Unlock instant, AI-driven research and patent intelligence for your innovation.

Visitor information management method, access control system, server and storage medium

An information management and access control system technology, applied in transmission systems, instruments, time registers, etc., can solve the problems of inability to guarantee the confidentiality and security of visitor information, waste of manpower, and inability to guarantee the correctness of visitor information, so as to improve the experience. , Avoid impersonation, strengthen the effect of confidentiality

Active Publication Date: 2020-02-07
CLOUDMINDS SHANGHAI ROBOTICS CO LTD
View PDF13 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found that there are at least the following problems in the related technology: a lot of manpower is wasted by manpower recording visitor information, and the correctness of the recorded visitor information cannot be guaranteed
In addition, after the visitor information is recorded, it can be viewed and deleted at will, and the confidentiality and security of the visitor information cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visitor information management method, access control system, server and storage medium
  • Visitor information management method, access control system, server and storage medium
  • Visitor information management method, access control system, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized.

[0023] The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0024] The fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of access control systems, and discloses a visitor information management method, an access control system, a server and a storage medium. The method comprises the following steps: when that a visitor meets a passing condition is determined, recording visitor information of the visitor and storing the visitor information in a database,wherein the visitor information at least comprises identity information of the visitor and passing information of the visitor; when a management request for the visitor information in the database isreceived, determining a permission group to which a sending node of the management request belongs; determining a management permission of the sending node according to a pre-stored corresponding relationship between the permission group and the management permission, wherein the relationship of the management permissions corresponding to the permission groups is a hierarchical relationship; andfeeding back the visitor information in the database to the sending node according to the management permission of the sending node. Therefore, the information of the visitor is automatically recorded, the accuracy and security of the visitor information can be ensured, and malicious data stealing or tampering is prevented.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of access control systems, and in particular to a visitor information management method, an access control system, a server, and a storage medium. Background technique [0002] Access control means the forbidden authority of "door", and it is the guard against "door". The "door" here, in a broad sense, includes all kinds of passages that can pass, including doors for people and vehicles. Nowadays, with the rapid development of digital technology and network technology, access control technology has developed rapidly. On the basis of traditional door locks opened by keys, they can also be identified by passwords or magnetic cards, and visitor information can also be recorded manually. In order to ensure the safety of the place where access control is set up, and avoid the entry of dangerous elements. [0003] The inventors have found that there are at least the following problems in re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/37G07C9/38H04L29/06
CPCH04L63/0861
Inventor 张永
Owner CLOUDMINDS SHANGHAI ROBOTICS CO LTD