CN108550201A - A kind of access control management method and corresponding access control system - Google Patents

A kind of access control management method and corresponding access control system Download PDF

Info

Publication number
CN108550201A
CN108550201A CN201810180249.3A CN201810180249A CN108550201A CN 108550201 A CN108550201 A CN 108550201A CN 201810180249 A CN201810180249 A CN 201810180249A CN 108550201 A CN108550201 A CN 108550201A
Authority
CN
China
Prior art keywords
user
information
biological information
management end
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810180249.3A
Other languages
Chinese (zh)
Inventor
樊详强
陈道远
彭磊
戚发贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201810180249.3A priority Critical patent/CN108550201A/en
Publication of CN108550201A publication Critical patent/CN108550201A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to security and guard technology, more particularly to a kind of access control management method and corresponding access control system, recognition accuracy and recognition efficiency for improving user identity.This method is:When access control system determines that the biological information of the user of acquisition does not pass through signature verification, triggering management end carries out authentication to user, and after determining user by authentication, and user is allowed to enter.In this way, the convenience of gate inhibition's way to manage can be promoted, without the limitation of distance, it enables management end that can complete the authentication of user in distal end, the time of verification is identified for user identity so as to effectively shorten access control system, while the probability of miscarriage of justice of access control system can also be reduced, both the recognition accuracy of user identity had been improved, recognition efficiency is also improved simultaneously, and then the property safety of building is effectively ensured, can largely increase user experience.

Description

A kind of access control management method and corresponding access control system
Technical field
The present invention relates to security and guard technology, more particularly to a kind of access control management method and corresponding access control system.
Background technology
Biometrics identification technology is one of the major technique that safety-protection system uses.Wherein, fingerprint identification technology, face are special The technologies such as sign identification technology, iris recognition, DNA are the biological characteristic extractive techniques of current most mainstream.Currently, how accurately to reflect Other personal information, protection personal information security are a very crucial social science problems, and traditional proof of identity method is existing Demand instantly cannot be met, the emerging technology based on living things feature recognition, which is undoubtedly, solves the problems, such as this best approach.
Under traditional mode, safety-protection system mainly carries out user identity verification by modes such as passwords.This verification mode It can usually can be stolen because of encrypted message, and user right is caused to be stolen, to cause immeasurable loss.
And with the development of computer technology, under prior art, have been able to collect for example by computer technology DNA, facial characteristics, fingerprint etc. biological information, and these biological informations are often unique, what is repeated is general Rate is very little;And this biological information usurps difficulty height only by there is biological body carrying, has high secrecy Characteristic.
On the other hand, network technical development is also quite ripe, by biological information digitizing technique and network technology phase In conjunction with will be mainstream instantly for access control system.
However, under prior art, the biological information of user is possible to that slight change can be generated because of external environment, Such as, finger causes fingerprint to deform because of injured or seasonal law, and facial characteristics generates change because of weightening or loss of weight, makeup or do not make up due to Change etc..
In this case, once access control system None- identified user identity, then can refuse user entrance, so as to Cause the time to cause seriously to be delayed, and then influences the normal life of user.
Invention content
The embodiment of the present invention provides a kind of access control management method and corresponding access control system, the knowledge for improving user identity Other accuracy rate and recognition efficiency.
Specific technical solution provided in an embodiment of the present invention is as follows:
A kind of access control management method, including:
Acquire the biological information of user;
Signature verification is carried out to the biological information, obtains verification result;
Based on the verification result, when determining that the biological information does not pass through signature verification, to specified management end It sends a notification message, triggers the management end and authentication is carried out to the user;
When determining that the user passes through authentication based on the feedback information that the management end returns, user is allowed to enter.
Optionally, the biological information of user is acquired, including:
If the biological information is finger print information, by the collection apparatus module being arranged in door knob, described During user holds door knob, the finger print information of the user is acquired;
If the biological information is face feature information, by the collection apparatus module being arranged in door leaf, The user acquires the face feature information of the user close to during door leaf.
Optionally, it is based on the verification result, determines the biological information not by signature verification, including:
Based on the verification result, when judging that the biological information is unrecognized, the biological information is determined Do not pass through signature verification;Alternatively,
Based on the verification result, judge that the biological information has been identified, but the corresponding biological information When the authority information instruction of setting does not allow the user to be directly entered, determine that the biological information is not tested by feature Card.
Optionally, it sends a notification message to specified management end, triggers the management end and user progress identity is tested Card, including:
It sends a notification message to specified management end, triggering the management end, there is currently a users to administrative staff's prompt Access control system is used, and the operational order based on administrative staff input completes the authentication to the user; Alternatively,
It sends a notification message to specified management end, the biological information of the user is carried in the notification message, It triggers the management end and is based on the biological information, complete the authentication to the user;Alternatively,
It sends a notification message to specified management end, which carries the biological information of the corresponding user The subscriber identity information of record triggers the management end and is based on the subscriber identity information, and the identity of the user is tested in completion Card;
It sends a notification message to specified management end, the image information of the user is carried in the notification message, trigger The management end shows described image information, and the operational order completion pair based on administrative staff input to administrative staff The authentication of the user.
Optionally, the feedback information returned based on the management end determines that the user by authentication, allows user Into later, further comprise:
If it is determined that the biological information of the user is unrecognized during signature verification before, then described in record Biological information.
Optionally, further comprise:
Based on the verification result, when determining that the biological information passes through signature verification, corresponding institute is further determined that State the authority information of biological information setting;
If it is determined that authority information instruction allows user to be directly entered but does not have administration authority, then only allow user into Enter;
If it is determined that the authority information instruction allows user to be directly entered and has administration authority, then user is allowed to enter, And Family administration function, and be based on the operational order input by user, to the biological information set that locally preserves into The corresponding update of row.
A kind of access control system, including:
Collection apparatus module, the biological information for acquiring user;
Main control module obtains verification result, and test based on described for carrying out signature verification to the biological information Card sends a notification message as a result, when determining that the biological information does not pass through signature verification to specified management end, triggers institute It states management end and authentication is carried out to the user, and the feedback information returned based on the management end determines that the user is logical When crossing authentication, user is allowed to enter.
Optionally,
The collection apparatus module is arranged in door knob, during the user holds door knob, acquires the user Finger print information as biological information;Alternatively,
The collection apparatus module is arranged in door leaf, during the user is close to door leaf, acquires the user Face feature information as biological information.
Optionally, the verification result, when determining that the biological information does not pass through signature verification, the master control are based on Module is used for:
Based on the verification result, when judging that the biological information is unrecognized, the biological information is determined Do not pass through signature verification;Alternatively,
Based on the verification result, judge that the biological information has been identified, but the corresponding biological information When the authority information instruction of setting does not allow the user to be directly entered, determine that the biological information is not tested by feature Card.
Optionally, it sends a notification message to specified management end, triggers the management end and user progress identity is tested When card, the main control module is used for:
It sends a notification message to specified management end, triggering the management end, there is currently a users to administrative staff's prompt Access control system is used, and the operational order based on administrative staff input completes the authentication to the user; Alternatively,
It sends a notification message to specified management end, the biological information of the user is carried in the notification message, It triggers the management end and is based on the biological information, complete the authentication to the user;Alternatively,
It sends a notification message to specified management end, the image information of the user is carried in the notification message, trigger The management end shows described image information, and the operational order completion pair based on administrative staff input to administrative staff The authentication of the user.
Optionally, the feedback information returned based on the management end determines that the user by authentication, allows user Into later, the main control module is further used for:
If it is determined that the biological information of the user is unrecognized during signature verification before, then described in record Biological information.
Optionally, the main control module is further used for:
Based on the verification result, when determining that the biological information passes through signature verification, corresponding institute is further determined that State the authority information of biological information setting;
If it is determined that authority information instruction allows user to be directly entered but does not have administration authority, then only allow user into Enter;
If it is determined that the authority information instruction allows user to be directly entered and has administration authority, then user is allowed to enter, And Family administration function, and be based on the operational order input by user, to the biological information set that locally preserves into The corresponding update of row.
In the embodiment of the present invention, when access control system determines that the biological information of the user of acquisition does not pass through signature verification, It triggers management end and authentication is carried out to user, and after determining user by authentication, user is allowed to enter.In this way, The convenience that gate inhibition's way to manage can be promoted enables management end that can complete the body of user in distal end without the limitation of distance Part verification, is identified the time of verification, while can also reduce so as to effectively shorten access control system for user identity The probability of miscarriage of justice of access control system, had both improved the recognition accuracy of user identity, while also improving recognition efficiency, and then effectively The property safety for ensureing building, can largely increase user experience.
Description of the drawings
Figure 1A is gate inhibition system schematic diagram in the embodiment of the present invention;
Figure 1B is fingerprint information collection schematic diagram in the embodiment of the present invention;
Fig. 2 is access control management method implementation flow chart in the embodiment of the present invention;
Fig. 3 is access control system illustrative view of functional configuration in the embodiment of the present invention.
Specific implementation mode
In order to improve access control system user identity recognition accuracy and recognition efficiency, in the embodiment of the present invention, pass through Mode that access control system and the management end of distal end coordinate jointly completes the identification of user identity.
Further description is made to the preferred embodiment of the present invention below in conjunction with the accompanying drawings.
In the embodiment of the present invention, need administrative staff that will have permission pre- into the biological information of each user of building First typing access control system.Optionally, different authority informations is arranged in the biological information that can also be directed to different users.
For example, using the biological information with highest permission, building can be directly entered, while can also be to gate inhibition All biological informations preserved in system are managed, e.g., increase new finger print information, delete original finger print information etc. Deng.
In another example using the biological information of common permission, it can only be directly entered building.
In another example using the biological information of least privilege, do not allow to be directly entered building, but needs obtaining really Building are entered back into after recognizing.
The above process is only for example, and in practical application, characteristic information can flexibly be arranged according to different application environments The particular content of corresponding authority information, details are not described herein.
In practical application, biological information may include finger print information, voiceprint, face feature information etc., after In continuous embodiment, for ease of description, it will use and illustrate for finger print information, but other kinds of biology can be extended to In characteristic information, it will not be described in great detail.
In the embodiment of the present invention, access control system uses decentralized configuration mode, includes at least finger print acquisition module 1 and master Control module 2, wherein
Collection apparatus module 1, the biological information for acquiring user.
In the embodiment of the present invention, optionally, for different types of biological information, collection apparatus module 1 can be put It sets in position not.
For example, as shown in FIG. 1A and 1B, it, can be by collection apparatus module 1 if biological information is finger print information Acquisition port be arranged within door handle.Preferably, can be arranged in the position that needs are held when opening the door of user on door knob (as shown in Figure 2 B), in this way, to complete the acquisition of finger print information at the time of user needs to open the door, specially without user Fingerprint input device is looked for, to save the opening time of user.
In another example if the biological information is face feature information, acquisition module 1 can be arranged in door leaf On (part that can be opened and closed on door), during the user is close to door leaf, the face feature information of user is acquired.
Main control module 2, for carrying out information exchange to biological information progress signature verification, and with management end, When signature verification fails, triggering management end carries out authentication to user.
Main control module 2 can access internet by WIFI modes or by mobile network, to be carried out with management end Remote interaction.
Certainly, it can be interacted by connecting line 3 between collection apparatus module 1 and main control module 2.
Further, as shown in Figure 1A, following equipment is also provided in access control system:
Warning light 4 allows access into building for prompting the user whether.
Camera 5, the image information for acquiring user are sent to management end and carry out authentication.
Based on above-mentioned access control system, as shown in fig.2, in the embodiment of the present invention, the detailed process of entrance guard management is realized such as Under:
Step 200:Collection apparatus module 1 acquires the biological information of user.
Specific gatherer process was carrying out introduction before, and details are not described herein.
If being pointed out that, biological information is that finger print information can be with one finger of typing in advance typing Or finger print information of the fingerprint of multiple fingers as standard e.g., can be by the index finger of palm, middle finger, unknown refering to fig. 1 shown in B Refer to and the fingerprint of little finger is as one group of finger print information typing access control system, in this way, when user stretches out one's hand torsion door knob, feature The fingerprint that acquisition module 2 can collect this four fingers carries out signature verification as one group of finger print information.
Step 210:Main control module 2 judges whether the biological information of user passes through signature verificationIf so, executing step Rapid 230, otherwise, execute step 220.
Specifically, in the embodiment of the present invention, main control module 2 determines the not sad signature verification of biological information of user, In the presence of but be not limited to following two situations:
The first situation is:When judging that the biological information of user is unrecognized, determine that the biological information does not lead to Cross signature verification.
In the first scenario, the biological information of 1 collected user of collection apparatus module, it is possible to because of user The state of itself changes and has produced certain deviation, inconsistent with the biological information of the standard of advance typing (e.g., weight rises, makes up, finger injuries lead to finger wear etc.), main control module 2 will be sentenced once finding such case The biological information of disconnected user is not by signature verification, using user as stranger's equivalent processes, to ensure building safety
The second situation is:The biological information of judgement user has been identified, but corresponding biological information setting Authority information instruction when the user not being allowed to be directly entered, determine that the biological information does not pass through signature verification.
In the latter case, main control module 2 has determined that the biological information of the user of typing, the mark with advance typing Accurate biological information is consistent, still, since the authority information of corresponding user setting is too low, that is, indicates not allowing user direct Into then main control module 2 still can determine whether the biological information of user not by signature verification, to ensure building safety.
Step 220:The biological information of user is sent to management end and verified by main control module 2, is returned according to management end The feedback information returned judges whether to pass through verificationIf so, thening follow the steps 230;Otherwise, step 240 is executed.
In the embodiment of the present invention, when executing step 220, main control module 2 can send notice to specified management end and disappear Breath, triggering management end carries out authentication to the user, specifically, may be used but be not limited to following three kinds of modes:
First way is:Main control module 2 sends a notification message to specified management end, triggers management end to administrative staff There is currently a users, and access control system is used for prompt, and the operational order based on administrative staff's input is completed to the use The authentication at family.
For example, main control module 2 sends a notification message to specified management end, instruction currently has user to need to enter building, The content of notification message can be presented to administrative staff by management end, at this point, administrative staff can be (e.g., double by being contacted with user Fang Jun has other side's phone number), to determine the identity of user, after identity validation, administrative staff can be in management end input validation Instruction, at this moment, management end can return to feedback information to main control module 2, and instruction user passes through authentication.
The second way is:Main control module 2 sends a notification message to specified management end, is carried in the notification message useful The biological information at family, triggering management end are based on biological information, complete the authentication to user.
For example, it is assumed that the biological information set stored at access control system is not timely updated, alternatively, corresponding biology The authority information of characteristic information setting is not timely updated, it is likely that the biological characteristic letter of user can not correctly be identified by existing The problem of breath, it is possible to also store a biological information set in management end in advance, management end receives main control module After the biological information of 2 users sent, feature can be carried out again based on the biological information set being locally stored and tested Card, signature verification this time can also regard the authentication to user as.
If main control module 2 identifies that the biological information of user has the permission into building, management end can be to master It controls module 2 and returns to feedback information, instruction user passes through authentication.
The third mode is:Main control module 2 sends a notification message to specified management end, which carries correspondence The subscriber identity information of the biological information record of the user, triggers the management end and is based on the subscriber identity information, Complete the authentication to the user.
For example, it is assumed that the biological information of user has been identified, but does not have access entitlements, then access control system can be based on The subscriber identity information set of storage further determines that the subscriber identity information of the biotinylated biomolecule information record of corresponding user is " Mr. Wang+warehouse keeper ", and the carrying of this subscriber identity information is sent to management end in an announcement message, from management end to pipe Reason personnel show subscriber identity information, and the operational order based on administrative staff's input completes the authentication to user.
4th kind of mode be:Main control module 2 sends a notification message to specified management end, is carried in the notification message useful The image information at family, triggering management end show described image information, and the operation based on administrative staff's input to administrative staff The authentication to user is completed in instruction.
For example, main control module 2 can shoot the image information of user by controlling camera 5, notification message will be passed through Image information is sent to management end, administrative staff are presented to by management end, administrative staff determine that user can be with by image information It into after building, can be instructed in management end input validation, at this moment, management end can return to feedback information to main control module 2, and instruction is used Family passes through authentication.
Step 230:Main control module 2 executes opening door operation, and user is allowed to enter.
Specifically, signature verification of the biological information of determining user by local, alternatively, the identity for passing through management end After verification, main control module 2 can allow user to enter building with opening gate.
Further, after allowing user to enter building, if it is determined that the biological information of user is in feature before It is unrecognized in verification process, then record the biological information.
For example, if user is emerging user, after obtaining the permission into building, access control system can be with The biological information of user is recorded, if in this way, user needs to enter building again later, access control system can be directly at this Ground carries out signature verification, determines whether that it enters building.
In another example if user is original user, but because biological information changes after, be determined and do not pass through Signature verification, then, after the authentication by management end, access control system can record the changed biological characteristic of user Information, if in this way, user needs to enter building again later, access control system can be directly before locally directly using variation Biological information after biological information and variation carries out signature verification, determines whether that it enters building
On the other hand, when executing step 230, when access control system determines that biological information passes through signature verification, may be used also To further determine that the authority information of corresponding biological information setting, however, it is determined that authority information instruction allows user to be directly entered But do not have administration authority, then only user is allowed to enter building, however, it is determined that authority information instruction allows user to be directly entered and have There is administration authority, then allow user to enter, and Family administration function, if in this way, the biological characteristic letter that access control system is locally stored Breath set needs (e.g., to need to increase new biological information, need to delete original biological information) when update, user It can need to input operation instruction according to update, the biological information set locally preserved accordingly updated.
Step 240:Main control module 2 does not execute opening door operation, and bribes user and show corresponding prompt message.
Specifically, determining the biological information of user not by local signature verification, and do not pass through management end After authentication, main control module 2 can be not turned on gate inhibition, i.e., do not allow user to enter building, and become by the color of indicator light 4 It changes, prompting the user with does not allow it to enter building, it is further possible to by the way that playing device is arranged, prompts the user with and does not permit Perhaps the reason of entering.
When not passing through signature verification to using biological information progress signature verification, determining, sent out to specified management end Notification message, triggering management end is sent to carry out authentication to the user, and when determining that the user passes through authentication, User is allowed to enter.
Based on above-described embodiment, further, the administrative staff of management end can also be complete in distal end instruction main control module 2 At the acquisition and update of biological information, it is only necessary to which user completes the record of biological information in collection apparatus module 1 Enter, and the preservation of biological information and the configuration of corresponding authority information completed by the management end of distal end instruction main control module 2, Details are not described herein.
Based on above-described embodiment, as shown in fig.3, providing a kind of access control system in the embodiment of the present invention, spy is included at least Levy acquisition module 30 and main control module 31, wherein
Collection apparatus module 30, the biological information for acquiring user;
Main control module 31 obtains verification result, and based on described for carrying out signature verification to the biological information Verification result when determining that the biological information does not pass through signature verification, sends a notification message to specified management end, triggering The management end carries out authentication to the user, and the feedback information returned based on the management end determines the user When passing through authentication, user is allowed to enter.
Optionally,
Collection apparatus module 30 is arranged in door knob, during the user holds door knob, acquires the user's Finger print information is as biological information;Alternatively,
Collection apparatus module 31 is arranged in door leaf, during the user is close to door leaf, acquires the user's Face feature information is as biological information.
So-called door leaf is the component that opening and closing can be controlled on door, during user is close to door leaf, Ke Yishe Infrared induction camera is set, when sensing that user is close, shoots the face feature information of user as biological information.
Optionally, the verification result, when determining that the biological information does not pass through signature verification, main control module are based on 31 are used for:
Based on the verification result, when judging that the biological information is unrecognized, the biological information is determined Do not pass through signature verification;Alternatively,
Based on the verification result, judge that the biological information has been identified, but the corresponding biological information When the authority information instruction of setting does not allow the user to be directly entered, determine that the biological information is not tested by feature Card.
Optionally, it sends a notification message to specified management end, triggers the management end and user progress identity is tested When card, main control module 31 is used for:
It sends a notification message to specified management end, triggering the management end, there is currently a users to administrative staff's prompt Access control system is used, and the operational order based on administrative staff input completes the authentication to the user; Alternatively,
It sends a notification message to specified management end, the biological information of the user is carried in the notification message, It triggers the management end and is based on the biological information, complete the authentication to the user;Alternatively,
It sends a notification message to specified management end, which carries the biological information of the corresponding user The subscriber identity information of record triggers the management end and is based on the subscriber identity information, and the identity of the user is tested in completion Card;Alternatively,
It sends a notification message to specified management end, the image information of the user is carried in the notification message, trigger The management end shows described image information, and the operational order completion pair based on administrative staff input to administrative staff The authentication of the user.
Optionally, the feedback information returned based on the management end determines that the user by authentication, allows user Into later, main control module 31 is further used for:
If it is determined that the biological information of the user is unrecognized during signature verification before, then described in record Biological information.
Optionally, main control module 31 is further used for:
Based on the verification result, when determining that the biological information passes through signature verification, corresponding institute is further determined that State the authority information of biological information setting;
If it is determined that authority information instruction allows user to be directly entered but does not have administration authority, then only allow user into Enter;
If it is determined that the authority information instruction allows user to be directly entered and has administration authority, then user is allowed to enter, And Family administration function, and be based on the operational order input by user, to the biological information set that locally preserves into The corresponding update of row.
In conclusion in the embodiment of the present invention, access control system determines that the biological information of the user of acquisition does not pass through spy When sign verification, triggering management end carries out authentication to user, and after determining user by authentication, allow user into Enter.In this way, the convenience of gate inhibition's way to manage can be promoted, without the limitation of distance, enable management end that can be completed in distal end The authentication of user the time of verification is identified so as to effectively shorten access control system for user identity, simultaneously also The probability of miscarriage of justice of access control system can be reduced, the recognition accuracy of user identity has both been improved, while also improving recognition efficiency, And then the property safety of building is effectively ensured, it can largely increase user experience.
It is possible to further which the collection apparatus module in access control system to be placed in door knob or door leaf, in user During executing door opening action, the verification of biological information is completed, both meets ergonomics, when improving user's enabling Comfort level, and walk doorway in person without related personnel and open the door, to effectively liberating labour, there is good user experience.
Meanwhile using access control system provided in an embodiment of the present invention, without installing individual collection apparatus module on doorway, Brief beauty, cost-effective, optionally, the main body service-strong material of access control system is built up, it is not easy to be disassembled, and be used The access control system of the technology does not have lockhole, it is not easy to be disassembled by violence, to enable biological information be not easy leakage, multiple System, degree of safety is higher, can greatly promote degree of safety, protects property safety.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer journeys can be provided Sequence instruct to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor with Generate a machine so that the instruction generation executed by computer or the processor of other programmable data processing devices is used for Realize the dress for the function of being specified in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes It sets.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out the embodiment of the present invention various modification and variations without departing from this hair The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (12)

1. a kind of access control management method, which is characterized in that including:
Acquire the biological information of user;
Signature verification is carried out to the biological information, obtains verification result;
Based on the verification result, when determining that the biological information does not pass through signature verification, sent to specified management end Notification message triggers the management end and carries out authentication to the user;
When determining that the user passes through authentication based on the feedback information that the management end returns, user is allowed to enter.
2. the method as described in claim 1, which is characterized in that the biological information of user is acquired, including:
If the biological information is finger print information, by the collection apparatus module being arranged in door knob, in the user During holding door knob, the finger print information of the user is acquired;
If the biological information is face feature information, by the collection apparatus module being arranged in door leaf, described User acquires the face feature information of the user close to during door leaf.
3. the method as described in claim 1, which is characterized in that be based on the verification result, determine the biological information Not by signature verification, including:
Based on the verification result, when judging that the biological information is unrecognized, determine that the biological information does not lead to Cross signature verification;Alternatively,
Based on the verification result, judge that the biological information has been identified, but the corresponding biological information setting Authority information instruction when the user not being allowed to be directly entered, determine that the biological information does not pass through signature verification.
4. method as claimed in claim 1,2 or 3, which is characterized in that send a notification message to specified management end, trigger institute It states management end and authentication is carried out to the user, including:
Send a notification message to specified management end, trigger the management end to administrative staff prompt there is currently a users Operational order using access control system, and based on administrative staff input completes the authentication to the user;Alternatively,
It sends a notification message to specified management end, the biological information of the user is carried in the notification message, trigger The management end is based on the biological information, completes the authentication to the user;Alternatively,
It sends a notification message to specified management end, which carries the biological information record of the corresponding user Subscriber identity information, trigger the management end and be based on the subscriber identity information, complete authentication to the user;Or Person,
It sends a notification message to specified management end, carries the image information of the user in the notification message, described in triggering Management end shows that described image information, and the operational order based on administrative staff input are completed to described to administrative staff The authentication of user.
5. method as claimed in claim 4, which is characterized in that the feedback information returned based on the management end determines the use Family is further comprised by authentication after allowing user to enter:
If it is determined that the biological information of the user is unrecognized during signature verification before, then the biology is recorded Characteristic information.
6. method as claimed in claim 1,2 or 3, which is characterized in that further comprise:
Based on the verification result, when determining that the biological information passes through signature verification, the corresponding life is further determined that The authority information of object characteristic information setting;
If it is determined that the authority information instruction allows user to be directly entered but do not have administration authority, then only user is allowed to enter;
If it is determined that the authority information instruction allows user to be directly entered and has administration authority, then user is allowed to enter, and open Management function is put, and is based on the operational order input by user, phase is carried out to the biological information set locally preserved It should update.
7. a kind of access control system, which is characterized in that including:
Collection apparatus module, the biological information for acquiring user;
Main control module obtains verification result, and tie based on the verification for carrying out signature verification to the biological information Fruit when determining that the biological information does not pass through signature verification, sends a notification message to specified management end, triggers the pipe It manages end and authentication is carried out to the user, and the feedback information returned based on the management end determines that the user passes through body When part verification, user is allowed to enter.
8. access control system as claimed in claim 7, which is characterized in that
The collection apparatus module is arranged in door knob, during the user holds door knob, acquires the finger of the user Line information is as biological information;Alternatively,
The collection apparatus module is arranged in door leaf, during the user is close to door leaf, acquires the face of the user Portion's characteristic information is as biological information.
9. access control system as claimed in claim 7, which is characterized in that be based on the verification result, determine the biological characteristic When information does not pass through signature verification, the main control module is used for:
Based on the verification result, when judging that the biological information is unrecognized, determine that the biological information does not lead to Cross signature verification;Alternatively,
Based on the verification result, judge that the biological information has been identified, but the corresponding biological information setting Authority information instruction when the user not being allowed to be directly entered, determine that the biological information does not pass through signature verification.
10. the access control system as described in claim 7,8 or 9, which is characterized in that it sends a notification message to specified management end, When triggering the management end to user progress authentication, the main control module is used for:
Send a notification message to specified management end, trigger the management end to administrative staff prompt there is currently a users Operational order using access control system, and based on administrative staff input completes the authentication to the user;Alternatively,
It sends a notification message to specified management end, the biological information of the user is carried in the notification message, trigger The management end is based on the biological information, completes the authentication to the user;Alternatively,
It sends a notification message to specified management end, which carries the biological information record of the corresponding user Subscriber identity information, trigger the management end and be based on the subscriber identity information, complete authentication to the user;Or Person,
It sends a notification message to specified management end, carries the image information of the user in the notification message, described in triggering Management end shows that described image information, and the operational order based on administrative staff input are completed to described to administrative staff The authentication of user.
11. access control system as claimed in claim 10, which is characterized in that determined based on the feedback information that the management end returns The user is by authentication, and after allowing user to enter, the main control module is further used for:
If it is determined that the biological information of the user is unrecognized during signature verification before, then the biology is recorded Characteristic information.
12. the access control system as described in claim 7,8 or 9, which is characterized in that the main control module is further used for:
Based on the verification result, when determining that the biological information passes through signature verification, the corresponding life is further determined that The authority information of object characteristic information setting;
If it is determined that the authority information instruction allows user to be directly entered but do not have administration authority, then only user is allowed to enter;
If it is determined that the authority information instruction allows user to be directly entered and has administration authority, then user is allowed to enter, and open Management function is put, and is based on the operational order input by user, phase is carried out to the biological information set locally preserved It should update.
CN201810180249.3A 2018-03-05 2018-03-05 A kind of access control management method and corresponding access control system Pending CN108550201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810180249.3A CN108550201A (en) 2018-03-05 2018-03-05 A kind of access control management method and corresponding access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810180249.3A CN108550201A (en) 2018-03-05 2018-03-05 A kind of access control management method and corresponding access control system

Publications (1)

Publication Number Publication Date
CN108550201A true CN108550201A (en) 2018-09-18

Family

ID=63516511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810180249.3A Pending CN108550201A (en) 2018-03-05 2018-03-05 A kind of access control management method and corresponding access control system

Country Status (1)

Country Link
CN (1) CN108550201A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933374A (en) * 2019-12-10 2020-03-27 浙江精弘益联科技有限公司 Intelligent building video monitoring system
CN113196732A (en) * 2020-09-30 2021-07-30 华为技术有限公司 Cross-device authentication method and related device
WO2022068156A1 (en) * 2020-09-30 2022-04-07 华为技术有限公司 Cross-device authentication method and related apparatus

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009093371A (en) * 2007-10-05 2009-04-30 Toshiba Corp Monitoring device of biological collation device, monitoring device of passage control device, biological collation system, passage control system, monitoring method of biological collation device, and monitoring device of passage control device
CN101739741A (en) * 2009-11-26 2010-06-16 中山大学 Face recognition door control system and method for digital household
CN101763672A (en) * 2010-01-22 2010-06-30 河北莱恩科技有限责任公司 Centralized management system for fingerprint access control system
CN202711243U (en) * 2011-11-30 2013-01-30 航天信息股份有限公司 Encryption type movable storage device based on fingerprint authentication
CN105427415A (en) * 2015-11-05 2016-03-23 四川长虹电器股份有限公司 Intelligent door lock control system and method based on mobile internet
CN105957196A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Vehicle unlocking method and device
CN106373240A (en) * 2016-09-14 2017-02-01 浙江维融电子科技股份有限公司 Intelligent monitoring system of self-service bank and monitoring method thereof
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN106652277A (en) * 2016-12-04 2017-05-10 南陵县生产力促进中心 Computer control and monitoring composite device
CN107364423A (en) * 2017-06-22 2017-11-21 吉利汽车研究院(宁波)有限公司 A kind of vehicle control system and control method based on fingerprint recognition

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009093371A (en) * 2007-10-05 2009-04-30 Toshiba Corp Monitoring device of biological collation device, monitoring device of passage control device, biological collation system, passage control system, monitoring method of biological collation device, and monitoring device of passage control device
CN101739741A (en) * 2009-11-26 2010-06-16 中山大学 Face recognition door control system and method for digital household
CN101763672A (en) * 2010-01-22 2010-06-30 河北莱恩科技有限责任公司 Centralized management system for fingerprint access control system
CN202711243U (en) * 2011-11-30 2013-01-30 航天信息股份有限公司 Encryption type movable storage device based on fingerprint authentication
CN105427415A (en) * 2015-11-05 2016-03-23 四川长虹电器股份有限公司 Intelligent door lock control system and method based on mobile internet
CN105957196A (en) * 2016-04-27 2016-09-21 乐视控股(北京)有限公司 Vehicle unlocking method and device
CN106373240A (en) * 2016-09-14 2017-02-01 浙江维融电子科技股份有限公司 Intelligent monitoring system of self-service bank and monitoring method thereof
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN106652277A (en) * 2016-12-04 2017-05-10 南陵县生产力促进中心 Computer control and monitoring composite device
CN107364423A (en) * 2017-06-22 2017-11-21 吉利汽车研究院(宁波)有限公司 A kind of vehicle control system and control method based on fingerprint recognition

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110933374A (en) * 2019-12-10 2020-03-27 浙江精弘益联科技有限公司 Intelligent building video monitoring system
CN110933374B (en) * 2019-12-10 2021-03-16 浙江精弘益联科技有限公司 Intelligent building video monitoring system
CN113196732A (en) * 2020-09-30 2021-07-30 华为技术有限公司 Cross-device authentication method and related device
WO2022068156A1 (en) * 2020-09-30 2022-04-07 华为技术有限公司 Cross-device authentication method and related apparatus
CN114629993A (en) * 2020-09-30 2022-06-14 华为技术有限公司 Cross-device authentication method and related device
CN114629993B (en) * 2020-09-30 2022-10-11 华为技术有限公司 Cross-device authentication method and related device

Similar Documents

Publication Publication Date Title
AU2019201491B2 (en) Method of Host-Directed Illumination and System for Conducting Host-Directed Illumination
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
Jain et al. An introduction to biometric recognition
US9747429B2 (en) Personal familiarity authentication
CN101763671A (en) System for monitoring persons by using cameras
CN108550201A (en) A kind of access control management method and corresponding access control system
US10909788B2 (en) Secure zone access control
KR20160080457A (en) System and method for entry authentication of security area
CN110276320A (en) Guard method, device, equipment and storage medium based on recognition of face
CN109598232A (en) A kind of integrated bio identification technology control method and its device
CN106878344A (en) A kind of biological characteristic authentication, register method and device
CN109461241A (en) A kind of face and fingerprint identification entrance guard system control method
JP2010090677A (en) Entrance and exit area collation system, entrance and exit area collation method, and program therefor
Shrestha et al. Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics
CN109960907A (en) A kind of method for identifying ID and equipment
Bock Identity Management with Biometrics: Explore the latest innovative solutions to provide secure identification and authentication
JP2009169478A (en) Biometric system, biometric method, and biometric program
CN107992733A (en) A kind of intelligent terminal and its safe unlocking method
KR20180119994A (en) Control apparatus for biometric and method thereof
JP2014016726A (en) Authentication device, authentication method, door opening and closing management device, and computer program
JP2007054263A (en) Personal authentication device and method, entering and exiting room managing device and method
CN117690166B (en) Security monitoring method and system for electric control cabinet
KR102480285B1 (en) Access controlling system based on fido
CN105205883A (en) Integrated management device for bank door control
Okubanjo et al. Development of a Hybrid Radio Frequency Identification (RFID) and Biometric Based Library Management System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180918