CN105447928A - Entrance guard control method and control system thereof - Google Patents

Entrance guard control method and control system thereof Download PDF

Info

Publication number
CN105447928A
CN105447928A CN201410434161.1A CN201410434161A CN105447928A CN 105447928 A CN105447928 A CN 105447928A CN 201410434161 A CN201410434161 A CN 201410434161A CN 105447928 A CN105447928 A CN 105447928A
Authority
CN
China
Prior art keywords
mobile terminal
owner
visitor
data
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410434161.1A
Other languages
Chinese (zh)
Other versions
CN105447928B (en
Inventor
张诗彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Original Assignee
Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Intelligent Home Appliance Technology Co Ltd filed Critical Qingdao Haier Intelligent Home Appliance Technology Co Ltd
Priority to CN201410434161.1A priority Critical patent/CN105447928B/en
Publication of CN105447928A publication Critical patent/CN105447928A/en
Application granted granted Critical
Publication of CN105447928B publication Critical patent/CN105447928B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an entrance guard control method and a control system thereof. The method comprises the following steps: acquiring connection requesting information of a mobile terminal, and judging whether a terminal marker carried by a connection requesting message is coupled with a pre-stored preset marker or not; determining the mobile terminal is an owner mobile terminal or an administrator mobile terminal if so; judging whether fingerprint data acquired by the mobile phone is coupled with preset fingerprint data corresponding the preset marker or not; and unlocking entrance guard if so. The method provided by the invention has high safety and great convenience, and realizes no staying of the fingerprint in a public area in order to avoid stole risk of the fingerprint.

Description

Access control method and control system
Technical field
The present invention relates to Intelligent Community control technology, specifically, relate to a kind of access control method and control system.
Background technology
In recent years, rapidly, a lot of community is provided with senior gate inhibition, and wherein Fingerprint Lock is widely used in Intelligent Community development, because Fingerprint Lock does not need key, therefore avoids old-fashioned lock key and loses the trouble will changing lock; And there is uniqueness due to fingerprint, thus can ensure security to a certain extent.
Although current Fingerprint Lock is without the need to using key; but user needs fingerprint by the Fingerprint Identification Unit of public domain (great majority are all arranged on gate inhibition); Fingerprint Identification Unit could identify and unlock; this mode makes fingerprint trace can stay on Fingerprint Identification Unit; exist and be replicated the possibility usurped, therefore adopt Fingerprint Lock still to have certain risk.
Summary of the invention
An object of the present invention is to provide a kind of access control method, is replicated to solve on Fingerprint Identification Unit that prior art needs fingerprint to stay public domain and to there is fingerprint the problem usurping risk.
For achieving the above object, method provided by the invention adopts following technical proposals to realize:
A kind of access control method, described method comprises:
Obtain the connection request message of mobile terminal, judge whether the terminal iidentification carried in described connection request message mates with the preset identifications prestored;
If so, judge that described mobile terminal is as owner's mobile terminal or keeper's mobile terminal;
Judge the finger print data of this mobile terminal collection with prestore, whether mate corresponding to the preset finger print data of described preset identifications;
If so, then gate inhibition is unlocked.
Two of object of the present invention is to provide a kind of control system being applied to gate inhibition, and gate inhibition can be controlled to unlock by hard to bear mobile terminal.
For realizing above-mentioned technical purpose, control system provided by the invention adopts following technical proposals to realize:
Be applied to a gate inhibition's control system, described control system comprises:
Connection request message obtains and determination module, for obtaining the connection request message of mobile terminal, and judges whether the terminal iidentification carried in described connection request message mates with the preset identifications prestored;
Finger print data receiver module, when judging described mobile terminal as owner's mobile terminal or keeper's mobile terminal for obtaining in described connection request message with determination module, receives the finger print data that this mobile terminal gathers;
Finger print data determination module, for judge the finger print data that receives with prestore, whether mate corresponding to the preset finger print data of described preset identifications;
Unlock gate inhibition's module, for unlocking gate inhibition when with determination module, described finger print data deciphering judges that the finger print data after deciphering mates with described preset finger print data;
Wherein, if the terminal iidentification carried in described connection request message matches with the preset identifications prestored, described connection request message obtains and judges that described mobile terminal is as owner's mobile terminal or keeper's mobile terminal with determination module.
Three of object of the present invention is to provide a kind of access control system being applied to the mobile terminal of access control, utilize mobile terminal to gather fingerprint access control, the Fingerprint Identification Unit avoiding prior art to need fingerprint to stay public domain exists fingerprint and is replicated the problem usurping risk.
For realizing above-mentioned technical purpose, access control system provided by the invention adopts following technical proposals to realize:
Be applied to an access control system for the mobile terminal of access control, described access control system comprises:
Connection request message transmission module, for sending connection request message to the gate inhibition that will control, carries the terminal iidentification of mobile terminal in described connection request message;
Fingerprint data collection module, for judging that the described gate inhibition that will control this mobile terminal gathers finger print data as when owner's mobile terminal or keeper's mobile terminal;
Finger print data sending module, for being sent to the described gate inhibition that will control by the finger print data of collection;
Wherein, when the preset identifications that the described gate inhibition that will control prestores in the terminal iidentification judging to carry in described connection request message and this gate inhibition matches, judge that this mobile terminal is as owner's mobile terminal or keeper's mobile terminal.
Compared with prior art, advantage of the present invention and good effect are: the present invention gathers the fingerprint of user by mobile terminal and sends to gate inhibition, gate inhibition verifies fingerprint and combines and carrys out access control unblock to the checking of mobile terminal, the mode of fingerprint authentication without the need to user's carrying keys, convenient, safety; Gather fingerprint by mobile scanning terminal, on gate inhibition, carry out touch operation without the need to user, avoid and fingerprint is stayed public domain and stolen risk; And the mode of the finger print data of the unique identification of mobile terminal and user being carried out double verification improves the security of checking.
After reading the specific embodiment of the present invention by reference to the accompanying drawings, the other features and advantages of the invention will become clearly.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of access control method of the present invention first embodiment;
Fig. 2 is the process flow diagram of another embodiment of access control method of the present invention;
Fig. 3 is the process flow diagram that mobile terminal in the present invention and gate inhibition carry out binding;
Fig. 4 is the process flow diagram increasing binding mobile terminal in the present invention;
Fig. 5 is the structured flowchart that the present invention is applied to a control system embodiment of gate inhibition;
Fig. 6 is the structured flowchart that the present invention is applied to an access control system embodiment of the mobile terminal of access control.
Embodiment
Below in conjunction with accompanying drawing, the specific embodiment of the present invention is described in detail.
Refer to Fig. 1, this figure is depicted as the process flow diagram of access control method of the present invention first embodiment.
As shown in Figure 1, the method that controls gate inhibition of this embodiment is as follows:
Step S001: the connection request message obtaining mobile terminal.
Gate inhibition can obtain the connection request message that mobile terminal sends, and, according to setting, in this connection request message, carry the terminal iidentification of mobile terminal.Gate inhibition gets connection request message, reads out terminal iidentification wherein, and mates with the preset identifications that gate inhibition prestores.
Step S002: judge marking matched whether successful.If success, perform step S003; Otherwise, go to step S006.
Step S003: if marking matched success, also the terminal iidentification namely in connection request message is consistent with preset identifications, then judge to send the mobile terminal of this connection request message as owner's mobile terminal or keeper's mobile terminal, and receive the finger print data of this mobile terminal collection.
And, after receiving the finger print data that mobile terminal collection sends, mate with that prestore in gate inhibition, corresponding with this preset identifications preset finger print data.
Step S004: judge that whether fingerprint matching is successful.If success, perform step S005; Otherwise, go to step S006.
Step S005: after fingerprint matching success, unlock gate inhibition.
Step S006: if marking matched unsuccessful or fingerprint matching is unsuccessful, performs other process.
Apply the control method of this embodiment, achieve and utilize fingerprint to carry out solution lock control to gate inhibition.And fingerprint is sent by mobile terminal, without the need to carrying out the collection of fingerprint on gate inhibition, avoiding and fingerprint is stayed public domain and stolen risk.In addition, fingerprint just gathers and receives judgement after mobile terminal is by checking, and the mode of the finger print data of the unique identification of mobile terminal and user being carried out double verification improves the security of checking.
Fig. 2 to Fig. 4 shows the process flow diagram of another embodiment of access control method of the present invention.The specific works flow process of this embodiment access control method is specifically described below in conjunction with Fig. 2 to 4.
As shown in Figure 2, be the process flow diagram of another embodiment of access control method of the present invention, the method comprises the following steps:
Step S11, mobile terminal send connection request message to gate inhibition, carry terminal iidentification in this connection request message, and this terminal iidentification is the unique identification of mobile terminal.
In the present embodiment, user is undertaken connecting the operation of gate inhibition by mobile terminal such as mobile phone, iPad etc., connected mode can but be not limited to bluetooth.Comprise as uniquely identified terminal iidentification: one or more in the MAC Address of mobile phone, Bluetooth address or string value IMEI.
The present embodiment is preferred, and mobile terminal sends connection request to gate inhibition, is when the distance of gate inhibition and mobile terminal is close to certain value, automatically triggers this mobile terminal and send connection request, and control transmission without user.
Step S12, gate inhibition receive the connection request message that mobile terminal sends, and judge whether the terminal iidentification in this connection request message mates with the preset identifications prestored.Preset identifications, refer to be stored in advance in gate inhibition, successfully binding after terminal iidentification.If the match is successful, then judge that this mobile terminal is as owner's mobile terminal or keeper's mobile terminal, gate inhibition sends successful connection message to mobile terminal, enters step S13; If mate unsuccessful, then perform step S21.
Particularly, store the terminal iidentification of the mobile terminal of the user in this gate inhibition's reach in the storer of gate inhibition, when mobile terminal is connected with gate inhibition, the terminal iidentification in this connection request message mates with the preset identifications prestored by gate inhibition.If the match is successful, then illustrate that this mobile terminal is owner's mobile terminal or keeper's mobile terminal of binding authentication, this user is validated user, then gate inhibition sends successful connection message to mobile terminal, to carry out next step finger print identifying.
Step S13, mobile terminal receive successful connection message, start the function of scanning fingerprint, gather the finger print data of user.
This step, being only first has the step of direct relation with user, and mobile terminal prompting client inputs finger print information, gathers its fingerprint.
Step S14, mobile terminal are encrypted the finger print data collected, and the finger print data after encryption is sent to gate inhibition.
The present embodiment is preferred, and this finger print data can be deleted after the finger print data after encryption is sent to gate inhibition by mobile terminal.
In other words, mobile terminal can not preserve this finger print data, makes fingerprint stolen in order to avoid mobile terminal is lost.
Step S15, gate inhibition are decrypted the finger print data received and identify, judge this finger print data and pre-stored, whether the preset finger print data of corresponding preset identifications mate.If the match is successful, then perform step S16; If mate unsuccessful, then perform step S31.
Step S16, gate inhibition unlock gate inhibition;
Particularly, in the storer of gate inhibition, the preset finger print data of the preset identifications of mobile terminal and this mobile terminal affiliated user is one to one, gate inhibition when the finger print data received can corresponding with this preset finger print data be just judged as unlocking gate inhibition.
If step S21 step S12 judges that terminal iidentification and preset identifications mate unsuccessful, then judge that mobile terminal is as visitor's mobile terminal, gate inhibition sends connection failure message to mobile terminal, and stochastic generation visitor verification msg, such as Quick Response Code, stores this Quick Response Code and sends this Quick Response Code to visitor's mobile terminal.
If being identified in the storer of gate inhibition of mobile terminal does not prestore, gate control system judges that this mobile terminal is as visitor's mobile terminal, represent that the holder of this mobile terminal may be the kith and kin visitor of owner, this time, needs judged whether to authorize kith and kin visitor's authority unlocking gate inhibition temporarily.Therefore gate inhibition's stochastic generation visitor verification msg, for confirming the identity of this visitor further, and whether the access of visitor can obtain the permission of owner.And gate inhibition self also can store this visitor's verification msg temporarily, for next step authentication of visitor.
After step S22, visitor's mobile terminal receive Quick Response Code, by modes such as multimedia message, micro-letter or Fetions, this Quick Response Code is sent on the mobile terminal of the owner that will access.
When this visitor is the kith and kin of owner really, this Quick Response Code can be sent to owner's mobile terminal.If this visitor is stranger, owing to not having the contact method of owner, nature can not carry out the action of this step, and gate inhibition also can enter standby or dormant state after preset time period.
After step S23, owner's mobile terminal receive Quick Response Code, this Quick Response Code and self owner's binding information such as terminal iidentification and/or finger print data are carried out combined ciphering, and the visitor's authorization message obtained after encrypted combination is sent to visitor's mobile terminal.
Particularly, Quick Response Code and its terminal iidentification encrypted combination can be first visitor's identification code by owner's mobile terminal, then are visitor's authorization message by the finger print data encrypted combination of this visitor's identification code and owner.
The visitor's authorization message received is sent to gate inhibition by step S24, visitor's mobile terminal.
Step S25, gate inhibition resolve this visitor's authorization message, obtain the terminal iidentification of owner's mobile terminal and/or the finger print data of owner, and the Quick Response Code of previous stochastic generation.Gate inhibition is mated with the information stored respectively by resolving the information obtained.If the match is successful, then perform step S16, unlock gate inhibition; If mate unsuccessful, then perform step S26.
Step S26, gate inhibition will not unlock, and send the reminder message that will not unlock to visitor's mobile terminal.
And whether no matter mate successful, Quick Response Code and visitor's authorization message of this stochastic generation all will lose efficacy, and namely this Quick Response Code can only use once, to improve security and the validity of checking.
Preferred, authorize to visitor the security unlocking access permission for improving further temporarily, in step 23, when owner's mobile terminal is combined as visitor's identification code to the Quick Response Code and own terminal mark encryption that are received from visitor, limit this and be encrypted as irreversible encryption, also namely, former data are not restored by being decrypted visitor's identification code.Like this, can malicious decryption be avoided and get the terminal iidentification of owner's mobile terminal.
If owner's mobile terminal adopts irreversible encryption to generate temporary mark code, then in step s 25, gate inhibition resolves visitor's authorization message, can only obtain the finger print data of visitor's identification code and owner.Then, gate inhibition adopt pre-set, generates the identical encryption method of visitor's identification code with owner's mobile terminal, to previous stochastic generation and the Quick Response Code stored and the preset terminal iidentification that prestores be encrypted, generation preset identifications code.Preset identifications code mates with the visitor's identification code received by gate inhibition, is mated by the preset finger print data that the owner's finger print data and gate inhibition in visitor's authorization message stores self.If the match is successful, perform step S16, unlock gate inhibition; If mate unsuccessful, then perform step S26, will not unlock, and send the reminder message that will not unlock to visitor's mobile terminal.
Further, if can communication between owner's mobile terminal and gate inhibition, then, after owner's mobile terminal generates visitor's authorization message, directly this visitor's authorization message be transferred to gate inhibition, and without the need to forwarding through visitor's mobile terminal again.
Step S31, gate inhibition judge in the first preset time period, to should mobile terminal it fails to match whether number of times exceeds predetermined threshold value, be perform step S32, otherwise perform step S33.
Step S32, gate inhibition start temporary protection pattern; the connection request message of gate inhibition and this mobile terminal of response is no longer unlocked in the second preset time period; send the frequency of failure to this mobile terminal to exceed predetermined threshold value or exceed the reminder message of Preset Time match time, and disconnect the connection with this mobile terminal.
If within the time period of setting; such as; within 5 minutes, the fingerprint matching frequency of failure of same mobile terminal exceeds setting value; such as 5 times; then gate inhibition is defaulted as the holder of current mobile terminal is not validated user; therefore start temporary protection pattern, attempt with the mobile terminal from malicious preventing visitor from holding owner.
Step S33, gate inhibition send the reminder message again inputting fingerprint to mobile terminal, record finger print data mates unsuccessful number of times, and performs step S15 after receiving finger print data.
In practical application, need mobile terminal and gate inhibition to bind in advance, only have the mobile terminal after binding could carry out Wireless Data Transmission and authentication with gate inhibition.In the present embodiment, carried out binding and the initialization of mobile terminal and gate inhibition by the mode of Fig. 3.
Specifically, mobile terminal and gate inhibition carry out binding and initialized process as follows:
Step S01, mobile terminal send bind-request message to gate inhibition, carry the terminal iidentification of mobile terminal in this bind-request message.
Step S02, gate inhibition receive bind-request message, and terminal iidentification is stored as preset identifications, and return permission binding response to mobile terminal.
Step S03, mobile scanning terminal gather finger print data, send to gate control system by the finger print data collected.
Preferably, mobile terminal sends to gate inhibition, again to improve security further after being encrypted by this finger print data.
Finger print data as preset finger print data and above-mentioned preset identifications corresponding stored, and is returned the message of binding success by step S04, gate inhibition to mobile terminal.
In the present embodiment, mobile terminal and gate inhibition can carry out communication by bluetooth or other communication modes.
Above-mentioned binding procedure is the process that owner's mobile terminal and gate inhibition carry out binding.In addition, for the ease of the information of the mobile terminal of institute's binding authentication in managing gate inhibition, when first use gate inhibition, keeper's mobile terminal can be set, give this mobile terminal administration authority, manage increasing binding and deleting the owner's mobile terminal bound.When carrying out bookkeeping, except the terminal iidentification of authentic administrator mobile terminal and fingerprint of administrator data, also needing to confirm keeper's identity information further, such as, determining its keeper's identity by password.So, for realizing the binding of keeper's mobile terminal, after above-mentioned steps S04, also comprise the process of following each step:
Step S05, mobile terminal send Password Input request to gate inhibition.
Step S06, gate inhibition return Password Input response.
The password that user inputs is sent to system by step S07, mobile terminal.
The terminal iidentification of password, mobile terminal and finger print data corresponding stored are preset identity information, preset identifications and preset finger print data by step S08, gate control system, and are keeper's mobile terminal by this mobile terminal identification.
Thus, stored preset identifications one to one, preset finger print data and preset identity information are designated the information of keeper's mobile terminal by gate inhibition, this keeper's mobile terminal has the authority increasing and delete the information stored in gate inhibition, also have the authority increasing and delete binding owner mobile terminal, implementation can comprise:
Mode one, keeper's mobile terminal with administrator right send and increase bound device request to gate inhibition, and after gate inhibition's authentic administrator identity, reply and allow to increase response, then new owner's mobile terminal performs step S01-S04.
Mode two, as shown in Figure 4, to comprise the following steps:
Step S41, owner's mobile terminal send increases bound device request to gate inhibition.
Step S42, gate inhibition's stochastic generation binding validatation data, such as Quick Response Code, stores this binding validatation Data Concurrent and gives owner mobile terminal.
Binding validatation data are sent to keeper's mobile terminal by step S43, owner's mobile terminal.
These binding validatation data and the keeper's binding information combined ciphering of self are replied to owner's mobile terminal by step S44, keeper's mobile terminal after binding authorization message.
Binding authorization message is sent to gate inhibition by step S45, owner's mobile terminal.
Step S46, gate inhibition verify this binding authorization message, resolve keeper's binding informations such as terminal iidentification, fingerprint of administrator data and the password drawing binding validatation data, keeper's mobile terminal, and mate resolving the information obtained with the preset information of storage, notify after the match is successful that this owner's mobile terminal allows to increase binding response.
Step S47, owner's mobile terminal perform the binding of step S01-S04.
Certainly, if can communication between keeper's mobile terminal and gate inhibition, then, after it generates binding authorization message, directly this binding authorization message can be transferred to gate inhibition, and without the need to forwarding through owner's mobile terminal again.
In addition, in order to prevent user from being unlocked gate inhibition when coercing by mobile terminal, preferably, the preset alarm fingerprint data of pre-stored are gone back in the present embodiment.That is, what such as owner unlocked gate inhibition at ordinary times is index fingerprint, fingerprints of what alarm fingerprint then stored is other fingers of owner.When gate inhibition uses alarm fingerprint by coupling discovery owner, while unblock, send warning message to administrative centers such as property.
The method of above-described embodiment is by the finger scan function on mobile terminal, and user does not need to touch gate inhibition and can unlock; And by the binding of mobile terminal and gate inhibition, also cannot be used for unlocking gate inhibition even if fingerprint is replicated, security significantly promotes; Alarm fingerprint can also be set and prevent malice from attempting function.
For realizing access control method described above, present invention also offers the access control system of the control system being applied to gate inhibition and the mobile terminal being applied to access control, two control system cooperatings, complete the control to gate inhibition.
Refer to Fig. 5, this figure is depicted as the structured flowchart that the present invention is applied to a control system embodiment of gate inhibition.
As shown in Figure 5, for making gate inhibition to control to carry out unlocked by fingerprint by hard to bear mobile terminal, the control system that this embodiment is applied to gate inhibition comprises:
Connection request message obtains and determination module 501, for obtaining the connection request message of mobile terminal, and judges whether the terminal iidentification carried in connection request message mates with the preset identifications prestored;
Finger print data receiver module 502, when judging mobile terminal as owner's mobile terminal or keeper's mobile terminal for obtaining in connection request message with determination module 502, receives this mobile terminal collection and finger print data after encryption;
Finger print data deciphering and determination module 503, for the finger print data after enabling decryption of encrypted process, and judge the finger print data after deciphering with prestore, whether mate corresponding to the preset finger print data of described preset identifications;
Unlock gate inhibition's module 504, for unlocking gate inhibition when with determination module 503, finger print data deciphering judges that the finger print data after deciphering mates with preset finger print data;
Wherein, if the terminal iidentification carried in connection request message matches with the preset identifications prestored, connection request message obtains and judges that this mobile terminal is as owner's mobile terminal or keeper's mobile terminal with determination module 501.
For carrying out temporary Authorization to visitor, make the visitor of owner to unlock gate inhibition, the control system being applied to gate inhibition also comprises:
With determination module 501, visitor's verification msg generation module 505, judges that mobile terminal is as stochastic generation visitor verification msg during visitor's mobile terminal for obtaining in connection request message;
Visitor's verification msg stores and sending module 506, for storing visitor's verification msg, and described visitor's verification msg is sent to visitor's mobile terminal;
Visitor's authorization message receiver module 507, visitor's authorization message that the owner's mobile terminal for receiving the owner that visitor's mobile terminal and/or visitor's mobile terminal will be accessed returns;
The deciphering of visitor's authorization message and determination module 508, for deciphering visitor's authorization message, and judge whether preset owner's binding information of owner's binding information and visitor's verification msg and storage and visitor's verification msg mate;
Unlock gate inhibition module 504 and unlock gate inhibition when preset owner's binding information of owner's binding information and visitor's verification msg and storage and visitor's verification msg match;
Wherein, if the terminal iidentification carried in connection request message does not mate with preset identifications, connection request message obtains and judges that mobile terminal is as visitor's mobile terminal with determination module 501; Owner's mobile terminal of the owner that visitor's authorization message will be accessed by visitor's mobile terminal generates according to owner's binding information and visitor's verification msg combined ciphering.
Further, control system also comprises:
Visitor is matching treatment module not, for when the deciphering of visitor's authorization message judges owner's binding information with determination module 508 and visitor's verification msg is not mated with preset owner's binding information of storage and visitor's verification msg of storage, gate inhibition will not be unlocked, delete the visitor's verification msg stored, and send the reminder message that will not unlock to visitor's mobile terminal.
For reply user is unlocked gate inhibition when coercing, control system also comprises:
Alarm fingerprint data judging and processing module 510, for after with determination module 503, finger print data deciphering judges that the finger print data after deciphering and preset finger print data match, judge finger print data whether with preset alarm fingerprint data match, and send warning message when matching to administrative center.
For realizing above-mentioned functions, control system also comprises:
Keeper's mobile terminal data acquisition module 511, for obtaining the terminal iidentification of keeper's mobile terminal, fingerprint of administrator data and keeper's identity information, and corresponding stored is preset identifications, preset finger print data and preset identity information;
Owner's mobile terminal data acquisition module 512, for obtaining terminal iidentification, owner's finger print data of owner's mobile terminal, and corresponding stored is preset identifications and preset finger print data, and
Alarm fingerprint data acquisition module 513, for obtaining the alarm fingerprint data of owner's mobile terminal, using alarm fingerprint data as preset alarm fingerprint data, with the preset identifications corresponding stored of this owner's mobile terminal.
For controlling the binding of mobile terminal and gate inhibition, described control system also comprises:
Increase bound device acquisition request module 514, for obtaining the increase bound device request that owner's mobile terminal sends;
Binding validatation data generation module 515, for stochastic generation binding validatation data after increase bound device acquisition request module 514 gets the request of increase bound device;
Binding validatation data store and sending module 516, for storing binding validatation data, and binding validatation data are sent to owner's mobile terminal;
Binding authorization message receiver module 517, for receiving the binding authorization message that owner's mobile terminal and/or described keeper's mobile terminal return;
The deciphering of binding authorization message and determination module 518, for deciphering binding authorization message, and judge whether preset keeper's binding information of keeper's binding information and binding validatation data and storage and binding validatation data mate;
Owner's mobile terminal data acquisition module 512 deciphers the preset keeper's binding information and binding validatation data match judging keeper's binding information and binding validatation data and storage with determination module 518 in visitor's authorization message after, obtain the terminal iidentification of owner's mobile terminal, owner's finger print data again, and corresponding stored is preset identifications and preset finger print data;
Wherein, bind authorization message and encrypt generation by keeper's mobile terminal according to keeper's binding information and binding validatation data assemblies; Keeper's binding information comprise in the terminal iidentification of keeper's mobile terminal, fingerprint of administrator data and keeper's identity information any one or multiple.
In addition, for the mobile terminal from malicious trial solution preventing stranger from holding user is locked a door taboo, control system also comprises:
Fingerprint is matching treatment module 519 not, for when with determination module 503, finger print data deciphering judges that the finger print data after deciphering does not mate with preset finger print data, send the reminder message again inputting fingerprint to owner's mobile terminal or keeper's mobile terminal, and record finger print data and mate unsuccessful number of times.And, fingerprint not matching treatment module 519 mates unsuccessful number of times at finger print data and exceeds predetermined threshold value, or in the first preset time period, fail that the match is successful, then will not respond the connection request message of this mobile terminal in the second preset time period, and exceed predetermined threshold value to this mobile terminal transmission frequency of failure or exceed the reminder message of Preset Time match time.
Above-mentioned control system runs in gate inhibition, such as, operates in the primary controller of gate inhibition, realizes whether unlocking gate inhibition according to the Communication Control of mobile terminal.
Refer to Fig. 6, the figure shows the structured flowchart that the present invention is applied to an access control system embodiment of the mobile terminal of access control.As shown in Figure 6, for making to unlock gate inhibition by mobile terminal, the access control system that this embodiment is applied to mobile terminal includes master controller 6, also comprises:
Connection request message transmission module 601, for sending connection request message to the gate inhibition that will control, carries the terminal iidentification of mobile terminal in connection request message;
Fingerprint data collection and encryption processing module 602, for judging that the gate inhibition that will control this mobile terminal gathers finger print data as when owner's mobile terminal or keeper's mobile terminal, and to finger print data encryption;
Finger print data sending module 603, for being sent to the gate inhibition that will control by the finger print data after encryption;
Wherein, when the preset identifications that the gate inhibition that control prestores in the terminal iidentification judging to carry in connection request message and this gate inhibition matches, judge that this mobile terminal is as owner's mobile terminal or keeper's mobile terminal.
For the interim gate inhibition realizing visitor unlocks mandate, access control system also comprises:
Visitor's verification msg receiver module 604, for judging that the gate inhibition that will control this mobile terminal is as the visitor's verification msg receiving this gate inhibition transmission during visitor's mobile terminal;
Visitor's verification msg forwarding module 605, for being forwarded to owner's mobile terminal of the owner that will access by visitor's verification msg;
Visitor's authorization message generation module 606, for when receiving visitor's verification msg that visitor's mobile terminal forwards, generates visitor's authorization message according to owner's binding information and visitor's verification msg combined ciphering;
Visitor's authorization message sending module 607, for sending visitor's authorization message to the gate inhibition that will control and/or other mobile terminals;
Wherein, owner's binding information terminal iidentification of comprising owner's mobile terminal of the owner that will access and/or the finger print data of owner that will access; And
Visitor's authorization message receives and forwarding module 608, for receiving visitor's authorization message of other mobile terminals transmission and being forwarded to the gate inhibition that will control.
It should be noted that, although above-mentioned each module about visitor's authorisation process as access control system part and be applied in mobile terminal, in certain specific mobile terminal, some module work, some module does not work.At this Unify legislation, being the consistance in order to realize access control system, can being all arranged in mobile terminal, but according to the difference of mobile terminal style, enable different module work.Such as, if mobile terminal is visitor's mobile terminal, visitor's verification msg receiver module 604 then in it and visitor's verification msg forwarding module 605 work, its visitor's authorization message receives and forwarding module 608 can start and also can not start (depend on owner's mobile terminal that visitor's mobile terminal will access whether can with gate inhibition's Direct Communication); And visitor's authorization message generation module 606 and visitor's authorization message sending module 607 do not work.If but mobile terminal is owner's mobile terminal, then its built-in visitor's verification msg receiver module 604, visitor's authorization message generation module 606 and visitor's authorization message sending module 607 work, and its built-in visitor's verification msg forwarding module 605, visitor's authorization message receive and forwarding module 608 does not then work.
Further, access control system also comprises:
Reminder message receiver module, for receiving the message of gate inhibition's transmission that will control.Said message herein, including, but not limited to unlocking the reminder message of gate inhibition, the reminder message again inputting fingerprint, the frequency of failure exceed predetermined threshold value or exceed the reminder message of Preset Time match time.
In addition, for binding with gate inhibition, access control system also comprises:
Keeper's mobile terminal data sending module 610, for sending the terminal iidentification of keeper's mobile terminal, fingerprint of administrator data and keeper's identity information to the gate inhibition that will control;
Owner's mobile terminal data sending module 611, for sending terminal iidentification, owner's finger print data of owner's mobile terminal to the gate inhibition that will control.
For realizing the binding realizing owner's mobile terminal and gate inhibition under the control of keeper's mobile terminal, access control system also comprises:
Increasing bound device request sending module 612, increasing bound device request for sending to the gate inhibition that will control;
Binding validatation data reception module 613, for receiving the binding validatation data of gate inhibition's transmission that will control;
Binding validatation data forwarding module 614, for by binding validatation data retransmission to keeper's mobile terminal with management function;
Binding authorization message generation module 615, for when receiving the binding validatation data that other mobile terminals forward, generates binding authorization message according to keeper's binding information and the encryption of binding validatation data assemblies;
Binding authorization message sending module 616, for sending binding authorization message to the gate inhibition that will control and/or other mobile terminals; And
Binding authorization message receives and forwarding module 617, for receiving the binding authorization message of other mobile terminals transmission and being forwarded to the gate inhibition that will control.
Wherein, keeper's binding information comprise in the terminal iidentification of described keeper's mobile terminal, fingerprint of administrator data and keeper's identity information any one or multiple.
Same, although above-mentioned each module about binding as access control system part and be applied in mobile terminal, in certain specific mobile terminal, some module work, some module does not work.At this Unify legislation, being the consistance in order to realize access control system, can being all arranged in mobile terminal, but according to the difference of mobile terminal style, enable different module work.Such as, if mobile terminal is owner's mobile terminal, binding validatation data reception module 613 then in it and binding validatation data forwarding module 614 work, its binding authorization message receives and forwarding module 617 can start and also can not start (depend on keeper's mobile terminal whether can with gate inhibition's Direct Communication); And bind authorization message generation module 615 and binding authorization message sending module 616 does not work.If but mobile terminal is keeper's mobile terminal, then its built-in binding validatation data reception module 613, binding authorization message generation module 615 and binding authorization message sending module 616 work, and its built-in binding validatation data forwarding module 614, the reception of binding authorization message and forwarding module 617 then do not work.
Each module of above-mentioned access control system, under the coordination of master controller 6, operates in mobile terminal, realizes controlling whether unlock gate inhibition according to fingerprint.
Above embodiment only in order to technical scheme of the present invention to be described, but not is limited; Although with reference to previous embodiment to invention has been detailed description, for the person of ordinary skill of the art, still can modify to the technical scheme described in previous embodiment, or equivalent replacement is carried out to wherein portion of techniques feature; And these amendments or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of the present invention's technical scheme required for protection.

Claims (24)

1. an access control method, is characterized in that, described method comprises:
Obtain the connection request message of mobile terminal, judge whether the terminal iidentification carried in described connection request message mates with the preset identifications prestored;
If so, judge that described mobile terminal is as owner's mobile terminal or keeper's mobile terminal;
Judge the finger print data of this mobile terminal collection with prestore, whether mate corresponding to the preset finger print data of described preset identifications;
If so, then gate inhibition is unlocked.
2. access control method according to claim 1, is characterized in that, if the terminal iidentification carried in described connection request message does not mate with described preset identifications, then judges that described mobile terminal is as visitor's mobile terminal, and generates visitor's verification msg;
Store described visitor's verification msg, and described visitor's verification msg is sent to described visitor's mobile terminal;
Visitor's authorization message that the owner's mobile terminal receiving the owner that described visitor's mobile terminal and/or described visitor's mobile terminal will be accessed returns;
Judge whether preset owner's binding information and visitor's verification msg of described visitor's authorization message and storage mate;
If so, then gate inhibition is unlocked;
Wherein, described owner's binding information comprises the terminal iidentification of owner's mobile terminal and/or the finger print data of the described owner that will access of the described owner that will access.
3. access control method according to claim 2, it is characterized in that, if described owner's binding information and described visitor's verification msg are not mated with preset owner's binding information of storage and visitor's verification msg of storage, then gate inhibition will not be unlocked, delete visitor's verification msg of described storage, and send the reminder message that will not unlock to described visitor's mobile terminal.
4. access control method according to claim 1, is characterized in that, described judge the finger print data of this mobile terminal collection with prestore, whether to mate corresponding to the preset finger print data of described preset identifications after, also comprise:
Judge described finger print data whether with preset alarm fingerprint data match;
If so, warning message is sent to administrative center;
Wherein, described preset alarm fingerprint data refer to: the alarm fingerprint data obtaining described owner's mobile terminal in advance, by the data after the preset identifications corresponding stored of these alarm fingerprint data and this owner's mobile terminal.
5. access control method according to claim 1, is characterized in that, described method also comprises:
Obtain the terminal iidentification of described keeper's mobile terminal, fingerprint of administrator data and keeper's identity information, and corresponding stored is preset identifications, preset finger print data and preset identity information; And
Obtain the terminal iidentification of described owner's mobile terminal, owner's finger print data, and corresponding stored is preset identifications and preset finger print data.
6. access control method according to claim 5, is characterized in that, before the terminal iidentification of the described owner's mobile terminal of described acquisition, owner's finger print data, also comprises:
Obtain the increase bound device request that described owner's mobile terminal sends, stochastic generation and storage binding validatation data, and described binding validatation data are sent to described owner's mobile terminal;
Receive the binding authorization message that described owner's mobile terminal and/or described keeper's mobile terminal return; Described binding authorization message encrypts generation by described keeper's mobile terminal according to keeper's binding information and described binding validatation data assemblies;
Decipher described binding authorization message, and judge whether preset keeper's binding information of described keeper's binding information and described binding validatation data and storage and binding validatation data mate;
If so, terminal iidentification, owner's finger print information of described acquisition owner mobile terminal is then performed;
Wherein, described keeper's binding information comprise in the terminal iidentification of described keeper's mobile terminal, fingerprint of administrator data and keeper's identity information any one or multiple.
7. access control method according to claim 1, it is characterized in that, if judge the finger print data after described deciphering with prestore, mate unsuccessful corresponding to the preset finger print data of described preset identifications, then send the reminder message again inputting fingerprint to described owner's mobile terminal or described keeper's mobile terminal, and record finger print data and mate unsuccessful number of times.
8. access control method according to claim 7, is characterized in that,
If described finger print data mates unsuccessful number of times and exceeds predetermined threshold value, or in the first preset time period, fail that the match is successful, then will not respond the connection request message of this mobile terminal in the second preset time period, and exceed predetermined threshold value to this mobile terminal transmission frequency of failure or exceed the reminder message of Preset Time match time.
9. be applied to a gate inhibition's control system, it is characterized in that, described control system comprises:
Connection request message obtains and determination module, for obtaining the connection request message of mobile terminal, and judges whether the terminal iidentification carried in described connection request message mates with the preset identifications prestored;
Finger print data receiver module, when judging described mobile terminal as owner's mobile terminal or keeper's mobile terminal for obtaining in described connection request message with determination module, receives the finger print data that this mobile terminal gathers;
Finger print data determination module, for judge the finger print data that receives with prestore, whether mate corresponding to the preset finger print data of described preset identifications;
Unlock gate inhibition's module, for unlocking gate inhibition when with determination module, described finger print data deciphering judges that the finger print data after deciphering mates with described preset finger print data;
Wherein, if the terminal iidentification carried in described connection request message matches with the preset identifications prestored, described connection request message obtains and judges that described mobile terminal is as owner's mobile terminal or keeper's mobile terminal with determination module.
10. the control system being applied to gate inhibition according to claim 9, is characterized in that, described control system also comprises:
With determination module, visitor's verification msg generation module, judges that described mobile terminal generates visitor's verification msg as during visitor's mobile terminal for obtaining in described connection request message;
Visitor's verification msg stores and sending module, for storing described visitor's verification msg, and described visitor's verification msg is sent to described visitor's mobile terminal;
Visitor's authorization message receiver module, visitor's authorization message that the owner's mobile terminal for receiving the owner that described visitor's mobile terminal and/or described visitor's mobile terminal will be accessed returns;
Whether visitor's authorization message determination module, mate for the preset owner's binding information and visitor's verification msg judging visitor's authorization message and storage;
Described unblock gate inhibition module unlocks gate inhibition when preset owner's binding information of described visitor's authorization message and storage and visitor's verification msg match;
Wherein, if the terminal iidentification carried in described connection request message does not mate with described preset identifications, described connection request message obtains and judges that described mobile terminal is as visitor's mobile terminal with determination module.
11. control system being applied to gate inhibition according to claim 10, it is characterized in that, described control system also comprises:
Visitor is matching treatment module not, for when the deciphering of described visitor's authorization message judges described owner's binding information with determination module and described visitor's verification msg is not mated with preset owner's binding information of storage and visitor's verification msg of storage, gate inhibition will not be unlocked, delete visitor's verification msg of described storage, and send the reminder message that will not unlock to described visitor's mobile terminal.
12. control system being applied to gate inhibition according to claim 9, it is characterized in that, described control system also comprises:
Alarm fingerprint data judging and processing module, for after described finger print data determination module judges finger print data and described preset finger print data matches, judge described finger print data whether with preset alarm fingerprint data match, and send warning message when matching to administrative center.
13. control system being applied to gate inhibition according to claim 12, it is characterized in that, described control system also comprises:
Alarm fingerprint data acquisition module, for obtaining the alarm fingerprint data of described owner's mobile terminal, using described alarm fingerprint data as preset alarm fingerprint data, with the preset identifications corresponding stored of this owner's mobile terminal.
14. control system being applied to gate inhibition according to claim 9, it is characterized in that, described control system also comprises:
Keeper's mobile terminal data acquisition module, for obtaining the terminal iidentification of described keeper's mobile terminal, fingerprint of administrator data and keeper's identity information, and corresponding stored is preset identifications, preset finger print data and preset identity information;
Owner's mobile terminal data acquisition module, for obtaining terminal iidentification, owner's finger print data of described owner's mobile terminal, and corresponding stored is preset identifications and preset finger print data.
15. control system being applied to gate inhibition according to claim 14, it is characterized in that, described control system also comprises:
Increase bound device acquisition request module, for obtaining the increase bound device request that described owner's mobile terminal sends;
Binding validatation data generation module, for stochastic generation binding validatation data after described increase bound device acquisition request module gets the request of described increase bound device;
Binding validatation data store and sending module, for storing described binding validatation data, and described binding validatation data are sent to described owner's mobile terminal;
Binding authorization message receiver module, for receiving the binding authorization message that described owner's mobile terminal and/or described keeper's mobile terminal return;
The deciphering of binding authorization message and determination module, for deciphering described binding authorization message, and judge whether preset keeper's binding information of described keeper's binding information and described binding validatation data and storage and binding validatation data mate;
Described owner's mobile terminal data acquisition module deciphers the preset keeper's binding information and binding validatation data match judging described keeper's binding information and described binding validatation data and storage with determination module in described visitor's authorization message after, obtain the terminal iidentification of described owner's mobile terminal, owner's finger print data again, and corresponding stored is preset identifications and preset finger print data;
Wherein, described binding authorization message encrypts generation by described keeper's mobile terminal according to keeper's binding information and described binding validatation data assemblies; Described keeper's binding information comprise in the terminal iidentification of described keeper's mobile terminal, fingerprint of administrator data and keeper's identity information any one or multiple.
16. control system being applied to gate inhibition according to claim 9, it is characterized in that, described control system also comprises:
Fingerprint is matching treatment module not, for when with determination module, described finger print data deciphering judges that the finger print data after deciphering does not mate with described preset finger print data, send the reminder message again inputting fingerprint to described owner's mobile terminal or described keeper's mobile terminal, and record finger print data and mate unsuccessful number of times.
17. control system being applied to gate inhibition according to claim 16, it is characterized in that, described fingerprint not matching treatment module mates unsuccessful number of times at described finger print data and exceeds predetermined threshold value, or in the first preset time period, fail that the match is successful, then will not respond the connection request message of this mobile terminal in the second preset time period, and exceed predetermined threshold value to this mobile terminal transmission frequency of failure or exceed the reminder message of Preset Time match time.
18. 1 kinds of access control systems being applied to the mobile terminal of access control, it is characterized in that, described access control system comprises:
Connection request message transmission module, for sending connection request message to the gate inhibition that will control, carries the terminal iidentification of mobile terminal in described connection request message;
Fingerprint data collection module, for judging that the described gate inhibition that will control this mobile terminal gathers finger print data as when owner's mobile terminal or keeper's mobile terminal;
Finger print data sending module, for being sent to the described gate inhibition that will control by the finger print data of collection;
Wherein, when the preset identifications that the described gate inhibition that will control prestores in the terminal iidentification judging to carry in described connection request message and this gate inhibition matches, judge that this mobile terminal is as owner's mobile terminal or keeper's mobile terminal.
19. access control systems being applied to the mobile terminal of access control according to claim 18, it is characterized in that, described access control system also comprises:
Visitor's verification msg receiver module, for judging that the described gate inhibition that will control this mobile terminal is as the visitor's verification msg receiving this gate inhibition transmission during visitor's mobile terminal;
Visitor's verification msg forwarding module, for being forwarded to owner's mobile terminal of the owner that will access by described visitor's verification msg;
Visitor's authorization message generation module, for when receiving described visitor's verification msg that described visitor's mobile terminal forwards, generates visitor's authorization message according to owner's binding information and described visitor's verification msg combined ciphering;
Visitor's authorization message sending module, for sending described visitor's authorization message to the described gate inhibition that will control and/or other mobile terminals;
Wherein, described owner's binding information comprises the terminal iidentification of owner's mobile terminal and/or the finger print data of the described owner that will access of the described owner that will access.
20. access control systems being applied to the mobile terminal of access control according to claim 19, it is characterized in that, described access control system also comprises:
Visitor's authorization message receives and forwarding module, for receiving visitor's authorization message of other mobile terminals transmission and being forwarded to the described gate inhibition that will control.
21. access control systems being applied to the mobile terminal of access control according to claim 18, it is characterized in that, described access control system also comprises:
Reminder message receiver module, for receiving the message that the described gate inhibition that will control sends.
22. access control systems being applied to the mobile terminal of access control according to claim 18, it is characterized in that, described access control system also comprises:
Keeper's mobile terminal data sending module, for sending the terminal iidentification of keeper's mobile terminal, fingerprint of administrator data and keeper's identity information to the described gate inhibition that will control;
Owner's mobile terminal data sending module, for sending terminal iidentification, owner's finger print data of owner's mobile terminal to the described gate inhibition that will control.
23. access control systems being applied to the mobile terminal of access control according to claim 18, it is characterized in that, described access control system also comprises:
Increasing bound device request sending module, increasing bound device request for sending to the described gate inhibition that will control;
Binding validatation data reception module, for receiving the binding validatation data that the described gate inhibition that will control sends;
Binding validatation data forwarding module, for by described binding validatation data retransmission to keeper's mobile terminal with management function;
Binding authorization message generation module, for when receiving the described binding validatation data that other mobile terminals forward, generates binding authorization message according to keeper's binding information and the encryption of described binding validatation data assemblies;
Binding authorization message sending module, for sending described binding authorization message to the described gate inhibition that will control and/or other mobile terminals;
Wherein, described keeper's binding information comprise in the terminal iidentification of described keeper's mobile terminal, fingerprint of administrator data and keeper's identity information any one or multiple.
24. access control systems being applied to the mobile terminal of access control according to claim 23, it is characterized in that, described access control system also comprises:
Binding authorization message receives and forwarding module, for receiving the binding authorization message of other mobile terminals transmission and being forwarded to the described gate inhibition that will control.
CN201410434161.1A 2014-08-29 2014-08-29 Access control method and control system Active CN105447928B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410434161.1A CN105447928B (en) 2014-08-29 2014-08-29 Access control method and control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410434161.1A CN105447928B (en) 2014-08-29 2014-08-29 Access control method and control system

Publications (2)

Publication Number Publication Date
CN105447928A true CN105447928A (en) 2016-03-30
CN105447928B CN105447928B (en) 2018-10-09

Family

ID=55558059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410434161.1A Active CN105447928B (en) 2014-08-29 2014-08-29 Access control method and control system

Country Status (1)

Country Link
CN (1) CN105447928B (en)

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127888A (en) * 2016-06-14 2016-11-16 天津宅美智能科技有限公司 Smart lock operational approach and smart lock operating system
CN106327637A (en) * 2016-08-25 2017-01-11 青岛亿联信息科技股份有限公司 Bluetooth door opening system based on community management and method
CN106447834A (en) * 2016-07-05 2017-02-22 福建意昂机电股份公司 Access authentication control system based on mobile phone client
CN106468886A (en) * 2016-09-30 2017-03-01 海尔优家智能科技(北京)有限公司 A kind of method and apparatus of third-party control devices
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN106558131A (en) * 2016-11-25 2017-04-05 宇龙计算机通信科技(深圳)有限公司 A kind of entrance guard controlling method and system
CN106600757A (en) * 2016-07-22 2017-04-26 深圳市凯迪仕智能科技有限公司 Wireless lock control system based on intelligent terminal and method
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN106651676A (en) * 2016-11-25 2017-05-10 深圳市保臻社区服务科技有限公司 Community business management method and apparatus
WO2017101385A1 (en) * 2015-12-14 2017-06-22 乐视控股(北京)有限公司 Access control identification method, device, system and terminal
CN107134026A (en) * 2017-04-19 2017-09-05 上海斐讯数据通信技术有限公司 A kind of entrance guard controlling method and system
CN107403494A (en) * 2017-07-28 2017-11-28 邱诗妍 A kind of automobile remote-control system for unlocking
CN107424245A (en) * 2017-03-29 2017-12-01 上海斐讯数据通信技术有限公司 A kind of gate inhibition's verification method and system based on Double-puzzle
CN107464325A (en) * 2017-09-13 2017-12-12 南京信息职业技术学院 A kind of multi-layer gate control system and its implementation
WO2018040770A1 (en) * 2016-09-05 2018-03-08 捷开通讯(深圳)有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and nfc
CN108022349A (en) * 2017-12-22 2018-05-11 北京小米移动软件有限公司 Information input method, equipment, smart lock and storage medium
CN108074308A (en) * 2016-11-18 2018-05-25 上海新微技术研发中心有限公司 Intelligent door lock control method and system based on cloud processing
CN108091014A (en) * 2017-12-21 2018-05-29 广东汇泰龙科技有限公司 A kind of application method, the system of the voice assistant based on cloud lock APP
CN108257274A (en) * 2018-02-01 2018-07-06 杭州登虹科技有限公司 A kind of intelligent door lock and its communication means
CN108550208A (en) * 2018-04-09 2018-09-18 深圳市靓工创新应用科技有限公司 Method for managing user right, server and the readable medium of intelligent door lock
CN108561022A (en) * 2018-04-28 2018-09-21 东莞市腾达五金制品有限公司 A kind of lockset and its encryption method based on APP remote monitorings
CN108597077A (en) * 2018-04-12 2018-09-28 广东汇泰龙科技有限公司 A kind of method, system for opening smart lock using iPhone mobile phones
WO2019000421A1 (en) * 2017-06-30 2019-01-03 深圳市汇顶科技股份有限公司 Authentication method, authentication device and authentication system
CN109147105A (en) * 2018-06-29 2019-01-04 贵安新区搜床科技有限公司 A kind of control method for door lock, terminal device and computer readable storage medium
CN109410376A (en) * 2018-08-30 2019-03-01 深圳市慧点光电有限公司 Intelligent fingerprint key uses management method, system and computer readable storage medium
CN109544752A (en) * 2018-11-26 2019-03-29 Oppo广东移动通信有限公司 Control method, device, terminal and the storage medium of access control equipment
CN109727327A (en) * 2018-11-08 2019-05-07 深圳壹账通智能科技有限公司 A kind of punch card method based on Intelligent bracelet, system and equipment
CN109756532A (en) * 2017-11-02 2019-05-14 阿里巴巴集团控股有限公司 For the response processing method and device of external staff
CN109993863A (en) * 2019-02-20 2019-07-09 南通大学 A kind of access control system and its control method based on recognition of face
CN110070656A (en) * 2019-05-07 2019-07-30 中国电子信息产业集团有限公司第六研究所 Secrecy box and method for unlocking
CN110533802A (en) * 2019-07-17 2019-12-03 浙江大华技术股份有限公司 Access control equipment control method, device, equipment, system and storage medium
CN110838196A (en) * 2019-11-11 2020-02-25 珠海格力电器股份有限公司 Intelligent door lock control method, intelligent door lock control system and intelligent door lock
CN110853208A (en) * 2018-07-24 2020-02-28 佛山弘视智能信息科技有限公司 Reverse verification face access control method, forward recognition face access control method and device
CN110992561A (en) * 2019-11-25 2020-04-10 深圳市菲格特智能科技有限公司 Security verification method and access control system
CN112288914A (en) * 2020-10-30 2021-01-29 深圳坚朗海贝斯智能科技有限公司 Peripheral binding and authentication security management method based on intelligent lock
CN112907788A (en) * 2021-01-25 2021-06-04 珠海格力电器股份有限公司 Door lock control method and device, door lock and storage medium
CN113129489A (en) * 2019-12-31 2021-07-16 广东煜升科技股份有限公司 Standby checking method based on building talkback
CN113129482A (en) * 2019-12-31 2021-07-16 广州海英智慧家居科技有限公司 Fingerprint lock identification method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN202108335U (en) * 2011-04-29 2012-01-11 广东必达保安系统有限公司 Fingerprint password anti-theft lock
CN102915588A (en) * 2012-11-02 2013-02-06 深圳市普罗巴克科技股份有限公司 Bluetooth technology-based intelligent lock system and control method thereof
CN102936980A (en) * 2012-10-31 2013-02-20 北京小米科技有限责任公司 Method and device for controlling electronic lock
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN103136820A (en) * 2011-12-05 2013-06-05 上海博路信息技术有限公司 Remote access control system based on terminal fingerprint identification
CN103456055A (en) * 2012-05-29 2013-12-18 沈阳晨讯希姆通科技有限公司 Door control device, mobile terminal, electronic security system and method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN202108335U (en) * 2011-04-29 2012-01-11 广东必达保安系统有限公司 Fingerprint password anti-theft lock
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN103136820A (en) * 2011-12-05 2013-06-05 上海博路信息技术有限公司 Remote access control system based on terminal fingerprint identification
CN103456055A (en) * 2012-05-29 2013-12-18 沈阳晨讯希姆通科技有限公司 Door control device, mobile terminal, electronic security system and method thereof
CN102936980A (en) * 2012-10-31 2013-02-20 北京小米科技有限责任公司 Method and device for controlling electronic lock
CN102915588A (en) * 2012-11-02 2013-02-06 深圳市普罗巴克科技股份有限公司 Bluetooth technology-based intelligent lock system and control method thereof

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017101385A1 (en) * 2015-12-14 2017-06-22 乐视控股(北京)有限公司 Access control identification method, device, system and terminal
CN106127888A (en) * 2016-06-14 2016-11-16 天津宅美智能科技有限公司 Smart lock operational approach and smart lock operating system
CN106127888B (en) * 2016-06-14 2019-06-11 天津宅美智能科技有限公司 Intelligent lock operation method and smart lock operating system
CN106447834A (en) * 2016-07-05 2017-02-22 福建意昂机电股份公司 Access authentication control system based on mobile phone client
CN106600757A (en) * 2016-07-22 2017-04-26 深圳市凯迪仕智能科技有限公司 Wireless lock control system based on intelligent terminal and method
CN106327637A (en) * 2016-08-25 2017-01-11 青岛亿联信息科技股份有限公司 Bluetooth door opening system based on community management and method
WO2018040770A1 (en) * 2016-09-05 2018-03-08 捷开通讯(深圳)有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and nfc
CN106468886A (en) * 2016-09-30 2017-03-01 海尔优家智能科技(北京)有限公司 A kind of method and apparatus of third-party control devices
CN106504390A (en) * 2016-11-09 2017-03-15 北京小米移动软件有限公司 Control method for door lock, apparatus and system
CN108074308A (en) * 2016-11-18 2018-05-25 上海新微技术研发中心有限公司 Intelligent door lock control method and system based on cloud processing
CN106651676A (en) * 2016-11-25 2017-05-10 深圳市保臻社区服务科技有限公司 Community business management method and apparatus
CN106558131A (en) * 2016-11-25 2017-04-05 宇龙计算机通信科技(深圳)有限公司 A kind of entrance guard controlling method and system
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN107424245A (en) * 2017-03-29 2017-12-01 上海斐讯数据通信技术有限公司 A kind of gate inhibition's verification method and system based on Double-puzzle
WO2018176759A1 (en) * 2017-03-29 2018-10-04 上海斐讯数据通信技术有限公司 Dual password-based access control authentication method and system
CN107134026A (en) * 2017-04-19 2017-09-05 上海斐讯数据通信技术有限公司 A kind of entrance guard controlling method and system
CN109906452A (en) * 2017-06-30 2019-06-18 深圳市汇顶科技股份有限公司 Method for authenticating, authentication device and right discriminating system
WO2019000421A1 (en) * 2017-06-30 2019-01-03 深圳市汇顶科技股份有限公司 Authentication method, authentication device and authentication system
CN107403494A (en) * 2017-07-28 2017-11-28 邱诗妍 A kind of automobile remote-control system for unlocking
CN107464325A (en) * 2017-09-13 2017-12-12 南京信息职业技术学院 A kind of multi-layer gate control system and its implementation
CN109756532A (en) * 2017-11-02 2019-05-14 阿里巴巴集团控股有限公司 For the response processing method and device of external staff
CN108091014A (en) * 2017-12-21 2018-05-29 广东汇泰龙科技有限公司 A kind of application method, the system of the voice assistant based on cloud lock APP
CN108022349A (en) * 2017-12-22 2018-05-11 北京小米移动软件有限公司 Information input method, equipment, smart lock and storage medium
CN108257274A (en) * 2018-02-01 2018-07-06 杭州登虹科技有限公司 A kind of intelligent door lock and its communication means
CN108550208A (en) * 2018-04-09 2018-09-18 深圳市靓工创新应用科技有限公司 Method for managing user right, server and the readable medium of intelligent door lock
CN108550208B (en) * 2018-04-09 2021-04-23 深圳市靓工创新应用科技有限公司 User authority management method of intelligent door lock, server and readable medium
CN108597077A (en) * 2018-04-12 2018-09-28 广东汇泰龙科技有限公司 A kind of method, system for opening smart lock using iPhone mobile phones
CN108561022A (en) * 2018-04-28 2018-09-21 东莞市腾达五金制品有限公司 A kind of lockset and its encryption method based on APP remote monitorings
CN109147105A (en) * 2018-06-29 2019-01-04 贵安新区搜床科技有限公司 A kind of control method for door lock, terminal device and computer readable storage medium
CN110853208A (en) * 2018-07-24 2020-02-28 佛山弘视智能信息科技有限公司 Reverse verification face access control method, forward recognition face access control method and device
CN109410376A (en) * 2018-08-30 2019-03-01 深圳市慧点光电有限公司 Intelligent fingerprint key uses management method, system and computer readable storage medium
CN109727327A (en) * 2018-11-08 2019-05-07 深圳壹账通智能科技有限公司 A kind of punch card method based on Intelligent bracelet, system and equipment
CN109544752A (en) * 2018-11-26 2019-03-29 Oppo广东移动通信有限公司 Control method, device, terminal and the storage medium of access control equipment
CN109993863A (en) * 2019-02-20 2019-07-09 南通大学 A kind of access control system and its control method based on recognition of face
CN110070656B (en) * 2019-05-07 2021-04-06 中国电子信息产业集团有限公司第六研究所 Security box and unlocking method
CN110070656A (en) * 2019-05-07 2019-07-30 中国电子信息产业集团有限公司第六研究所 Secrecy box and method for unlocking
CN110533802A (en) * 2019-07-17 2019-12-03 浙江大华技术股份有限公司 Access control equipment control method, device, equipment, system and storage medium
CN110838196A (en) * 2019-11-11 2020-02-25 珠海格力电器股份有限公司 Intelligent door lock control method, intelligent door lock control system and intelligent door lock
CN110992561A (en) * 2019-11-25 2020-04-10 深圳市菲格特智能科技有限公司 Security verification method and access control system
CN110992561B (en) * 2019-11-25 2020-08-07 深圳市菲格特智能科技有限公司 Security verification method and access control system
CN113129489A (en) * 2019-12-31 2021-07-16 广东煜升科技股份有限公司 Standby checking method based on building talkback
CN113129482A (en) * 2019-12-31 2021-07-16 广州海英智慧家居科技有限公司 Fingerprint lock identification method
CN112288914A (en) * 2020-10-30 2021-01-29 深圳坚朗海贝斯智能科技有限公司 Peripheral binding and authentication security management method based on intelligent lock
CN112288914B (en) * 2020-10-30 2022-06-21 深圳坚朗海贝斯智能科技有限公司 Peripheral binding and authentication security management method based on intelligent lock
CN112907788A (en) * 2021-01-25 2021-06-04 珠海格力电器股份有限公司 Door lock control method and device, door lock and storage medium
WO2022156315A1 (en) * 2021-01-25 2022-07-28 珠海格力电器股份有限公司 Door lock control method and apparatus, door lock, and storage medium

Also Published As

Publication number Publication date
CN105447928B (en) 2018-10-09

Similar Documents

Publication Publication Date Title
CN105447928A (en) Entrance guard control method and control system thereof
JP6908451B2 (en) Car sharing system and car sharing method
CN108111998B (en) Wireless unlocking method and system
US10187793B2 (en) Method for pairing a mobile telephone with a motor vehicle and locking/unlocking set
CN109088849B (en) Method and device for authenticating a user on a vehicle
JP2011511350A (en) Access control management method and apparatus
US20190385392A1 (en) Digital door lock having unique master key and method of operating the digital door
WO2011147204A1 (en) Entrance guard control method and system thereof
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN102150446A (en) Authentication in a communication network
CN107516364A (en) Method for unlocking, bluetooth lock and the unlocking terminal of bluetooth lock
WO2006079282A1 (en) A method for setting the key and setting the initial security key in the mobile terminal
CN105635089B (en) Authentication method, unlocking method and unlocking system of dynamic coded lock
WO2014036453A1 (en) One-way key fob and vehicle pairing verification, retention, and revocation
CN102892102A (en) Method, system and device for binding mobile terminal and smart card in mobile network
CN110738764A (en) Security control system and method based on intelligent lock
CN107888376B (en) NFC authentication system based on quantum communication network
CN209070615U (en) Electronics unlocking system
CN114255533B (en) Intelligent lock system and implementation method thereof
CN111161454A (en) Intelligent lock safety networking and control method
CN109493497A (en) Electronics unlocking system
WO2014187848A1 (en) Portable authentication tool and method
CN112767576B (en) Lockset authorization management method and lockset authorization management system
US11003744B2 (en) Method and system for securing bank account access
JP2009293317A (en) Authentication device, mobile terminal, electric key system and authentication control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant