CN105205892A - Door access control method and system - Google Patents

Door access control method and system Download PDF

Info

Publication number
CN105205892A
CN105205892A CN201510649537.5A CN201510649537A CN105205892A CN 105205892 A CN105205892 A CN 105205892A CN 201510649537 A CN201510649537 A CN 201510649537A CN 105205892 A CN105205892 A CN 105205892A
Authority
CN
China
Prior art keywords
access control
control equipment
access
biological information
opening door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510649537.5A
Other languages
Chinese (zh)
Inventor
胡慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510649537.5A priority Critical patent/CN105205892A/en
Publication of CN105205892A publication Critical patent/CN105205892A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a door access control method and system. The door access control method comprises the following steps: acquiring first biological characteristic information of current visitors by second door access equipment; identifying whether the first biological characteristic information of the current visitors is the same as stored second biological characteristic information or not by the second door access equipment, wherein the second biological characteristic information is biological characteristic information of the visitors, which is transmitted by a mobile terminal and is acquired by first door access equipment; and if so, executing corresponding door opening operation by the second door access equipment. According to the door access control method and system, users can not carry keys when gonging out, and doors of the first door access equipment and the second door access equipment can be opened through identifying the biological characteristic information; and furthermore, when the visitors have a visit, the door access equipment also can automatically enable the visitors to enter a house according to access authorities of the visitors even if no people exist in the house.

Description

Access control method and system
Technical field
The present invention relates to communication technical field, particularly relate to a kind of access control method and system.
Background technology
Along with the development of the communication technology, the transmission of information more and more depends on the mobile terminal devices such as mobile phone.And it is also more and more higher to the requirement of the real-time of Information Communication.
In daily life, most of family all needs to open Door by Hand.This just requires that family must have people to exist, and requires that user's thing must put down when there is a ring at the door in hand goes to open the door in person, and this can bring a lot of inconvenience to daily life.Meanwhile, user just must can know the identity of people outdoors by opal or other watch-dogs, so just bring certain inconvenience or even unsafe factor to user.
For solving the problems of the technologies described above, at present, prior art carrys out access control system to open door mainly through mobile phone, as, the visitor image of shooting is transferred in mobile phone by gate control system, it is understanding that cellphone subscriber views this visitor, and so send door open command in gate control system by mobile phone, gate control system performs opening door operation according to this instruction.
But above-mentioned prior art also can only open a sect by mobile phone, the gate in such as family.For the community that safety management is tight, when entering gate, community, visitor needs to be conversed by gate control system with community user, community user is allowed to open once door by the access control equipment in family, arrive community to be conversed by gate control system again downstairs, allow community user open once door by the access control equipment in family, arrived family and also will open once door again; Such needs are repeatedly conversed to open the door with community user, seem and bother very much.
Therefore, be necessary to propose a kind of new technical scheme, to solve the problems of the technologies described above.
Summary of the invention
In view of this, the object of the present invention is to provide a kind of access control method and system, can solve the needs existed in prior art and repeatedly converse to open the door with community user, seem the very problem such as trouble.
For solving the problems of the technologies described above, embodiments provide following technical scheme:
The invention provides a kind of access control method, described access control method comprises the following steps:
Second access control equipment gathers first biological information of current visitor;
Whether first biological information of the current visitor of described second access control equipment identification is consistent with the second biological information of preservation, and described second biological information is the biological information of the described visitor that the first access control equipment of mobile terminal forwarding collects; And
If consistent, described second access control equipment performs corresponding opening door operation.
Present invention also offers a kind of access control method, described access control method comprises the following steps:
First access control equipment gathers first biological information of current visitor;
First biological information of the current visitor collected is transferred to mobile terminal by described first access control equipment;
Described first access control equipment receives and preserves described mobile the second biological information forwarded eventually; Described second biological information is confirmed described first biological information that described mobile terminal forwards;
Whether first biological information of the current visitor of described first access control equipment identification is consistent with the second biological information of preservation;
If consistent, described first access control equipment performs corresponding opening door operation.
Present invention also offers a kind of access control method, described access control method comprises the following steps:
Mobile terminal receives the first biological information of the first access control equipment transmission, and described first biological information is the biological information of the current visitor that the first access control equipment collects;
Current visitor corresponding for described first biological information is set to the visitor allowing access by mobile terminal; And
Mobile terminal transmits the second biological information to the first access control equipment and at least one second access control equipment, to make the first access control equipment and at least one second access control equipment according to the identification first biological information result whether consistent with the second biological information, perform corresponding opening door operation; Described second biological information is described first biological information that described mobile terminal allows the visitor of access.
Present invention also offers a kind of access control system, described access control system comprises:
Acquisition module, for gathering first biological information of current visitor;
Identification module, whether the second biological information for the first biological information with preservation that identify current visitor is consistent, and described second biological information is the biological information of the described visitor that the first access control equipment of mobile terminal forwarding collects; And
Enabling control module, if for consistent, then control the second access control equipment and performs corresponding opening door operation.
Present invention also offers a kind of access control system, described access control system comprises:
Acquisition module, for gathering first biological information of current visitor;
Transport module, for being transferred to mobile terminal by first biological information of the current visitor collected;
Receive and preserve module, for receiving and preserving described mobile the second biological information forwarded eventually; Described second biological information is confirmed described first biological information that described mobile terminal forwards;
Identification module, whether the second biological information for the first biological information with preservation that identify current visitor is consistent;
Enabling control module, if for consistent, control described first access control equipment and performs corresponding opening door operation.
Present invention also offers a kind of access control system, described access control system comprises:
Receiver module, for receiving the first biological information of the first access control equipment transmission, described first biological information is the biological information of the current visitor that the first access control equipment collects;
Module is set, for current visitor corresponding for described first biological information being set to the visitor allowing access; And
Transport module, for transmitting the second biological information to the first access control equipment and at least one second access control equipment, to make the first access control equipment and at least one second access control equipment according to the identification first biological information result whether consistent with the second biological information, perform corresponding opening door operation; Described second biological information is described first biological information that described mobile terminal allows the visitor of access.
Relative to prior art, access control method of the present invention and system, by the first access control equipment, first biological information of the current visitor collected is transferred to mobile terminal, second biological information is sent to the first access control equipment and the second access control equipment by mobile terminal, and described second biological information is confirmed described first biological information that described mobile terminal forwards; First access control equipment and the second access control equipment, according to the identification first biological information result whether consistent with the second biological information, automatically perform corresponding opening door operation.Therefore, user of the present invention gos out and can be with key, by identifying that biological information opens the door of the first access control equipment and the second access control equipment; In addition, when there being guest to visit, even if nobody exists within doors, access control equipment also can, automatically according to the access rights of visitor, make guest conveniently can enter into inside family.
Accompanying drawing explanation
Fig. 1 is the applied environment schematic diagram of the access control system that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the access control method that the embodiment of the present invention one provides;
Fig. 3 is the schematic flow sheet of the access control method that the embodiment of the present invention two provides;
Fig. 4 is the schematic flow sheet of the access control method that the embodiment of the present invention three provides;
Fig. 5 is the structural representation of the access control system that the embodiment of the present invention four provides;
Fig. 6 is the structural representation of the access control system that the embodiment of the present invention five provides;
Fig. 7 is the structural representation of the access control system that the embodiment of the present invention six provides.
Embodiment
What please refer in accompanying drawing is graphic, and wherein identical element numbers represents identical assembly, and principle of the present invention implements to illustrate in a suitable computing environment.The following description is based on exemplified specific embodiments of the invention, and it should not be regarded as limiting the present invention not at other specific embodiment that this describes in detail.
The principle of the invention illustrates with above-mentioned word, and it is not represented as a kind of restriction, and those skilled in the art can recognize that the plurality of step of the following stated and operation also may be implemented in the middle of hardware.Principle of the present invention uses other wide usages many or specific purpose computing, communication environment or configuration to operate.
Access control system provided by the invention and method, be mainly used in terminal device, as: mobile phone, computer, personal digital assistant (PersonalDigitalAssistant, PDA), access control equipment etc.
See Fig. 1, the applied environment schematic diagram of the access control system that this figure provides for the embodiment of the present invention, comprises multiple terminal device, as mobile phone and access control equipment etc.Wherein, by the first access control equipment 21, first biological information of the current visitor collected is transferred to mobile terminal 10, second biological information is sent to the first access control equipment 21 and the second access control equipment 22 or the 3rd access control equipment 23 by mobile terminal 10, and described second biological information is confirmed described first biological information that described mobile terminal 10 forwards; First access control equipment 21, second access control equipment 22 and the 3rd access control equipment 23, according to the identification first biological information result whether consistent with the second biological information, automatically perform corresponding opening door operation.
To be described in detail respectively below.
Embodiment one
Referring to Fig. 2, is the schematic flow sheet of the access control method that the embodiment of the present invention one provides; Described access control method, be applied in the second access control equipment, it mainly comprises the following steps:
In step S101, the second access control equipment gathers first biological information of current visitor;
In embodiments of the present invention, the first biological information can be the biological characteristics such as facial image, fingerprint, iris.
In step s 102, whether first biological information of the current visitor of described second access control equipment identification is consistent with the second biological information of preservation, and described second biological information is the biological information of the described visitor that the first access control equipment of mobile terminal forwarding collects;
In step s 103, if unanimously, described second access control equipment performs corresponding opening door operation.
In embodiments of the present invention, described second access control equipment performs the step of corresponding opening door operation, specifically comprises the following steps:
Judge the access rights of described current visitor;
Described second access control equipment performs corresponding opening door operation according to judged result.
As one embodiment of the invention,
Judge whether the access times of described current visitor have exceeded the number of times allowing access;
If judge to have exceeded the number of times allowing access, then described second access control equipment does not perform opening door operation;
If judge not exceeded the number of times allowing access, then described second access control equipment performs opening door operation.
As another embodiment of the present invention,
Judge whether the access time of described current visitor is allowing within the scope of the access time;
If judge within the permission access time, described second access control equipment performs opening door operation;
If judge that described second access control equipment does not perform opening door operation not within the permission access time.
As further embodiment of this invention,
Judge whether described current visitor is frequentation visitor;
If judge it is frequentation visitor, then described second access control equipment performs opening door operation;
If judge it is not frequentation visitor, then described second access control equipment only performs an opening door operation, and the access rights of current visitor are designated inefficacy.
Be described in detail to gather facial image below:
(1) second access control equipment receives and preserves the facial image of current visitor that the first access control equipment that mobile phone forwards collects;
(2) second access control equipments receive the access instruction of current visitor input;
(3) second access control equipments, according to described access instruction, open camera;
(4) second access control equipments control the facial image of described camera shooting visitor;
(5) second access control equipments, according to face recognition technology, identify that whether the facial image of the visitor that visitor's facial image of shooting forwards with the mobile phone of preservation is consistent;
(6) if consistent, then the second access control equipment judges whether the access times of described current visitor have exceeded the number of times allowing access;
(7) if judge to have exceeded the number of times allowing access, then described second access control equipment does not perform opening door operation;
(8) if judge not exceeded the number of times allowing access, then described second access control equipment performs opening door operation.
(9) second access control equipments reduce allowing the authority number of times of access once.
Embodiment two
Referring to Fig. 3, is the schematic flow sheet of the access control method that the embodiment of the present invention two provides; Described access control method, be applied in the first access control equipment, it mainly comprises the following steps:
In step s 201, the first access control equipment gathers first biological information of current visitor;
In embodiments of the present invention, the first biological information can be the biological characteristics such as facial image, fingerprint, iris.
In embodiments of the present invention, described first access control equipment also comprises before gathering the step of the first biological information of current visitor:
Described first access control equipment receives the room number to be visited of input;
Described first access control equipment searches the mobile terminal number corresponding with described room number, and connects with described mobile terminal.Wherein, the first access control equipment, by modes such as wireless wifi module or data networks, connects with described mobile terminal.
In step S202, first biological information of the current visitor collected is transferred to mobile terminal by described first access control equipment;
In embodiments of the present invention, first biological information of the current visitor collected, by modes such as wireless wifi module or data networks, is transferred to mobile terminal by the first access control equipment.
In step S203, described first access control equipment receives and preserves described mobile the second biological information forwarded eventually; Described second biological information is confirmed described first biological information that described mobile terminal forwards;
In step S204, whether first biological information of the current visitor of described first access control equipment identification is consistent with the second biological information of preservation;
In step S205, if unanimously, described first access control equipment performs corresponding opening door operation.
In embodiments of the present invention, described first access control equipment performs the step of corresponding opening door operation, specifically comprises the following steps:
Judge the access rights of described current visitor;
Described first access control equipment performs corresponding opening door operation according to judged result.
As one embodiment of the invention,
Judge whether the access times of described current visitor have exceeded the number of times allowing access;
If judge to have exceeded the number of times allowing access, then described first access control equipment does not perform opening door operation;
If judge not exceeded the number of times allowing access, then described first access control equipment performs opening door operation.
As another embodiment of the present invention,
Judge whether the access time of described current visitor is allowing within the scope of the access time;
If judge within the permission access time, described first access control equipment performs opening door operation;
If judge that described first access control equipment does not perform opening door operation not within the permission access time.
As further embodiment of this invention,
Judge whether described current visitor is frequentation visitor;
If judge it is frequentation visitor, then described first access control equipment performs opening door operation;
If judge it is not frequentation visitor, then described first access control equipment only performs an opening door operation, and the access rights of current visitor are designated inefficacy.
Be described in detail to gather facial image below:
(1) first access control equipment receives the room number to be visited of current visitor input;
(2) described first access control equipment searches the mobile terminal number corresponding with described room number, and connects with described mobile terminal;
(3) first access control equipments open camera;
(4) first access control equipments control the facial image of described camera shooting visitor;
The facial image of the visitor of shooting is transferred to described mobile terminal by (5) first access control equipments;
(6) first access control equipments receive and preserve the facial image of the visitor that mobile terminal sends;
(7) first access control equipments, according to face recognition technology, identify that whether the facial image of the visitor that visitor's facial image of shooting forwards with the mobile terminal of preservation is consistent;
(8) if consistent, then the first access control equipment judges whether the access times of described current visitor have exceeded the number of times allowing access;
(9) if judge to have exceeded the number of times allowing access, then described first access control equipment does not perform opening door operation;
(10) if judge not exceeded the number of times allowing access, then described first access control equipment performs opening door operation.
(11) first access control equipments reduce allowing the authority number of times of access once.
Embodiment three
Referring to Fig. 4, is the schematic flow sheet of the access control method that the embodiment of the present invention three provides; Described access control method, be applied in mobile terminal, it mainly comprises the following steps:
In step S301, mobile terminal receives the first biological information of the first access control equipment transmission, and described first biological information is the biological information of the current visitor that the first access control equipment collects;
In embodiments of the present invention, the first biological information can be the biological characteristics such as facial image, fingerprint, iris.
In embodiments of the present invention, receive the step of the first biological information of the first access control equipment transmission at mobile terminal before, also comprise:
Mobile terminal receives the connection request message that the first access control equipment sends;
Mobile terminal receives the instruction allowing to connect, and connects with described first access control equipment.
In step s 302, current visitor corresponding for described first biological information is set to the visitor allowing access by mobile terminal;
In step S303, mobile terminal transmits the second biological information to the first access control equipment and at least one second access control equipment, to make the first access control equipment and at least one second access control equipment according to the identification first biological information result whether consistent with the second biological information, perform corresponding opening door operation; Described second biological information is described first biological information that described mobile terminal allows the visitor of access.
As one embodiment of the invention, described access control method, also comprise: mobile terminal sends access rights corresponding to described current visitor to the first access control equipment and at least one the second access control equipment, perform corresponding opening door operation to make the first access control equipment and at least one second access control equipment according to access rights.
Describe in detail below by citing
(1) mobile terminal receives the facial image collected of the first access control equipment transmission;
(2) current visitor corresponding for described facial image is set to the visitor allowing access by mobile terminal;
(3) mobile terminal allows the facial image of the visitor of access to the first access control equipment and at least one the second access control equipment transmission, to make the first access control equipment and at least one second access control equipment according to identifying the result whether facial image of current visitor is consistent with the facial image of preservation, perform corresponding opening door operation.
Embodiment four
Referring to Fig. 5, is the structural representation of the access control system that the embodiment of the present invention four provides.For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.Described access control system comprises: acquisition module 101, identification module 102 and enabling control module 103.Described access control system can be the unit of software unit, hardware cell or the software and hardware combining be built in the second access control equipment.
Acquisition module 101, for gathering first biological information of current visitor;
Identification module 102, whether the second biological information for the first biological information with preservation that identify current visitor is consistent, and described second biological information is the biological information of the described visitor that the first access control equipment of mobile terminal forwarding collects; And
Enabling control module 103, if for consistent, then control the second access control equipment and performs corresponding opening door operation.
In embodiments of the present invention, described access control system also comprises:
Authority judge module, for judging the access rights of described current visitor;
Described enabling control module, specifically for performing corresponding opening door operation according to judged result.
As one embodiment of the invention, described authority judge module specifically comprises: number of times judge module;
Described number of times judge module, for judging whether the access times of described current visitor have exceeded the number of times allowing access;
Described enabling control module, if exceeded specifically for judging the number of times allowing access, has then controlled described second access control equipment and has not performed opening door operation; If judge not exceeded the number of times allowing access, then described second access control equipment performs opening door operation.
As another embodiment of the present invention, described authority judge module specifically comprises: time judgment module;
Described time judgment module, for judging whether the access time of described current visitor is allowing within the scope of the access time;
Described enabling control module, if specifically for judging within the permission access time, described second access control equipment performs opening door operation; If judge that described second access control equipment does not perform opening door operation not within the permission access time.
Embodiment five
Referring to Fig. 6, is the structural representation of the access control system that the embodiment of the present invention five provides.For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.Described access control system comprises: acquisition module 201, transport module 202, reception preserve module 203, identification module 204 and enabling control module 205.Described access control system can be the unit of software unit, hardware cell or the software and hardware combining be built in the first access control equipment.
Acquisition module 201, for gathering first biological information of current visitor;
Transport module 202, for being transferred to mobile terminal by first biological information of the current visitor collected;
Receive and preserve module 203, for receiving and preserving described mobile the second biological information forwarded eventually; Described second biological information is confirmed described first biological information that described mobile terminal forwards;
Identification module 204, whether the second biological information for the first biological information with preservation that identify current visitor is consistent;
Enabling control module 205, if for consistent, control described first access control equipment and performs corresponding opening door operation.
In embodiments of the present invention, described access control system also comprises:
Number reception module, for receiving the room number to be visited of input;
Searching and set up module, for searching the mobile terminal number corresponding with described room number, and connecting with described mobile terminal.
In embodiments of the present invention, described access control system also comprises:
Authority judge module, for judging the access rights of described current visitor;
Described enabling control module, performs corresponding opening door operation specifically for controlling described first access control equipment according to judged result.
As one embodiment of the invention, described authority judge module specifically comprises: number of times judge module;
Described number of times judge module, for judging whether the access times of described current visitor have exceeded the number of times allowing access;
Described enabling control module, if exceeded specifically for judging the number of times allowing access, has then controlled described first access control equipment and has not performed opening door operation; If judge not exceeded the number of times allowing access, then control described first access control equipment and perform opening door operation.
As another embodiment of the present invention, described authority judge module specifically comprises: time judgment module;
Described time judgment module, for judging whether the access time of described current visitor is allowing within the scope of the access time;
Described enabling control module, if specifically for judging within the permission access time, controlling described first access control equipment and performing opening door operation; If judge, not within the permission access time, to control described first access control equipment and do not perform opening door operation.
Embodiment six
Referring to Fig. 7, is the structural representation of the access control system that the embodiment of the present invention six provides.For convenience of explanation, illustrate only the part relevant to the embodiment of the present invention.Described access control system comprises: receiver module 301, arrange module 302 and transport module 303.Described access control system can be the unit of the software unit be built in mobile terminal, hardware cell or software and hardware combining.
Receiver module 301, for receiving the first biological information of the first access control equipment transmission, described first biological information is the biological information of the current visitor that the first access control equipment collects;
Module 302 is set, for current visitor corresponding for described first biological information being set to the visitor allowing access; And
Transport module 303, for transmitting the second biological information to the first access control equipment and at least one second access control equipment, to make the first access control equipment and at least one second access control equipment according to the identification first biological information result whether consistent with the second biological information, perform corresponding opening door operation; Described second biological information is described first biological information that described mobile terminal allows the visitor of access.
In embodiments of the present invention, described access control system also comprises:
Message reception module, for receiving the connection request message that the first access control equipment sends;
Setting up module, for receiving the instruction allowing to connect, and connecting with described first access control equipment.
As the present invention one preferred embodiments,
Described transport module 303, also for sending access rights corresponding to described current visitor to the first access control equipment and at least one the second access control equipment, perform corresponding opening door operation to make the first access control equipment and at least one second access control equipment according to access rights.
In sum, access control method of the present invention and system, by the first access control equipment, first biological information of the current visitor collected is transferred to mobile terminal, second biological information is sent to the first access control equipment and the second access control equipment by mobile terminal, and described second biological information is confirmed described first biological information that described mobile terminal forwards; First access control equipment and the second access control equipment, according to the identification first biological information result whether consistent with the second biological information, automatically perform corresponding opening door operation.Therefore, user of the present invention gos out and can be with key, by identifying that biological information opens the door of the first access control equipment and the second access control equipment; In addition, when there being guest to visit, even if nobody exists within doors, access control equipment also can, automatically according to the access rights of visitor, make guest conveniently can enter into inside family.
The access control method that the embodiment of the present invention provides and access control system belong to same design, and its specific implementation process refers to instructions in full, repeats no more herein.
In sum; although the present invention discloses as above with preferred embodiment; but above preferred embodiment is also not used to limit the present invention; those of ordinary skill in the art; without departing from the spirit and scope of the present invention; all can do various change and retouching, the scope that therefore protection scope of the present invention defines with claim is as the criterion.

Claims (24)

1. an access control method, is characterized in that, described access control method comprises the following steps:
Second access control equipment gathers first biological information of current visitor;
Whether first biological information of the current visitor of described second access control equipment identification is consistent with the second biological information of preservation, and described second biological information is the biological information of the described visitor that the first access control equipment of mobile terminal forwarding collects; And
If consistent, described second access control equipment performs corresponding opening door operation.
2. access control method as claimed in claim 1, is characterized in that, described second access control equipment performs the step of corresponding opening door operation, specifically comprises the following steps:
Judge the access rights of described current visitor;
Described second access control equipment performs corresponding opening door operation according to judged result.
3. access control method as claimed in claim 2, it is characterized in that, the step of the access rights of the described current visitor of described judgement, specifically comprises:
Judge whether the access times of described current visitor have exceeded the number of times allowing access;
Described second access control equipment performs the step of corresponding opening door operation according to judged result, specifically comprises:
If judge to have exceeded the number of times allowing access, then described second access control equipment does not perform opening door operation;
If judge not exceeded the number of times allowing access, then described second access control equipment performs opening door operation.
4. access control method as claimed in claim 2, it is characterized in that, the step of the access rights of the described current visitor of described judgement, specifically comprises:
Judge whether the access time of described current visitor is allowing within the scope of the access time;
Described second access control equipment performs the step of corresponding opening door operation according to judged result, specifically comprises:
If judge within the permission access time, described second access control equipment performs opening door operation;
If judge that described second access control equipment does not perform opening door operation not within the permission access time.
5. an access control method, is characterized in that, described access control method comprises the following steps:
First access control equipment gathers first biological information of current visitor;
First biological information of the current visitor collected is transferred to mobile terminal by described first access control equipment;
Described first access control equipment receives and preserves described mobile the second biological information forwarded eventually; Described second biological information is confirmed described first biological information that described mobile terminal forwards;
Whether first biological information of the current visitor of described first access control equipment identification is consistent with the second biological information of preservation;
If consistent, described first access control equipment performs corresponding opening door operation.
6. access control method as claimed in claim 5, it is characterized in that, described first access control equipment also comprises before gathering the step of the first biological information of current visitor:
Described first access control equipment receives the room number to be visited of input;
Described first access control equipment searches the mobile terminal number corresponding with described room number, and connects with described mobile terminal.
7. access control method as claimed in claim 5, is characterized in that, described first access control equipment performs the step of corresponding opening door operation, specifically comprises the following steps:
Judge the access rights of described current visitor;
Described first access control equipment performs corresponding opening door operation according to judged result.
8. access control method as claimed in claim 7, it is characterized in that, the step of the access rights of the described current visitor of described judgement, specifically comprises:
Judge whether the access times of described current visitor have exceeded the number of times allowing access;
Described first access control equipment performs the step of corresponding opening door operation according to judged result, specifically comprises:
If judge to have exceeded the number of times allowing access, then described first access control equipment does not perform opening door operation;
If judge not exceeded the number of times allowing access, then described first access control equipment performs opening door operation.
9. access control method as claimed in claim 7, it is characterized in that, the step of the access rights of the described current visitor of described judgement, specifically comprises:
Judge whether the access time of described current visitor is allowing within the scope of the access time;
Described first access control equipment performs the step of corresponding opening door operation according to judged result, specifically comprises:
If judge within the permission access time, described first access control equipment performs opening door operation;
If judge that described first access control equipment does not perform opening door operation not within the permission access time.
10. an access control method, is characterized in that, described access control method comprises the following steps:
Mobile terminal receives the first biological information of the first access control equipment transmission, and described first biological information is the biological information of the current visitor that the first access control equipment collects;
Current visitor corresponding for described first biological information is set to the visitor allowing access by mobile terminal; And
Mobile terminal transmits the second biological information to the first access control equipment and at least one second access control equipment, to make the first access control equipment and at least one second access control equipment according to the identification first biological information result whether consistent with the second biological information, perform corresponding opening door operation; Described second biological information is described first biological information that described mobile terminal allows the visitor of access.
11. access control methods as claimed in claim 10, is characterized in that, before receiving the step of the first biological information of the first access control equipment transmission, also comprise at mobile terminal:
Mobile terminal receives the connection request message that the first access control equipment sends;
Mobile terminal receives the instruction allowing to connect, and connects with described first access control equipment.
12. access control methods as claimed in claim 10, it is characterized in that, described access control method, also comprises:
Mobile terminal sends access rights corresponding to described current visitor to the first access control equipment and at least one the second access control equipment, performs corresponding opening door operation to make the first access control equipment and at least one second access control equipment according to access rights.
13. 1 kinds of access control systems, is characterized in that, described access control system comprises:
Acquisition module, for gathering first biological information of current visitor;
Identification module, whether the second biological information for the first biological information with preservation that identify current visitor is consistent, and described second biological information is the biological information of the described visitor that the first access control equipment of mobile terminal forwarding collects; And
Enabling control module, if for consistent, then control the second access control equipment and performs corresponding opening door operation.
14. access control systems as claimed in claim 13, it is characterized in that, described access control system also comprises:
Authority judge module, for judging the access rights of described current visitor;
Described enabling control module, specifically for performing corresponding opening door operation according to judged result.
15. access control systems as claimed in claim 14, it is characterized in that, described authority judge module specifically comprises: number of times judge module;
Described number of times judge module, for judging whether the access times of described current visitor have exceeded the number of times allowing access;
Described enabling control module, if exceeded specifically for judging the number of times allowing access, has then controlled described second access control equipment and has not performed opening door operation; If judge not exceeded the number of times allowing access, then described second access control equipment performs opening door operation.
16. access control methods as claimed in claim 14, it is characterized in that, described authority judge module specifically comprises: time judgment module;
Described time judgment module, for judging whether the access time of described current visitor is allowing within the scope of the access time;
Described enabling control module, if specifically for judging within the permission access time, described second access control equipment performs opening door operation; If judge that described second access control equipment does not perform opening door operation not within the permission access time.
17. 1 kinds of access control systems, is characterized in that, described access control system comprises:
Acquisition module, for gathering first biological information of current visitor;
Transport module, for being transferred to mobile terminal by first biological information of the current visitor collected;
Receive and preserve module, for receiving and preserving described mobile the second biological information forwarded eventually; Described second biological information is confirmed described first biological information that described mobile terminal forwards;
Identification module, whether the second biological information for the first biological information with preservation that identify current visitor is consistent;
Enabling control module, if for consistent, control described first access control equipment and performs corresponding opening door operation.
18. access control systems as claimed in claim 17, it is characterized in that, described access control system also comprises:
Number reception module, for receiving the room number to be visited of input;
Searching and set up module, for searching the mobile terminal number corresponding with described room number, and connecting with described mobile terminal.
19. access control systems as claimed in claim 17, it is characterized in that, described access control system also comprises:
Authority judge module, for judging the access rights of described current visitor;
Described enabling control module, performs corresponding opening door operation specifically for controlling described first access control equipment according to judged result.
20. access control systems as claimed in claim 19, it is characterized in that, described authority judge module specifically comprises: number of times judge module;
Described number of times judge module, for judging whether the access times of described current visitor have exceeded the number of times allowing access;
Described enabling control module, if exceeded specifically for judging the number of times allowing access, has then controlled described first access control equipment and has not performed opening door operation; If judge not exceeded the number of times allowing access, then control described first access control equipment and perform opening door operation.
21. access control systems as claimed in claim 19, it is characterized in that, described authority judge module specifically comprises: time judgment module;
Described time judgment module, for judging whether the access time of described current visitor is allowing within the scope of the access time;
Described enabling control module, if specifically for judging within the permission access time, controlling described first access control equipment and performing opening door operation; If judge, not within the permission access time, to control described first access control equipment and do not perform opening door operation.
22. 1 kinds of access control systems, is characterized in that, described access control system comprises:
Receiver module, for receiving the first biological information of the first access control equipment transmission, described first biological information is the biological information of the current visitor that the first access control equipment collects;
Module is set, for current visitor corresponding for described first biological information being set to the visitor allowing access; And
Transport module, for transmitting the second biological information to the first access control equipment and at least one second access control equipment, to make the first access control equipment and at least one second access control equipment according to the identification first biological information result whether consistent with the second biological information, perform corresponding opening door operation; Described second biological information is described first biological information that described mobile terminal allows the visitor of access.
23. access control systems as claimed in claim 22, it is characterized in that, described access control system also comprises:
Message reception module, for receiving the connection request message that the first access control equipment sends;
Setting up module, for receiving the instruction allowing to connect, and connecting with described first access control equipment.
24. access control systems as claimed in claim 22, is characterized in that,
Described transport module, also for sending access rights corresponding to described current visitor to the first access control equipment and at least one the second access control equipment, performs corresponding opening door operation to make the first access control equipment and at least one second access control equipment according to access rights.
CN201510649537.5A 2015-10-08 2015-10-08 Door access control method and system Pending CN105205892A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510649537.5A CN105205892A (en) 2015-10-08 2015-10-08 Door access control method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510649537.5A CN105205892A (en) 2015-10-08 2015-10-08 Door access control method and system

Publications (1)

Publication Number Publication Date
CN105205892A true CN105205892A (en) 2015-12-30

Family

ID=54953546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510649537.5A Pending CN105205892A (en) 2015-10-08 2015-10-08 Door access control method and system

Country Status (1)

Country Link
CN (1) CN105205892A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296943A (en) * 2016-08-29 2017-01-04 珠海迈科智能科技股份有限公司 A kind of data processing method, access control server and access control system
CN106302547A (en) * 2016-10-19 2017-01-04 中国科学院深圳先进技术研究院 Type hotel occupancy management system and method
CN106939731A (en) * 2016-01-04 2017-07-11 杭州海康威视数字技术股份有限公司 A kind of control method for door lock and device
CN107578506A (en) * 2017-09-06 2018-01-12 深圳市盛路物联通讯技术有限公司 The control method and device of internet-of-things terminal
CN108053532A (en) * 2017-12-21 2018-05-18 广东汇泰龙科技有限公司 A kind of unlocking time limit setting method based on intelligent cloud lock, system
CN108625312A (en) * 2018-05-23 2018-10-09 国政通科技股份有限公司 Visitor's gate and control method with multiple check function
CN108830987A (en) * 2018-06-04 2018-11-16 联想(北京)有限公司 A kind of authority control method, intelligent door system and controller
CN109393954A (en) * 2018-10-19 2019-03-01 惠而浦(中国)股份有限公司 Wind path valve and micro- with the device scorch all-in-one machine
CN110176088A (en) * 2018-10-31 2019-08-27 广东小天才科技有限公司 A kind of control method for door lock and wearable device based on wearable device
CN110443919A (en) * 2019-07-15 2019-11-12 广东校园卫士网络科技有限责任公司 A kind of student's disengaging management and candid photograph analysis method based on recognition of face
CN110491008A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based managing caller side and system, storage medium
CN110491007A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based caller management method, community server and storage medium
CN111080852A (en) * 2019-12-17 2020-04-28 重庆邮电大学 Method for setting automobile door lock member
CN113496393A (en) * 2021-01-09 2021-10-12 武汉谦屹达管理咨询有限公司 Offline payment financial system and method based on block chain
CN114442617A (en) * 2022-01-06 2022-05-06 东风柳州汽车有限公司 AGV trolley control method and device
CN116012991A (en) * 2022-08-31 2023-04-25 云丁网络技术(北京)有限公司 Method, device and related equipment for site access management
CN116746892A (en) * 2023-08-22 2023-09-15 深圳第一健康医疗管理有限公司 Medical intelligent health detection system and equipment
CN116820183A (en) * 2023-08-31 2023-09-29 泉州昆泰芯微电子科技有限公司 Knob with rotary feedback sense and electric appliance

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004020768A1 (en) * 2002-09-02 2004-03-11 Suk-Kyun Kim Electronic door lock
WO2006081487A2 (en) * 2005-01-27 2006-08-03 John D. Brush & Co., Inc. System and method for administering access to an interior compartment of an enclosure
CN101059878A (en) * 2007-05-14 2007-10-24 杭州中正生物认证技术有限公司 Secondary door access system adopting biological character identification technology and control method
CN101833806A (en) * 2010-05-12 2010-09-15 泰豪科技股份有限公司 Face recognition multi-access intelligent group control device
CN103544749A (en) * 2012-07-17 2014-01-29 一哥科技股份有限公司 Cloud control access control management system and authentication method thereof
CN204650628U (en) * 2015-05-25 2015-09-16 深圳市中阳通讯有限公司 A kind of recognition of face access control AB door system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004020768A1 (en) * 2002-09-02 2004-03-11 Suk-Kyun Kim Electronic door lock
WO2006081487A2 (en) * 2005-01-27 2006-08-03 John D. Brush & Co., Inc. System and method for administering access to an interior compartment of an enclosure
CN101059878A (en) * 2007-05-14 2007-10-24 杭州中正生物认证技术有限公司 Secondary door access system adopting biological character identification technology and control method
CN101833806A (en) * 2010-05-12 2010-09-15 泰豪科技股份有限公司 Face recognition multi-access intelligent group control device
CN103544749A (en) * 2012-07-17 2014-01-29 一哥科技股份有限公司 Cloud control access control management system and authentication method thereof
CN204650628U (en) * 2015-05-25 2015-09-16 深圳市中阳通讯有限公司 A kind of recognition of face access control AB door system

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106939731A (en) * 2016-01-04 2017-07-11 杭州海康威视数字技术股份有限公司 A kind of control method for door lock and device
CN106296943A (en) * 2016-08-29 2017-01-04 珠海迈科智能科技股份有限公司 A kind of data processing method, access control server and access control system
CN106302547A (en) * 2016-10-19 2017-01-04 中国科学院深圳先进技术研究院 Type hotel occupancy management system and method
CN107578506A (en) * 2017-09-06 2018-01-12 深圳市盛路物联通讯技术有限公司 The control method and device of internet-of-things terminal
CN108053532B (en) * 2017-12-21 2020-12-04 广东汇泰龙科技股份有限公司 Unlocking time limit setting method and system based on intelligent cloud lock
CN108053532A (en) * 2017-12-21 2018-05-18 广东汇泰龙科技有限公司 A kind of unlocking time limit setting method based on intelligent cloud lock, system
CN108625312A (en) * 2018-05-23 2018-10-09 国政通科技股份有限公司 Visitor's gate and control method with multiple check function
CN108830987A (en) * 2018-06-04 2018-11-16 联想(北京)有限公司 A kind of authority control method, intelligent door system and controller
CN108830987B (en) * 2018-06-04 2021-01-15 联想(北京)有限公司 Authority control method, intelligent door system and controller
CN109393954A (en) * 2018-10-19 2019-03-01 惠而浦(中国)股份有限公司 Wind path valve and micro- with the device scorch all-in-one machine
CN110176088B (en) * 2018-10-31 2021-04-30 广东小天才科技有限公司 Door lock control method based on wearable device and wearable device
CN110176088A (en) * 2018-10-31 2019-08-27 广东小天才科技有限公司 A kind of control method for door lock and wearable device based on wearable device
CN110443919A (en) * 2019-07-15 2019-11-12 广东校园卫士网络科技有限责任公司 A kind of student's disengaging management and candid photograph analysis method based on recognition of face
CN110491007A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based caller management method, community server and storage medium
CN110491008A (en) * 2019-08-29 2019-11-22 恒大智慧科技有限公司 A kind of community-based managing caller side and system, storage medium
CN111080852A (en) * 2019-12-17 2020-04-28 重庆邮电大学 Method for setting automobile door lock member
CN111080852B (en) * 2019-12-17 2022-03-11 重庆邮电大学 Method for setting automobile door lock member
CN113496393A (en) * 2021-01-09 2021-10-12 武汉谦屹达管理咨询有限公司 Offline payment financial system and method based on block chain
CN114442617A (en) * 2022-01-06 2022-05-06 东风柳州汽车有限公司 AGV trolley control method and device
CN116012991A (en) * 2022-08-31 2023-04-25 云丁网络技术(北京)有限公司 Method, device and related equipment for site access management
CN116746892A (en) * 2023-08-22 2023-09-15 深圳第一健康医疗管理有限公司 Medical intelligent health detection system and equipment
CN116820183A (en) * 2023-08-31 2023-09-29 泉州昆泰芯微电子科技有限公司 Knob with rotary feedback sense and electric appliance
CN116820183B (en) * 2023-08-31 2023-12-08 泉州昆泰芯微电子科技有限公司 Knob with rotary feedback sense and electric appliance

Similar Documents

Publication Publication Date Title
CN105205892A (en) Door access control method and system
US9041511B2 (en) Facility management using mobile devices
CN104517336B (en) Yunmen access control system and its implementation based on mobile internet
CN203966221U (en) A kind of remote visible talkback door lock system
CN101853535B (en) Door control system and door control management method
US20150050922A1 (en) Mobile device security system
CN102354409A (en) Access control system based on face recognition
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN104134253A (en) Entrance guard system and entrance guard opening method
CN106157390A (en) The visible building talkback door lock system of a kind of band safety certification and method of work thereof
CN105227578B (en) Transmit the encryption and decryption approaches of file
CN203984607U (en) Building entrance guard intercommunication system
GB2532305A (en) Method for Configuring and controlling smart home products
WO2015064076A1 (en) Communication terminal management system, management method, management server, terminal control method, and communication terminal
CN103150800A (en) Device for adding permissions in entrance guard system
CN105979487A (en) Method and system for configuring office partitions according to positioning information of mobile terminal
CN105451001A (en) Visible dialogue system and method based on cloud technology
CN103401988A (en) Mobile phone, and method and system for mobile-phone communication control based on radio frequency (RF) technology
EP3422684B1 (en) System and data transfer method in said system
CN102682501A (en) System and method for achieving access control of parking lot
CN205453946U (en) Visible dialogue system based on cloud
RU171655U1 (en) Intercom with touchscreen and wireless
CN101848417A (en) Method and system for controlling wireless communication terminal service
Kim et al. Near real-time tracking of IoT device users
CN109246104B (en) Security mobile police service system oriented to high-confidentiality environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151230

RJ01 Rejection of invention patent application after publication