Method and system for visitor self-service authentication

A visitor and visitor registration technology, which is applied in the field of self-service visitor authentication, can solve the problems of ineffective control, low efficiency, and manual dependence, and achieve the effect of effective control, efficiency improvement, and no manual intervention

Active Publication Date: 2022-01-28
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the technical problems in the related art that the management and control of visiting visitors relies on manual work, is inefficient and cannot be effectively controlled, the present invention provides a method and system for self-service visitor authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for visitor self-service authentication
  • Method and system for visitor self-service authentication
  • Method and system for visitor self-service authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0035] figure 1 is a schematic diagram of an implementation environment involved in accordance with the present disclosure. The implementation environment includes: an access control system 110 and a visitor system 130 , and data interaction is performed between the access control system 110 and the visitor system 130 .

[0036] The access control system 110 includes: an access control barrier 111...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for visitors to realize visit authentication by themselves. The method includes: according to the access control authority authorization triggered by the visitor registration terminal, assigning virtual identification information to the identity information of the visitor and configuring the expiration time, the virtual identification information is output by the visitor registration terminal; updating the assigned virtual identification information to the The virtual identification information set of access control; according to the expiration time of the virtual identification information, the virtual identification information in the virtual identification information set is cleared, and the visitor's access control authority is recovered through the cleaning of the virtual identification information. As a result, under the influence of virtual identification information and expiration time, visitors can be controlled in time, and long-term stays of visitors can be monitored, thereby avoiding abnormal long-term stays of visitors, ensuring safety and controllability, that is, realizing effective Management and control, avoiding repeated use of virtual identification information, illegal access control, high degree of automation, no manual intervention, and improved efficiency.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a method and system for self-service visit authentication by visitors. Background technique [0002] Various places are often equipped with access control for their own personnel control. Since the personnel have obtained the access control authority, they can complete the authentication through various authentication methods configured on the access control and pass it, and then be released by the access control. Visitors will not be released by access control because they do not have access control authority. At this time, they have to obtain access control authority in various ways to achieve the purpose of being released by access control. [0003] For example, for a building or floor used by an enterprise, access control will be installed at the entrance and exit, and internal communication will be used to confirm whether the visitor is released, and then the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G07C9/32G07C9/38
CPCG07C9/32G07C9/38
Inventor 罗挺李俊聪朱佳范铭贾镕企彭诗辉卓松
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products