CN111402468A - Electronic key generation method and device, computer equipment and computer storage medium - Google Patents
Electronic key generation method and device, computer equipment and computer storage medium Download PDFInfo
- Publication number
- CN111402468A CN111402468A CN202010200699.1A CN202010200699A CN111402468A CN 111402468 A CN111402468 A CN 111402468A CN 202010200699 A CN202010200699 A CN 202010200699A CN 111402468 A CN111402468 A CN 111402468A
- Authority
- CN
- China
- Prior art keywords
- user
- access control
- electronic key
- control equipment
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000013475 authorization Methods 0.000 claims abstract description 25
- 238000004590 computer program Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 210000000707 wrist Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00968—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
- G07C2009/00992—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier mechanical key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the application discloses an electronic key generation method, an electronic key generation device, computer equipment and a computer storage medium, which are used for generating an electronic key for a user of an access control system. The electronic key generation method of the embodiment of the application comprises the following steps: acquiring relevant information of the access control, wherein the relevant information of the access control comprises a corresponding relation between access control equipment and a passing range; acquiring relevant information of a user, wherein the relevant information of the user comprises: the corresponding relation between the user identification and the passing range of the user; determining target access control equipment of the user needing authorization according to the corresponding relation between the user and the passing range and the corresponding relation between the access control equipment and the passing range; generating an electronic key according to the user identification of the user and the target access control equipment; sending the electronic key to a key carrier device of the user.
Description
Technical Field
The embodiment of the application relates to the field of electronic keys, in particular to an electronic key generation method, an electronic key generation device and computer equipment.
Background
The access control system is a modern safety management system and is an effective measure for realizing safety precaution management at an entrance and an exit of an important department. The device is suitable for various places such as various communities, banks, factories and the like where more people get in and out. The access control system is provided with access control equipment at key places of the access personnel to manage the access personnel. The person who comes in and goes out usually needs to have the electronic key as the voucher, proves that oneself is the user of access control system, and possesses the authority of passing through access control equipment.
In a large-scale access control system, a plurality of access control devices and a large number of users often exist, and a manager wants to enable an access person to have access rights of only part of the access control devices. For example, in a community scene, a property wants a residential quarter to have access rights of the floor, the unit and a residential quarter door; in a factory setting, a security department may wish that workers only have access to a production area, but not to a research and development area. Therefore, electronic keys for different access devices are required to be assigned to different users. A large number of users exist in a large-scale access control system, and access control authorities possessed by the users are different.
In order to improve the confidentiality, when an electronic key needs to be generated, an administrator needs to manually determine a user account of the electronic key and corresponding access control equipment to generate the electronic key, so that excessive efforts of the administrator are consumed.
Disclosure of Invention
The embodiment of the application provides an electronic key generation method and device, computer equipment and a computer storage medium, which are used for generating an electronic key for an access control system.
A first aspect of the present application provides an electronic key generation method, including:
acquiring relevant information of the access control, wherein the relevant information of the access control comprises a corresponding relation between access control equipment and a passing range;
acquiring relevant information of a user, wherein the relevant information of the user comprises: the corresponding relation between the user identification and the passing range of the user;
determining target access control equipment of the user needing authorization according to the corresponding relation between the user and the passing range and the corresponding relation between the access control equipment and the passing range;
generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
sending the electronic key to a key carrier device of the user.
Optionally, the electronic key generation method further includes:
acquiring identification information of the newly added access control equipment;
searching a target passing range corresponding to the newly-added access control equipment according to the corresponding relation between the access control equipment and the passing range;
searching a target user in the users according to the corresponding relation between the users and the passing range; wherein the target user is a user whose corresponding traffic range includes the target traffic range;
acquiring a user identifier of the target user;
and generating an electronic key according to the user identification of the target user and the identification information of the newly added access control equipment.
Optionally, the electronic key generation method further includes:
obtaining an authorization deadline of the user;
and setting the validity period of the electronic key according to the authorization period.
Optionally, the generating an electronic key according to the user identifier of the user and the identifier information of the target access control device includes:
sending the user identification and the identification information of the target access control equipment to an access control system;
and receiving the electronic key returned by the access control system.
Optionally, the electronic key stores encrypted information, and the encrypted information includes a user identifier of the user, a target access control device, and an expiration date.
The present application also provides an electronic key generation apparatus, including:
the system comprises an acquisition unit, a control unit and a control unit, wherein the acquisition unit is used for acquiring relevant information of the access control, and the relevant information of the access control comprises the corresponding relation between access control equipment and a passing range and identification information of the access control equipment;
the acquiring unit is further configured to acquire relevant information of a user, where the relevant information of the user includes: the corresponding relation between the user identification and the passing range of the user;
the determining unit is used for determining target access control equipment which needs to be authorized of the user according to the corresponding relation between the user and the passing range and the corresponding relation between the access control equipment and the passing range;
the generating unit is used for generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
a transmitting unit for transmitting the electronic key to the key carrier device of the user.
Optionally, the obtaining unit is further configured to obtain identification information of the newly added access control device;
the obtaining unit is further configured to obtain a user identifier of the target user;
the generating unit is further used for generating an electronic key according to the user identification of the target user and the identification information of the newly added access control equipment;
the electronic key generation device further includes:
the searching unit is used for searching a target passing range corresponding to the newly-added access control equipment according to the corresponding relation between the access control equipment and the passing range;
the searching unit is further configured to search a target user from the users according to a corresponding relationship between the users and a passing range, where the target user is a user whose relevant information includes the target passing range.
Optionally, the obtaining unit is further configured to obtain an authorization deadline of the user;
the electronic key generation device further includes:
and the setting unit is used for setting the validity period of the electronic key according to the authorization period.
Optionally, the first generating unit specifically includes:
the sending module is used for sending the user identification and the identification information of the target access control equipment to an access control system;
and the receiving module is used for receiving the electronic key returned by the access control system.
The present application also provides a computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, performs the steps of the method of any of the preceding first aspects.
A third aspect of embodiments of the present application provides a computer storage medium having instructions stored therein, which when executed on a computer, cause the computer to perform the steps of any one of the methods of the first aspect.
According to the technical scheme, the embodiment of the application has the following advantages:
the application provides a new method and a device for generating an electronic key of an entrance guard user based on spatial relationship management. According to the method and the system, based on the relation between the passing range of the activities of the user and the entrance guard equipment, the rule corresponding to the entrance guard equipment between the passing range of the activities of the user and the entrance guard equipment is established, so that the user identification and the entrance guard equipment corresponding to the electronic key needing to be generated can be quickly found out based on the rule corresponding to the user identification and the entrance guard equipment, the electronic key corresponding to the user is automatically generated in batches, the user account and the entrance guard equipment of the electronic key do not need to be manually confirmed by an administrator, and the workload of the administrator is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic flow chart of an electronic key generation method according to an embodiment of the present application
FIG. 2 is a schematic flow chart illustrating an electronic key generation method according to an embodiment of the present application
FIG. 3 is a schematic structural diagram of an electronic key generation device in an embodiment of the present application
FIG. 4 is a schematic structural diagram of an electronic key generation device in an embodiment of the present application
Fig. 5 is a schematic structural diagram of a computer device in an embodiment of the present application.
Detailed Description
The embodiment of the application provides an electronic key generation method, an electronic key generation device and computer equipment, and electronic keys of an access control system can be generated rapidly in batches.
In the management of the access control system, the generation of the electronic key is a relatively cumbersome task. Due to the lack of clear space rules, when the existing access control system generates an electronic key, a manager of the access control system is required to check the authorization of the access control devices required by the user, and then the electronic key is generated for the access control devices and is issued to the user. When electronic keys need to be generated for a large number of users, the method is low in efficiency and low in speed of generating the electronic keys.
In view of the above, the present application provides an electronic key generation method based on correspondence between an access control device and a passage range of user activities. The method simplifies the generation process of the electronic key of the access control system by establishing the connection between the passing range of the activities of the access control user and each access control device.
Specifically, taking a large cell as an example, please refer to fig. 1, an embodiment of the electronic key generation method provided by the present application includes:
101. acquiring relevant information of the access control;
and acquiring relevant information of the access control, wherein the relevant information of the access control at least comprises a predefined corresponding relation between the access control equipment and the passing range and identification information of each access control equipment. Taking the access control management of a large-scale community as an example, the community is provided with a plurality of entrances and exits, each entrance and exit is provided with corresponding access control equipment, and each access control equipment is provided with identification information for distinguishing different access control equipment; the community comprises a plurality of unit buildings, and the entrance of each unit building is provided with corresponding access control equipment; the residential area is provided with a shared underground garage, only part of residents purchase the use right of the underground garage, and corresponding access control equipment is arranged at an access of the underground garage. The residents in the cell are the users referred by the method.
102. Acquiring relevant information of a user, wherein the relevant information of the user comprises: the corresponding relation between the user identification and the passing range of the user;
and acquiring the corresponding relation between the user identification of the user and the passing range. Each household has a unique user identification for identifying the household, and each household has a corresponding traffic range.
For example, a certain resident A in the community lives in the unit A and purchases the use right of the underground garage, and a certain resident B in the community lives in the unit B but does not purchase the use right of the underground garage. The information related to the user of the first resident comprises the unique user identification of the first resident and the corresponding relation between the first resident and the A unit building, the underground garage and the community entrance and exit, namely the A unit building, the underground garage and the community entrance and exit belong to the corresponding passing range of the first resident. The related information of the resident B comprises the unique user identification of the resident B and the corresponding relation between the resident B and the entrance and exit of the B unit building and the community, and the entrance and exit of the B unit building and the community belong to the corresponding passing range of the resident B
103. Determining target access control equipment of a user needing authorization;
and determining the authorization of which access control devices the resident should have according to the corresponding relation between the user and the passing range and the corresponding relation between the access control devices and the passing range.
Specifically, a resident A resides in the A unit building, and the entrance guard equipment authority of the A unit building is required for entering and exiting the A unit building; the householder A also purchases the use right of the underground garage and also needs the access control equipment authority of the entrance and exit of the underground garage; in addition, the first resident, as a resident of the cell, naturally needs to freely enter and exit the cell, and therefore, the corresponding access device authority of the cell gate is also needed. The corresponding passing range of the first resident comprises three passing ranges of the A unit building, the underground garage and the entrance and exit of the community, and according to the corresponding relation between the entrance guard equipment and the passing ranges, the entrance guard authority of the first resident, which needs the entrance guard equipment of the A unit building, the entrance guard equipment of the underground garage and the entrance guard equipment of the community, can be automatically determined and is matched with the actual demand of the first resident. Similarly, the passing range corresponding to the resident B comprises two passing ranges of a B unit building and a cell entrance and exit, and the actual requirement of the resident B is met.
104. Generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
sending the user identification of the user needing to generate the electronic key and the corresponding access control equipment to an access control system through an open interface; and generating a corresponding electronic key through an appointed encryption mode according to the user identification and the corresponding access control equipment. And then the access control system returns the generated electronic key, and each generated electronic key contains the user identification of one resident and corresponding access control equipment.
Specifically, the user identification of the first resident, the access control equipment of the A unit building, the access control equipment of the underground garage and the identification information of the access control equipment of the community access are sent to the access control system, the access control system generates an electronic key according to the user identification of the first resident and the identification information of the access control equipment of the A unit building, generates a next electronic key according to the user identification of the first resident and the identification information of the access control equipment of the underground garage, and generates an electronic key again according to the user identification of the first resident and the identification information of the access control equipment of the community access. Similarly, the same operation is performed on the second household, and two electronic keys of the entrance guard equipment of the B unit building and the entrance and exit of the community are generated for the second household.
In some specific embodiments, electronic keys of a plurality of different manufacturers need to be generated for a user, and the generation rules of the electronic keys are different. Therefore, a plurality of open interfaces may be preset, each open interface corresponding to an electronic key generation service of a specific rule, so as to provide corresponding electronic key generation rules for electronic keys of different manufacturers. However, no matter according to any generation rule, the electronic key at least includes the corresponding user identifier and the corresponding access control device, so as to ensure that electronic keys of different manufacturers and different generation rules can be generated and managed uniformly according to the electronic key generation method provided by the embodiment.
105. The electronic key is sent to the key carrier device of the user.
And issuing the generated electronic key to the key carrier equipment of the user through wired or wireless communication. The key is preferably issued to the user's mobile phone through the wireless communication function of the mobile phone, and the user's mobile phone is installed with a corresponding application program for receiving and uniformly managing a plurality of electronic keys. Optionally, in order to improve user experience, the carrier device may store the received electronic keys of multiple access control manufacturers and/or multiple access control systems in a unified manner, for example, store the electronic key of the user in a work unit and the electronic key of the cell where the user lives at the same time.
Referring to fig. 2, the present application further provides another embodiment, in which a function of generating electronic keys in batches for users who add new access control devices is added, the embodiment includes:
201. acquiring relevant information of the access control;
202. acquiring related information of a user;
203. determining target access control equipment of a user needing authorization;
204. generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
wherein steps 201 to 204 are similar to steps 101 to 104 of the embodiment corresponding to fig. 1, and are not repeated herein.
205. Acquiring identification information of the newly added access control equipment;
when a new entrance guard device is added to the entrance guard system, the identification information of the newly added entrance guard device is obtained. Still taking a large-scale community as an example, when a new entrance and exit is added to an underground garage of the community, an entrance guard is also installed at the new entrance and exit, and the new entrance and exit is regarded as a newly added entrance guard device.
206. Searching a target passing range corresponding to the newly added access control equipment;
and searching a target passing range corresponding to the newly added access control equipment according to the corresponding relation between the access control equipment and the passing range acquired in the step 201. The corresponding passing range of the newly added access control equipment of the underground garage is the underground garage.
207. Searching a target user in the users according to the corresponding relation between the users and the passing range;
according to the correspondence between the user and the passing range obtained in step 202, a target user is searched for from the user, wherein the target user is a user whose corresponding passing range includes the target passing range. Specifically, corresponding to the example of the cell, the user a has a corresponding relationship with the passing range of the underground garage, and the household b does not have a corresponding relationship with the passing range of the underground garage, so that the household a is determined to be the target user.
208. Acquiring a user identifier of a target user;
and acquiring the user identification of the target user, namely acquiring the user identification of the first resident.
209. And generating an electronic key according to the user identification of the target user and the identification information of the newly added access control equipment.
And sending the user identification of the user A and the identification information of the newly added access control equipment to the access control system. And the access control system generates an electronic key through an appointed encryption mode according to the user identification of the first resident and the corresponding newly-added access control equipment, and returns the generated electronic key. The generation process of the electronic key may refer to step 104 of the corresponding embodiment in fig. 1.
210. The electronic key is sent to the key carrier device of the user.
This step is similar to step 105 of the embodiment shown in fig. 1, and is not described again here.
On the basis of the above embodiment, in another embodiment of the present application, a validity period may also be set for the electronic key, so that the user changes the electronic key regularly, and the cell management security is improved. Specifically, based on the embodiment shown in fig. 1, please refer to fig. 3, in another embodiment of the present application, which includes:
301. acquiring relevant information of the access control;
302. acquiring related information of a user;
303. determining target access control equipment of a user needing authorization;
steps 301 to 303 of this embodiment are similar to steps 101 to 103 of the embodiment corresponding to fig. 1, and are not repeated herein.
304. Obtaining an authorization deadline of a user;
the authorization period of the user who needs to generate the electronic key is acquired. The time limit may be a fixed period or may be determined according to other information of the user. For example, a community gate manager may change the encryption scheme of the electronic key at regular intervals, and thus the validity period of each electronic key is defined to be a fixed period of 15 days, so that all users use the electronic key generated by the new encryption scheme 15 days after each change of the new encryption scheme of the electronic key. Or an electronic key with a long validity period in units of years is provided for the residents of the cell, and an electronic key with a validity period of 3 months or less is provided for the tenants of the cell.
305. And setting the validity period of the electronic key.
A term of validity is set for the electronic key according to the authorization term acquired in step 304.
Specifically, the validity period may be set by directly adding validity period information to the electronic key, and when the electronic key is displayed on the reading device of the access control device, the reading device may directly read the validity period information according to the electronic key, compare the validity period information with the current date, and directly determine whether the electronic key exceeds the validity period.
Alternatively, each electronic key is a unique electronic key generated based on the user identifier and the target access control device, so that the validity period of the electronic key can be marked in the database of the access control system, and the electronic key can be deleted from the database after the validity period of the electronic key exceeds. Thus, anyone cannot use the electronic key exceeding the validity period to pass through the corresponding access control device.
306. Generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
307. sending the electronic key to a key carrier device of a user;
steps 306 and 307 of this embodiment are similar to steps 105 and 106 of the embodiment corresponding to fig. 1, respectively, and are not repeated here.
It should be noted that the carrier device of the electronic key may not be limited to a mobile phone, but may also be a smart watch, a wrist band, or other devices, and most mobile devices having input, output, and storage functions have the condition of being the carrier device of the electronic key. The electronic key as an electronic certificate can be a character string, a two-dimensional code or a bar code and is used for bearing encrypted information. For the convenience of understanding of those skilled in the art, the above embodiment only uses a large cell as an application scenario, and the electronic key generation method of the present invention is explained in detail. It can be understood that the electronic key generation method provided by the invention is not limited to the application in the cell, and the invention can be applied to access control systems with most users, such as access control systems in large industrial parks, office buildings and other scenes. Referring to fig. 4, the present application further provides an embodiment of an electronic key generation apparatus, including:
an obtaining unit 401, configured to obtain relevant information of an access control, where the relevant information of the access control includes a correspondence between an access control device and a passage range;
the obtaining unit 401 is further configured to obtain relevant information of the user, where the relevant information of the user includes: the corresponding relation between the user identification and the passing range of the user;
a determining unit 402, configured to determine, according to a correspondence between the user and the passage range and a correspondence between the access control device and the passage range, a target access control device that needs to be authorized for the user;
a generating unit 403, configured to generate an electronic key according to a user identifier of a user and a target access control device;
a sending unit 404 for sending the electronic key to the key carrier device of the user.
Optionally, the 401 obtaining unit is further configured to obtain identification information of the newly added access control device;
the obtaining unit 401 is further configured to obtain a user identifier of the target user;
the generating unit 403 is further configured to generate an electronic key according to the user identifier of the target user and the identifier information of the newly added access control device;
the electronic key generation device further includes:
the searching unit 405 is configured to search a target passage range corresponding to the newly added access control device according to a correspondence between the access control device and the passage range;
the searching unit 405 is further configured to search a target user from the users according to the correspondence between the users and the passing range, where the target user is a user whose relevant information includes the target passing range.
Optionally, the obtaining unit 405 is further configured to obtain an authorization deadline of the user;
the electronic key generation device further includes:
the setting unit 406 is used for setting the validity period of the electronic key according to the authorization period.
Optionally, the generating unit 403 specifically includes:
the sending module is used for sending the user identification and the identification information of the target access control equipment to the access control system;
and the receiving module is used for receiving the electronic key returned by the access control system.
The electronic key generation device provided by the present application may be a device having a transmission module and a reception module as shown in the figure, and receive the electronic key returned by the access control system by means of transmitting the user identifier and the target access control device. The electronic key generating device may also generate the electronic key directly through the user identifier and the target access control device by presetting and configuration generating unit 403, so that the user identifier and the target access control device do not need to be sent to the access control system.
Since the embodiment of the apparatus portion and the embodiment of the method portion correspond to each other, the embodiment of the system portion may refer to the description of the embodiment of the method portion, and is not described herein again.
In addition, in practical application, the electronic key generation device provided by the application can be a part of an access control system, and can also be an independent device independent of the access control system.
The present application further provides a computer device, comprising a memory and a processor, wherein the memory stores a computer program, such that when the processor executes the computer program in the memory, the method corresponding to any of the embodiments shown in fig. 1, fig. 2 or fig. 3 is implemented, please refer to fig. 5, the computer device may comprise one or more Central Processing Units (CPUs) 501 and a memory 505, and the memory 505 stores one or more application programs or data therein, wherein the memory 505 may be volatile storage or persistent storage, the program stored in the memory 505 may comprise one or more modules, each of which may comprise a series of instructions operating in the computer device, further, the central processing unit 501 may be configured to communicate with the memory 505, execute a series of instructions operating in the memory 505 on the computer device 500, the computer device 500 may further comprise one or more power supplies 502, one or more wired or wireless network interfaces 503, one or more input/output interfaces 504, and/or one or more input/output interfaces 501, and/or one or more operation systems may execute a series of instructions operating in the memory 505, the computer device 500 may further be described as more detailed description of ttt, the operations of the aforementioned processes, and the processes of the aforementioned processes are not described in detail by us patent application, the aforementioned specific reference to ttg × ts, and the aforementioned processes, which are not described herein, and the aforementioned specific description of the relevant units of the relevant technologies of the relevant description.
The embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a computer, implements the method flow in any of the above method embodiments.
It can be understood that the electronic key generation method provided by the application can simultaneously generate electronic keys for a plurality of users in one execution, and also can generate a corresponding electronic key for one user every time the corresponding electronic key generation method is executed, and then the method is repeated, so that the purpose of generating electronic keys for a plurality of different users is achieved. The invention focuses on the rule of batch authorization, and all entrance guards entering the closed area in the actual life are the same as the matching rule of the final purpose of the user, thereby reducing a large amount of rule definitions. The method and the device improve the complicated process of single authorization of the original electronic key, improve the authorization process of the electronic key and realize batch authorization of the electronic key. And a large amount of labor of software operators is reduced.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various other media capable of storing program codes.
Claims (10)
1. An electronic key generation method, comprising:
acquiring relevant information of the access control, wherein the relevant information of the access control comprises a corresponding relation between access control equipment and a passing range and identification information of the access control equipment;
acquiring relevant information of a user, wherein the relevant information of the user comprises a user identifier and a corresponding relation between the user and a passing range;
determining target access control equipment of the user needing authorization according to the corresponding relation between the user and the passing range and the corresponding relation between the access control equipment and the passing range;
generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
sending the electronic key to a key carrier device of the user.
2. The electronic key generation method according to claim 1, characterized by further comprising:
acquiring identification information of the newly added access control equipment;
searching a target passing range corresponding to the newly-added access control equipment according to the corresponding relation between the access control equipment and the passing range;
searching a target user in the users according to the corresponding relation between the users and the passing range; wherein the target user is a user whose corresponding traffic range includes the target traffic range;
acquiring a user identifier of the target user;
and generating an electronic key according to the user identification of the target user and the identification information of the newly added access control equipment.
3. The electronic key generation method according to claim 1, further comprising:
obtaining an authorization deadline of the user;
and setting the validity period of the electronic key according to the authorization period.
4. The method for generating an electronic key according to claim 1, wherein the generating an electronic key according to the user identifier of the user and the identification information of the target access control device includes:
sending the user identification and the identification information of the target access control equipment to an access control system;
and receiving the electronic key returned by the access control system.
5. The method for generating an electronic key according to claim 4, wherein the electronic key stores therein encrypted information, and the encrypted information includes a user identifier of the user, identification information of a target access control device, and a validity period.
6. An electronic key generation device, comprising:
the system comprises an acquisition unit, a control unit and a control unit, wherein the acquisition unit is used for acquiring relevant information of the access control, and the relevant information of the access control comprises the corresponding relation between access control equipment and a passing range and identification information of the access control equipment;
the acquiring unit is further configured to acquire relevant information of a user, where the relevant information of the user includes: the corresponding relation between the user identification and the passing range of the user;
the determining unit is used for determining target access control equipment which needs to be authorized of the user according to the corresponding relation between the user and the passing range and the corresponding relation between the access control equipment and the passing range;
the generating unit is used for generating an electronic key according to the user identification of the user and the identification information of the target access control equipment;
a transmitting unit for transmitting the electronic key to the key carrier device of the user.
7. The electronic key generation apparatus according to claim 6,
the acquisition unit is also used for acquiring identification information of the newly added access control equipment;
the obtaining unit is further configured to obtain a user identifier of the target user;
the generating unit is further used for generating an electronic key according to the user identification of the target user and the identification information of the newly added access control equipment;
the electronic key generation device further includes:
the searching unit is used for searching a target passing range corresponding to the newly-added access control equipment according to the corresponding relation between the access control equipment and the passing range;
the searching unit is further configured to search a target user from the users according to a corresponding relationship between the users and a passing range, where the target user is a user whose relevant information includes the target passing range.
8. The electronic key generation apparatus according to claim 6, wherein the acquisition unit is further configured to acquire an authorization period of the user;
the electronic key generation device further includes:
and the setting unit is used for setting the validity period of the electronic key according to the authorization period.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
10. A computer storage medium having stored therein instructions which, when executed on a computer, cause the computer to perform the steps of the method of any one of claims 1 to 5.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010200699.1A CN111402468A (en) | 2020-03-20 | 2020-03-20 | Electronic key generation method and device, computer equipment and computer storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010200699.1A CN111402468A (en) | 2020-03-20 | 2020-03-20 | Electronic key generation method and device, computer equipment and computer storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN111402468A true CN111402468A (en) | 2020-07-10 |
Family
ID=71429019
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010200699.1A Pending CN111402468A (en) | 2020-03-20 | 2020-03-20 | Electronic key generation method and device, computer equipment and computer storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111402468A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114613046A (en) * | 2022-04-13 | 2022-06-10 | 上海天诚比集科技有限公司 | User permission configuration method, device, equipment and medium for cell access control |
| CN115798097A (en) * | 2022-09-27 | 2023-03-14 | 中国建设银行股份有限公司 | Access control authority verification method, device, program product and readable storage medium |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101661638A (en) * | 2008-08-26 | 2010-03-03 | 上海亦源智能科技有限公司 | Self-help visitor management system |
| EP2555169A2 (en) * | 2011-08-02 | 2013-02-06 | ASSA ABLOY Sicherheitstechnik GmbH | Terminal de voie de secours avec interface de lecture |
| CN105847276A (en) * | 2016-04-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Access control method and device |
| CN106204847A (en) * | 2016-07-18 | 2016-12-07 | 北京千丁互联科技有限公司 | Access control system, background server and self-learning method thereof |
| CN207611424U (en) * | 2017-11-16 | 2018-07-13 | 浙江中创建筑智能化科技有限公司 | A kind of cell intelligent access control system |
| CN109326024A (en) * | 2018-09-06 | 2019-02-12 | 日立楼宇技术(广州)有限公司 | A kind of linkage system based on access control and processing method |
| CN110415420A (en) * | 2019-08-22 | 2019-11-05 | 广东鉴面智能科技有限公司 | A kind of visitor's intelligent management system and its management method based on recognition of face |
-
2020
- 2020-03-20 CN CN202010200699.1A patent/CN111402468A/en active Pending
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101661638A (en) * | 2008-08-26 | 2010-03-03 | 上海亦源智能科技有限公司 | Self-help visitor management system |
| EP2555169A2 (en) * | 2011-08-02 | 2013-02-06 | ASSA ABLOY Sicherheitstechnik GmbH | Terminal de voie de secours avec interface de lecture |
| CN105847276A (en) * | 2016-04-28 | 2016-08-10 | 乐视控股(北京)有限公司 | Access control method and device |
| CN106204847A (en) * | 2016-07-18 | 2016-12-07 | 北京千丁互联科技有限公司 | Access control system, background server and self-learning method thereof |
| CN207611424U (en) * | 2017-11-16 | 2018-07-13 | 浙江中创建筑智能化科技有限公司 | A kind of cell intelligent access control system |
| CN109326024A (en) * | 2018-09-06 | 2019-02-12 | 日立楼宇技术(广州)有限公司 | A kind of linkage system based on access control and processing method |
| CN110415420A (en) * | 2019-08-22 | 2019-11-05 | 广东鉴面智能科技有限公司 | A kind of visitor's intelligent management system and its management method based on recognition of face |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114613046A (en) * | 2022-04-13 | 2022-06-10 | 上海天诚比集科技有限公司 | User permission configuration method, device, equipment and medium for cell access control |
| CN115798097A (en) * | 2022-09-27 | 2023-03-14 | 中国建设银行股份有限公司 | Access control authority verification method, device, program product and readable storage medium |
| CN115798097B (en) * | 2022-09-27 | 2025-04-25 | 中国建设银行股份有限公司 | Access control authority verification method, device, program product and readable storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109255255B (en) | Data processing method, device, equipment and storage medium based on block chain | |
| CN111553767B (en) | Shared house leasing system, method and storage medium based on block chain | |
| CN108961475B (en) | Access control deployment method and access control deployment server | |
| US7818783B2 (en) | System and method for global access control | |
| US12002046B2 (en) | Face authentication system and face authentication method | |
| CN102165460A (en) | Packet generator for generating passwords | |
| Lopez et al. | A blockchain framework for smart mobility | |
| CN104240342A (en) | Access control method and device | |
| US12169540B2 (en) | Facial authentication management server and facial authentication management method | |
| CN104751545A (en) | System, method and device for processing permissions of door lock | |
| FR2806233B1 (en) | SYSTEM PROVIDING SELECTIVE ACCESS TO A SOFTWARE APPLICATION | |
| CN110912932B (en) | Power secondary system information safety operation and maintenance supervision platform | |
| KR102473960B1 (en) | Method of big data management in automatic enbergy meter reading system using an universal subscriber identify module and apparatus for the same | |
| CN111275487A (en) | Client data acquisition method and device, server and storage medium | |
| US20220147612A1 (en) | Face authentication registration device and face authentication registration method | |
| CN104240014A (en) | Door access control method and door access control platform | |
| CN103150800A (en) | Device for adding permissions in entrance guard system | |
| CN111402468A (en) | Electronic key generation method and device, computer equipment and computer storage medium | |
| JP2007286912A (en) | Attendance management terminal and attendance management program | |
| JP2018055571A (en) | Application development environment providing system, application development environment providing method, application development environment providing program, and terminal device | |
| KR102733126B1 (en) | System for providing electric vehicle charing service for co-operative housing | |
| CN111652781A (en) | Service processing method, device, equipment and storage medium based on community codes | |
| Bandara et al. | Optimizing Efficiency Using a Low-Cost RFID-Based Inventory Management System | |
| US20040006631A1 (en) | Management of access to equipment of the like using a logic key | |
| CN112988824B (en) | Data generation method, device, computer equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200710 |
|
| RJ01 | Rejection of invention patent application after publication |