Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides an intelligent visitor management system, which can improve the management efficiency of visitors, track the visitors constantly and greatly improve the safety of modern parks, factories and buildings.
The invention also provides computer equipment.
It is yet another object of the present invention to provide a computer readable storage medium.
One of the purposes of the invention is realized by adopting the following scheme:
a smart guest management system, comprising:
the visitor reservation platform is used for generating two-dimensional code information from visitor reservation information;
the access control system is used for verifying the two-dimensional code information and sending the visitor arrival information to the interviewee, if the verification is passed, sending control information to open the gate, and if the verification is not passed, not acting;
the visitor track management system is used for planning, indicating and tracking the visitor walking track, and if the visitor walking track is abnormal, the visitor walking track management system feeds back the visitor walking track in an alarm form; the visitor track management system comprises a visitor card, a card reader and a guard displayer, wherein the visitor card is provided with a tag for storing visitor information and determining visitor position data, and the card reader is used for acquiring detailed geographical positioning data fed back by the visitor card carried by a visitor and displaying the detailed geographical positioning data through the guard displayer; and
and the visitor background management system is used for recording, interacting and managing visitor information and is respectively connected with the visitor reservation platform, the access control system and the visitor track management system.
In one embodiment, the reservation mode of the visitor reservation platform comprises a visitor reservation mode, a visitor invited mode, a field registration mode and a batch access mode.
In one embodiment, the access control system comprises a two-dimensional code reader, and the two-dimensional code reader is a reading module or a two-dimensional code scanning gun which is arranged in the access control system.
In one embodiment, the method for planning the walking track of the visitor in the visitor track management system comprises the following steps: the visitor reservation method includes the steps that a visitor reservation time at a visitor reservation platform is used for coding, a corresponding sequence is given to the visitor, a planned walking route is used for counting time length, data of the maximum time length are used for controlling the operation of the visitor, or the walking route and the time length are set by following the ages and the physical conditions of different visitors, and a visitor walking route map is sent to the visitor and recorded on a visitor card.
In one embodiment, the indication method of the visitor track management system is as follows:
s10, dividing the walking route into sensitive areas or normal areas, setting the stay time according to each area, if the stay time of the visitor in the sensitive area is too long, prompting a guard or the visitor in a prompting mode, and prompting the visitor to leave the sensitive area as soon as possible;
s20, when the visitor arrives in the normal area of the addressee, the visitor information is fed back, whether the area is authorized or not is judged, if not, an alarm is sent to the entrance guard or the addressee, and if the area is authorized, the alarm is not sent;
and S30, when the time length of the visitor pausing at a certain point location of the normal area is long, judging the point location of the visitor, if so, canceling the alarm, if not, sending the alarm, checking whether the behavior of the visitor is correct or not through monitoring, and if not, giving an alarm by a gatekeeper.
In one embodiment, the visitor track management system adopts an RFID anti-collision calculation method when tracking the walking track of the visitor, and the RFID anti-collision calculation method comprises an ALOHA calculation method and a binary tree calculation method.
In one embodiment, the RFID anti-collision calculation method includes the following steps:
s10, a plurality of labels enter the effective identification range of a card reader, the ID information of the labels is sent out, and if the card reader receives the information sent by less than 5 labels in the same interval, the information is processed by adopting an ALOHA calculation method; if the card reader receives information sent by more than 5 labels in the same interval, processing the information by adopting a binary tree calculation method;
s20, one or more labels enter the effective identification range of multiple card readers at the same time, if multiple card readers will receive the information sent by the same label in the same interval, the ALOHA calculation method is adopted for processing; and if the plurality of card readers receive the information sent by the same plurality of labels in the same interval, processing the information by adopting a binary tree calculation method.
In one embodiment, the visitor track management system is further provided with a tracking vector filtering module in tracking the visitor walking track, and the calculation method of the tracking vector algorithm is as follows:
s10: acquiring a tracking vector;
s20: searching historical information corresponding to the ID according to the label data stored in the tracking vector;
s30: if the historical information is not searched, deriving a final vector and storing the final vector in a hash table; if the history information exists, the next step is carried out;
s40: after searching the history information corresponding to the ID of the label, comparing the history information with the received ID information, if the history information is different from the ID information, changing the point position of the label, editing the tracking vector and compiling in a hash table; otherwise, if the point position of the label is not changed, the next step is carried out;
s50: comparing the historical information with the time point of the tracking vector, if the historical information and the time point of the tracking vector meet the requirement
If so, deleting the tracking vector, otherwise, repeatedly passing the interval detected by the antenna by the tag, transmitting the tracking vector and compiling in a hash table;
s60: when the visitor accesses at the corresponding section edge of the two card readers, if the condition is met
Then the redundant tracking vectors are deleted;
wherein t1-t2 is the detailed time of the visitor staying at the R1 point for visiting,
for the minimum stay time of the visitor in the R1 area, T1 is the first card reader, and T2 is the second card reader.
The second purpose of the invention is realized by adopting the following scheme:
a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the operating steps of the intelligent guest management system when executing the computer program.
The third purpose of the invention is realized by adopting the following scheme:
a computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, performs the operational steps of the intelligent guest management system described above.
Compared with the prior art, the invention has the beneficial effects that:
foretell intelligent visitor management system is through being equipped with visitor reservation platform, access control system, visitor whereabouts management system and visitor backstage management system, form one from the perfect system of many-sided management such as reservation registration, information verification, the trail tracking, information record management, visitor reservation platform and access control system cooperation, can break away from traditional handwritten registration mode, high efficiency, historical data is easily preserved and is traceed back, can improve visitor's managerial efficiency, visitor whereabouts management system can follow up the whereabouts of visitor constantly, improve modern garden by a wide margin, the mill, the security of building, visitor backstage management system can realize the data interaction between each system, let data processing more high-efficient.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention more comprehensible, embodiments accompanying figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
Referring to fig. 1 and 2, the intelligent visitor management system of the present invention includes avisitor reservation platform 10, anaccess control system 20, a visitortrack management system 30, and a visitorbackground management system 40.
Thevisitor reservation platform 10 is used for generating visitor reservation information into two-dimensional code information;
theaccess control system 20 is used for verifying the two-dimensional code information and sending the visitor arrival information to the interviewee, if the verification is passed, sending control information to open the gate, and if the verification is not passed, not acting; theaccess control system 20 comprises a two-dimensional code reader which is a reading module or a handheld two-dimensional code scanning gun built in theaccess control system 20;
the visitortrack management system 30 is used for planning, indicating and tracking a visitor walking track, and if the visitor walking track is found to be abnormal, the visitor walking track is fed back in an alarm form; the visitortrack management system 30 comprises a visiting card, a remote card reader and a entrance guard display, wherein the visiting card is provided with a radio frequency tag (RFID card) for storing visitor information and determining visitor position data, and the remote card reader is used for acquiring detailed geographical positioning data (the number of the remote card readers is multiple and distributed in different positions of modern parks, factories and buildings) fed back by the visiting card carried by a visitor and displaying the detailed geographical positioning data through the entrance guard display; the visitor walks according to a visitor route indicated by the visitortrack management system 30, if the visitor is separated from the visitor card (the positioning of the visitor card deviates from the satellite positioning of the visitortrack management system 30 to achieve a double positioning effect) or the visitor reaches a place without permission, the visitor condition is fed back to the entrance guard in an alarm form, the entrance guard refers the position of the visitor by using a camera, and the entrance guard performs alarm operation if the visitor is true or false;
the visitorbackground management system 40 is used for recording, interacting and managing visitor information, and the visitorbackground management system 40 is respectively connected with thevisitor reservation platform 10, theaccess control system 20 and the visitor track management system 30 (network connection, data line transmission connection, cloud data connection and the like).
Foretell intelligent visitor management system is through being equipped withvisitor reservation platform 10,access control system 20, visitor'swhereabouts management system 30 and visitorbackstage management system 40, form one from the perfect system of many-sided management such as reservation registration, information verification, trajectory tracking, information record management,visitor reservation platform 10 andaccess control system 20 cooperation, can break away from traditional handwritten registration mode, high efficiency, historical data is easy to be preserved and is traceed back, can improve visitor's managerial efficiency, visitor'swhereabouts management system 30 can follow up the whereabouts of visitor constantly, improve modern garden by a wide margin, factories, the security of building, visitor'sbackstage management system 40 can realize the data interaction between each system, let data processing more high-efficient.
As shown in fig. 3, theguest reservation platform 10 includes several reservation modes:
1. visitor reservation mode: the visitor fills in reservation application information through a visitor application interface of a WeChat public number or a webpage and sends out a reservation access request, if the interviewee approves the opinion as agreement, time and place are determined, a two-dimensional code (containing the visitor, the interviewee, the time, the place and other information) is generated and sent to the visitor, if the interviewee approves the opinion as refute, refute reasons are filled, the refute reasons are fed back to the visitor, and the visitor stops reservation or re-reserves. When the visitor visits, the two-dimensional code is displayed, thedoor control system 20 is used for swiping the code or a door guard uses a scanning gun to scan the code to check information, after the verification is passed, the door is opened, a matched visiting card is issued (the visiting card is recorded with the information of the visitor, the place and the like, and is provided with the place door opening limit of the authority), meanwhile, the information that the visitor has arrived is sent to the visitor, the visiting information of the visitor is registered in the visitorbackground management system 40, and a visitor walking route map is formed. And the visitor arrives at a designated place according to the walking route map, and the visitor arrives at the floor or the designated place for reception. After the reception work is finished, the visitor returns along the walking route map to show the two-dimensional code, the visitor swipes the code on theaccess control system 20 or the entrance guard scans the code by using a scanning gun to check the information, the gate is opened after the verification is passed, the visiting card is recycled, and the two-dimensional code is invalid.
In one embodiment, the visitor can also present a reservation order number, the entrance guard inputs the reservation order number into the visitorbackground management system 40 to search for a reservation record, the entrance guard checks the detailed visitor information loaded by the system and the identity document information provided by the visitor, and if the information is checked, the entrance is allowed; when the visitor leaves, the entrance guard inputs the reservation list number into the visitorbackground management system 40, the gate is opened and the visitor is released after the check information passes, the visitor leaves the visitor and the visitorbackground management system 40 records that the reservation is finished, and the visitor reservation list number is invalid.
The reservation mode is aimed at visitors, after the visitors pay attention to the public number or related webpage interfaces of modern parks, factories, buildings or targeted visitors, complete information such as reservation purposes, reservation places or companies, reservation reasons, visitor numbers, personal names, mobile phone numbers, visited person names, visited person telephones, visit start times, visit end times, vehicle information and the like is filled in on visitor registration pages, and visitor identity certificates, face collection and the like are uploaded, identity certificates support identity cards, drivers licenses, passports, business cards, work certificates and other valid certificate, the reservation purposes include business negotiation, private negotiation and the like, and the reservation purposes include reservation face negotiation, freight transportation and engineering construction.
2. Guest invited mode: the visitor fills in the reservation application information (the same as the reservation application information filled in the reservation mode of the visitor) through a WeChat public number or a staff application interface of a webpage to generate a two-dimensional code, sends invitation visiting information to the visitor and attaches the two-dimensional code and geographic coordinates, and the visitor can use a map for navigation to reach the gates of modern parks, factories and buildings at the invited place. The two-dimensional code verification and subsequent management work of the visitor are the same as the visitor management mode of the visitor reservation mode, and are not repeated herein.
3. A field registration mode: the site registration mode includes that firstly, under the condition that a visitor has an identity card without reservation, the visitor communicates with a site telephone, after the visitor gives permission to visit through a visited person, the visitor presents the identity card, the system takes a picture to register visitor visit information, or a gatekeeper registers visitor related information (including information of the visitor, the visited person, time, place and the like) on a visitor background management system 40, a two-dimensional code is generated and sent to the visitor, the two-dimensional code verification and subsequent management work of the visitor are the same as the visitor management mode of the visitor reservation mode, and the description is omitted; secondly, under the condition that the visitor has no reservation and is a foreign person and has no identity card, the visitor performs on-site telephone communication, after the visitor agrees to visit, a gatekeeper registers visitor related information on a visitor background management system 40, takes a picture of the visitor to generate a two-dimensional code and sends the two-dimensional code to the visitor, or under the condition that the visitor is a foreign person and has no mobile phone, the generated two-dimensional code information is printed to form a visitor bar, then the visitor bar is verified by the two-dimensional code, the visitor is opened after the verification is passed, a matched visitor card is issued, and the two-dimensional code verification and subsequent management work of the visitor are the same as the visitor management mode of the visitor reservation mode, and are not repeated;
4. batch access mode: the conference organizer confirms with the visited person through a telephone, the visited person applies in batch through a staff application interface of a WeChat public number or a webpage, fills in staff information of a conference related list to generate a two-dimensional code, sends the two-dimensional code to the staff of the conference related list and attaches the two-dimensional code and a geographic coordinate, or the conference related staff registers on site to generate the two-dimensional code or print the two-dimensional code. The two-dimensional code verification and subsequent management work of the visitor in the conference are the same as the visitor management mode of the visitor reservation mode, and are not repeated herein.
In another embodiment, the manner in which the visitor subscribes to theplatform 10 may also include a blacklist disallowed subscription mode, and some visitor behaviors may be product promotion, advertising, loan, etc., for which the visitor or system may blacklist its settable settings, and the user will no longer be able to make access reservations with the company and the enterprise account associated with the system.
Thevisitor reservation platform 10 can be installed in multiple units, the subsystems are independent, data are uploaded to the cloud server in a unified mode, a manager enterprise unit can manage information of interviewees and visitors of the units in a unified mode, the visiting efficiency is improved through information collection and the use of WeChat reservation visiting, and resources are prevented from being utilized reasonably.
In one embodiment, the method for planning the walking track of the visitor in the visitortrack management system 30 includes: the method comprises the steps of coding the reservation time of a visitor on avisitor reservation platform 10, giving a corresponding sequence to the visitor, counting the time length by using a planned walking route, taking the data of the maximum time length as the operation of controlling the visitor, or setting the walking route and the time length by following the ages and physical conditions of different visitors (or manually setting), dividing the walking route into sensitive areas or normal areas, setting the stay time length according to each area, sending a visitor walking route map to the visitor and recording the visitor walking route map on a visitor card.
The instruction method of the visitortrack management system 30 is as follows:
s10, dividing the walking route into sensitive areas or normal areas, setting the stay time according to each area, if the stay time of the visitor in the sensitive area is too long, prompting a guard or the visitor in a prompting mode, and prompting the visitor to leave the sensitive area as soon as possible; understandably, the maximum length of time can be set as 10 minutes in a longer path, the maximum length of time can be set as 30 minutes when visitors are weak, the maximum length of time is five minutes when visitors are normal, and the length of time can be set as less when infrastructures such as stairs are convenient, and the setting can control the scope and the length of time according to real conditions.
S20, when the visitor arrives in the normal area of the addressee, the visitor information is fed back, whether the area is authorized or not is judged, if not, an alarm is sent to the entrance guard or the addressee, and if the area is authorized, the alarm is not sent;
and S30, when the time length of the visitor pausing at a certain point location of the normal area is long, judging the point location of the visitor, if so, canceling the alarm, if not, sending the alarm, checking whether the behavior of the visitor is correct or not through monitoring, and if not, giving an alarm by a gatekeeper.
The indicating method is used for preventing visitors from damaging the RFID card to reach sensitive areas, time is set for management and control, and if the time for the visitors to reach the specified areas is long, the visitors should be informed to perform operation, so that the safety in a factory area is improved.
In another embodiment, the guestwhereabouts management system 30 further includes a snooze prompt module; when the visitor arrives at a place appointed by the visitor, whether the alarm prompting function needs to be suspended is judged according to the appointment purpose of the visitor, if the appointment purpose is appointment interview, monitoring is continued but alarm prompting is suspended, if the appointment purpose is freight transportation and engineering construction, monitoring is continued and track suspicious is found, and alarm is prompted in time, so that intelligent monitoring control is achieved.
In the track management system, a short and feasible visitor walking route map is planned according to the appointed place, the drawings of modern parks, factories and buildings. The long-distance card readers are distributed along the areas of modern parks, factories and buildings according to the identification distance; the remote card reader can send out radio frequency signals with a certain frequency, when an access card enters an effective identification range of the remote card reader, induced current is generated, a radio frequency label of the access card is activated, the radio frequency label sends out self information, the remote card reader receives and processes the information sent by the radio frequency label and then sends the information to the entrance guard displayer, the information is compared with a visitor walking route map, and if the fact that a visitor walking track is abnormal is found, the information can be fed back in an alarm mode.
When one or more radio frequency tags are simultaneously positioned in the readable range of one remote card reader or a plurality of remote card readers, under the conditions of channel sharing and same frequency, a plurality of tags simultaneously send signals into a reading channel of one card reader to generate channel contention, the signals are mutually interfered to generate data collision, and thus the communication between the card reader and the tags fails, and the tags collide at the moment; when one or more card readers simultaneously send requests, error data is formed or the same error electronic tag is generated among the card readers, and the card readers collide at the moment.
In order to avoid card reader collision and/or label collision in the visitortrack management system 30, the invention adopts an RFID anti-collision calculation method when tracking the visitor walking track, the RFID anti-collision calculation method comprises an ALOHA calculation method and a binary tree calculation method, and specifically, the RFID anti-collision calculation method comprises the following steps:
s10, a plurality of labels enter the effective identification range of a card reader, the ID information of the labels is sent out, and if the card reader receives the information sent by less than 5 labels in the same interval, the information is processed by adopting an ALOHA calculation method; if the card reader receives information sent by more than 5 tags in the same interval, processing the information by adopting a binary tree calculation method;
s20, one or more labels enter the effective identification range of multiple card readers at the same time, if multiple card readers will receive the information sent by the same label in the same interval, the ALOHA calculation method is adopted for processing; and if the plurality of card readers receive the information sent by the same plurality of labels in the same interval, processing the information by adopting a binary tree calculation method.
The ALOHA calculation method is a mode of randomly accessing information in a plurality of paths, and the core design concept of the ALOHA calculation method is to apply a first-come-first-serve label method. If the electronic tag enters the system and is detected by the reader-writer, the ID number of the electronic tag is sent to the reader-writer, if the electronic tag information is sent, the electronic tag or other ID numbers for sending the information enter the interval, the information repetition condition possibly occurs at this time, all or part of the information for sending the electronic tag is collided, whether the received information is collided or not is detected by reading and writing, if the collision exists, the reading and writing can be directly decided, the reader-writer sends the stopped command to the electronic tag, and then the information is randomly re-sent, so that the probability of collision is effectively reduced. The binary tree method is that the electronic tags in the conflict state are divided into 1 subset and 0 subset, firstly, the 0 subset is inquired, if no conflict occurs, the electronic tags can be correctly identified, if the conflict exists, the electronic tags are divided into 01 subset and 00 subset, and the process is repeated until the electronic tags in the 0 subset are all identified, and then the 1 subset information is inquired according to the 0 subset inquiry step.
The above-mentioned RFID anti-collision calculation method selects the ALOHA calculation method and the binary tree calculation method by classification, and can effectively handle the card reader collision and the tag collision, improve the tag recognition capability of the card reader, and further improve the recognition of the visitor walking track of the visitor by the visitortrack management system 30.
In another embodiment, the visitortrack management system 30 is further provided with a tracking vector filtering module in tracking the visitor walking track, and calculates the visitor track by using a tracking vector algorithm, so as to avoid the existence of redundant data, so that the system data amount is reduced, as shown in fig. 4, the tracking vector algorithm is calculated by:
s10: acquiring a tracking vector;
s20: searching historical information corresponding to the ID according to the label data stored in the tracking vector; wherein, the historical information is stored in the hash table;
s30: if the historical information is not searched, deriving a final vector and storing the final vector in a hash table; if the history information exists, the next step S40 is carried out;
s40: after searching the history information corresponding to the ID of the label, comparing the history information with the received ID information, if the history information is different from the ID information, changing the point position of the label, editing the tracking vector and compiling in a hash table; otherwise, if the label point location is not changed, the next step S50 is performed;
s50: comparing the historical information with the time point of the tracking vector, if the historical information and the time point of the tracking vector meet the requirement
And if the requirement of the data elimination rule is met, deleting the tracking vector, otherwise, repeatedly passing the interval detected by the antenna by the tag, transmitting the tracking vector and writing the tracking vector in the hash table. Wherein t1-t2 is the detailed time of the visitor staying at the R1 point for visiting,
is a visit toThe guest is located in the R1 area for a minimum length of stay.
S60: when the visitor is located at the zone edge corresponding to the two card readers for access (as shown in FIG. 5), if the condition is met
The redundant tracking vectors are deleted. Wherein t1-t2 is the detailed time of the visitor staying at the R1 point for visiting,
the visitor is in the R1 area for the minimum length of stay. T1 is the first card reader, T2 is the second card reader.
According to the visitor location tracking method, the visitor location is collected at intervals with the collection interval duration of 1-10 times/10S, and the collected visitor location is sent to a gatekeeper displayer to form a visitor tracking route map. In the present embodiment, the collection interval duration is 1/S. Since the RFID device to which the visitorwhereabouts management system 30 is applied has high reliability but the time is not very accurate, by filtering the trace vector, the amount of preservation of the whereabouts history data can be reduced.
The filtering tracking vector module calculates the track of the visitor according to the tracking vector and stores historical data by using the hash table, so that the data processing is more efficient, the capacity of a database can be reduced, and the track of the visitor can be more efficiently prepared and displayed.
The visitorbackground management system 40 is a middleware for data interaction between an intelligent visitor management system and a MY SQL database, is convenient and rapid to connect a monitoring system, a security system and other systems, and can ensure the property safety of a company and the personal safety of staff.
The data interaction operation method comprises the following steps:
and S10, operating the DOM through the java script. DOM (document object model); mainly for operating on the content of HTML and XML documents. The DOM depicts a hierarchical node tree, and functions of adding, deleting, modifying, searching and the like of document contents are realized by operating nodes.
And S20, operating the BOM through javascript. The Browser Object Model (BOM) is one of the components of JavaScript, which provides an object that interacts independently with content and browser windows, and interaction with HTML can be achieved using the browser object model.
In one embodiment, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the operating steps of the intelligent guest management system of claim above when executing the computer program.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the operational steps of the intelligent guest management system described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that various changes and modifications can be made by those skilled in the art without departing from the spirit of the invention, and these changes and modifications are all within the scope of the invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.