CN106097500B - A kind of method and system for responding user and entering - Google Patents

A kind of method and system for responding user and entering Download PDF

Info

Publication number
CN106097500B
CN106097500B CN201610406694.8A CN201610406694A CN106097500B CN 106097500 B CN106097500 B CN 106097500B CN 201610406694 A CN201610406694 A CN 201610406694A CN 106097500 B CN106097500 B CN 106097500B
Authority
CN
China
Prior art keywords
password
user
log
entrance guard
intelligent entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610406694.8A
Other languages
Chinese (zh)
Other versions
CN106097500A (en
Inventor
熊益冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi beluga Information Technology Co.,Ltd.
Original Assignee
WINSTRONG TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WINSTRONG TECHNOLOGY Co Ltd filed Critical WINSTRONG TECHNOLOGY Co Ltd
Priority to CN201610406694.8A priority Critical patent/CN106097500B/en
Publication of CN106097500A publication Critical patent/CN106097500A/en
Application granted granted Critical
Publication of CN106097500B publication Critical patent/CN106097500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

The embodiment of the invention discloses it is a kind of respond user enter method, including:Intelligent entrance guard receives the registration request of user, and the registration request is sent to remote monitoring server;After registration request is received, the intelligent entrance guard prompting user inputs the first log-in password and the second log-in password, and the second log-in password includes the vibration password that intelligent entrance guard number is tapped in preset time;If user does not carry access card, the intelligent entrance guard receives the first log-in password and the second log-in password input by user, user is allowed to enter after being verified.The embodiment of the invention also discloses a kind of systems.Using the present invention, safety and the convenience of intelligent entrance guard can be improved, opening gate when facilitating the user not carry access card.

Description

A kind of method and system for responding user and entering
Technical field
The present invention relates to more particularly to it is a kind of respond user enter method and system.
Background technology
Internet of Things is the important component of generation information technology and the important development stage in " informationization " epoch. Its English name is:“Internet of things(IoT)”.As its name suggests, Internet of Things is exactly the internet that object object is connected.This There is two layers of meaning:First, the core of Internet of Things and basis are still internet, it is extension and extension on Internet basic Network;Second, its user terminal extends and extends between any article and article, information exchange and communication are carried out, that is, Object object mutually ceases.Internet of Things is widely used in network by the cognition technology that communicates such as Intellisense, identification technology and general fit calculation In fusion, also therefore it is referred to as the third wave that world information industry develops after computer, internet.Internet of Things is mutual The application extension of networking, rather than Internet of Things is network, Internet of Things is business and application.Therefore, application innovation is object The core of networking development, the innovation 2.0 using user experience as core are the souls of Internet of Things development.
Using communication technologys such as localized network or internets sensor, controller, machine, personnel and object etc. by new Mode is linked togather, and is formed people and is connected with object, object and object, realizes information-based, remote management and control and intelligentized network.Internet of Things Net is the extension of internet, it includes resource all on internet and internet, all applications in compatible internet, but Internet of Things All elements (all equipment, resource and communication etc.) are all personalized and privatizations in net.
Internet of Things is widely used, throughout intelligent transportation, environmental protection, government work, public safety, safety home, intelligence It is fire-fighting, industry monitoring, environmental monitoring, street lighting management and control, Landscape Lighting management and control, building lighting management and control, plaza lighting management and control, old The multiple fields such as people's nursing, personal health, flower culture, water system monitoring, foodstuff traceability, enemy's situation investigation and information gathering.Wherein, In terms of intelligent entrance guard, only allow the personnel for having permission that could enter, be to ensure the neighbours living person and property safety One of effective measures.Currently used intelligent access control system, all there are one access card, owner passes through at gate inhibition each owner The POS on scan can opening gate.But sometimes resident family may leave behind or lose access card, this When, need a kind of method of safe and reliable opening gate.
Invention content
Technical problem to be solved of the embodiment of the present invention is, provides a kind of method and system for responding user and entering. It can not opening gate during solving the problems, such as that user does not carry access card.
In order to solve the above-mentioned technical problem, first aspect of the embodiment of the present invention provides a kind of side for responding user and entering Method, including:
Intelligent entrance guard receives the registration request of user, and the registration request is sent to remote monitoring server;
Remote monitoring server display monitoring picture, prompts administrator to handle the registration request, and the monitored picture is used Prove user facial image and/or user identity certificate image of the user for resident family so that the administrator confirms user in acquisition Identity;
When the administrator selects to handle the registration request, the administrator is prompted to input administrator password and is managed Member's authentication, administrator's authentication by allowing the administrator to accept or reject the registration request later;
After registration request is received, the intelligent entrance guard prompting user inputs the first log-in password, first note Volume password includes numerical ciphers, biometrics password or gesture password;
After the intelligent entrance guard has collected the first log-in password, prompting user's the second log-in password of input, described second Log-in password includes the vibration password that intelligent entrance guard number is tapped in preset time;
If user does not carry access card, the intelligent entrance guard receives the first log-in password input by user and is verified;
After first log-in password is verified, the intelligent entrance guard prompting user inputs the second log-in password;
After second log-in password is verified, user is allowed to enter.
Second aspect of the embodiment of the present invention provides a kind of system, including:
The registration request for receiving the registration request of user, and is sent to remote monitoring server by intelligent entrance guard, The monitored picture proves user facial image and/or user identity certificate image of the user for resident family so as to described for acquiring Administrator confirms user identity;
The remote monitoring server for display monitoring picture, prompts administrator to handle the registration request;When described When administrator selects to handle the registration request, the administrator is prompted to input the administrator password person's of being managed authentication, pipe Reason person's authentication by allowing the administrator to accept or reject the registration request later;
After registration request is received, the intelligent entrance guard is additionally operable to prompting user and inputs the first log-in password, described First log-in password includes numerical ciphers, biometrics password or gesture password;After having collected the first log-in password, prompt user defeated Enter the second log-in password, second log-in password includes the vibration password that intelligent entrance guard number is tapped in preset time;If with Family does not carry access card, receives the first log-in password input by user and is verified;When first log-in password verification is logical After crossing, the intelligent entrance guard prompting user inputs the second log-in password;After second log-in password is verified, permit Family allowable enters.
Implement the embodiment of the present invention, have the advantages that:
By the way that intelligent entrance guard and remote monitoring server connected and composed intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after user identity is confirmed, it is ensured that the correctness of user identity;Then typing first is registered Password and the second log-in password;User can by way of verifying password opening gate, it is close due to adding the second registration Code, therefore relative to the mode of single password, safety higher, and the input mode of the second log-in password to tap, crypticity Stronger with interest, user's input is extremely convenient, conducive to user experience is promoted.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram for responding the method that user enters of the embodiment of the present invention;
Fig. 2 is a kind of composition schematic diagram of system of the embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is please referred to, is a kind of flow diagram for responding the method that user enters of the embodiment of the present invention, in the present embodiment In, it the described method comprises the following steps:
S101, intelligent entrance guard receive the registration request of user, and the registration request is sent to remote monitoring server.
S102, remote monitoring server display monitoring picture prompt administrator to handle the registration request.
Wherein, the monitored picture proves that user demonstrate,proves for the user's facial image and/or user identity of resident family for acquiring Part image confirms user identity so as to the administrator.Administrator can carry out user identity by monitored picture artificial true Recognize, the content of monitored picture can also be provided with the resident family that resident family preserves on remote monitoring server by remote monitoring server Material such as photo, identity document information carry out Auto-matching to confirm user identity.
S103, when the administrator selects to handle the registration request, prompt the administrator input administrator password into Row administrator's authentication, administrator's authentication by allowing the administrator to accept or reject the registration request later.
Wherein, administrator needs that the registration request of user could be handled after carrying out authentication, can be to avoid juridical-person The member's arbitrarily normal registration of refusal resident family or owner request, can also avoid unauthorized person from arbitrarily agreeing to non-resident or non-owner Illegal registration request, it is ensured that the safety and interests of resident family.
S104, after registration request is received, the intelligent entrance guard prompting user inputs the first log-in password.
Optionally, the biometrics password includes finger-print cipher, iris password or speech cipher.
S105 after the intelligent entrance guard has collected the first log-in password, prompts user to input the second log-in password, described Second log-in password includes the vibration password that intelligent entrance guard number is tapped in preset time.
Single numerical ciphers or biometrics password or gesture password safety are relatively low, and existing intelligent entrance guard uses above-mentioned list One password is very easy to be obtained by unauthorized person there is a situation where password, and the property safety of normal resident family is difficult to preferably be protected Therefore shield, in the present embodiment, introduces the second log-in password to improve the safety of password.And second log-in password be pre- If tapping the vibration password of intelligent entrance guard number in the time, for example, it is inferior that 3 are tapped in 5 seconds.Intelligent entrance guard be will hit against as Two log-in passwords simulate the traditional approach of conventional entrance of knocking at the door, and increase the interest of password authentification;And tap must be Just has availability, therefore when the first log-in password is not verified after the verification of first log-in password, without processing detection The percussion arrived, can be to avoid going processing user misoperation or unconscious operation.Although there is provided two passwords, user's input It is very convenient simple, intelligent entrance guard need to be only tapped after the first log-in password of typing such as voice, gesture, number or fingerprint etc. , relatively single password both improved the safety of intelligent entrance guard, and in turn avoided the trouble that Complicated Flow is brought, user Usage experience is preferable.
S106, if user does not carry access card, the intelligent entrance guard receives the first log-in password input by user and carries out Verification.
Certainly, even if user carries access card, opening gate can also be carried out using the mode described in the present embodiment.Example Such as, user carry relatively more things cause it is inconvenient from pocket dig out access card when, the first registration that voice may be used is close Then code taps intelligent entrance guard with wrist, elbow or other positions.
S107, after first log-in password is verified, the second registration of the intelligent entrance guard prompting user input Password.
It should be noted that in the present embodiment, the first log-in password can prompt user to input the second note after being verified Volume password, for non-neighbours living, it may be difficult to expect inputting the mode of the second log-in password to tap intelligent entrance guard, because This, safety and concealment are higher.In addition, the first log-in password can not also prompt user's input the second registration after being verified Password, only prompts the first log-in password of user to be verified, input in the preset time after by user second register it is close Code, so as to further promote the concealment of the second log-in password.
S108 after second log-in password is verified, allows user to enter.
In the present embodiment, by the way that intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user It is registered after user identity is confirmed by intelligent entrance guard and remote monitoring server, it is ensured that the correctness of user identity;So The first log-in password of typing and the second log-in password afterwards;User can by way of verifying password opening gate, due to adding The second log-in password is entered, therefore relative to the mode of single password, safety higher, and the input mode of the second log-in password To tap, crypticity and interest are stronger, and user's input is extremely convenient, conducive to user experience is promoted.
In view of the second log-in password is taps, illegal user from malicious is attempted in order to prevent, 3 input failures can be set Afterwards, the request of the temporarily refusal processing user.If the user is really neighbours living, can be by contacting remote monitoring service The administrator at device end passes through remote opening gate inhibition after monitored picture confirmation identity.
Optionally, other than intelligent entrance guard locally preserves the first log-in password and the second log-in password is verified, also It can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow, Safety can be further promoted, especially when intelligent entrance guard failure can not be verified, is carried out by remote monitoring server Verification, can further lifting system work stability.
When remote monitoring server is used to be verified, the first log-in password and second can be registered by intelligent entrance guard Password is sent directly to remote monitoring server and is preserved.Certainly, in order to further enhance the safety of the second log-in password And concealment, the second log-in password can also be carried out to retransmit to remote monitoring server after appropriate processing.Specific stream Journey is described as follows:
The intelligent entrance guard is multiplied by 2 to the number of taps in second log-in password according to preset rules, wherein, it is described Preset rules are sent to the intelligent entrance guard with logical by the remote monitoring server after the registration request of user is received Know user;
First log-in password and the second log-in password being multiplied by after 2 are sent to the remote monitoring server to protect It deposits;
If intelligent entrance guard damage can not carry out password authentification, prompt user select the remote monitoring server into Row password authentification;
Certainly, it may be otherwise and do not prompt, remote monitoring server verification is selected by user oneself.
The intelligent entrance guard receives remote monitoring server checking request input by user, will first log-in password with It is multiplied by the second log-in password after 2 and is sent to the remote monitoring server;
The remote monitoring server by rear, controls the intelligent entrance guard to open in password authentification.
By the above-mentioned means, handled the second log-in password, in this way, when gate inhibition is normal, user's registration and just It only needs to tap the number in the second log-in password when often using, when intelligent entrance guard damage is verified by remote monitoring server When, the second log-in password is changed, and this variation can further promote the safety of intelligent entrance guard.
Optionally, when intelligent entrance guard damages or needs to carry out system update, when needing replacing intelligent entrance guard, the intelligent door Prohibit and first log-in password and second log-in password are sent to the remote monitoring server preservation;
When the intelligent entrance guard is replaced, the code data of preservation is sent to replacement by the remote monitoring server Intelligent entrance guard afterwards.
So that it is guaranteed that the integrality of user data and safety before and after replacing.
Since present cell the elderly is more and more, the first log-in password can be biometrics password, forget without having to worry about user Note, but the second log-in password it is easy to forget that.Following flow can be used at this time and carry out opening gate.
If user forgets second log-in password, the intelligent entrance guard verifies the first log-in password input by user After success, the call request of user is received;
The call request is sent to the remote monitoring server or by the call request with short message or electricity The mode of words is sent to the mobile phone of the administrator;
After the administrator confirms user identity by monitored picture, remote monitoring server receives the administrator Remote control open command, open the intelligent entrance guard.
Fig. 2 is please referred to, is a kind of composition schematic diagram of system of the embodiment of the present invention, in the present embodiment, the system packet It includes:Remote monitoring server 200 and at least one intelligent entrance guard 100.Intelligent entrance guard 100 includes being used for as remote monitoring server 200 provide monitored pictures camera, for input numerical ciphers button or touch screen (touch screen can also be used for input gesture Password), for input the biometrics password of biometrics password identification module enter fingerprint recognition module, iris recognition module or speech recognition Module, the authentication module for the sensor for sensing vibrations and for verifying password.Remote monitoring server 200 includes aobvious Show device and the server for storing data.
Specifically, intelligent entrance guard 100 for receiving the registration request of user, and the registration request are sent to remotely Monitoring server;
The remote monitoring server 200 for display monitoring picture, prompts administrator to handle the registration request, institute State monitored picture for acquire prove user be resident family user's facial image and/or user identity certificate image so as to the pipe Reason person confirms user identity;When the administrator selects to handle the registration request, the administrator is prompted to input management close The code person's of being managed authentication, administrator's authentication please by the way that the administrator is allowed to accept or reject the registration later It asks;
After registration request is received, the intelligent entrance guard 100 is additionally operable to prompting user and inputs the first log-in password, institute It states the first log-in password and includes numerical ciphers, biometrics password or gesture password;After having collected the first log-in password, user is prompted The second log-in password is inputted, second log-in password includes the vibration password that intelligent entrance guard number is tapped in preset time;If User does not carry access card, receives the first log-in password input by user and is verified;When first log-in password is verified By the way that later, the intelligent entrance guard 100 prompts user to input the second log-in password;When second log-in password is verified it Afterwards, user is allowed to enter.
Optionally, the intelligent entrance guard 100 is additionally operable to:
2 are multiplied by according to preset rules to the number of taps in second log-in password, wherein, the preset rules are by institute It states remote monitoring server 200 and is sent to the intelligent entrance guard 100 after the registration request of user is received to notify user; First log-in password and the second log-in password being multiplied by after 2 are sent to the remote monitoring server 200 and preserved;If The intelligent door 100, which prohibits damage, can not carry out password authentification, then prompts user that the remote monitoring server 200 is selected to carry out close Code verification;Receive remote monitoring server checking request input by user, by first log-in password and be multiplied by after 2 the Two log-in passwords are sent to the remote monitoring server 200;
The remote monitoring server 200 is additionally operable to the intelligent entrance guard be controlled by rear to open in password authentification.
Optionally, the intelligent entrance guard 100 is additionally operable to:
First log-in password and second log-in password are sent to the remote monitoring server 200 to preserve;
The remote monitoring server 200 is additionally operable to:
When the intelligent entrance guard 100 is replaced, the remote monitoring server 200 sends the code data of preservation Intelligent entrance guard after to replacement.
Optionally, if user forgets second log-in password, the intelligent entrance guard 100 is additionally operable to input by user After first log-in password is proved to be successful, the call request of user is received;The call request is sent to the remote monitoring Server 200 or the mobile phone that the call request is sent to the administrator in a manner of short message or phone;
After the administrator confirms user identity by monitored picture, the remote monitoring server 200 is additionally operable to The remote control open command of the administrator is received, opens the intelligent entrance guard.
Wherein, the biometrics password includes finger-print cipher, iris password or speech cipher.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation is all difference with other embodiments, and just to refer each other for identical similar part between each embodiment. For device embodiment, since it is basicly similar to embodiment of the method, so description is fairly simple, related part referring to The part explanation of embodiment of the method.
By the description of above-described embodiment, the present invention has the following advantages:
By the way that intelligent entrance guard and remote monitoring server connected and composed intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after user identity is confirmed, it is ensured that the correctness of user identity;Then typing first is registered Password and the second log-in password;User can by way of verifying password opening gate, it is close due to adding the second registration Code, therefore relative to the mode of single password, safety higher, and the input mode of the second log-in password to tap, crypticity Stronger with interest, user's input is extremely convenient, conducive to user experience is promoted.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer read/write memory medium In, the program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, abbreviation ROM) or random access memory (Random Access Memory, abbreviation RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent variations made according to the claims of the present invention, is still within the scope of the present invention.

Claims (8)

  1. A kind of 1. method for responding user and entering, which is characterized in that including:
    Intelligent entrance guard receives the registration request of user, and the registration request is sent to remote monitoring server;
    Remote monitoring server display monitoring picture, prompts administrator to handle the registration request, and the monitored picture is used to adopt Integrating proves user's facial image and/or the user identity certificate image that user is resident family so as to administrator confirmation user's body Part;
    When the administrator selects to handle the registration request, the administrator is prompted to input the administrator password person's of being managed body Part verification, administrator's authentication by allowing the administrator to accept or reject the registration request later;
    After registration request is received, the intelligent entrance guard prompting user inputs the first log-in password, and first registration is close Code includes numerical ciphers, biometrics password or gesture password;
    After the intelligent entrance guard has collected the first log-in password, user is prompted to input the second log-in password, second registration Password includes the vibration password that intelligent entrance guard number is tapped in preset time;
    If user does not carry access card, the intelligent entrance guard receives the first log-in password input by user and is verified;
    After first log-in password is verified, the intelligent entrance guard prompting user inputs the second log-in password;
    After second log-in password is verified, user is allowed to enter;
    The intelligent entrance guard is multiplied by 2 to the number of taps in second log-in password according to preset rules, wherein, it is described default Rule is sent to the intelligent entrance guard to notify to use by the remote monitoring server after the registration request of user is received Family;
    First log-in password and the second log-in password being multiplied by after 2 are sent to the remote monitoring server to preserve;
    If the intelligent entrance guard damage can not carry out password authentification, prompt user that the remote monitoring server is selected to carry out close Code verification;
    The intelligent entrance guard receives remote monitoring server checking request input by user, by first log-in password and is multiplied by The second log-in password after 2 is sent to the remote monitoring server;
    The remote monitoring server by rear, controls the intelligent entrance guard to open in password authentification.
  2. 2. the method as described in claim 1, which is characterized in that further include:
    First log-in password and second log-in password are sent to the remote monitoring server by the intelligent entrance guard It preserves;
    When the intelligent entrance guard is replaced, after the code data of preservation is sent to replacement by the remote monitoring server Intelligent entrance guard.
  3. 3. the method as described in claim 1, which is characterized in that if user forgets second log-in password, the intelligence After gate inhibition is proved to be successful the first log-in password input by user, the call request of user is received;
    The call request is sent to the remote monitoring server or by the call request with short message or phone Mode is sent to the mobile phone of the administrator;
    After the administrator confirms user identity by monitored picture, remote monitoring server receives the distant of the administrator Open command is controlled, opens the intelligent entrance guard.
  4. 4. such as claim 1-3 any one of them methods, which is characterized in that the biometrics password includes finger-print cipher, iris Password or speech cipher.
  5. 5. a kind of system for responding user and entering, which is characterized in that including:
    The registration request for receiving the registration request of user, and is sent to remote monitoring server by intelligent entrance guard;
    The remote monitoring server for display monitoring picture, prompts administrator to handle the registration request, the monitoring picture Face proves user facial image and/or user identity certificate image of the user for resident family so that the administrator confirms for acquiring User identity;When the administrator selects to handle the registration request, the administrator is prompted to input administrator password and carries out pipe Reason person's authentication, administrator's authentication by allowing the administrator to accept or reject the registration request later;
    When registration request by receive after, the intelligent entrance guard be additionally operable to prompting user input the first log-in password, described first Log-in password includes numerical ciphers, biometrics password or gesture password;After having collected the first log-in password, user's input the is prompted Two log-in passwords, second log-in password include the vibration password that intelligent entrance guard number is tapped in preset time;If user is not Access card is carried, receive the first log-in password input by user and is verified;When first log-in password is verified it Afterwards, the intelligent entrance guard prompting user inputs the second log-in password;After second log-in password is verified, allow to use Family enters;
    The intelligent entrance guard is additionally operable to:
    2 are multiplied by according to preset rules to the number of taps in second log-in password, wherein, the preset rules are by described remote Range monitoring server is sent to the intelligent entrance guard to notify user after the registration request of user is received;By described first Log-in password and the second log-in password being multiplied by after 2 are sent to the remote monitoring server and preserve;If the intelligent entrance guard Damage can not carry out password authentification, then prompt user that the remote monitoring server is selected to carry out password authentification;It is defeated to receive user First log-in password and the second log-in password being multiplied by after 2 are sent to by the remote monitoring server checking request entered The remote monitoring server;
    The remote monitoring server is additionally operable to the intelligent entrance guard be controlled by rear to open in password authentification.
  6. 6. system as claimed in claim 5, which is characterized in that the intelligent entrance guard is additionally operable to:
    First log-in password and second log-in password are sent to the remote monitoring server to preserve;
    The remote monitoring server is additionally operable to:
    When the intelligent entrance guard is replaced, after the code data of preservation is sent to replacement by the remote monitoring server Intelligent entrance guard.
  7. 7. system as claimed in claim 5, which is characterized in that if user forgets second log-in password, the intelligence Gate inhibition is additionally operable to after being proved to be successful to the first log-in password input by user, receives the call request of user;By the calling Request is sent to the remote monitoring server or is sent in a manner of short message or phone the call request described The mobile phone of administrator;
    After the administrator confirms user identity by monitored picture, the remote monitoring server is additionally operable to described in reception The remote control open command of administrator, opens the intelligent entrance guard.
  8. 8. such as claim 5-7 any one of them systems, which is characterized in that the biometrics password includes finger-print cipher, iris Password or speech cipher.
CN201610406694.8A 2016-06-12 2016-06-12 A kind of method and system for responding user and entering Active CN106097500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610406694.8A CN106097500B (en) 2016-06-12 2016-06-12 A kind of method and system for responding user and entering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610406694.8A CN106097500B (en) 2016-06-12 2016-06-12 A kind of method and system for responding user and entering

Publications (2)

Publication Number Publication Date
CN106097500A CN106097500A (en) 2016-11-09
CN106097500B true CN106097500B (en) 2018-07-06

Family

ID=57228577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610406694.8A Active CN106097500B (en) 2016-06-12 2016-06-12 A kind of method and system for responding user and entering

Country Status (1)

Country Link
CN (1) CN106097500B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018006325A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entrance
WO2018006349A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entry based on picture password
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN106991749A (en) * 2017-05-27 2017-07-28 刘洪文 Being used for based on biological characteristic shares unlocking and the payment system of equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1326381A2 (en) * 2001-12-27 2003-07-09 Brother Kogyo Kabushiki Kaisha Network and terminal devices
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features
CN102542908A (en) * 2012-02-27 2012-07-04 深圳市赛格导航科技股份有限公司 Password verification method and device based on vibration
CN105072611A (en) * 2015-07-08 2015-11-18 广东欧珀移动通信有限公司 Verification method and terminal
CN105225304A (en) * 2014-05-30 2016-01-06 由田新技股份有限公司 Access control device and registration system and method thereof
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1326381A2 (en) * 2001-12-27 2003-07-09 Brother Kogyo Kabushiki Kaisha Network and terminal devices
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features
CN102542908A (en) * 2012-02-27 2012-07-04 深圳市赛格导航科技股份有限公司 Password verification method and device based on vibration
CN105225304A (en) * 2014-05-30 2016-01-06 由田新技股份有限公司 Access control device and registration system and method thereof
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system
CN105072611A (en) * 2015-07-08 2015-11-18 广东欧珀移动通信有限公司 Verification method and terminal

Also Published As

Publication number Publication date
CN106097500A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
CN105847451B (en) A kind of method and system controlling intelligent entrance guard using mobile terminal
CN105869255B (en) A kind of intelligent entrance guard control method and system based on mobile terminal
US11133929B1 (en) System and method of biobehavioral derived credentials identification
CN105847303A (en) Verification method and system of intelligent access control unit
CN103907328B (en) A kind of user authen method of site resource
CN106097500B (en) A kind of method and system for responding user and entering
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
CN209265530U (en) A kind of community visitor intelligence register system
CN109741498A (en) A method of intelligence registration community visitor
CN105872104A (en) Method and system for managing intelligent entrance guard by combining mobile terminal
CN105530356B (en) Communication terminal and its data guard method and device
US20220116227A1 (en) Chain of authentication using public key infrastructure
US10789386B2 (en) Dispatching identity information from secure hardware appliance
JP2009003805A (en) Validity authentication system and validity authentication method
US11367323B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
CN105893823A (en) Security protection method and device, and intelligent terminal
CN106231092A (en) A kind of phone information security protection method
CN105913513A (en) Control method and system for door lock system
CN106650361A (en) Unblocking method and device
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
CN106127005A (en) The user management method of a kind of mobile terminal and system
CN105703909A (en) Authentication method and electronic equipment
CN106295423A (en) A kind of method for exhibiting data and client
Yohan et al. Dynamic multi-factor authentication for smartphone
CN106127006A (en) The user management method of a kind of mobile terminal and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200827

Address after: 430000 705, 706a, building 1, Huigu spacetime, No.206, laowuhuang highway, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee after: Wuhan Tuozhijia Information Technology Co.,Ltd.

Address before: 518000, Guangdong, Shenzhen province Baoan District source road Internet industry base A District 7613

Patentee before: SHENZHEN WINSTRONG INFORMATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right

Effective date of registration: 20201118

Address after: 241000 No.37 Hengshan Road, economic and Technological Development Zone, Wuhu City, Anhui Province

Patentee after: Dong Jinhuan

Address before: 430000 705, 706a, building 1, Huigu spacetime, No.206, laowuhuang highway, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee before: Wuhan Tuozhijia Information Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201202

Address after: 233000 Room 102 north, No.11, No.2 building, liukm Huayuan commercial building, Changqing Township, Yuhui District, Bengbu City, Anhui Province

Patentee after: Anhui Licha Information Technology Co., Ltd

Address before: 241000 No.37 Hengshan Road, economic and Technological Development Zone, Wuhu City, Anhui Province

Patentee before: Dong Jinhuan

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210207

Address after: 530022 room 1801, 18th floor, platinum Palace International, 127 Minzu Avenue, Qingxiu District, Nanning City, Guangxi Zhuang Autonomous Region

Patentee after: Guangxi beluga Information Technology Co.,Ltd.

Address before: 233000 Room 102 north, No.11, No.2 building, liukm Huayuan commercial building, Changqing Township, Yuhui District, Bengbu City, Anhui Province

Patentee before: Anhui Licha Information Technology Co., Ltd

TR01 Transfer of patent right