限信息为第一服务终端接收到第二用户终端发送的服务订单信息发送至所述第一用户终端的;Step 91: receiving access control authority information of a first user terminal, wherein the access control authority information is sent from a first service terminal to the first user terminal by receiving service order information sent by a second user terminal;
步骤92:对所述第一用户终端的门禁权限信息进行验证,得到第三验证结果;Step 92: Verify the access control authority information of the first user terminal to obtain a third verification result;
步骤93:响应于所述第三验证结果指示验证成功,将门禁开启密钥发送至所述第一用户终端,以供所述所述第一用户终端基于所述门禁开启密钥解锁所述待访问门禁。Step 93: In response to the third verification result indicating successful verification, a door unlocking key is sent to the first user terminal, so that the first user terminal can unlock the door to be accessed based on the door unlocking key.
本公开实施例中,通过第一服务终端接收到第二用户终端发送的服务订单信息发送至所述第一用户终端的门禁权限信息,为第一用户终端进行门禁解锁,可以省去各相关方的繁琐的门禁授权操作,在保证门禁安全性的同时为各方用户提供了便利,且提高了服务效率。In the disclosed embodiment, the first service terminal receives the service order information sent by the second user terminal and sends the access control permission information to the first user terminal, so as to unlock the access control for the first user terminal. This can save the tedious access control authorization operations of all relevant parties, provide convenience for all users while ensuring the security of the access control, and improve service efficiency.
在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:
接收第二用户终端发送的门禁权限的申请请求,所述第二用户终端对应待访问门禁的被访问端;Receiving an application request for access control authority sent by a second user terminal, where the second user terminal corresponds to an accessed terminal to be accessed;
基于所述申请请求,向所述第二用户终端发送所述门禁生成权限,其中,基于所述申请信息,向所述第二用户终端发送所述门禁生成权限,其中,所述门禁生成权限用于供所述第二用户终端生成所述门禁权限信息,或者供所述第二用户终端发送给第一服务终端生成所述门禁权限信息。Based on the application request, the access control generation authority is sent to the second user terminal, wherein based on the application information, the access control generation authority is sent to the second user terminal, wherein the access control generation authority is used for the second user terminal to generate the access control authority information, or for the second user terminal to send to the first service terminal to generate the access control authority information.
示例性的,所述接收第二用户终端发送的门禁权限申请请求,可以包括:Exemplarily, the receiving the access control permission application request sent by the second user terminal may include:
接收第二用户终端发送的针对与第二用户终端相关的待访问门禁的门禁权限申请。Receive a door access permission application for a door access to be accessed related to the second user terminal, sent by the second user terminal.
示例性的,基于所述申请请求,向所述第二用户终端发送所述门禁生成权限,包括:基于所述申请请求,向所述第二用户终端发送与第二用户相关的待访问门禁的门禁权限申请。Exemplarily, sending the access control generation permission to the second user terminal based on the application request includes: sending, to the second user terminal, an access control permission application for the access control to be accessed related to the second user based on the application request.
可以理解的是,所述方法还包括:根据第二用户终端的终端位置,确定所述待访问门禁;或者,根据第二用户终端登录的地理位置,确定所述待访问门禁。It is understandable that the method further includes: determining the access control to be accessed according to the terminal location of the second user terminal; or determining the access control to be accessed according to the geographical location where the second user terminal logs in.
如此,可以仅对第二用户终端授予与第二用户终端相关的待访问门禁的门禁生成权限,有利于同社区与第二用户终端无关的门禁的门禁安全性。In this way, the second user terminal can be granted only the access control generation authority of the access control to be accessed related to the second user terminal, which is beneficial to the access control security of the access control that is not related to the community and the second user terminal.
本公开实施例中,只有通过向第二用户终端发送了门禁权限申请请求的第一用户终端才拥有下发门禁生成权限的权限。如此一来,在减少待访问门禁的管理人员,例如保安等人力等的同时,也可以减少恶意下发门禁生成权限而导致的门禁不安全现象。In the disclosed embodiment, only the first user terminal that has sent a request for access control permission to the second user terminal has the permission to issue access control generation permission. In this way, while reducing the number of managers to access the access control, such as security guards, etc., it can also reduce the access control insecurity caused by malicious issuance of access control generation permission.
上述实施例可以组合成一个或多个实施例。对此,不再赘述。The above embodiments can be combined into one or more embodiments, which will not be described in detail.
进一步地,本公开还提供一个具体实施例,以进一步理解本公开实施例提供的门禁授权方法。Furthermore, the present disclosure also provides a specific embodiment to further understand the access control authorization method provided by the embodiment of the present disclosure.
本公开实施中,涉及的对象包括:用户,即要求提供服务的个人或团体,包括:业主或者待访问门禁内的人员;物业,即门禁的管理员,用户需要向物业申请得到门禁生成权限;商户,提供服务的商家;配送员,执行商户服务的个人或团体;门禁,配送员给用户上门服务是需要一定权限才能通过,包括社区大门、单元门、单体房门等。In the implementation of the present disclosure, the objects involved include: users, that is, individuals or groups who require services, including: owners or people waiting to access the access control area; properties, that is, the administrator of the access control area, and users need to apply to the properties for access control generation permissions; merchants, merchants who provide services; delivery personnel, individuals or groups who perform merchant services; access control, delivery personnel need certain permissions to pass when providing door-to-door services to users, including community gates, unit doors, single-room doors, etc.
需要说明的是,现代社区一般是相对封闭的,必须持有相应的门禁或者向保安展示合理的身份(业主、租户、业主亲戚朋友、警察),方可进入。反之,就会有通行的麻烦。It should be noted that modern communities are generally relatively closed, and you must have the corresponding access control or show a reasonable identity (owner, tenant, owner's relatives and friends, police) to the security guard before you can enter. Otherwise, there will be trouble in passing.
目前的解决方法有:The current solutions are:
配送员抵达门禁处,跟保安上报到访的楼号和目的,经保安允许后通过门禁。The delivery person arrives at the access control point, reports the building number and purpose of his visit to the security guard, and passes through the access control after being allowed by the security guard.
配送员抵达门禁处,通过保安与用户通话,确认配送员可以通行。The delivery person arrives at the access control point and speaks to the user through the security guard to confirm that the delivery person can pass.
用户事先将相关密码或门禁卡给到配送员,配送员抵达门禁后使用密码或门禁卡验证后通行。The user gives the relevant password or access card to the delivery person in advance. After the delivery person arrives at the access control station, he will use the password or access card to verify and pass through.
用户有专属用于管理门禁权限信息的应用程序,通过应用程序给配送员二维码,这个二维码可以具有时效性,配送员在通行门禁时出示二维码,验证权限后通过。Users have a dedicated application for managing access control permission information. Through the application, they give the delivery person a QR code. This QR code can be time-sensitive. The delivery person presents the QR code when passing through the access control and passes after verifying the permission.
用户通过应用户程序,填写配送员的手机号码、姓名等信息,发放短信验证码,之后通过验证码验证权限后通过。The user goes through the user application, fills in the deliveryman's mobile phone number, name and other information, receives a text message verification code, and then passes the verification code to verify the authority.
但是,以上几种方法有以下几个问题:However, the above methods have the following problems:
第一,过程繁琐。First, the process is cumbersome.
首先,通过保安验证,每次都需要沟通交流,效率低。First of all, security verification requires communication every time, which is inefficient.
其次,用户每次下发二维码、验证码,需要用户主动操作。Secondly, every time a QR code or verification code is sent, the user needs to take the initiative.
第二,安全性低。Second, the security is low.
首先,对于保安盘问的情况,如果陌生人掌握了保安的几个问题和小区的情况,就可以进入小区;而配送员如果要登记自己的身份证号和手机号,就会出现隐私泄露问题。First of all, with regard to the situation of being questioned by security guards, if a stranger knows a few questions asked by the security guard and the situation of the community, he or she can enter the community; and if the deliveryman wants to register his or her ID number and mobile phone number, there will be a problem of privacy leakage.
其次,对于下发二维码或者验证码的情况,如果被其他人拿到就会有权限盗取问题最后,目前下发的二维码和验证码的权限没有细分,配送员有越权问题。Secondly, when it comes to issuing QR codes or verification codes, if they are obtained by other people, there will be a problem of permission theft. Finally, the permissions of the QR codes and verification codes currently issued are not subdivided, and the delivery staff may have exceeded their authority.
第三,需要用户主动参与。Third, users need to actively participate.
首先,对于保安确认信息给用户打电话,用户必须保持通话畅通,否则配送员无法进入。First of all, when the security guard calls the user to confirm the information, the user must keep the call open, otherwise the delivery person will not be able to enter.
其次,对于用户发放权限的情况,用户必须主动授权,并且管理权限,增加生活负担。Secondly, in the case of user issuance of permissions, users must actively authorize and manage permissions, which increases the burden on life.
基于此,在送快递、送外卖、上门维修、上门服务这些场景下,配送员或者快递员、外卖骑手、维修师傅、保洁阿姨、保姆等,以下以配送员为例,都需要登门才能提供完整的服务。而在这个过程中,配送员如何安全高效的穿越社区大门、单元门、电梯、用户的房门,正是本公开实施例要解决的问题。Based on this, in the scenarios of delivering express, food delivery, door-to-door maintenance, and door-to-door service, the deliveryman or courier, food delivery rider, maintenance master, cleaning lady, nanny, etc., below taking the deliveryman as an example, all need to visit the door to provide complete services. In this process, how the deliveryman can safely and efficiently pass through the community gate, unit door, elevator, and user's door is exactly the problem to be solved by the embodiments of the present disclosure.
请参阅图9,图9是根据具体实施例示出的再一种门禁授权方法的流程图,如图9所示,Please refer to FIG. 9 , which is a flow chart of another access control authorization method according to a specific embodiment. As shown in FIG. 9 ,
步骤1.1:用户向物业申请门禁生成权限;Step 1.1: The user applies to the property management for access control generation permission;
该步骤1.1,相当于上述实施例所述的步骤71,即相当于“第二用户终端向第二服务终端发送门禁权限的申请请求”。This step 1.1 is equivalent to step 71 described in the above embodiment, that is, equivalent to "the second user terminal sends an application request for access control authority to the second service terminal".
步骤1.2:物业根据申请请求为用户授予与用户相关的待访问门禁的门禁生成权限。Step 1.2: The property grants the user access control generation authority for the access control to be accessed related to the user based on the application request.
该步骤1.2,相当于上述实施例所述的步骤“第一服务终端根据第二用户终端发送的申请请求,向所述第二用户终端发送所述门禁生成权限”。This step 1.2 is equivalent to the step described in the above embodiment that "the first service terminal sends the access control generation authority to the second user terminal according to the application request sent by the second user terminal."
步骤2:用户向商户授予门禁权限;Step 2: The user grants access control permissions to the merchant;
该步骤2,相当于上述实施例所述的“第二用户终端将门禁生成权限发送给第一服务终端”,或者,相当于上述实施例所述的,第二用户终端将门禁生成权限生成的门禁权限信息发送给第一服务终端。This step 2 is equivalent to "the second user terminal sends the access control generation authority to the first service terminal" described in the above embodiment, or is equivalent to the above embodiment, the second user terminal sends the access control authority information generated by the access control generation authority to the first service terminal.
步骤3:配送员注册身份,即配送员向上述发送注册信息。Step 3: The delivery person registers his/her identity, i.e. the delivery person sends the registration information to the above.
该步骤3,相当于上述实施例所述的步骤21,即“第一用户终端向第一服务终端发送注册请求信息”。This step 3 is equivalent to step 21 described in the above embodiment, that is, "the first user terminal sends a registration request message to the first service terminal".
步骤4.1:用户向商户服务下单;Step 4.1: User places an order with the merchant service;
该步骤4.1相当于上述实施例所述的步骤61,即“第二用户终端响应于服务订单信息生成,向第一服务终端发送所述服务订单信息”。This step 4.1 is equivalent to step 61 described in the above embodiment, that is, "the second user terminal sends the service order information to the first service terminal in response to the service order information being generated."
步骤4.2:商户派单授予权限,即商户向配送员派单以及发送门禁权限信息;Step 4.2: The merchant grants permission to dispatch orders, i.e. the merchant dispatches orders to the delivery personnel and sends access control permission information;
该步骤4.2相当于上述步骤32、33步骤34,即第一服务终端可以根据服务订单信息,确定门禁权限信息,以及第一用户终端,然后将门禁权限信息发送给第一用户终端。This step 4.2 is equivalent to the above steps 32, 33 and 34, that is, the first service terminal can determine the access control authority information and the first user terminal according to the service order information, and then send the access control authority information to the first user terminal.
可以理解的是,这里的商家如果是拥有门禁生成权限,则利用门禁生成权限生成门禁权限信息,并将门禁权限信息发送给配送员;这里的商家如果是拥有门禁权限信息,则直接将门禁权限信息发送给配送员。It is understandable that if the merchant here has the access control generation authority, he will use the access control generation authority to generate access control authority information and send the access control authority information to the delivery person; if the merchant here has the access control authority information, he will directly send the access control authority information to the delivery person.
步骤4.3:验证权限,上门服务。Step 4.3: Verify permissions and provide on-site service.
该步骤4.3可以包括:上述实施例所述的“第一用户终端向第一服务终端发送解锁请求信息”,以便第一服务终端根据解锁请求信息对配送员进行验证,进一步提高了待访问门禁的门禁安全性。该步骤4.3还可以包括:配送员根据门禁授权信息向物业发起的开门请求,并接收到物业基于开门请求返回的动态的门禁卡密码或者门禁卡二维码等。This step 4.3 may include: the "first user terminal sends an unlock request message to the first service terminal" as described in the above embodiment, so that the first service terminal verifies the delivery person according to the unlock request message, further improving the access security of the door to be accessed. This step 4.3 may also include: the delivery person initiates a door opening request to the property according to the access authorization information, and receives a dynamic access card password or access card QR code etc. returned by the property based on the door opening request.
步骤5.1:完成订单,即用户向商户上报服务订单完成指令。Step 5.1: Complete the order, i.e. the user reports the service order completion instruction to the merchant.
该步骤5.1相当于上述步骤中“第二用户终端响应于所述第一服务终端基于服务订单信息服务完成,向所述第一服务返回服务订单完成指令”。This step 5.1 is equivalent to the above step of "the second user terminal responds to the first service terminal completing the service based on the service order information, and returns a service order completion instruction to the first service terminal."
步骤5.2:回收门禁权限,即商户向配送员回收门禁权限信息。Step 5.2: Reclaiming access control permissions, i.e. the merchant reclaims access control permission information from the delivery person.
该步骤5.2相当于上述实施例中,第一服务终端响应于接收到所述第二用户终端发送的服务订单完成指令,向所述第一用户终端发送所述门禁权限禁用指令,以指示所述第一用户终端禁用所述门禁权限信息。This step 5.2 is equivalent to the above embodiment, in which the first service terminal sends the access control permission disabling instruction to the first user terminal in response to receiving the service order completion instruction sent by the second user terminal, so as to instruct the first user terminal to disable the access control permission information.
本公开实施提供一种门禁授权方法,一旦服务订单信息产生,则由商家系统自动给配送员下发门禁权限信息,相比相关技术中,需要用户主动将门禁权限信息发送给配送员而言,可以省去用户的操作麻烦。另一方面,本公开实施例中,由于配送员在商户注册了身份信息,相比相关技术中,用户对配送员的身份信息无任何验证而言,风险可控性更强。此外,本公开实施例中,由于门禁权限信息是与配送员的手机绑定的,且在一些实施例中,会再次对配送员的解锁请求信息进行验证,例如对配送员进行人脸识别认证等,相比相关技术中,直接将门禁权限信息发送到一个陌生人手机上而言,可以减少门禁权限信息的盗用,提高门禁安全性。The present disclosure implements a method for access control authorization. Once the service order information is generated, the merchant system automatically sends the access control permission information to the delivery person. Compared with the related art, which requires the user to actively send the access control permission information to the delivery person, the user can save the trouble of operation. On the other hand, in the embodiment of the present disclosure, since the delivery person has registered his identity information with the merchant, the risk is more controllable than in the related art, where the user has no verification of the delivery person's identity information. In addition, in the embodiment of the present disclosure, since the access control permission information is bound to the delivery person's mobile phone, and in some embodiments, the delivery person's unlocking request information will be verified again, such as performing facial recognition authentication on the delivery person, compared with the related art, which directly sends the access control permission information to a stranger's mobile phone, it can reduce the theft of access control permission information and improve access control security.
故,本公开实施提供的门禁授权方法,能够在保证安全前提下,提高了服务效率。Therefore, the access control authorization method provided by the present disclosure can improve service efficiency while ensuring safety.
图10是根据一示例性实施例示出的一种门禁授权装置,应用于第一用户终端10,所述装置包括:FIG10 is a diagram showing a door access authorization device according to an exemplary embodiment, which is applied to a first user terminal 10, and the device includes:
第一接收模块101,用于从第一服务终端接收门禁权限信息,其中,所述门禁权限信息是由所述第一服务终端从第二用户终端接收到的,或者所述门禁权限信息是所述第一服务终端根据从所述第二用户终端接收到的门禁生成权限动态生成的;A first receiving module 101 is used to receive access control authority information from a first service terminal, wherein the access control authority information is received by the first service terminal from a second user terminal, or the access control authority information is dynamically generated by the first service terminal according to the access control generation authority received from the second user terminal;
解锁模块102,用于基于所述门禁权限信息,解锁待访问门禁。The unlocking module 102 is used to unlock the door to be accessed based on the door access authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第一发送模块,用于向所述第一服务终端发送所述第一用户终端的注册信息;A first sending module, configured to send registration information of the first user terminal to the first service terminal;
第二接收模块,用于接收所述第一服务终端对所述注册信息进行验证所生成的第一验证结果;A second receiving module, configured to receive a first verification result generated by the first service terminal verifying the registration information;
所述第一接收模块101,还用于:The first receiving module 101 is further configured to:
响应于所述第一验证结果指示验证成功,从所述第一服务终端接收所述门禁权限信息。In response to the first verification result indicating successful verification, the access control authority information is received from the first service terminal.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第二发送模块,用于向所述第一服务终端发送解锁信息;A second sending module, used to send unlocking information to the first service terminal;
第三接收模块,用于接收所述第一服务终端对所述解锁信息进行验证所生成的第二验证结果;A third receiving module, configured to receive a second verification result generated by the first service terminal verifying the unlocking information;
所述解锁模块,还用于:The unlocking module is further used for:
响应于所述第二验证结果指示验证成功,基于所述门禁权限信息,解锁所述待访问门禁。In response to the second verification result indicating successful verification, the door to be accessed is unlocked based on the door access authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第四接收模块,用于响应于所述第二验证结果指示验证失败,从所述第一服务终端接收第一门禁权限禁用信息,其中,所述第一门禁权限禁用信息是所述第一服务终端根据所述第二验证结果指示验证失败而生成的。The fourth receiving module is used to receive first access control permission disabling information from the first service terminal in response to the second verification result indicating verification failure, wherein the first access control permission disabling information is generated by the first service terminal according to the second verification result indicating verification failure.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第五接收模块,用于从所述第一服务终端接收到第二门禁权限禁用信息,所述第二门禁权限禁用信息是所述第一服务终端根据从所述第二用户终端接收到的服务订单完成指令而生成的。The fifth receiving module is used to receive second access control permission disabling information from the first service terminal, where the second access control permission disabling information is generated by the first service terminal according to the service order completion instruction received from the second user terminal.
图11是根据一示例性实施例示出的另一种门禁授权装置,提供一种门禁授权装置10,应用于第一服务终端,所述装置包括:FIG. 11 is another access control authorization device according to an exemplary embodiment, and provides an access control authorization device 10, which is applied to a first service terminal, and the device includes:
第六接收模块112,用于接收第二用户终端发送的服务订单信息;A sixth receiving module 112, configured to receive service order information sent by a second user terminal;
第一确定模块114,用于根据所述服务订单信息,确定门禁权限信息;A first determining module 114, configured to determine access control authority information according to the service order information;
第二确定模块116,用于基于所述服务订单信息,确定为所述第二用户终端服务的第一用户终端;A second determining module 116, configured to determine, based on the service order information, a first user terminal serving the second user terminal;
第三发送模块118,用于将所述门禁权限信息发送给所述第一用户终端,其中,所述门禁权限信息用于所述第一用户终端基于所述门禁权限信息解锁待访问门禁。The third sending module 118 is configured to send the access control authority information to the first user terminal, wherein the access control authority information is used by the first user terminal to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述服务订单信息包括门禁生成权限,所述装置还包括:In some embodiments, the service order information includes access control generation authority, and the device further includes:
所述第一确定模块114,还用于:The first determining module 114 is further configured to:
根据所述服务订单信息中包括的所述门禁生成权限,生成所述门禁权限信息。The access control authority information is generated according to the access control generation authority included in the service order information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第七接收模块,用于接收第一用户终端发送的第一用户终端的注册信息;A seventh receiving module, configured to receive registration information of the first user terminal sent by the first user terminal;
第一生成验证模块,用于对所述注册信息进行验证,生成第一验证结果;A first generation verification module, used to verify the registration information and generate a first verification result;
所述第二确定模块116,还用于:The second determining module 116 is further configured to:
基于所述服务订单信息,从所述第一验证结果指示验证成功对应的第一用户终端中,确定出为所述第二用户终端提供服务的所述第一用户终端。Based on the service order information, the first user terminal that provides service to the second user terminal is determined from the first user terminals corresponding to the first verification result indicating successful verification.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第八接收模块,用于接收所述第一用户终端发送的解锁信息;an eighth receiving module, configured to receive unlocking information sent by the first user terminal;
第二生成验证模块,用于对所述解锁信息进行验证,生成第二验证结果;A second generation verification module, used to verify the unlocking information and generate a second verification result;
第四发送模块,用于响应于所述第二验证结果指示验证失败,向所述第一用户终端发送的第一门禁权限禁用信息,以禁止所述第一用户终端解锁所述待访问门禁。A fourth sending module is used for sending first access control permission disabling information to the first user terminal in response to the second verification result indicating that the verification fails, so as to prohibit the first user terminal from unlocking the access control to be accessed.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第五发送模块,用于响应于接收到所述第二用户终端发送的服务订单完成指令,向所述第一用户终端发送第二门禁权限禁用信息,以指示所述第一用户终端禁止解锁所述待访问门禁。A fifth sending module is used to send second access control permission disabling information to the first user terminal in response to receiving the service order completion instruction sent by the second user terminal, so as to instruct the first user terminal to prohibit unlocking the access control to be accessed.
图12是根据一示例性实施例示出的又一种门禁授权装置,提供一种门禁授权装置12,应用于第二用户终端,所述装置包括:FIG. 12 is another access control authorization device according to an exemplary embodiment, and provides an access control authorization device 12, which is applied to a second user terminal, and the device includes:
第六发送模块120,用于向第一服务终端发送所述服务订单信息,所述服务订单信息用于供所述第一服务终端确定为所述第二用户终端提供服务的第一用户终端以及门禁权限信息,所述门禁权限信息用于供所述第一用户终端基于所述门禁权限信息解锁待访问门禁。The sixth sending module 120 is used to send the service order information to the first service terminal, and the service order information is used for the first service terminal to determine the first user terminal and access control authority information that provide services to the second user terminal, and the access control authority information is used for the first user terminal to unlock the access control to be accessed based on the access control authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第七发送模块,用于向所述第一服务终端发送服务订单完成指令,其中,所述服务订单完成指令,用于供所述第一服务终端向所述第一用户终端发送第二门禁权限禁用信息。A seventh sending module is used to send a service order completion instruction to the first service terminal, wherein the service order completion instruction is used for the first service terminal to send second access control authority disabling information to the first user terminal.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第八发送模块,用于向第二服务终端发送门禁权限的申请请求;An eighth sending module, used to send an application request for access control authority to the second service terminal;
第九接收模块,用于接收所述第二服务终端基于所述申请请求发送的门禁生成权限,其中,所述门禁生成权限用于生成所述门禁权限信息。A ninth receiving module is configured to receive a door access control generation authority sent by the second service terminal based on the application request, wherein the door access control generation authority is used to generate the door access control authority information.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第九发送模块,用于将所述门禁生成权限发送给所述第一服务终端。A ninth sending module is used to send the access control generation authority to the first service terminal.
在一些实施例中,所述第十发送模块,还用于:In some embodiments, the tenth sending module is further used to:
响应于所述服务订单信息生成,将所述门禁生成权限发送给所述第一服务终端。In response to the service order information being generated, the access control generation authority is sent to the first service terminal.
在一些实施例中,所述第七发送模块,还用于:In some embodiments, the seventh sending module is further used to:
响应于所述服务订单信息生成,基于所述门禁生成权限生成所述门禁权限信息;In response to the service order information being generated, generating the access control authority information based on the access control generation authority;
将所述门禁权限信息携带在所述服务订单信息中发送给所述第一服务终端。The access control authority information is carried in the service order information and sent to the first service terminal.
图13是根据一示例性实施例示出的一种门禁授权装置,提供一种门禁授权装置13,应用于第二服务终端,所述装置包括:FIG. 13 is a diagram showing a door access authorization device according to an exemplary embodiment. A door access authorization device 13 is provided, which is applied to a second service terminal. The device includes:
第十接收模块130,用于接收第一用户终端的门禁权限信息,其中,所述门禁权限信息为第一服务终端接收到第二用户终端发送的服务订单信息发送至所述第一用户终端的;A tenth receiving module 130, configured to receive access control authority information of a first user terminal, wherein the access control authority information is sent from a first service terminal to the first user terminal after receiving service order information sent by a second user terminal;
第三验证生成模块132,用于对所述第一用户终端的门禁权限信息进行验证,得到第三验证结果;A third verification generating module 132, configured to verify the access control authority information of the first user terminal to obtain a third verification result;
第十发送模块134,用于响应于所述第三验证结果指示验证成功,则将门禁开启密钥发送至所述第一用户终端。The tenth sending module 134 is configured to send a door unlocking key to the first user terminal in response to the third verification result indicating successful verification.
在一些实施例中,所述装置还包括:In some embodiments, the apparatus further comprises:
第十一接收模块,用于接收第二用户终端发送的门禁权限的申请信息;An eleventh receiving module, configured to receive application information for access control authority sent by a second user terminal;
第十一发送模块,用于基于所述申请信息,向所述第二用户终端发送所述门禁生成权限,其中,所述门禁生成权限用于供所述第二用户终端生成所述门禁权限信息,或者供所述第二用户终端发送给第一服务终端生成所述门禁权限信息。An eleventh sending module is used to send the access control generation authority to the second user terminal based on the application information, wherein the access control generation authority is used for the second user terminal to generate the access control authority information, or for the second user terminal to send to the first service terminal to generate the access control authority information.
图14是根据一示例性实施例示出的一种门禁授权系统框图,包括:上述任意所述的应用于第一用户终端的门禁授权装置10、上述任意所述的应用于第一服务终端的门禁授权装置11、上述任意所述的应用于第二用户终端的门禁授权装置12以及上述任意所述的应用于第二服务终端的门禁授权装置13。Figure 14 is a block diagram of a access control authorization system according to an exemplary embodiment, including: any of the above-mentioned access control authorization devices 10 applied to the first user terminal, any of the above-mentioned access control authorization devices 11 applied to the first service terminal, any of the above-mentioned access control authorization devices 12 applied to the second user terminal, and any of the above-mentioned access control authorization devices 13 applied to the second service terminal.
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。Regarding the device in the above embodiment, the specific manner in which each module performs operations has been described in detail in the embodiment of the method, and will not be elaborated here.
图15是根据一示例性实施例示出的一种终端1200的框图。例如,终端1200可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。Fig. 15 is a block diagram of a terminal 1200 according to an exemplary embodiment. For example, the terminal 1200 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, etc.
参照图12,终端1200可以包括以下一个或多个组件:处理组件1202,存储器1204,电力组件1206,多媒体组件1208,音频组件1210,输入/输出(I/O)的接口1212,传感器组件1214,以及通信组件1216。12 , terminal 1200 may include one or more of the following components: a processing component 1202 , a memory 1204 , a power component 1206 , a multimedia component 1208 , an audio component 1210 , an input/output (I/O) interface 1212 , a sensor component 1214 , and a communication component 1216 .
处理组件1202通常控制终端1200的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1202可以包括一个或多个处理器1220来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1202可以包括一个或多个模块,便于处理组件1202和其他组件之间的交互。例如,处理组件1202可以包括多媒体模块,以方便多媒体组件1208和处理组件1202之间的交互。The processing component 1202 generally controls the overall operation of the terminal 1200, such as operations associated with display, phone calls, data communications, camera operations, and recording operations. The processing component 1202 may include one or more processors 1220 to execute instructions to complete all or part of the steps of the above-mentioned method. In addition, the processing component 1202 may include one or more modules to facilitate the interaction between the processing component 1202 and other components. For example, the processing component 1202 may include a multimedia module to facilitate the interaction between the multimedia component 1208 and the processing component 1202.
存储器1204被配置为存储各种类型的数据以支持在终端1200的操作。这些数据的示例包括用于在终端1200上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1204可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。The memory 1204 is configured to store various types of data to support operations at the terminal 1200. Examples of such data include instructions for any application or method operating on the terminal 1200, contact data, phone book data, messages, pictures, videos, etc. The memory 1204 may be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as a static random access memory (SRAM), an electrically erasable programmable read-only memory (EEPROM), an erasable programmable read-only memory (EPROM), a programmable read-only memory (PROM), a read-only memory (ROM), a magnetic memory, a flash memory, a magnetic disk, or an optical disk.
电力组件1206为终端1200的各种组件提供电力。电力组件1206可以包括电源管理系统,一个或多个电源,及其他与为终端1200生成、管理和分配电力相关联的组件。Power component 1206 provides power to various components of terminal 1200. Power component 1206 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to terminal 1200.
多媒体组件1208包括在所述终端1200和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1208包括一个前置摄像头和/或后置摄像头。当终端1200处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。The multimedia component 1208 includes a screen that provides an output interface between the terminal 1200 and the user. In some embodiments, the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundaries of the touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1208 includes a front camera and/or a rear camera. When the terminal 1200 is in an operating mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
音频组件1210被配置为输出和/或输入音频信号。例如,音频组件1210包括一个麦克风(MIC),当终端1200处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1204或经由通信组件1216发送。在一些实施例中,音频组件1210还包括一个扬声器,用于输出音频信号。The audio component 1210 is configured to output and/or input audio signals. For example, the audio component 1210 includes a microphone (MIC), and when the terminal 1200 is in an operation mode, such as a call mode, a recording mode, and a speech recognition mode, the microphone is configured to receive an external audio signal. The received audio signal can be further stored in the memory 1204 or sent via the communication component 1216. In some embodiments, the audio component 1210 also includes a speaker for outputting audio signals.
I/O接口1212为处理组件1202和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。I/O interface 1212 provides an interface between processing component 1202 and peripheral interface modules, such as keyboards, click wheels, buttons, etc. These buttons may include but are not limited to: home button, volume button, start button, and lock button.
传感器组件1214包括一个或多个传感器,用于为终端1200提供各个方面的状态评估。例如,传感器组件1214可以检测到终端1200的打开/关闭状态,组件的相对定位,例如所述组件为终端1200的显示器和小键盘,传感器组件1214还可以检测终端1200或终端1200一个组件的位置改变,用户与终端1200接触的存在或不存在,终端1200方位或加速/减速和终端1200的温度变化。传感器组件1214可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1214还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1214还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。The sensor assembly 1214 includes one or more sensors for providing various aspects of status assessment for the terminal 1200. For example, the sensor assembly 1214 can detect the open/closed state of the terminal 1200, the relative positioning of the components, such as the display and keypad of the terminal 1200, and the sensor assembly 1214 can also detect the position change of the terminal 1200 or a component of the terminal 1200, the presence or absence of contact between the user and the terminal 1200, the orientation or acceleration/deceleration of the terminal 1200, and the temperature change of the terminal 1200. The sensor assembly 1214 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1214 may also include an optical sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1214 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
通信组件1216被配置为便于终端1200和其他设备之间有线或无线方式的通信。终端1200可以接入基于通信标准的无线网络,如WiFi,2G或3G,或它们的组合。在一个示例性实施例中,通信组件1216经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1216还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。The communication component 1216 is configured to facilitate wired or wireless communication between the terminal 1200 and other devices. The terminal 1200 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1216 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1216 also includes a near field communication (NFC) module to facilitate short-range communication. For example, the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
在示例性实施例中,终端1200可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。In an exemplary embodiment, terminal 1200 may be implemented by one or more application-specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components to perform the above methods.
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1204,上述指令可由终端1200的处理器1220执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, a non-transitory computer-readable storage medium including instructions is also provided, such as a memory 1204 including instructions, and the instructions can be executed by the processor 1220 of the terminal 1200 to complete the above method. For example, the non-transitory computer-readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, etc.
图16是根据一示例性实施例示出的一种服务器1300的框图。参照图13,服务器1300包括处理组件1322,其进一步包括一个或多个处理器,以及由存储器1332所代表的存储器资源,用于存储可由处理组件1322的执行的指令,例如应用程序。存储器1332中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1322被配置为执行指令,以执行上述方法各个实施例所述的应用于门禁授权方法。FIG16 is a block diagram of a server 1300 according to an exemplary embodiment. Referring to FIG13 , the server 1300 includes a processing component 1322, which further includes one or more processors, and a memory resource represented by a memory 1332 for storing instructions executable by the processing component 1322, such as an application. The application stored in the memory 1332 may include one or more modules, each corresponding to a set of instructions. In addition, the processing component 1322 is configured to execute instructions to execute the access control authorization method described in each embodiment of the above method.
服务器1300还可以包括一个电源组件1326被配置为执行服务器1300的电源管理,一个有线或无线网络接口1350被配置为将服务器1300连接到网络,和一个输入输出(I/O)接口1358。服务器1300可以操作基于存储在存储器1332的操作系统,例如WindowsServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。The server 1300 may also include a power supply component 1326 configured to perform power management of the server 1300, a wired or wireless network interface 1350 configured to connect the server 1300 to a network, and an input/output (I/O) interface 1358. The server 1300 may operate based on an operating system stored in the memory 1332, such as Windows Server™, Mac OS X™, Unix™, Linux™, FreeBSD™, or the like.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本申请旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。Those skilled in the art will readily appreciate other embodiments of the present invention after considering the specification and practicing the invention disclosed herein. This application is intended to cover any variations, uses or adaptations of the present invention that follow the general principles of the present invention and include common knowledge or customary techniques in the art that are not disclosed in this disclosure. The specification and examples are to be considered exemplary only, and the true scope and spirit of the present invention are indicated by the following claims.
一种非临时性计算机可读存储介质,当所述存储介质中的指令由电子设备的处理器执行时,使得电子设备能够执行上述各实施例所述的报点信息处理方法。该电子设备可以是上述所述的终端,也可以是上述所述的服务器。A non-transitory computer-readable storage medium, when the instructions in the storage medium are executed by a processor of an electronic device, enables the electronic device to execute the method for processing time information described in the above embodiments. The electronic device may be the terminal described above or the server described above.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本申请旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。Those skilled in the art will readily appreciate other embodiments of the present invention after considering the specification and practicing the invention disclosed herein. This application is intended to cover any variations, uses or adaptations of the present invention that follow the general principles of the present invention and include common knowledge or customary techniques in the art that are not disclosed in this disclosure. The specification and examples are to be considered exemplary only, and the true scope and spirit of the present invention are indicated by the following claims.
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。It should be understood that the present invention is not limited to the exact construction that has been described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present invention is limited only by the appended claims.
Claims (33)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111165085.5A CN114038099B (en) | 2021-09-30 | 2021-09-30 | Access control authorization method, device, system, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111165085.5A CN114038099B (en) | 2021-09-30 | 2021-09-30 | Access control authorization method, device, system, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114038099A CN114038099A (en) | 2022-02-11 |
CN114038099B true CN114038099B (en) | 2024-08-13 |
Family
ID=80140616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111165085.5A Active CN114038099B (en) | 2021-09-30 | 2021-09-30 | Access control authorization method, device, system, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114038099B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118261504A (en) * | 2024-02-18 | 2024-06-28 | 无锡市启诚星科技有限公司 | Data analysis method and system based on Internet |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105528816A (en) * | 2014-09-28 | 2016-04-27 | 中国移动通信集团辽宁有限公司 | Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center |
CN109544746A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | A kind of community's access control system control method and its device |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102682410B (en) * | 2012-05-22 | 2016-03-02 | 厦门思德电子科技有限公司 | A kind of employee's authorization method based on household services |
CN104751545B (en) * | 2015-02-16 | 2018-05-25 | 北京果加智能科技有限公司 | Door lock authorization process system and method and device |
CN206021342U (en) * | 2016-07-19 | 2017-03-15 | 福建方维信息科技有限公司 | A kind of O2O e-commerce systems |
CN106355708A (en) * | 2016-08-31 | 2017-01-25 | 北京厚文知识产权顾问有限公司 | Door control system capable of conferring opening authority to visitors and door control management method |
CN107895414A (en) * | 2017-10-31 | 2018-04-10 | 成都起能起重设备技术服务有限公司 | A kind of visitor's concierge system based on Quick Response Code |
CN111724512B (en) * | 2020-06-28 | 2022-04-26 | 口碑(上海)信息技术有限公司 | Equipment opening method, device, equipment and readable storage medium of equipment |
-
2021
- 2021-09-30 CN CN202111165085.5A patent/CN114038099B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105528816A (en) * | 2014-09-28 | 2016-04-27 | 中国移动通信集团辽宁有限公司 | Intelligent gate inhibition realization method, terminal, gate inhibition identification apparatus and user authorization service center |
CN109544746A (en) * | 2018-11-20 | 2019-03-29 | 北京千丁互联科技有限公司 | A kind of community's access control system control method and its device |
Also Published As
Publication number | Publication date |
---|---|
CN114038099A (en) | 2022-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10397785B2 (en) | Handheld video visitation | |
WO2017140240A1 (en) | Guest authentication method and system | |
US20160191484A1 (en) | Secure Inmate Digital Storage | |
US20170337755A1 (en) | Systems and methods for location enabled electronic lock controls | |
KR101118679B1 (en) | Method for controlling access using near field communication | |
US20140280559A1 (en) | Inmate network priming | |
US9871760B2 (en) | Message transmission scheme in a controlled facility | |
WO2017178816A1 (en) | Event tickets with user biometric verification on the user mobile terminal | |
JP2014214556A (en) | Entering-leaving area management system and entering-leaving area management method | |
EP3811339A1 (en) | Improved access control system and a method thereof controlling access of persons into restricted areas | |
US12020525B2 (en) | Property management systems | |
CN114863597B (en) | Access management method, system and device based on trusted bar code | |
JP5955700B2 (en) | Key distribution system | |
US20110148576A1 (en) | Device, System and Method for Personnel Tracking and Authentication | |
CN114038099B (en) | Access control authorization method, device, system, electronic equipment and storage medium | |
US11599872B2 (en) | System and network for access control to real property using mobile identification credential | |
JP6151036B2 (en) | Key distribution system | |
US20220108573A1 (en) | Remote device interface and telephone entry system | |
JP7450569B2 (en) | Visitor management system and visitor management method | |
CN114117474A (en) | Visitor rights management method and device, electronic device and storage medium | |
CN110648443A (en) | Access control verification method, device, equipment and medium | |
JP7581623B2 (en) | Information processing device and program | |
TW201907688A (en) | Systems, devices, and methods for performing verification of communications received from one or more computing devices | |
US10726365B2 (en) | Secure facility resident grievance/request filing system | |
JP2003288426A (en) | Visit staff identity guaranteeing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |