Background
With the rapid development of social economy, the mobility of various external people is increasingly frequent, and potential safety hazards are increased, so that visitor entrance and exit management becomes increasingly important. At present, each place requiring access control management greatly adopts manual operation, visitors register and get evidences and other modes, but the mode has obvious defects, on one hand, 24-hour all-day guard cannot be realized, labor cost can be increased through shift change, on the other hand, on-duty personnel cannot judge authenticity of the certificates and personnel identities, and potential safety hazards can be caused to a certain degree.
For example, in a server farm hosting site, that is, a data center, since different client devices are stored in different rooms, target areas or modules of the data center, and the client devices are generally processing devices of data of great importance to clients, the prior art method of manual verification is adopted to ensure the security of the devices and data of each client, which undoubtedly causes great safety hazards and has extremely high labor cost.
Therefore, how to realize unmanned self-help is still a problem to be solved urgently.
Disclosure of Invention
The problem to be solved is to solve how to realize unmanned self-help verification in the prior art.
The invention provides a self-service certificate-returning method, which comprises the following steps: the method comprises the steps of obtaining a departure request, wherein the departure request is used for representing departure triggering of a visitor from a target area, and the target area is determined based on the visitor request and visitor identity information; verifying the target area state and/or visitor identity information based on the departure request; and when the target area state and/or the visitor identity information meet the preset requirements, outputting a card returning instruction, and controlling a card returning device to collect the visitor pass by the card returning instruction user.
Optionally, the verifying the target area status and/or the visitor identity information based on the departure request includes: analyzing the off-site request to obtain target area information; acquiring a first running state of preset equipment in a target area based on the target area information; judging whether the running state is consistent with a second running state of preset equipment before the visitor enters the target area; and if the verification result is consistent, the verification of the departure request is successful.
Optionally, the verifying the target area status and/or the visitor identity information based on the departure request includes: acquiring first identity information of a visitor; analyzing the departure request to obtain second identity information when the visitor enters the target area; judging whether the first identity information of the visitor is consistent with the second identity information; and if the verification result is consistent, the verification of the departure request is successful.
Optionally, the analyzing the departure request to obtain second identity information when the visitor enters the target area includes: obtaining authorization information of the pass according to the departure request, wherein the authorization information is obtained by verifying the second identity information when a visitor enters the target area; and acquiring the second identity information corresponding to the authorization information according to the authorization information.
Optionally, the first identity information includes first certificate information and first biometric information; the second identity information includes second certificate information and second biometric information.
Optionally, the determining whether the guest first identity information and the second identity information are consistent includes: comparing the first certificate information with the first certificate information; and comparing the first biological characteristic information with the second biological characteristic information when the second certificate information is consistent with the first certificate information, wherein the first identity information is consistent with the second identity information when the first biological characteristic information is consistent with the second biological characteristic information.
Optionally, the determining of the target area based on the guest request and the guest identity information comprises: determining target area information accessed by the visitor based on the visitor request; and verifying the identity information of the visitor and generating authorization information corresponding to the target area information based on a verification result, wherein the authorization information is used for authorizing the pass to unlock the target area accessed by the visitor.
According to a second aspect, an embodiment of the present invention provides a self-service certificate issuing device, including: the system comprises an acquisition module, a departure request, a display module and a display module, wherein the departure request is used for representing that a visitor leaves from a target area and is obtained through triggering, and the target area is determined based on the visitor request and visitor identity information; the verification module verifies the state of the target area and/or the identity information of the visitor based on the departure request; and the license returning module is used for outputting a license returning instruction when the target area state and/or the visitor identity information meet the preset requirements, and the license returning instruction controls the license returning equipment to collect the visitor pass.
According to a third aspect, an embodiment of the present invention provides a computer-readable storage medium, which stores computer instructions for causing a computer to execute a self-service payment method according to any one of the above first aspects.
According to a fourth aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the program to implement the self-help authentication method according to any one of the first aspects.
The self-service evidence-returning method provided by the embodiment of the application obtains the departure request, wherein the departure request is used for representing that a visitor leaves from a target area and is triggered, and the target area is determined based on the visitor request and visitor identity information; verifying the target area state and/or visitor identity information based on the departure request; and when the target area state and/or the visitor identity information meet the preset requirements, outputting a card returning instruction, and controlling a card returning device to collect the visitor pass by the card returning instruction user. After the departure request is obtained, the departure can be confirmed by verifying the state of the target area and the identity information of the visitor when the state of the target area and the identity information of the visitor are consistent with the state of the area entering the target area and the identity information of the visitor. And furthermore, the safety of the target area when a specific visitor leaves the target area can be realized. And human-induced redemptions can be avoided, and the safety of the target areas for the lessees can be completely ensured.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings. In order to ensure the security of data, each module has only a corresponding client with an access right, and therefore, in order to ensure that a client can be accurately authorized to enter a target area, an embodiment of the present invention provides a self-service authentication method, as shown in fig. 1, the method may include the following steps:
s10, a departure request is obtained and used for representing departure triggering of a visitor from a target area, and the target area is determined based on the visitor request and visitor identity information. In this embodiment, the departure request may be a request issued by a visitor when the visitor leaves the target area, for example, the passerby device reads information in the pass, or the visitor triggers a preset button or a preset touch area to trigger the departure request. The target area may be determined by a visitor request and visitor identity information, specifically, the visitor request information may be based on a visitor application filled by a visitor, the application may be an electronic application, may be a paper application, specifically, the visitor request information may be extracted based on application information filled by a visitor, and exemplarily, the visitor first identity information in the visitor application information, the visitor target visit target area, and the like may be extracted based on the electronic application. When the guest request information is acquired, the first biological characteristics of the guest corresponding to the first identity information in the guest request information, for example, the biological characteristics of the unique identification individual identity information, such as the collected face image, the collected iris characteristic, the collected gait characteristic, the collected fingerprint characteristic, and the like, can also be acquired together. In this embodiment, the first biometric characteristic may be bound to the first identity information and the target access target area. As an optional embodiment, taking a data center as an example for description, the client leases at least one target area storage server or data in the data, and the guest request information may further include tenant information. The tenant information may include tenant identity information, target area information rented by the tenant. The tenant information may further include person information or the like that is specified by the tenant and that can access the tenant target area. Analyzing the request information of the user to obtain first identity information, first biological characteristic information, visitor visit target area information and the like of the user. Specifically, after the first identity information of the user and the first acoustic feature information, the information of the target area visited by the other users may be associated. And further determining the information of the target area to be visited by the current visitor. As an exemplary embodiment, the client request information may include tenant information, and in this embodiment, a target area that a current guest can visit may be further determined according to the tenant information, and for example, the current client tenant target area includes A, B, C, D four target areas, so that the finally determined guest visits any one or more of the A, B, C, D four target areas. Therefore, before determining the visitor target area, the visitor target area information in the visitor request information needs to be compared with the tenant target area information in the tenant information, and when the visitor target area belongs to the tenant target area, the visitor target area information of the visitor can be confirmed. As an alternative embodiment, the lessee may set some access rights to specify a specific person to enter the target area of the lessee, so that before the visitor is determined to access the target area, the first identity information and/or the first biological characteristic may be verified with the access rights of the lessee, and when the verification is passed, the visitor access target area information is confirmed.
As an exemplary embodiment, after confirming that the visitor accesses the target area information, the user may perform a self-service pass exchange, where the identity information of the visitor needs to be verified, and for example, the user's certificate information may be collected, and the certificate information may include information on a certificate such as an identity card, a passport, and the like, and may be read by using a certificate reading device. And acquiring second biological characteristic information of the user, for example, acquiring a face image, and acquiring biological characteristics such as iris characteristics, gait characteristics and fingerprint characteristics, which uniquely identify the personal identity information. First, whether the certificate information is consistent with the second biological characteristic information or not can be verified, if so, the second identity information of the visitor can be confirmed, and the information verified when the user changes the pass is carried out during the second identity information, so that the unified verification of the personal identification can be realized.
As an exemplary embodiment, after obtaining the unified identification of the witness, it is further required to compare whether the current passer-by is consistent with the person who submits the request, so it is required to compare whether the first identity information is consistent with the second identity information, and when the first identity information is consistent with the second identity information, it can be confirmed that the person who applies for entry is the same as the person who currently exchanges the passer, so it can be confirmed that the identity information of the visitor is successfully verified. As an alternative embodiment, preventing another person from falsely using the certificate, as an exemplary embodiment, when the first identity information and the second identity information are consistent, the first biometric information corresponding to the first identity information may be acquired; comparing the first biological characteristic information with the second biological characteristic information, and when the first biological characteristic information is the same as the second biological characteristic information, successfully verifying the identity information of the visitor. Therefore, through double verification of the certificate information and the biological information, the identity information of the visitor can be verified more accurately.
After the identity information of the visitor is successfully verified, authorization information corresponding to the determined target area information can be generated, the authorization information is used for authorizing the pass to unlock the visitor to access the target area, and the pass authorized by the authorization information cannot open the unauthorized target area. Accurate authorization of a particular visitor to enter the corresponding target area may be achieved. Human-based redemptions can be avoided, and the safety of the target areas for lessees can be fully ensured.
And S20, verifying the state of the target area and/or the identity information of the visitor based on the departure request. As an exemplary embodiment, the departure request may be parsed to obtain target area information; acquiring a first running state of preset equipment in a target area based on the target area information; judging whether the running state is consistent with a second running state of preset equipment before the visitor enters the target area; and if the verification result is consistent, the verification of the departure request is successful. For example, it may be verified whether the doors of the target area are locked, whether there are any people remaining in the target area, or whether the lights or other devices of the target area are consistent with the status of the visitor before entering the target area.
As an exemplary embodiment, after the state of the target area is successfully verified, whether the current departure person is a person entering the target area can be verified, and specifically, first identity information of the visitor is acquired; the first identity information is visitor information collected when a visitor leaves a field, and specifically can collect the certificate information and/or biological characteristic information of the visitor, for example, can read the biological characteristics of unique identification personal identity information such as visitor identity card information, face image characteristics, iris characteristics, gait characteristics, fingerprint characteristics and the like. Analyzing the departure request to obtain second identity information when the visitor enters the target area; the second identity information may be information collected when the visitor enters the target area, and the information may be information requested by the visitor, and specifically, as described in the above embodiment for the request information, the second identity information may be identity information verified before the visitor enters the target area, for example, collected visitor certificate information and/or biometric information. When a visitor enters the target area, after the identity information is successfully verified, the visitor identity information and the communication card authorization information are bound, when the visitor leaves the field, the visitor determines a leaving request by reading the authorization information in the pass, then the authorization information is determined, and second identity information when the visitor enters the target area is called based on the authorization information. Judging whether the first identity information of the visitor is consistent with the second identity information; and comparing whether the first identity information is consistent with the second identity information, and when the first identity information is consistent with the second identity information, confirming that the person applying for entering is the same as the person who exchanges the pass at present, so that the successful verification of the identity information of the visitor can be confirmed. As an alternative embodiment, preventing another person from falsely using the certificate, as an exemplary embodiment, when the first identity information and the second identity information are consistent, the first biometric information corresponding to the first identity information may be acquired; comparing the first biological characteristic information with the second biological characteristic information, and when the first biological characteristic information is the same as the second biological characteristic information, successfully verifying the identity information of the visitor. Therefore, through double verification of the certificate information and the biological information, the identity information of the visitor can be verified more accurately. When the target area status and/or the visitor identity information meet the preset requirements, the process proceeds to step S30.
S30, a certificate returning instruction is output, and the certificate returning instruction user controls the certificate returning equipment to collect the visitor pass
An embodiment of the present application further provides a self-service certificate-returning device, as shown in fig. 2, the device may include:
the system comprises an obtainingmodule 10, a departure request, a display module and a display module, wherein the departure request is used for representing that a visitor leaves from a target area and is triggered, and the target area is determined based on the visitor request and visitor identity information;
averification module 20 for verifying the status of the target area and/or the identity information of the visitor based on the departure request;
and thelicense returning module 30 is used for outputting a license returning instruction when the target area state and/or the visitor identity information meet the preset requirements, and the license returning instruction controls the license returning equipment to collect the visitor pass.
An embodiment of the present invention provides an electronic device, as shown in fig. 3, which includes one ormore processors 31 and amemory 32, and oneprocessor 33 is taken as an example in fig. 3.
The controller may further include: aninput device 33 and anoutput device 34.
Theprocessor 31, thememory 32, theinput device 33 and theoutput device 34 may be connected by a bus or other means, and fig. 3 illustrates the connection by a bus as an example.
Theprocessor 31 may be a Central Processing Unit (CPU). Theprocessor 31 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Thememory 32, which is a non-transitory computer readable storage medium, can be used for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present application. Theprocessor 31 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in thememory 32, namely, implements the self-help authentication method of the above-described method embodiment.
Thememory 32 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, thememory 32 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, thememory 32 may optionally include memory located remotely from theprocessor 31, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Theinput device 33 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. Theoutput device 34 may include a display device such as a display screen.
One or more modules are stored in thememory 32, which when executed by the one ormore processors 31 perform the method as shown in fig. 1.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the motor control methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Finally, the principle and the implementation of the present invention are explained by applying the specific embodiments in the present invention, and the above description of the embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.