CN110648435A - Access control management method based on identity recognition - Google Patents

Access control management method based on identity recognition Download PDF

Info

Publication number
CN110648435A
CN110648435A CN201910873675.XA CN201910873675A CN110648435A CN 110648435 A CN110648435 A CN 110648435A CN 201910873675 A CN201910873675 A CN 201910873675A CN 110648435 A CN110648435 A CN 110648435A
Authority
CN
China
Prior art keywords
access control
server
control device
mobile terminal
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910873675.XA
Other languages
Chinese (zh)
Inventor
戴红山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Enjoy Key Technology Co Ltd
Original Assignee
Hangzhou Enjoy Key Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Enjoy Key Technology Co Ltd filed Critical Hangzhou Enjoy Key Technology Co Ltd
Publication of CN110648435A publication Critical patent/CN110648435A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application discloses an access control management method based on identity recognition, which comprises the following steps: after the mobile terminal collects the two-dimensional code image, the first processor obtains a first digital secret key from the server; the first communication module and the second communication module carry out data transmission to compare the first secret key with a second secret key prestored in the access control device; if the comparison is successful, the door control motor drives the door lock mechanism to unlock; and the server matches the user identity with the access control device. The access control system based on the identity recognition has the advantages that the identity recognition can be effectively carried out, and meanwhile, the access control management can be conveniently carried out.

Description

Access control management method based on identity recognition
Technical Field
The application relates to an access control management method based on identity recognition.
Background
In the related art, an access control system performs identification and access control using an authorized IC card. However, the access control system using the IC card for identification usually has the following defects:
the existing access control system has the following defects:
firstly, the door opening modes of the district unit door and the pedestrian gate are single, and the owner card can not pass through the district unit door and the pedestrian gate if forgetting to take or losing the district unit door and the pedestrian gate; the card supplementing mode is single, the working time of the owner conflicts with the property, and the owner and the property do not understand each other;
secondly, the card is easy to copy, which is not beneficial to the safety of community owners;
the aging serious failure rate of the lines and equipment of the access control system is high for more than five years, the cost of rearranging a new system is high, and the property business is difficult to advance and retreat, and the current general current situation is that the access control facilities in the community are basically in an idle or paralyzed state;
the visitors are manually registered, the visitor identity checking waiting time is long due to large security workload, the efficiency is low, and the checking difficulty is large afterwards;
fifthly, the repair cost of the building access control system is high, and the owner and the visitor are very inconvenient to enter because the door cannot be opened normally;
sixthly, the difficulty of controlling the safety of the personnel entering the community is high;
and seventhly, the use of the passing equipment is not ideal, the owner has large opinions and deep property contradiction, the difficulty of collecting property fees is increased, and vicious circle is realized.
Disclosure of Invention
An access control management method based on identity recognition is provided, and an access control system based on identity recognition comprises: a mobile terminal capable of accessing at least one wireless communication network; the access control device at least can access the wireless communication network; the server at least forms data interaction with the mobile terminal and the access control device; wherein, the mobile terminal comprises: the image acquisition equipment is used for acquiring a two-dimensional code image or a human face image; the first communication module is at least used for receiving and transmitting Bluetooth signals; the first processor is used for controlling the image acquisition equipment and the first Bluetooth module to perform data processing; the human body information sensor is at least used for identifying face information of a user, the human body information sensor sends identified body characteristic data to the first processor, and the first processor transmits the body characteristic data to the second processor through the first communication module and the second communication module; the entrance guard's device includes: the door lock mechanism is used for realizing unlocking or locking of the entrance guard; the door control motor is used for driving the door lock mechanism; the second communication module is at least used for receiving and transmitting Bluetooth signals to form interaction with the first Bluetooth module; the second processor is used for controlling the access control motor and the second Bluetooth module and processing data; the mobile terminal collects face information and uploads the face information to the server for identity recognition; the management method comprises the following steps: after the mobile terminal collects the two-dimensional code image, the first processor obtains a first digital secret key from the server; the first communication module and the second communication module carry out data transmission to compare the first secret key with a second secret key prestored in the access control device; if the comparison is successful, the door lock mechanism is driven to unlock by the access control motor; and the server matches the user identity with the access control device. Further, the server comprises a key server for transmitting the first digital key to the mobile terminal.
Further, the server comprises a key server storing a first digital key for transmission to the mobile terminal.
Further, the server includes a key server that stores a first digital key generated for transmission to the mobile terminal.
Further, the server comprises an identity server, and the identity server at least stores face information for identity recognition.
Further, the server further comprises a key server storing a first digital key for transmission to the mobile terminal; the key server and the identity server form data interaction.
Further, the server further comprises a management server, and the management server at least stores data of the corresponding relation between the access control device and the user identity; the management server, the key server and the identity server form data interaction.
Further, the server comprises a management server, and the management server at least stores data of the corresponding relation between the access control device and the user identity.
Furthermore, the management server and a second communication module of the access control device form communication connection so that the management server can acquire the state data of the access control device.
Further, the status data includes: the opening and closing state of the access control device, the state duration of the access control device and the user corresponding to the access control device.
The invention has the advantages that: the identity recognition-based access control management method can effectively perform identity recognition and can also conveniently perform access control management.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
in the drawings:
fig. 1 is a schematic structural diagram of an access control system based on a wireless communication network according to an embodiment of the present disclosure;
fig. 2 is a schematic block diagram of a structure of an access control system based on a wireless communication network according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an access control device provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a second access control system based on a wireless communication network according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a third wireless communication network-based access control system according to an embodiment of the present disclosure;
fig. 6 is a schematic flowchart of a management method of an access control system based on a wireless communication network according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
As shown in fig. 1, in the first embodiment of the present application, a gate inhibition system 100 includes a mobile terminal 101, a gate inhibition device 102, and a server 103.
The mobile terminal 101 can access at least one wireless communication network, for example, WIFI, bluetooth, NFC, NB-IOT, Zigbee, and the like; as a specific scheme, the system can also be accessed to a long-distance wireless communication network, such as a CDMA, WCDMA, GSM, TD-SCDMA, TD-LTE, 5G and other mobile networks.
Specifically, as shown in fig. 2, the mobile terminal 101 includes an image capturing device, a first communication module, and a first processor.
As a specific solution, the mobile terminal 101 may further include: terminal power, terminal touch-sensitive screen, terminal stereo set and some other equipment. The terminal power supply is used for supplying power to other equipment of the mobile terminal 101; the terminal touch screen is mainly used for feeding back image information to a user and providing an input interface for the user; the terminal sound box is used for feeding back sound information to the user.
The image capturing device may include a front camera or a rear camera, which are respectively disposed on two opposite sides of the mobile terminal 101. The front camera or the rear camera can acquire image information.
The first communication module is used for realizing the communication function of the mobile terminal 101, and the first communication module can at least transmit data through a bluetooth protocol. Of course, the first communication module can also implement data transmission of other communication protocols.
As a specific solution, the mobile terminal 101 further includes a human body information sensor for identifying a physical feature of the user. These physical characteristics include human face characteristics, fingerprint characteristics, or iris characteristics, or a combination of these characteristics. As a specific scheme, the human body information sensor comprises a camera, a fingerprint sensor and an iris sensor to collect human body characteristics so as to identify different users.
As mentioned above, the mobile terminal 101 may be configured with two cameras, both of which may be used as an embodiment of an image acquisition device or a human body information sensor, as a preferred scheme, the rear camera is used as an image acquisition device for acquiring identification information of the access control device 102, and the front camera is used as a human body information sensor for acquiring a face image and further acquiring face feature data.
As another specific solution, the iris sensor may be implemented by selecting a high-precision optical camera, and as a preferable solution, the iris sensor and the camera for recognizing the human face are both front cameras of the mobile terminal 101. The fingerprint recognition sensor may be constituted by a particular device of the mobile terminal 101, or may be constituted by a pressure-sensitive touch screen provided to the mobile terminal 101, or may employ an optical fingerprint recognition technique.
The access control device 102 includes three main parts: entrance guard's body, door lock device and controlling means.
The access control body mainly constitutes the entrance control body of separation to the space, specifically can be constructed as room door, floodgate or other forms of entity mechanism. The entrance guard body in this application should be understood as the most generalized entrance guard body.
The door lock mechanism is also understood to be a device or a mechanism which can realize the mechanical or electromechanical combination for limiting the position of the door lock body in the broadest sense. For example, a lock cylinder mechanism in a room door and a lock cylinder motor driving the lock cylinder, and for example, an electromagnet device of a glass door and a driving circuit driving the electromagnet; for another example, a gate of a gate machine and a gate motor driving the gate. As is apparent from the above, the door lock device includes: the mechanical part for realizing physical contact or obstruction is defined as a door lock mechanism, and the other part can be a driving device for converting electric energy into mechanical energy for driving the mechanical part. The control means may be a variety of chips, chip combinations or a combination of chips and peripheral circuits capable of control signal output.
As an embodiment, as shown in fig. 2 and 3, the door lock device 102 further includes a door lock mechanism, a door lock motor, a second communication module, and a second processor in addition to the door lock body.
As mentioned above, the door lock mechanism is used to unlock and lock the door, i.e. to control the state of the door, so that the door lock mechanism has an unlocked state that enables a user to enter a certain space and a locked state that enables the user to not enter the certain space through the position of the door lock body.
The entrance guard motor is used as a driving device of the door lock mechanism, and can drive the lock cylinder in the door lock mechanism to be embedded into or withdraw from the building structure through rotation to form a lock groove, so that the function of locking is realized.
The second processor is used as a control device which can control the entrance guard motor and can form data interaction based on the electric signal with the second communication module. The second processor controls the operation of the access control motor by sending an electrical signal to the access control motor. The second communication module can at least form communication connection with the first communication module, so that the mobile terminal 101 and the access control device 102 form data interaction.
The second communication module can also be at least accessed to a wireless communication network like the first communication module, such as WIFI, Bluetooth, NFC, NB-IOT and the like; as a specific scheme, the system can also be accessed to a long-distance wireless communication network, such as a CDMA, WCDMA, GSM, TD-SCDMA, TD-LTE, 5G and other mobile networks.
As an extension, the door access device 102 further includes an input device for a user to operate to input information, and an output device for outputting information to the user. Specifically, the input device and the second processor form a data connection so that the user input information and data can be transmitted to the second processor; the output device is in data connection with the second processor such that the output device is capable of outputting information under control of said second processor.
As shown in fig. 3, the door access device 102 may be provided with a door access camera 11, an iris sensor 12, a fingerprint sensor 13, a touch screen 14, and a combination dial 15 in addition to the housing 10 of the door access device 102.
The door access camera 11 can realize face recognition to unlock directly, and can also be used as a peripheral of the mobile terminal 101 or a peripheral camera of the other server 103 through a short-range wireless communication network.
The iris sensor 12 and the fingerprint sensor 13 and the combination disk 15 may be used as input devices for a user to input information to the second processor of the door access device 102.
The touch screen 14 may be used as an input device of the access control device 102 or an output device of the access control device 102, and may display information to the user, such as pattern information, such as a two-dimensional code, for the mobile terminal 101 to scan to identify the access control device 102. Of course, the touch panel 14 may be replaced with a general display panel for presenting information to the user, and the combination dial 15 may be used as an input device.
As an extension, the output device further comprises an audio device, which may be used to prompt the user with information.
As an alternative, the access control system of the present application further includes a gateway device, which can be disposed between the server 103 and the access control device 102, and the gateway device directly forms data interaction with the second communication module of the access control device 102, so as to implement remote control of the access control device 102 through the gateway device. The server 103 then directly interacts with the gateway device and indirectly interacts with the gate device 102. The server 103 may communicate with the gateway device through a wireless network or a wired network.
As a specific scheme, the present application provides a bluetooth device, which can be used as a control device and is compatible with an electronic access control device 102 having only a door lock mechanism and an access control motor to expand specific functions.
As a specific scheme, the bluetooth device includes: bluetooth module, treater and circuit board. The Bluetooth module is at least used for receiving and transmitting Bluetooth signals; the processor is used for controlling the access control motor and judging whether the electronic key transmitted by the Bluetooth accords with the electronic key stored in the processor; the circuit board is used for connecting the Bluetooth module with the circuit board to form a battery core.
On the basis of the above scheme, the technical scheme of the software part in the present application is described below.
The mobile terminal is provided with a corresponding application program in advance, the access control device is also provided with a corresponding pre-stored control program in advance, the access control device is activated in advance, and a unique equipment identifier is set for each access control device.
Specifically, the data protocols of the bluetooth device of the present application include a base protocol and an application layer protocol. The basic protocol comprises an equipment activating/Bluetooth binding protocol, a time synchronization protocol, a synchronization authority protocol, a synchronous use record protocol, a request report information protocol, a report information protocol, an obtained information protocol, a factory reset protocol and a mobile terminal door opening protocol; the application layer protocol comprises adding authority, adding authority with physical information, deleting authority, modifying authority, forbidding/enabling authority, setting a door opening mode and inquiring battery electric quantity.
In order to enable the management system to effectively and safely manage the access control device, a unique equipment identifier is set for the access control device. If the entrance guard's device is the integrated manufacturing, then after equipment bluetooth module and treater, carry out equipment activation and the binding of bluetooth, make treater and bluetooth module bind into a whole. Preferably, in order to enable the mobile terminal to be paired with the bluetooth module of the access control device, pairing information of the bluetooth module or device information of the access control device may be attached to the access control device or disposed around the access control device in the form of a readable image such as a two-dimensional code. The information such as the two-dimensional code may include the name and MAC address of the bluetooth module.
As an alternative, the touch screen of the access control device may be activated to display a two-dimensional code corresponding to the access control device.
On the basis of the technical scheme, referring to fig. 6, the application also discloses a management method based on the access control device.
The management method includes an unlocking method. Specifically, the unlocking method comprises the following steps:
the mobile terminal scans the two-dimensional code of the access control device to obtain the equipment information of the access control device.
The mobile terminal transmits the device information to the server.
The server verifies the equipment information, and if the equipment information is correct, the server sends a first digital key corresponding to the equipment information to the mobile terminal.
And the mobile terminal sends the first digital key to the access control device through a Bluetooth protocol.
The entrance guard device judges whether the first digital secret key is matched with a second digital secret key prestored in the entrance guard device.
And the access control device outputs a control signal for driving the access control motor according to the matched result.
As a preferred scheme, the mobile terminal obtains a verification data related to the access serial number of the bluetooth device of the current access control device from the first digital key obtained by the server. The door control device determines whether the first digital key and the second digital key are matched and also determines whether the check data meets the requirements.
Specifically, the check data is equal to the access serial number of the bluetooth device stored in the server, and is subjected to one operation, for example, 1 is added to the original access requirement, or other operations are naturally available, then the combination of the check data after the operation and the first digital key is subjected to AES encryption, and then the combination is sent to the mobile terminal, and meanwhile, the server uses the check data of this time and replaces the original stored access serial number. And if the access control device passes the matching, covering the current verification data with the original access serial number.
The access sequence number and the check data are for security reasons. And if the check data received by the Bluetooth device is larger than the current access serial number, making a response, and using the check data as the next access serial number. And if the sequence number received by the receiver is less than or equal to the currently recorded sequence number, discarding the instruction, returning a sequence number packet, and informing the sender that the sequence number is wrong, wherein the sequence number parameter is the current sequence number parameter. When the current sequence number is 0xFFFFFF, the next sequence number is 0x 000000.
Alternatively, the check data may be a set of random numbers in a set format. The judgment standard is that the check data is different from the current access serial number.
Therefore, the access sequence number is changed when the secret key is acquired every time, the secret key is prevented from being repeatedly used by a person after being intercepted, namely the secret key is automatically invalidated after being opened, and the safety of the secret key is ensured.
As a specific scheme, the management method includes:
applying for registering a property manager account and a password through a property management client (a data background is on a cloud server);
the registration application of the property manager is checked through a system management end, a corresponding account password is established for the registration application, and the authority is distributed and stored;
after the property manager account is established, the user can log in the cloud server to set property related information such as: property unit information, each property owner information, entrance guard control equipment information, entrance guard installation positions and the like, and the cloud server is stored. The property unit information comprises a property name and the number of terminal users; the access control equipment information comprises an access control channel name and a Bluetooth equipment name;
a4, a property owner logs in a WeChat applet by using an intelligent mobile terminal, a camera code scanning access control device fixing two-dimensional code (namely the name of a Bluetooth device and an MAC address) is called by clicking a button 'code scanning door opening', the name of the Bluetooth device is checked and matched with the MAC address, and if the matching is successful, the property owner has the right to apply for a key to a cloud server; wherein, the specific entry is an entry requiring a user name and a password of the wechat applet. The WeChat account login mode is realized, namely the WeChat quick login can be clicked to enter the WeChat state.
After receiving the key request, the cloud server adds 1 to the maximum serial number of the corresponding Bluetooth device recorded in the cloud database, combines a secret key in the database, encrypts the combined content in an AES (advanced encryption standard) mode and then sends the encrypted content to the requesting mobile terminal;
the WeChat applet transmits the received secret key returned by the cloud server to the Bluetooth equipment for decryption according to the protocol, and the decrypted content must satisfy the following conditions: the serial number is larger than the serial number recorded in the Bluetooth equipment, the secret key is matched with the secret key in the Bluetooth module, if the conditions of the serial number and the secret key are met simultaneously, the electronic control door lock is opened by returning success and outputting a signal, otherwise, the electronic control door lock is opened without outputting a signal after returning failure, and the door lock is prompted to be opened failure; the content of obtaining the secret key at the cloud server is composed of two parts, one part is the access serial number of the current access control Bluetooth module plus 1, and the other part is the secret key of the Bluetooth module. The two parts of contents are encrypted and issued in an AES mode, and the current access serial number in the database is replaced at the same time, so that the access serial number is only increased when the secret key is obtained every time, the secret key is prevented from being reused by a person after the secret key is intercepted, namely the secret key is automatically invalidated after the secret key is opened, and the safety of the secret key is ensured.
And covering the current sequence number into the Bluetooth equipment after the return is successful, and preparing for the next comparison. The processing ensures that the secret key must be acquired from the cloud server in real time, and the security and timeliness of the secret key are ensured.
And a property manager of the property management client is responsible for managing the door opening permission of the terminal user, such as issuing a new secret key permission or recovering a secret key and the like, and storing the result in the cloud server. And checking or counting the door opening records and the door opening authority in the jurisdiction range according to the needs.
In a specific scheme, in order to improve unlocking safety, when a user registers by using a mobile terminal, information to be filled in includes that a mobile terminal number is filled or the mobile terminal logs in a micro-signal mode, identity verification is required, an identity card number needs to be input, the mobile terminal shoots a face and uploads the face to a database of a national identity card (such as a national identity card center library and a public security first research institute) for comparison, and other operations can be carried out only when the identity verification is passed.
The remote cloud server in the master door opening process contains owner information including property units, building numbers, owner names and owner addresses; the entrance guard information comprises an entrance guard name, a Bluetooth device name and an MAC address, and effective start-stop time is obtained; the action information of the owner entrance guard opening door is sent to a remote cloud server through a wide area network by an intelligent mobile terminal (APP or an applet) to be stored for query.
As an extension scheme, when the door lock device is installed or a part of the door lock device is installed, an installed user can enter an installation interface through a small program or in a form of accessing a public number and the like, then an address location function is used, address information is obtained through a mobile terminal, such as a location module of a mobile phone, such as a GPS module, and then the address information is bound with the device.
As a specific scheme, simultaneously, in the process of code scanning unlocking, face recognition is required, the face recognition is acquired through an image acquisition device of the mobile terminal and then uploaded to a server for comparison, or the face recognition is uploaded to a server of a database of a national identification card (such as a national identification card center library and a public security first research institute) through the server for comparison. And comparing the secret keys through Bluetooth only when the face recognition is successful and the user is actually used.
Therefore, the real-name access control management can be realized, and the system can be applied to places needing real-name check-in, such as residences, hotels and the like.
As an alternative scheme, the entrance guard device is also provided with a camera, the camera of the entrance guard device can be used for collecting face information, then the face information is transmitted to the mobile terminal through Bluetooth, and then the face information is uploaded to the server through the mobile terminal to be compared. This can improve safety.
As another alternative, after the mobile terminal performs face comparison, the camera of the access control device collects face information again for comparison, so as to ensure that the user is entering.
Similar tests can of course be performed with other body recognition sensors or combinations of sensors.
As an extension, since the above scheme has a function of real-name authentication, the scheme can be applied to check-in management of rental places such as residences, hotels, public rental houses, and the like.
Specifically, the server described above is a generalized server, and the generalized server may include a plurality of servers, such as the first server 103 and the second server 105, as a specific solution.
As a specific scheme, three sub-servers may be included: a key server, an identity server and a management server. Data interaction can be formed among the three servers.
The key server is used for realizing the key transmission and matching of the bluetooth device, and is used for supporting data services related to the basic functions of the access control system in the application.
The identity server can be an external server or a self-built internal server, and at least stores face information for identity recognition. The key server may be externally connected to a server of a national identity card database (e.g., a national identity card repository, a public security first research institute) to serve as the identity server. No matter the electronic key is shared or other electronic keys are obtained, the user can obtain the address information of the door lock through the information of the electronic key so as to navigate.
The management server is used for daily management of places such as hotels and the like, can store the corresponding relation between the user and the access control device into the relation between hotel rooms and the user, and can directly or indirectly form communication with the communication module of the access control device so as to master the information of the user.
When a user opens a door, the face recognition of the user firstly realizes real-name authentication of the user, then, in the unlocking process, the user and the room number are stored in the management server in a correlated mode, in order to ensure safety, the entrance guard device can collect the face information of the user entering the door again, and whether the user is in real name is checked again.
As an extension, a millimeter wave radar may be installed inside a room, and the accuracy of the millimeter wave radar is adjusted to only identify whether a human body is present.
Of course, corresponding precision can be set so that the millimeter wave radar can only recognize the approximate outline of the human body, and the processor connected with the millimeter wave radar can judge which image is the human body in a convolution nerve learning mode, so that millimeter wave radar detection can be carried out after a user enters, and whether redundant personnel appear or not is detected.
Therefore, as long as the key server and the management server of the hotel and the server of the national identity card center form data interconnection, the card-free access of the user can be realized, the real-name authentication and registration can be completed when the user opens the entrance guard, the time of the user is saved, and meanwhile, the unmanned management is realized, so that the method is particularly suitable for residential homes or other forms of cyber-contracted rooms or unmanned hotels.
In addition, as another aspect of the present application, the above scheme may also be applied to an access control system of a community, and similarly, the management server is used to implement general management of property, and the identity server is used for identity recognition of a user.
The difference is that the community management server does not need to match and register users with the access control devices in a one-to-one correspondence, but only needs to register passing users.
As a specific scheme, the access control of the community needs to distinguish users, which can be divided into owner users and visitor users, the owner users can only complete the passing-through function without monitoring the access time of the owner users, and for the visitor users, except for the time limit of the secret key server, the management server also needs to monitor the visitor users, especially the visitor users such as express delivery, takeaway and the like.
It will be apparent to those skilled in the art that the modules or steps of the present application described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present application is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. An entrance guard management method based on identity recognition is characterized in that:
the access control system based on identification includes:
a mobile terminal capable of accessing at least one wireless communication network;
the access control device at least can access the wireless communication network;
the server at least forms data interaction with the mobile terminal and the access control device;
wherein, the mobile terminal comprises:
the image acquisition equipment is used for acquiring a two-dimensional code image or a human face image;
the first communication module is at least used for receiving and transmitting Bluetooth signals;
the first processor is used for controlling the image acquisition equipment and the first Bluetooth module to perform data processing;
the human body information sensor is at least used for identifying face information of a user, the human body information sensor sends identified body characteristic data to the first processor, and the first processor transmits the body characteristic data to the second processor through the first communication module and the second communication module;
the entrance guard's device includes:
the door lock mechanism is used for realizing unlocking or locking of the entrance guard;
the door control motor is used for driving the door lock mechanism;
the second communication module is at least used for receiving and transmitting Bluetooth signals to form interaction with the first Bluetooth module;
the second processor is used for controlling the access control motor and the second Bluetooth module and processing data;
the mobile terminal collects face information and uploads the face information to the server for identity recognition;
the management method comprises the following steps:
after the mobile terminal collects the two-dimensional code image, the first processor obtains a first digital secret key from the server;
the first communication module and the second communication module carry out data transmission to compare the first secret key with a second secret key prestored in the access control device;
if the comparison is successful, the door lock mechanism is driven to unlock by the access control motor;
and the server matches the user identity with the access control device.
2. The identity recognition-based access control management method according to claim 1, wherein:
the server comprises a key server for transmitting the first digital key to the mobile terminal.
3. The identity recognition-based access control management method according to claim 1, wherein:
the server comprises a key server storing a first digital key for transmission to the mobile terminal.
4. The identity recognition-based access control management method according to claim 1, wherein:
the server comprises a key server that stores a first digital key generated for transmission to the mobile terminal.
5. The identity recognition-based access control management method according to claim 1, wherein:
the server comprises an identity server, and the identity server at least stores face information for identity recognition.
6. The identity recognition-based access control management method according to claim 5, wherein:
the server further comprises a key server storing a first digital key for transmission to the mobile terminal; the key server and the identity server form data interaction.
7. The identity recognition-based access control management method according to claim 6, wherein:
the server also comprises a management server, and the management server at least stores data of the corresponding relation between the access control device and the user identity; the management server, the key server and the identity server form data interaction.
8. The identity recognition-based access control management method according to claim 1, wherein:
the server comprises a management server, and the management server at least stores data of the corresponding relation between the access control device and the user identity.
9. The identity recognition-based access control management method according to claim 8, wherein:
the management server and a second communication module of the access control device form communication connection so that the management server can acquire state data of the access control device.
10. The access control management method based on the identity recognition according to claim 9, characterized in that:
the status data includes: the opening and closing state of the access control device, the state duration of the access control device and the user corresponding to the access control device.
CN201910873675.XA 2019-08-21 2019-09-16 Access control management method based on identity recognition Pending CN110648435A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910776707 2019-08-21
CN2019107767074 2019-08-21

Publications (1)

Publication Number Publication Date
CN110648435A true CN110648435A (en) 2020-01-03

Family

ID=68991870

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910873675.XA Pending CN110648435A (en) 2019-08-21 2019-09-16 Access control management method based on identity recognition

Country Status (1)

Country Link
CN (1) CN110648435A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113256450A (en) * 2021-04-07 2021-08-13 武汉亿融信科科技有限公司 Intelligent hotel management system based on data analysis and video identification

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424678A (en) * 2013-08-30 2015-03-18 聚龙股份有限公司 Electronic password lock system and control method thereof
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN106713431A (en) * 2016-12-13 2017-05-24 上海众人网络安全技术有限公司 Unlocking/locking control method and system for vehicle
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
US9767629B1 (en) * 2017-03-07 2017-09-19 Nxp B.V. System and method for controlling access to vehicle
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN207909224U (en) * 2018-02-26 2018-09-25 王铭杰 A kind of intelligent wireless unlocking system based on high in the clouds control
CN109712300A (en) * 2019-01-31 2019-05-03 广州微证互联网有限公司 A kind of unlocking system based on network identification card certification

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424678A (en) * 2013-08-30 2015-03-18 聚龙股份有限公司 Electronic password lock system and control method thereof
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN106713431A (en) * 2016-12-13 2017-05-24 上海众人网络安全技术有限公司 Unlocking/locking control method and system for vehicle
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
US9767629B1 (en) * 2017-03-07 2017-09-19 Nxp B.V. System and method for controlling access to vehicle
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN207909224U (en) * 2018-02-26 2018-09-25 王铭杰 A kind of intelligent wireless unlocking system based on high in the clouds control
CN109712300A (en) * 2019-01-31 2019-05-03 广州微证互联网有限公司 A kind of unlocking system based on network identification card certification

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
何黎明: "《中国物流技术发展报告2018》", 31 October 2018 *
周玲: "《楼宇智能化技术》", 31 January 2014 *
玛丽娜•L•加夫里洛娃: "《安全***中的多模态生物特征识别与智能图像处理》", 30 September 2016 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113256450A (en) * 2021-04-07 2021-08-13 武汉亿融信科科技有限公司 Intelligent hotel management system based on data analysis and video identification

Similar Documents

Publication Publication Date Title
CN104134253B (en) A kind of gate control system and gate inhibition's deployment method
CN110570559A (en) Electronic key sharing method in access control system based on mobile terminal
CN104966336B (en) Intelligent lock and authorization management method and device of intelligent lock
CN105279832B (en) Intelligent door lock system and its control method
CN107967741A (en) Double-channel testimony of a witness in-one intelligent lock control method and system
CN205405639U (en) Access control system based on cloud ware
US9576412B2 (en) Network-assisted remote access portal
KR101296863B1 (en) Entry authentication system using nfc door lock
US20170236350A1 (en) Electronic door lock system
CN107734158A (en) The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
CN109155088B (en) Dynamic key access control system, method and device
US20140002236A1 (en) Door Lock, System and Method for Remotely Controlled Access
CN110570560A (en) access control system based on identity recognition
CN106534080B (en) Object access right management method, corresponding background system, device and user terminal
CN104732636A (en) Bluetooth cellphone-based intelligent community access control system and method
CN106803298A (en) Intelligent intercom system and method based on recognition of face
CN108257274A (en) A kind of intelligent door lock and its communication means
CN110570557A (en) access control system based on wireless communication network
CN104517338A (en) Remote door access control system based on wireless network and realization method of remote door access control system
US20180114384A1 (en) Cloud-based keyless access control system for housing facilities
CN204759558U (en) Intelligent entrance guard , equipment and system
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
CN109859350B (en) Remote authorized fingerprint self-service entry method and hotel self-service check-in method
CN103985169A (en) System utilizing handheld terminal and USB interface to lock/unlock door lock and controlling method thereof
CN106251438A (en) A kind of E.E.G lock system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 311113 room 1425, building 1, Shangyi center, Dufu village, Liangzhu street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Enjoy Key Technology Co.,Ltd.

Address before: 310000 room 301-2, building 1, Xigang development center, Sandun Town, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: Hangzhou Enjoy Key Technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200103