TW202429396A - Access management system and method - Google Patents
Access management system and method Download PDFInfo
- Publication number
- TW202429396A TW202429396A TW112100448A TW112100448A TW202429396A TW 202429396 A TW202429396 A TW 202429396A TW 112100448 A TW112100448 A TW 112100448A TW 112100448 A TW112100448 A TW 112100448A TW 202429396 A TW202429396 A TW 202429396A
- Authority
- TW
- Taiwan
- Prior art keywords
- certificate
- server
- visitor
- access
- access control
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 238000012795 verification Methods 0.000 claims description 75
- 238000012545 processing Methods 0.000 claims description 57
- 238000003672 processing method Methods 0.000 claims 6
- 238000004891 communication Methods 0.000 description 28
- 238000010586 diagram Methods 0.000 description 7
- 238000003384 imaging method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Landscapes
- Lock And Its Accessories (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
關於一種遠端控制的處理系統與方法,特別有關一種門禁排程的處理系統與方法。The invention relates to a remote control processing system and method, and in particular to an access control scheduling processing system and method.
傳統的門禁管理是以保全人員作為訪客確認的首要方式。由於保全人力的各種限制,所以保全人員並無法全天候的管控。並且不同的環境場域對於保全人員的人力要求也有所不同。最常見的情況為外部訪客欲拜訪本地住戶。一般而言,保全人員在確認外部訪客與本地住戶兩邊後,就由外部訪客自行移動至本地住戶的樓層。在外部訪客移動的過程中,保全人員僅能通過監控系統觀看。所以外部訪客的移動過程中會產生安全的疑慮。雖然可以通過感應磁扣或門禁卡等方式,限制外部訪客的移動路徑。但前述的門禁控制方式均有可能被複製,所以也會產生其他的安全問題。Traditional access control management uses security personnel as the primary method of visitor confirmation. Due to various restrictions on security personnel, security personnel cannot provide all-weather control. In addition, different environments have different requirements for security personnel. The most common situation is that external visitors want to visit local residents. Generally speaking, after the security personnel confirm both the external visitor and the local resident, the external visitor moves to the local resident's floor by himself. During the movement of external visitors, security personnel can only watch through the monitoring system. Therefore, security concerns will arise during the movement of external visitors. Although the movement path of external visitors can be restricted by inductive magnetic buckles or access control cards. However, the aforementioned access control methods may be copied, so other security issues may arise.
有鑑於此,在一些實施例中,所述的門禁排程的處理系統提供遠端控制門禁的排程內容,以供接獲訪問權限的使用者可以於所指定的時段中通行。門禁排程的處理系統包括本地裝置、伺服器與門控裝置。伺服器根據所接收的憑證生成要求產生訪客憑證與憑證通知;本地裝置根據外訪裝置與所屬的訪問資訊產生憑證生成要求,本地裝置傳送憑證生成要求給伺服器,本地裝置傳送憑證通知至外訪裝置,外訪裝置根據憑證通知向伺服器獲取相應的訪客憑證;門控裝置網路連接於伺服器,門控裝置包括電子鎖元件,門控裝置根據外訪裝置的訪客憑證產生驗證要求,門控裝置傳送驗證要求至伺服器;其中,伺服器根據驗證要求產生門禁控制命令,並將門禁控制命令發送至門控裝置。門禁排程的處理系統可以根據不同的訪客賦予相應的通行權限,並且指派相應的通行時段。本地用戶也可以隨時向伺服器發出通行權限或時段的修改要求,增加門禁管控的操作彈性。In view of this, in some embodiments, the access control scheduling processing system provides remote control access control scheduling content so that users who have obtained access rights can pass through during the specified time period. The access control scheduling processing system includes a local device, a server and a door control device. The server generates a visitor certificate and a certificate notification according to the received certificate generation request; the local device generates a certificate generation request according to the external visiting device and its access information, the local device transmits the certificate generation request to the server, the local device transmits the certificate notification to the external visiting device, and the external visiting device obtains the corresponding visitor certificate from the server according to the certificate notification; the door control device is network-connected to the server, the door control device includes an electronic lock element, the door control device generates a verification request according to the visitor certificate of the external visiting device, and the door control device transmits the verification request to the server; wherein, the server generates an access control command according to the verification request, and sends the access control command to the door control device. The access control scheduling processing system can grant corresponding access rights to different visitors and assign corresponding access time periods. Local users can also send access rights or time period modification requests to the server at any time to increase the operational flexibility of access control.
在一些實施例中,訪問資訊包括外訪裝置的通行日期、通行時段、通行次數、有效期限、身份資訊或其組合。In some embodiments, the access information includes the access date, access time period, access times, validity period, identity information, or a combination thereof of the access device.
在一些實施例中,伺服器生成用戶驗證頁面與相應用戶驗證頁面的連結資訊,用戶驗證頁面包括識別條碼,識別條碼適配於訪客憑證,伺服器將連結資訊加入憑證通知。In some embodiments, the server generates a user verification page and link information of the corresponding user verification page, the user verification page includes an identification barcode, the identification barcode is suitable for the visitor's certificate, and the server adds the link information to the certificate notification.
在一些實施例中,外訪裝置根據連結資訊向伺服器獲取識別條碼。In some embodiments, the access device obtains an identification barcode from the server according to the link information.
在一些實施例中,伺服器判斷訪客憑證為合法的外訪裝置,伺服器發送門禁控制命令並解鎖門控裝置;伺服器判斷訪客憑證為非法的外訪裝置,伺服器發送門禁控制命令至門控裝置並由門控裝置產生警示通知。In some embodiments, if the server determines that the visitor's credentials are from a legitimate external visitor device, the server sends an access control command and unlocks the door control device; if the server determines that the visitor's credentials are from an illegal external visitor device, the server sends an access control command to the door control device and the door control device generates a warning notification.
在一些實施例中,門控裝置進行解鎖時,伺服器向本地裝置發送來訪通知。In some embodiments, when the door control device is unlocked, the server sends an incoming access notification to the local device.
在一些實施例中,伺服器對訪問資訊進行加密處理並產生訪客憑證。In some embodiments, the server encrypts the access information and generates a visitor certificate.
在一些實施例中,更包括管理裝置,網路連接於伺服器,管理裝置根據外訪裝置的訪客憑證產生另一驗證要求,管理裝置傳送另一驗證要求至伺服器。In some embodiments, a management device is further included, which is connected to the server via a network. The management device generates another verification request based on the visitor certificate of the visiting device, and the management device sends the other verification request to the server.
在一些實施例中,一種門禁排程的處理方法,其係包括伺服器根據憑證生成要求產生訪客憑證與憑證通知;外訪裝置根據憑證通知獲取相應的訪客憑證;由門控裝置讀取外訪裝置的訪客憑證並產生驗證要求;門控裝置傳送驗證要求至伺服器;伺服器根據驗證要求產生門禁控制命令,並將門禁控制命令發送至門控裝置。In some embodiments, a method for processing access control scheduling includes a server generating a visitor credential and a credential notification according to a credential generation request; an external visiting device obtaining a corresponding visitor credential according to the credential notification; a door control device reading the visitor credential of the external visiting device and generating a verification request; the door control device transmitting the verification request to the server; the server generating an access control command according to the verification request and sending the access control command to the door control device.
在一些實施例中,在伺服器根據憑證生成要求產生訪客憑證的步驟包括:伺服器對憑證生成要求的訪問資訊進行加密處理並產生訪客憑證。In some embodiments, the step of generating a visitor certificate in accordance with a certificate generation request at a server includes: the server encrypts access information of the certificate generation request and generates a visitor certificate.
在一些實施例中,外訪裝置根據憑證通知獲取相應的訪客憑證的步驟包括:伺服器根據訪客憑證生成用戶驗證頁面與相應用戶驗證頁面的連結資訊,用戶驗證頁面包括識別條碼,識別條碼適配於訪客憑證;伺服器將連結資訊加入憑證通知。In some embodiments, the step of the external visiting device obtaining the corresponding visitor certificate according to the certificate notification includes: the server generates a user verification page and link information of the corresponding user verification page according to the visitor certificate, the user verification page includes an identification barcode, and the identification barcode is suitable for the visitor certificate; the server adds the link information to the certificate notification.
在一些實施例中,在外訪裝置根據憑證通知獲取相應的訪客憑證的步驟包括:伺服器傳送憑證通知至本地裝置;本地裝置將憑證通知發送至外訪裝置。In some embodiments, the step of obtaining a corresponding visitor credential based on a credential notification at the visiting device includes: the server transmits the credential notification to the local device; and the local device sends the credential notification to the visiting device.
在一些實施例中,在伺服器根據驗證要求產生門禁控制命令,並將門禁控制命令發送至門控裝置的步驟包括:伺服器判斷驗證要求的訪客憑證是否合法;若訪客憑證為合法,伺服器令門控裝置解鎖;若訪客憑證為非法,伺服器發送警示通知至本地裝置。In some embodiments, the server generates an access control command based on the verification request and sends the access control command to the door control device, including: the server determines whether the visitor credential of the verification request is legal; if the visitor credential is legal, the server unlocks the door control device; if the visitor credential is illegal, the server sends a warning notification to the local device.
在一些實施例中,外訪裝置根據憑證通知獲取相應的訪客憑證的步驟後包括由管理裝置讀取外訪裝置的訪客憑證並產生另一驗證要求;伺服器判斷另一驗證要求的訪客憑證是否合法;若訪客憑證為合法,伺服器令門控裝置解鎖;若訪客憑證為非法,伺服器發送警示通知至本地裝置。In some embodiments, the step of the visiting device obtaining the corresponding visitor credential based on the credential notification includes the management device reading the visitor credential of the visiting device and generating another verification request; the server determining whether the visitor credential of the other verification request is legal; if the visitor credential is legal, the server instructs the door control device to unlock; if the visitor credential is illegal, the server sends a warning notification to the local device.
所述的門禁排程的處理系統與方法可以指定訪客的通行時段、訪問次數或可通行區域。本地裝置也可以隨時向伺服器發出通行權限或時段的修改要求,增加門禁管控的操作彈性。並且外訪裝置不需逐次向本地裝置獲取訪客憑證,也降低雙方通訊的時間成本。此外,伺服器可以每經過預設時間定時更新識別條碼,藉以防止識別條碼的截圖被第三方所使用。The access control scheduling processing system and method can specify the visitor's access time period, number of visits or accessible area. The local device can also send a request to the server to modify the access permission or time period at any time, increasing the operational flexibility of access control. And the external visiting device does not need to obtain the visitor certificate from the local device one by one, which also reduces the time cost of communication between the two parties. In addition, the server can regularly update the identification barcode every preset time to prevent the screenshot of the identification barcode from being used by a third party.
請配合參考圖1與圖2,門禁排程的處理系統(以下簡稱為處理系統10)包括伺服器100、本地裝置200與門控裝置300。伺服器100網路連接於本地裝置200、門控裝置300與至少一外訪裝置400。伺服器100包括第一處理元件110、第一通訊元件120與第一儲存元件130。第一處理元件110連接於第一通訊元件120與第一儲存元件130。Please refer to FIG. 1 and FIG. 2 , the access control scheduling processing system (hereinafter referred to as the processing system 10) includes a
第一通訊元件120接收憑證生成要求612或驗證要求631,第一通訊元件120傳送憑證通知622或門禁控制命令641。第一處理元件110根據憑證生成要求612產生訪客憑證621與相應的憑證通知622。憑證通知622的傳輸方式可以但不限定為推播、電子郵件、即時通訊、電信簡訊或語音通知。第一儲存元件130儲存訪客憑證621與相應訪客憑證621的用戶驗證頁面623。每一訪客憑證621各自對應於不同的外訪裝置400。第一處理元件110根據訪客憑證621生成相應的用戶驗證頁面623。第一處理元件110根據驗證要求631產生門禁控制命令641,並發送門禁控制命令641至門控裝置300,其運作將於後文詳述。The first communication component 120 receives the
前述的伺服器100、本地裝置200與門控裝置300均屬於同一門禁範圍S1之內的電子裝置,而外訪裝置400可以是門禁範圍S1外的電子裝置,也可以是同一門禁範圍S1但不同的區域。例如:同一大樓中的不同樓層可以被視為不同的門禁範圍。圖1中係以粗黑虛線分隔成兩個範圍,分別為門禁範圍S1與其餘範圍S2。每一個門禁範圍具有至少一個門控裝置300,例如在門禁範圍S1中設置一個門控裝置300,在其餘範圍S2中設置三個門控裝置300。在一些實施例中,伺服器100或/及本地裝置200可不位於門控裝置300所屬的門禁範圍S1內。The
本地裝置200包括第二處理元件210、第二通訊元件220與輸入元件230。第二處理元件210連接於第二通訊元件220與輸入元件230。輸入元件230接收使用者所輸入的訪問資訊611。輸入元件230可以是但不限定為鍵盤、滑鼠或觸控螢幕等。訪問資訊611包括外訪裝置400的可通行日期、通行時段、通行次數、有效期限、通行區域、訪客的身份資訊或前述的組合。本地裝置200可以是個人電腦、筆記型電腦、平板電腦或行動電話。第二通訊元件220網路連接於伺服器100。第二處理元件210根據訪問資訊611產生憑證生成要求612,並驅動第二通訊元件220將憑證生成要求612發送至伺服器100。第二通訊元件220另接收伺服器100所傳送的憑證通知622。第二處理元件210根據訪問資訊611將憑證通知622發送至對應的外訪裝置400。The
門控裝置300包括第三處理元件310、第三通訊元件320、讀取元件330與電子鎖元件340。第三處理元件310連接於第三通訊元件320、讀取元件330與電子鎖元件340。讀取元件330用於讀取外訪裝置400的訪客憑證621。在圖1與圖2中外訪裝置400係以虛線表示由門控裝置300讀取識別條碼624。讀取元件330可以是攝像鏡頭、鍵盤、觸控螢幕或近場通信協議(Near Field Communication,NFC)。第三處理元件310根據訪客憑證621產生驗證要求631,並驅動第三通訊元件320將驗證要求631發送至伺服器100。第三通訊元件320接收伺服器100的門禁控制命令641。第三處理元件310根據門禁控制命令641控制電子鎖元件340進行解鎖、上鎖或播放警示通知。The
外訪裝置400包括第四處理元件410、第四通訊元件420、第四儲存元件430與顯示元件440。第四處理元件410連接於第四通訊元件420、第四儲存元件430與顯示元件440。第四通訊元件420網路連接於本地裝置200或伺服器100。外訪裝置400可以是平板電腦或行動電話等移動設備。第四通訊元件420接收本地裝置200的憑證通知622。第四處理元件410根據憑證通知622向伺服器100獲取相應的訪客憑證621。第四處理元件410驅動顯示元件440並於顯示元件440上播放訪客憑證621,以使門控裝置300的讀取元件330可以讀取訪客憑證621。The visiting
為能完整說明門禁排程的處理系統10的整體運作,以下將處理系統10的運作逐步說明,並請參考圖3所示,門禁排程的處理系統10執行下述步驟:
步驟S310:本地裝置根據訪問資訊產生憑證生成要求,並將憑證生成要求發送至伺服器;
步驟S320:伺服器根據憑證生成要求產生訪客憑證與憑證通知;
步驟S330:伺服器傳送憑證通知至本地裝置;
步驟S340:本地裝置根據訪問資訊將憑證通知傳送至外訪裝置;
步驟S350:外訪裝置根據憑證通知獲取相應的訪客憑證;
步驟S360:由門控裝置讀取外訪裝置的訪客憑證並產生驗證要求;
步驟S370:門控裝置傳送驗證要求至伺服器;以及
步驟S380:伺服器根據驗證要求產生門禁控制命令,並將門禁控制命令發送至門控裝置。
In order to fully explain the overall operation of the access control
首先,使用者透過輸元件元將外訪裝置400的訪問資訊611輸入至本地裝置200。本地裝置200接收訪問資訊611並根據訪問資訊611產生憑證生成要求612(對應於步驟S310)。本地裝置200將憑證生成要求612發送至伺服器100。憑證生成要求612可以通過本地裝置200的應用程式,或者是透過伺服器100的網站與網頁進行登錄所產生。簡而言之,本地裝置200將外訪裝置400的身份資訊與門禁排程的時段、進出次數或區域封裝為憑證生成要求612。伺服器100接獲憑證生成要求612後,伺服器100根據憑證生成要求612與所屬的訪問資訊611產生對應的訪客憑證621。所述的訪客憑證621對應於訪問資訊611的外訪裝置400。於此同時,伺服器100產生訪客憑證621的憑證通知622(對應於步驟S320)。First, the user inputs the
伺服器100傳送憑證通知622至本地裝置200(對應於步驟S330)。在一些實施例中,憑證通知622包含連結資訊,連結資訊適配於一用戶驗證頁面623。用戶驗證頁面623包括識別條碼624與外訪裝置400的相關資訊。外訪裝置400的相關資訊可以是外訪裝置400的使用者名字、電話、可通行日期、通行時段、通行次數、有效期限、通行區域等。伺服器100根據當前時間資訊與訪客憑證621交互產生識別條碼624。識別條碼624的種類可以是一維條碼或二維條碼(例如:快速響應矩陣碼-QR Code,Quick Response Code)等。伺服器100建立用戶驗證頁面623後,伺服器100獲取用戶驗證頁面623的連結資訊。伺服器100除了可以將連結資訊直接視為憑證通知622外,也可以同時加入時間戳記或其他用於驗證外訪裝置400身分的資訊。The
伺服器100每經過預設時間後,伺服器100再根據新的流水編號資訊與訪客憑證621產生新的識別條碼624。例如:預設時間若為10分鐘,則伺服器100每經過10分鐘後,伺服器100可以獲取當前的時間將其視為新的流水編號資訊並產生新的識別條碼624。由於憑證通知622不會與識別條碼624或用戶驗證頁面623相關連,因此憑證通知622與連結資訊不會隨著新的識別條碼624而重新產生。伺服器100產生新的識別條碼624後,伺服器100會更新用戶驗證頁面623中的識別條碼624。伺服器100可以將舊的識別條碼624儲存至第一儲存元件130中。After each preset time, the
此外,本地裝置200也可以登入至伺服器100並查閱(或修改)用戶驗證頁面623。本地裝置200可以向用戶驗證頁面623進行訪問資訊611的調整。例如,本地裝置200可以修改(或者新增、刪除)外訪裝置400的訪問日期、時間、出入次數或可出入的區域。在本地裝置200異動訪問資訊611後,伺服器100也會更新訪客憑證621的內容。而憑證通知622不會與識別條碼624或用戶驗證頁面623相關連,所以異動訪問資訊611後伺服器100也是沿用既有的憑證通知622與連結資訊。In addition, the
本地裝置200根據訪問資訊611將憑證通知622傳送至對應的外訪裝置400(對應步驟S340)。訪問資訊611除了具有外訪裝置400被授權通過的時間、時段、日期或區域外,訪問資訊611還具有身份資訊。身份資訊包括國際移動設備識別碼(International Mobile Equipment Identity,IMEI)、移動設備識別碼(Mobile Equipment Identifier,MEID)、媒體存取控制位址(Media Access Control,MAC)、通用唯一識別碼(Universally Unique Identifier,UUID)、設備序列號碼(Serial Number)、門號號碼、身份證號或用戶姓名等。The
外訪裝置400獲得憑證通知622後,外訪裝置400根據憑證通知622獲得訪客憑證621(對應步驟S350),請配合圖4所示。若訪客憑證621具有連結資訊,則外訪裝置400根據連結資訊登錄伺服器100並獲取相應的用戶驗證頁面623。外訪裝置400從用戶驗證頁面623中獲取識別條碼624,並且從用戶驗證頁面623中獲知可以進出的門禁時段、時間或可通行的區域的相關資訊。After the visiting
在一些實施例中,伺服器100根據訪客憑證621生成相應的識別條碼624後,直接將識別條碼624加入憑證通知622。伺服器100另將部分的訪問資訊611加入憑證通知622之中,例如:將外訪裝置400的訪問日期、時間、出入次數或可出入的區域等資訊加入憑證通知622。本地裝置200將具有識別條碼624的憑證通知622發送至外訪裝置400(亦對應步驟S340)。外訪裝置400可以直接獲得識別條碼624,並儲存識別條碼624(亦對應步驟S350)。In some embodiments, after the
當外訪裝置400欲進入門禁範圍,外訪裝置400可以根據憑證通知622獲取識別條碼624。外訪裝置400獲得識別條碼624後,外訪裝置400可以透過顯示元件440播放識別條碼624。外訪裝置400出示識別條碼624給門控裝置300讀取。門控裝置300的讀取元件330可以讀取識別條碼624、或者以鍵盤鍵入識別條碼624的內容、又或者是以NFC讀取識別條碼624,如圖5所示。在圖5中的門控裝置300將所拍攝(意即前述讀取處理)的識別條碼624顯示於螢幕之中。門控裝置300根據所讀取的識別條碼624獲得訪客憑證621,並以訪客憑證621產生相應的驗證要求631(對應步驟S360)。驗證要求631的內容除了包括訪客憑證621外,也可以包括讀取識別條碼624的時間。When the visiting
接著,門控裝置300將驗證要求631傳送至伺服器100(對應步驟S370)。伺服器100判斷驗證要求631的訪客憑證621與所儲存的訪客憑證621是否一致。若伺服器100的訪客憑證621與驗證要求631的訪客憑證621一致時,則伺服器100視驗證要求631的訪客憑證621為合法,並且向門控裝置300發送解鎖的門禁控制命令641。反之,伺服器100向門控裝置300發送警示通知的門禁控制命令641(對應步驟S380)。伺服器100發送門禁控制命令641的同時,伺服器100也可以向本地裝置200發送相應的通知訊息。在一些實施例中,當伺服器100發送解鎖的門禁控制命令641時,伺服器100可以向本地裝置200發送來訪通知。伺服器100向門控裝置300發送警示通知的門禁控制命令641外,也可以向本地裝置200發送警示通知。Next, the
伺服器100的訪客憑證621與驗證要求631的訪客憑證621一致的情況包括:於已登錄時間區段中訪問門禁範圍、訪問門禁範圍的次數未達設定上限、或外訪裝置400已經被登錄。舉例來說,外訪裝置400的可訪問時間區段可以是每週的週一、三、五,或者是2023年01月01日~30日。更進一步而言,本地裝置200還可以指定特定時段,如每週的週一(AM8:00~AM11:30)、週三(AM8:00~AM11:30)、週五(整天)。進一步而言,前述的指定時段可以為週、月、季或年。例如可應用於長租或短租之租客。此外,外訪裝置400的可訪問的門禁範圍為大樓(或園區等)中的特定樓層,例如大樓的大廳~4樓等。The situations where the
更進一步而言,本地裝置200也可以設定門禁範圍的進出次數。若外訪裝置400以舊的識別條碼624給門控裝置300讀取,則伺服器100也會將此情況視為非法。請參考圖6所示,圖6中伺服器100在經過預設時間後將會廢止現有的識別條碼624並建立新的識別條碼624。在圖6中係以T1、T2、T3分別表示伺服器100在不同的時間點,並於對應的時間點建立新的識別條碼624。因此外訪裝置400在任一時間點時會通過相同的連結資訊連上對應時間點的用戶驗證頁面623。Furthermore, the
以上雖以單一個外訪裝置400為例說明,實際上處理系統10可以對於不同的外訪裝置400分別設定相應的訪問資訊611,用以獲得各外訪裝置400的憑證通知622。在一些實施例中,若外訪裝置400為複數個時,本地裝置200可以將相關的外訪裝置400設定為同一群組。本地裝置200可以批次輸入各外訪裝置400的身份資訊後,本地裝置200將相同的內容的通行日期、通行時段、通行次數等資訊輸入至訪問資訊611。伺服器100根據前述訪問資訊611產生相應的訪客憑證621與憑證通知622。伺服器100可以根據各身份資訊產生相應數量的訪客憑證621與憑證通知622。或者是,伺服器100產生同一組的訪客憑證621與憑證通知622。伺服器100將憑證通知622傳送至本地裝置200。本地裝置200根據各身份資訊將憑證通知622傳送至各外訪裝置400。Although a single visiting
在一些實施例中,伺服器100產生訪客憑證621的過程中可以對訪問資訊611進行加密處理,並將已加密的輸出結果視為訪客憑證621。接著,伺服器100根據已加密的訪客憑證621產生相應的用戶驗證頁面623與識別條碼624。In some embodiments, the
在一些實施例中,伺服器100可以將訪客憑證621生成對應的連結資訊,並將連結資訊寫入憑證通知622。外訪裝置400獲得憑證通知622後,外訪裝置400將憑證通知622記錄於第四儲存元件430中。舉例來說,若第四儲存元件430係為NFC記憶體。外訪裝置400欲進入門禁範圍時,由門控裝置300讀取外訪裝置400的NFC記憶體中的訪客憑證621。In some embodiments, the
在一些實施例中,處理系統10包括伺服器100、本地裝置200、門控裝置300、管理裝置500與外訪裝置400,請參考圖7與圖8所示。伺服器100連結於本地裝置200、門控裝置300、管理裝置500與外訪裝置400。伺服器100、本地裝置200、門控裝置300與管理裝置500屬於同一門禁範圍。外訪裝置400對伺服器100、本地裝置200、門控裝置300與管理裝置500的連接與各式訊息的傳輸可以參考前文。In some embodiments, the
管理裝置500包括第五處理元件510、第五通訊元件520與攝像元件530。第五處理元件510連接於第五通訊元件520與攝像元件530。攝像元件530用於拍攝外訪裝置400的識別條碼624。第五處理元件510根據識別條碼624產生驗證要求631。第五通訊元件520傳送驗證要求631至伺服器100。伺服器100根據驗證要求631產生相應的門禁控制命令641,並將門禁控制命令641傳送至門控裝置300。若外訪裝置400欲訪問門禁範圍,外訪裝置400可以出示識別條碼624以供管理裝置500讀取。管理裝置500根據識別條碼624向伺服器100發送相應的驗證要求631。伺服器100判斷驗證要求631是否為合法。若驗證要求631為合法時,伺服器100向門控裝置300發送解鎖的門禁控制命令641。反之,伺服器100向門控裝置300傳送產生警示通知的門禁控制命令641。The
所述的門禁排程的處理系統10與方法可以指定訪客的通行時段、訪問次數或可通行區域。本地裝置200也可以隨時向伺服器100發出通行權限或時段的修改要求,增加門禁管控的操作彈性。並且外訪裝置400不需逐次向本地裝置200獲取訪客憑證621,也降低雙方通訊的時間成本。為了提供訪客憑證621的安全性,伺服器100每經過預設時間定時更新識別條碼624,進而有效防止識別條碼624的截圖被第三方所使用。對於合法的外訪裝置400而言,外訪裝置400可以通過用戶驗證頁面623獲取有效的識別條碼624,所以合法的外訪裝置400還是可以正常的使用訪客憑證621。The access control
10:處理系統 100:伺服器 110:第一處理元件 120:第一通訊元件 130:第一儲存元件 200:本地裝置 210:第二處理元件 220:第二通訊元件 230:輸入元件 300:門控裝置 310:第三處理元件 320:第三通訊元件 330:讀取元件 340:電子鎖元件 400:外訪裝置 410:第四處理元件 420:第四通訊元件 430:第四儲存元件 440:顯示元件 500:管理裝置 510:第五處理元件 520:第五通訊元件 530:攝像元件 611:訪問資訊 612:憑證生成要求 621:訪客憑證 622:憑證通知 623:用戶驗證頁面 624:識別條碼 631:驗證要求 641:門禁控制命令 S1:門禁範圍 S2:其餘範圍 S310~S380:步驟 T1~T3:時間點 10: Processing system 100: Server 110: First processing element 120: First communication element 130: First storage element 200: Local device 210: Second processing element 220: Second communication element 230: Input element 300: Door control device 310: Third processing element 320: Third communication element 330: Reading element 340: Electronic lock element 400: External access device 410: Fourth processing element 420: Fourth communication element 430: Fourth storage element 440: Display element 500: Management device 510: Fifth processing element 520: Fifth communication element 530: Camera element 611: Access information 612: Credential generation request 621: Visitor credential 622: Credential notification 623: User verification page 624: Identification barcode 631: Verification request 641: Access control command S1: Access range S2: Other ranges S310~S380: Steps T1~T3: Time point
圖1為此實施例的門禁排程的處理系統示意圖。 圖2為此實施例的處理系統的元件示意圖。 圖3為此實施例的門禁排程的處理流程圖。 圖4為此實施例的門禁排程的處理系統示意圖。 圖5為此實施例的門控裝置拍攝識別條碼的示意圖。 圖6為此實施例的不同時間點的生成用戶驗證頁面的示意圖。 圖7為此實施例的處理系統的元件示意圖。 圖8為此實施例的門控裝置的元件示意圖。 Figure 1 is a schematic diagram of the processing system of the access control scheduling of this embodiment. Figure 2 is a schematic diagram of the components of the processing system of this embodiment. Figure 3 is a flowchart of the processing of the access control scheduling of this embodiment. Figure 4 is a schematic diagram of the processing system of the access control scheduling of this embodiment. Figure 5 is a schematic diagram of the door control device of this embodiment photographing the identification barcode. Figure 6 is a schematic diagram of the generation of the user verification page at different time points of this embodiment. Figure 7 is a schematic diagram of the components of the processing system of this embodiment. Figure 8 is a schematic diagram of the components of the door control device of this embodiment.
10:處理系統 10: Processing system
100:伺服器 100: Server
200:本地裝置 200: Local device
300:門控裝置 300: Door control device
400:外訪裝置 400: External access device
611:訪問資訊 611: Access information
612:憑證生成要求 612: Certificate generation request
622:憑證通知 622: Certificate Notice
624:識別條碼 624: Identify barcode
631:驗證要求 631: Verification Request
641:門禁控制命令 641: Access control command
S1:門禁範圍 S1: Access control range
S2:其餘範圍 S2: The rest of the range
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW112100448A TWI848504B (en) | 2023-01-05 | 2023-01-05 | Access management system and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| TW112100448A TWI848504B (en) | 2023-01-05 | 2023-01-05 | Access management system and method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| TWI848504B TWI848504B (en) | 2024-07-11 |
| TW202429396A true TW202429396A (en) | 2024-07-16 |
Family
ID=92928791
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| TW112100448A TWI848504B (en) | 2023-01-05 | 2023-01-05 | Access management system and method |
Country Status (1)
| Country | Link |
|---|---|
| TW (1) | TWI848504B (en) |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9600645B2 (en) * | 2012-09-21 | 2017-03-21 | Google Inc. | Smart invitation handling at a smart-home |
| CN110517387A (en) * | 2019-08-29 | 2019-11-29 | 宝钜(中国)儿童用品有限公司 | Access control management system, method, device and readable storage medium |
| CN112200949B (en) * | 2020-12-02 | 2021-02-09 | 北京紫光青藤微系统有限公司 | Entrance guard starting method and device and identity verification system |
| TWM610550U (en) * | 2020-12-29 | 2021-04-11 | 今網智慧科技股份有限公司 | Community visitor management system |
-
2023
- 2023-01-05 TW TW112100448A patent/TWI848504B/en active
Also Published As
| Publication number | Publication date |
|---|---|
| TWI848504B (en) | 2024-07-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP4668551B2 (en) | Personal authentication device and system and method thereof | |
| US7437755B2 (en) | Unified network and physical premises access control server | |
| US20210397691A1 (en) | Authentication system, and information recording medium | |
| US20220224727A1 (en) | Applying device policies using a management token | |
| TW201923639A (en) | Systems and methods for managing relationships among digital identities | |
| WO2016169424A1 (en) | Networked community area access control system and community area access method based thereon | |
| US20170169635A1 (en) | Method and system for visitor access control management | |
| US11348392B2 (en) | Method for access control | |
| CN107204983B (en) | A system for safe data transmission of wind farm SCADA system based on SIP protocol | |
| US12126654B2 (en) | Determining a device posture using a device posture token | |
| US11275858B2 (en) | Document signing system for mobile devices | |
| EP3550488A1 (en) | System and method for credentialing access to restricted rooms | |
| US20180114384A1 (en) | Cloud-based keyless access control system for housing facilities | |
| CN119155129B (en) | Method and system for rapidly authenticating multiple services in coal mine | |
| JP2019173523A (en) | Electric lock system and lock control terminal | |
| US20220014388A1 (en) | Virtual security guard | |
| US7827407B2 (en) | Scoped federations | |
| WO2018207174A1 (en) | Method and system for sharing a network enabled entity | |
| TWI848504B (en) | Access management system and method | |
| JP4904939B2 (en) | Group participation management method, system and program | |
| US20220327875A1 (en) | Providing access to a lock for a service provider using a grant token and credential | |
| US11461451B2 (en) | Document signing system for mobile devices | |
| JP2014158222A (en) | Key distribution system | |
| JP4794939B2 (en) | Ticket type member authentication apparatus and method | |
| JP7740726B2 (en) | Processing System |