CN107862774B - Access control calling method, system and client - Google Patents

Access control calling method, system and client Download PDF

Info

Publication number
CN107862774B
CN107862774B CN201711223064.8A CN201711223064A CN107862774B CN 107862774 B CN107862774 B CN 107862774B CN 201711223064 A CN201711223064 A CN 201711223064A CN 107862774 B CN107862774 B CN 107862774B
Authority
CN
China
Prior art keywords
information
mobile terminal
visitor
access control
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711223064.8A
Other languages
Chinese (zh)
Other versions
CN107862774A (en
Inventor
马宇尘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Liangming Technology Development Co Ltd
Original Assignee
Shanghai Liangming Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Liangming Technology Development Co Ltd filed Critical Shanghai Liangming Technology Development Co Ltd
Priority to CN201711223064.8A priority Critical patent/CN107862774B/en
Publication of CN107862774A publication Critical patent/CN107862774A/en
Application granted granted Critical
Publication of CN107862774B publication Critical patent/CN107862774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an access control calling method, an access control calling system and a client, and relates to the technical field of intelligent security. An access control calling system comprises an owner mobile terminal, a visitor mobile terminal and an access control server which are in communication connection; the visitor mobile terminal is used for triggering a visit request message based on the address information; the access control server side is used for collecting registration information of an owner in the access control client side, storing a corresponding relation between the owner authentication information and the owner address information, acquiring the owner authentication information corresponding to the address information according to a visit request message based on the address information, acquiring owner mobile terminal information and triggering the owner mobile terminal; the host mobile terminal is used for outputting response information aiming at the visit request message. In the invention, the visitor can initiate the visit request through the mobile terminal carried at any time, and the mobile terminal of the visited object sends the response, thereby saving complicated hardware installation and required installation cost, and being safe and convenient.

Description

Access control calling method, system and client
Technical Field
The invention relates to the technical field of intelligent security.
Background
With the improvement of living standard, people put forward higher demands on living environment, and the security protection system of residential district receives more and more attention, and entrance guard management is an important component of district security management. The existing access control system comprises an out-of-order keyboard mode, a card identification mode, a biological identification mode and the like. For example, the common card recognition mode has poor safety, only the card is not recognized, the card is easy to copy, no personal identity information exists in the card, the visitor enters and exits the gate without tracking a system, security personnel are required to manually check and record information, the work is complex, and the safety is low. Currently, some intelligent gating systems can be used for two-way communication between a resident and an external visitor in a building, and meanwhile, an image of the external visitor is displayed for the resident through a camera installed in a gating mode, so that a judgment is made as to whether the resident allows the visitor to enter. After the confirmation is passed, the owner can open the electric door through the telephone. According to the door control device, the owner needs to install the call display system in a house and install the camera outdoors, and needs to manually execute the door opening operation when the user walks to the vicinity of the door control terminal, so that inconvenience is brought to the user.
Doorbell is used as a common application in daily life, and is more and more convenient for people's life. The doorbell is generally divided into a wired doorbell and a wireless doorbell: the transmitter and the receiver of the wired doorbell are connected by virtue of wires, so that signal transmission is stable, wiring is troublesome, wall drilling is likely to be needed, and the market is gradually faded out; the wireless doorbell omits the trouble of wiring, but simultaneously because the signal is transmitted wirelessly, the signal stability is affected by the transmission distance and the actual environment, and the receiver needs a battery or is charged regularly, so that inconvenience is brought in the actual use.
Disclosure of Invention
The invention aims at: overcomes the defects of the prior art and provides an access control calling method, an access control calling system and a client. In the invention, the visitor can initiate a visit request through the mobile terminal carried at any time, and the mobile terminal of the visited object sends a response, such as a prompt sound of a doorbell by way of example and not limitation, and the visited object can obtain the visit information through the mobile terminal of the visitor, thereby saving complicated hardware installation and required installation cost, and being safe and convenient.
In order to achieve the above object, the present invention provides the following technical solutions.
An access control calling method comprises the following steps:
collecting registration information of an owner at an access control client, and presetting a corresponding relation between owner authentication information and owner address information;
collecting a visit request message triggered by a visitor mobile terminal and based on address information;
acquiring owner mobile terminal information according to the owner authentication information corresponding to the address information;
triggering the host mobile terminal to output response information aiming at the visit request message.
Further, the visit request message also comprises visitor identity information, wherein the visitor identity information comprises one or more of a mobile terminal identification number, name information, identity card information, occupation information, contact information and biological characteristic identification information of the visitor.
Further, the visitor registers the user for the access control client, and when the object to be visited is the contact person of the visitor, the visitor mobile terminal triggers the visit request message in such a way that,
opening a contact list through an access control client, searching a contact object to be visited, and sending a visit request message through triggering the contact object;
the contact list is a contact list special for the access control client or other clients associated with the access control client.
Further, the visitor registers the user for the access control client, and the visitor mobile terminal triggers the visit request message under the condition that the object to be visited is not a visitor contact,
the visitor inputs address information of an object to be visited through an access control client, and obtains a host mobile terminal corresponding to the address information;
the visitor mobile terminal outputs an induction interface and collects the beating action of a visitor on the induction interface;
and when the knocking action is judged to be in accordance with a preset knocking trigger condition, a visit request message is sent.
Further, the access control server side acquires information of the master mobile terminal according to the visit request message, and triggers the master mobile terminal to send doorbell sound or knock sound.
Further, the visitor registers the user for the access control client, and the visitor mobile terminal triggers the visit request message under the condition that the object to be visited is not a visitor contact,
and the visitor inputs the address information of the object to be visited through the access control client, and the access control client sends a visit request message to the corresponding host mobile terminal based on the address information.
Further, under the condition that the address information corresponds to a plurality of host mobile terminals, a visit request message is sent to each host mobile terminal, or screening is carried out on the plurality of host mobile terminals.
The process of screening the plurality of host mobile terminals includes,
collecting a response sequence of a master mobile terminal preset in an access control client;
and according to the response sequence, sending a visit request message to the host mobile terminal with the highest priority.
Alternatively, the process of screening the plurality of host mobile terminals may include,
collecting current positioning information of a plurality of host mobile terminals;
judging whether the current positioning information accords with the address information or not;
and acquiring the corresponding host mobile terminal and sending out a visit request message.
Alternatively, the process of screening the plurality of host mobile terminals may include,
collecting remark information of each host mobile terminal in the access control client;
judging whether the host mobile terminal currently receives a visit request or not according to the remark information;
and sending a visit request message to the host mobile terminal receiving the visit request.
Alternatively, the process of screening the plurality of host mobile terminals may include,
collecting owner identity information of each owner mobile terminal in an access control client;
returning the identity information of the plurality of owners to the visitor mobile terminal;
and collecting the selection information of the visitor mobile terminal, and sending a visit request message to the selected host mobile terminal.
Further, the visitor mobile terminal triggers the visit request message in such a way that,
collecting a distance triggering condition preset by a visitor;
and acquiring real-time positioning information of the visitor, and sending out a visit request message when the distance between the positioning information and the address information meets the distance triggering condition.
Further, before triggering the host mobile terminal to output the response information for the visit request message, the method also comprises the steps of,
collecting the current position information of the visitor mobile terminal;
acquiring the distance between the current position information and the address information;
judging whether the distance is within a preset distance threshold range or not;
and when the distance is within a preset distance threshold range, triggering the host mobile terminal to output response information aiming at the visit request message.
Preferably, when the distance is not within the preset distance threshold, storing the visit request message and the host mobile terminal correspondingly;
and triggering the host mobile terminal to output response information aiming at the visit request message when the distance meets the distance threshold range.
Further, before triggering the host mobile terminal to output the response information for the visit request message, the method also comprises the steps of,
Collecting visit authority set by the host mobile terminal in the access control client;
judging whether visitor identity information corresponding to the visitor mobile terminal meets the visiting authority or not;
and triggering the host mobile terminal to output response information aiming at the visit request message under the condition that the visitor identity information meets the visit authority.
Further, under the condition that the visitor identity information does not meet the visit authority, the host mobile terminal is prohibited from being triggered to output response information aiming at the visit request message.
Preferably, the setting mode of the visit authority is one of the following modes,
firstly, acquiring a contact list in a host mobile terminal, and setting a contact object in the contact list as a visitor object;
a second mode is that a history visitor record in the host mobile terminal is obtained, visit times of each visitor are counted according to the history visitor record, the visit times reach a preset time threshold value, and the visit times are set as a visitor;
thirdly, visitor identity information is acquired, the visitor identity information is identified, and visitors meeting the trust level are set as accessible objects according to the trust level requirements preset in the host mobile terminal;
The fourth mode is that visitor identity information is obtained, identity identification is carried out on the visitor based on an identification rule preset by an access control client, and the visitor identified as express or outgoing is set as a visitor capable of being visited;
and fifthly, obtaining visitor identity information, wherein the visitor identity information comprises visitor with identical identity card photo and face data information and is set as a visitor.
Further, the abnormal response condition is preset when the visitor identity information does not meet the visiting authority,
judging whether the visitor mobile terminal meets an abnormal response condition or not under the condition that visitor identity information does not meet the visiting authority;
and when the abnormal response condition is met, triggering the host mobile terminal to output response information aiming at the visit request message.
Preferably, the abnormal response condition is that the visitor mobile terminal prepays a visit deposit through the access control client, and the visit deposit meets the visit deposit requirement of the host client.
The step of triggering the host mobile terminal to output the response information aiming at the visit request message comprises the following steps: and returning the collected safety confirmation information of the host mobile terminal to the visitor mobile terminal according to the safety confirmation information.
Further, triggering the host mobile terminal to output response information aiming at the visit request message, and simultaneously sending visitor identity information to the host mobile terminal in the form of a name card; the business card is a visiting business card which is made by a visitor in the access control client side in advance, or is automatically generated by the access control server based on identity information of the visitor, and information in the business card can be stored in an address book of the host mobile terminal.
Further, the business card information comprises one or more of the time of the visit, an object, a specific event, a visitor mobile terminal number and visitor face image information besides the visitor basic identity information.
Further, acquiring the beating operation information on the visitor mobile terminal, acquiring beating force, and acquiring corresponding sound volume based on the corresponding relation between the preset beating force and the sound volume;
and synchronously outputting the knocker sound matched with the sound volume at the host mobile terminal.
Further, after triggering the master mobile terminal to output the response information aiming at the visit request message, the master mobile terminal confirms or prohibits the operation of opening the access control.
Further, the operation of confirming or prohibiting the opening of the door control comprises one of the following modes,
In the first mode, clicking a trigger control for confirming opening or prohibiting opening;
the second mode is to collect the voice information of the host, and after voice recognition, judge whether there is a voice instruction for confirming or prohibiting the opening of the door access;
and thirdly, collecting body action image information of the host, and judging whether an action instruction for confirming or prohibiting opening of the door access is corresponding after image recognition.
The invention also discloses an access control calling system, which comprises a master mobile terminal, a visitor mobile terminal and an access control server which are in communication connection;
the visitor mobile terminal is used for triggering a visit request message based on address information;
the access control server side is used for collecting registration information of an owner in the access control client side, storing a corresponding relation between the owner authentication information and the owner address information, acquiring the owner authentication information corresponding to the address information according to a visit request message based on the address information, acquiring owner mobile terminal information and triggering the owner mobile terminal;
the host mobile terminal is used for outputting response information aiming at the visit request message.
Further, the system also comprises an access control device, wherein the access control device comprises an access control controller and an electric control lock, the input end of the access control controller is connected with the access control server, and the output end of the access control controller is connected with the electric control lock.
The invention also discloses an access control client, which comprises a master module, a visitor module and an information processing module which are in communication connection;
the visitor module is connected with the information processing module and is used for triggering a visit request message based on the address information and sending the visit request message to the information processing module;
the host module is connected with the information processing module and is used for collecting registration information of the host, sending the registration information to the information processing module, receiving a visit request message forwarded by the information processing module and outputting response information aiming at the visit request message;
the information processing module is used for storing the corresponding relation between the host authentication information and the host address information according to the registration information of the host, acquiring the host authentication information corresponding to the address information according to the visit request information based on the address information, acquiring the host mobile terminal information and triggering the host mobile terminal.
Further, access control client is connected with access control device, access control device includes access control controller and electric control lock, access control controller's input is connected with access control client's information processing module, access control controller's output is connected with electric control lock.
Further, the visitor module comprises a door knocking action acquisition sub-module, wherein the door knocking action acquisition sub-module is used for outputting an induction interface after acquiring the host mobile terminal, acquiring the knocking action of the induction interface, and sending a visit request message when judging that the knocking action accords with a preset door knocking trigger condition.
Compared with the prior art, the invention has the following advantages and positive effects by taking the technical scheme as an example: the visitor can initiate a visit request through a mobile terminal (such as a mobile phone) carried at any time, and the mobile terminal of the visited object sends a response, such as a prompt sound of a doorbell by way of example and not limitation, and the visited object can obtain visit information through the mobile terminal of the visitor, so that complicated hardware installation and required installation cost are saved, and the visitor is safe and convenient.
Drawings
Fig. 1 is a flowchart of an access control calling method provided by an embodiment of the present invention.
Fig. 2 to fig. 4 are operation example diagrams of triggering a visit request by a contact according to an embodiment of the present invention.
Fig. 5 is an exemplary diagram of an interface for displaying response information on a host mobile terminal according to an embodiment of the present invention.
Fig. 6 to fig. 8 are operation example diagrams of triggering a call request by an address according to an embodiment of the present invention.
Fig. 9 is an exemplary diagram of an interface for displaying response information on a host mobile terminal according to an embodiment of the present invention.
Fig. 10 is a block diagram of an access control client according to an embodiment of the present invention.
The labels in the figures are as follows:
visitor mobile terminal 100, display structure 110, access trigger control 111, contact list 112, contact trigger 113;
a host mobile terminal 200, displaying a structure 210;
the system comprises an access control client 300, a visitor module 310, a master module 320 and an information processing module 330.
Detailed Description
The method, the system and the client for calling the access control provided by the invention are further described in detail below with reference to the accompanying drawings and the specific embodiments. It should be noted that the technical features or combinations of technical features described in the following embodiments should not be regarded as being isolated, and they may be combined with each other to achieve a better technical effect. In the drawings of the embodiments described below, like reference numerals appearing in the various drawings represent like features or components and are applicable to the various embodiments. Thus, once an item is defined in one drawing, no further discussion thereof is required in subsequent drawings.
It should be noted that the structures, proportions, sizes, etc. shown in the drawings are merely used in conjunction with the disclosure of the present specification, and are not intended to limit the applicable scope of the present invention, but rather to limit the scope of the present invention. The scope of the preferred embodiments of the present invention includes additional implementations in which functions may be performed out of the order described or discussed, including in a substantially simultaneous manner or in an order that is reverse, depending on the function involved, as would be understood by those of skill in the art to which embodiments of the present invention pertain.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but should be considered part of the specification where appropriate. In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of the exemplary embodiments may have different values.
Examples
Fig. 1 is a flowchart of an access control calling method provided in this embodiment. The entrance guard calling method comprises the following steps:
s100, collecting registration information of an owner at an access control client, and presetting a corresponding relation between owner authentication information and owner address information.
S200, acquiring a visit request message triggered by the visitor mobile terminal and based on the address information.
S300, obtaining owner mobile terminal information according to the owner authentication information corresponding to the address information.
S400, triggering the host mobile terminal to output response information aiming at the visit request message.
Firstly, a user registers on a related access control client, wherein the access control client can be an access control client based on intelligent mobile setting or an access control client based on a PC (personal computer) terminal.
By way of example, but not limitation, after a user registers through an access control client on a mobile terminal based on own owner identity and address information, the server checks the information, and after authentication passes, the registration result is fed back, and authentication information of the user, address information of the user, and correspondence between the authentication information and the address information are stored.
After confirming that the registration is successful, the user can log in the access control client with the owner identity. The authentication information is owner authentication information, and may include, but is not limited to, a name, a nickname, a phone, a mailbox, and/or a mobile terminal identification number of the user. The address information used in the registration is the host address information. The host authentication information has a corresponding relation with host address information, the host authentication information can be obtained based on the address information, and the host mobile terminal can be obtained based on the host authentication information.
The mobile terminal can be various commonly used mobile terminals such as smart phones, tablet computers, palm computers, tablet computers and the like, and various intelligent wearable electronic devices such as intelligent glasses, intelligent watches and the like. In this embodiment, a mobile phone is preferable.
For example, a user may register with the access control client through a mobile phone number, and the registered identity may be a host or a visitor. When the registered identity is the host, the address information of the user is acquired, and the authenticated mobile phone number and the address information can be stored correspondingly. When the registered identity is a guest, it may not be necessary to acquire address information of the user.
Of course, the user registered by the host identity may also be a guest, and the user registered by the guest identity may need to provide address information to further register as the host identity. Through the access control client of the embodiment, a user can receive visit information with the host identity or send the visit information with the visitor identity according to the requirement.
Preferably, the visitor also serves as a registered user of the access control client.
When the visitor needs to access the user, the visitor can trigger a visit request message based on address information through the access control client based on the mobile terminal carried by the visitor. And acquiring owner mobile terminal information according to the owner authentication information corresponding to the address information. Triggering the host mobile terminal to output response information aiming at the visit request message, such as a doorbell or a door knocking sound sent by a mobile phone of the host.
Referring to fig. 2, when a visitor registers a user for the access control client, the visitor may first start the visitor mobile terminal 100 to find the access control client, and the display structure 110 of the visitor mobile terminal 100 displays an access control trigger control 111 corresponding to the start of the access control client, where the visitor triggers the access control trigger control 111, and the display structure 110 outputs an access control client user interface, as shown in fig. 3.
Referring to fig. 3, a contact list 112 is presented on the user interface, each contact in the contact list 112 corresponds to a contact trigger item 113, and after the contact trigger item 113 is triggered, a visitor can interact with the contact object. In this embodiment, the visitor may send the visit request message by triggering the contact object. By way of example and not limitation, if a visitor needs to visit and triggers the contact object "Zhang San", a visit request object may be sent to Zhang Sanhe, as shown in FIG. 4, and after triggering, the display structure 110 outputs the following interface information that is connecting Zhang Sanhe.
The contact list can be a contact list special for the access control client or other clients associated with the access control client, and address information of contact objects is stored in the contact list.
The server side obtains address information of the contact person object sheet III according to the trigger message, obtains mobile terminal information of the contact person object sheet III according to master authentication information (namely authentication information of the contact person object sheet III) corresponding to the address information, and then forwards the visit request information to a mobile terminal of the target object sheet III, such as a mobile phone. Referring to fig. 5, when the host mobile terminal 200 receives the call request message, interface information output by the structure 210 is displayed. Preferably, the visit request message further includes visitor identity information, where the visitor identity information includes one or more of a mobile terminal identifier, name information, identity card information, professional information, contact information and biometric information of the visitor, and when the server forwards the visit request message, the server outputs one or more of the visitor identity information at the same time, so that the object to be visited determines whether to receive the visit.
The host can take the visit request as feedback according to the visit request message. For example, the door control can be directly unlocked (in the case that the master mobile terminal is associated with the door control lock); or the video is required to be connected, and the identity of the visitor is confirmed; or call with the visitor is required, and the dialing of the phone is defaulted to the phone number provided in the call request message.
Referring to fig. 6, in another implementation manner of this embodiment, when a visitor registers a user for the access control client and an object to be visited is not an existing contact of the visitor, the call request message may be triggered as follows:
and the visitor inputs the address information of the object to be visited through the access control client, and the access control client sends a visit request message to the corresponding host mobile terminal based on the address information. The address information may be entered, in whole or in part, by the guest, preferably by using existing positioning information of the positioning system.
By way of example and not limitation, a user may need to visit an object (the master object that has been registered with the access client) at address "Yang Puou national route 3ww No. 6 building 10 building 001 room". The user carries the mobile phone to go down the building No. 6, opens the access control client, and sends a visit request to the owner corresponding to the address by inputting the address information into the access control client. After entering the address input interface, the access control client can be based on the positioning information of the positioning system of the mobile phone, namely the No. 6 building of No. 3ww of the national routing of Yang Puou, and after the specific floor number is directly input, a visit request is triggered, so that the information manually input by a visitor can be reduced, and the visit efficiency is improved. Of course, in the case of inaccurate positioning, the visitor can directly select to manually input accurate visitor address information.
Referring to fig. 7, after the user inputs the complete address information, a visit request is triggered, and based on the address information, the access control client obtains the host mobile terminal corresponding to the address information, that is, the mobile phone of Zhang Jiang, and sends the visit request to the mobile phone of Zhang Jiang.
The mobile phone of Zhang Jiang responds after receiving the visit request, such as the mobile phone making a doorbell or a knock. Then Zhang Jiangji looks at the call request at the prompt, which requires a video call with the visitor to further determine the visitor's information. After receiving the video call request, the server presents the interface information shown in fig. 8 to the visitor.
Under the condition that the visitor triggers the 'receiving' control, the access control client starts the camera shooting structure of the visitor mobile phone to collect images, so that the host Zhang Jiang can see the head portrait information of the visitor through the own mobile phone display structure, as shown in fig. 9, meanwhile, the selection control 'unlocking' and 'rejecting' are output on the display structure 210, and the host can select to perform 'unlocking' operation on the access control or reject the visit request of the visitor as required.
In another implementation manner of this embodiment, when the visitor registers the user for the access control client and the object to be visited is not a visitor contact person, the manner in which the visitor mobile terminal triggers the visit request message is as follows: the visitor inputs address information of an object to be visited through the access control client, the visitor mobile terminal outputs an induction interface, and the beating action of the visitor on the induction interface is collected; and when the knocking action is judged to be in accordance with a preset knocking trigger condition, a visit request message is sent. Preferably, the access control server side can acquire information of the host mobile terminal according to the visit request message, trigger the host mobile terminal to send doorbell sound or knock sound, and prompt the host that the visit request is received through sound.
In this implementation, since one address information may correspond to a plurality of host users, this is common in multi-member families, such as, by way of example and not limitation, a mobile phone having a plurality of family members based on one address information. And under the condition that the address information corresponds to a plurality of host mobile terminals, sending a visit request message to each host mobile terminal or screening the plurality of host mobile terminals.
Specifically, the process of screening the plurality of host mobile terminals may include: collecting a response sequence of a master mobile terminal preset in an access control client; and according to the response sequence, sending a visit request message to the host mobile terminal with the highest priority. By way of example and not limitation, for example, one address information corresponds to 4 host mobile terminals, namely a mobile phone of father, mother, grandpa and grandpa respectively, and in the access control client, mother limits the response sequence, father has the highest response level of priority, and then mother, grandpa and grandpa respectively. The dad's handset responds preferentially, such as sounding a doorbell or a knock, based on the call request triggered by the address information.
Alternatively, the process of screening the plurality of host mobile terminals includes: collecting current positioning information of a plurality of host mobile terminals; judging whether the current positioning information accords with the address information or not; and acquiring the corresponding host mobile terminal and sending out a visit request message. By way of example and not limitation, an address message corresponds to a mobile phone having 4 host mobile terminals, dad, mom, grandpa, and milk, respectively. After the server side obtains 4 host mobile terminals, the current positions of the 4 host mobile terminals are positioned, and it is determined which of the 4 positioning positions accords with the address information, for example, the address information to be visited is "national fixed way 3ww No. 6 building 10 building 001 room", and the positions of the 4 host mobile terminals are discony, national fixed way 3ww No. 6 building, discony and discony in sequence, so that it can be determined that only the mobile phone corresponding to the mother is suitable for receiving the visit request, and the mobile phone of the mother is triggered to send doorbell or knock sound.
Alternatively, the process of screening the plurality of host mobile terminals includes: collecting remark information of each host mobile terminal in the access control client; judging whether the host mobile terminal currently receives a visit request or not according to the remark information; and sending a visit request message to the host mobile terminal receiving the visit request. The remark information can be, for example, a trip plan made by the host for the present trip, whether the host is located at the address information position in the time period can be judged according to the trip plan, and when the host is judged not to be located at the address information position, a visit request is not sent to the host mobile terminal. And for the host mobile terminal determined to be located at the address information position, triggering the host mobile terminal to sound a doorbell or a knock.
Alternatively, the process of screening the plurality of host mobile terminals includes: collecting owner identity information of each owner mobile terminal in an access control client; returning the identity information of the plurality of owners to the visitor mobile terminal; and collecting the selection information of the visitor mobile terminal, and sending a visit request message to the selected host mobile terminal. The method comprises the steps that owner identity information, such as names, nicknames and the like, of a plurality of owner mobile terminals is returned to a visitor, and the visitor selects a target object to be visited according to the visiting intention of the visitor.
In this embodiment, the manner in which the visitor mobile terminal triggers the visit request message may be a distance triggering manner, which specifically includes the following steps: collecting a distance triggering condition preset by a visitor; and acquiring real-time positioning information of the visitor, and sending out a visit request message when the distance between the positioning information and the address information meets the distance triggering condition.
In another implementation manner of this embodiment, before triggering the host mobile terminal to output the response information for the call request message, the method further includes the steps of: collecting the current position information of the visitor mobile terminal; acquiring the distance between the current position information and the address information; judging whether the distance is within a preset distance threshold range or not; and when the distance is within a preset distance threshold range, triggering the host mobile terminal to output response information aiming at the visit request message.
Preferably, when the distance is not within the preset distance threshold, storing the visit request message and the host mobile terminal correspondingly; and triggering the host mobile terminal to output response information aiming at the visit request message when the distance meets the distance threshold range.
By way of example and not limitation, a visitor makes a visit request 1000 meters from a visit address, and the preset distance threshold conditions that trigger a visit are: if the current distance between the visitor and the visit address is less than 200 meters, the distance of 1000 meters cannot trigger the corresponding host mobile terminal to send a response. But the visit request message can be stored by the server side, and when the real-time distance of the visitor meets the distance threshold, namely, is less than 200 meters, the corresponding host mobile terminal response is triggered.
In another implementation manner of this embodiment, before triggering the host mobile terminal to output the response information for the call request message, the method may further include the following steps: collecting visit authority set by the host mobile terminal in the access control client; judging whether visitor identity information corresponding to the visitor mobile terminal meets the visiting authority or not; triggering the host mobile terminal to output response information aiming at the visit request message under the condition that visitor identity information meets the visit authority; and under the condition that the visitor identity information does not meet the visit authority, prohibiting triggering the host mobile terminal to output response information aiming at the visit request message.
Preferably, the setting mode of the visit authority may be one of the following modes:
in a first mode, a contact list in a host mobile terminal is obtained, and a contact object in the contact list is set as a visitor object.
And secondly, acquiring a history visitor record in the host mobile terminal, counting the visit times of each visitor according to the history visitor record, and setting the visit times as a visitor capable of being visited when the visit times reach a preset time threshold.
And thirdly, acquiring visitor identity information, identifying the visitor identity information, and setting the visitor meeting the trust level as a visitor capable of being visited according to the trust level requirement preset in the host mobile terminal.
And in a fourth mode, visitor identity information is acquired, identity identification is carried out on the visitor based on an identification rule preset by the access control client, and the visitor identified as express or outgoing is set as a visitor capable of being visited.
And fifthly, obtaining visitor identity information, wherein the visitor identity information comprises visitor with identical identity card photo and face data information and is set as a visitor.
Further, presetting an abnormal response condition under the condition that visitor identity information does not meet the visiting authority, and judging whether the visitor mobile terminal meets the abnormal response condition under the condition that visitor identity information does not meet the visiting authority; and when the abnormal response condition is met, triggering the host mobile terminal to output response information aiming at the visit request message.
Preferably, the abnormal response condition is that the visitor mobile terminal prepays a visit deposit through the access control client, and the visit deposit meets the visit deposit requirement of the host client. By way of example and not limitation, if an owner presets a visit deposit in an access control client to reach 10 yuan, the owner can receive a person who does not meet the visit authority to visit, and when the visitor sends a visit request, the visitor who does not meet the visit authority is prompted to pay the visit deposit of more than 10 yuan according to the visit authority and the visit deposit requirement set by the owner in the access control client, and the corresponding owner mobile terminal response can be triggered. When the visitor pays more than 10 visiting deposit, the host mobile terminal is triggered to give out doorbell or knock sound.
After triggering the host mobile terminal to output the response information for the visit request message, the method can further comprise the steps of: and returning the collected safety confirmation information of the host mobile terminal to the visitor mobile terminal according to the safety confirmation information.
In this embodiment, the host mobile terminal is triggered to output the response information for the visit request message, and meanwhile, the visitor identity information can be sent to the host mobile terminal in the form of a business card; the business card is a visiting business card which is made by a visitor in the access control client side in advance, or is automatically generated by the access control server based on identity information of the visitor, and information in the business card can be stored in an address book of the host mobile terminal. Preferably, the business card information includes one or more of the time of the visit, the object, the specific event, the number of the visitor mobile terminal and the visitor face image information besides the visitor basic identity information.
In another implementation manner of this embodiment, the method includes acquiring information of a beating operation on a visitor mobile terminal, acquiring beating force, and acquiring corresponding sound volume based on a preset corresponding relation between the beating force and the sound volume; and synchronously outputting the knocker sound matched with the sound volume at the host mobile terminal. By way of example and not limitation, such as setting a pressure sensor on a screen of a mobile phone, collecting the beating force of a user on the screen through the pressure sensor, wherein the force is related to the pressure received by the pressure sensor, for example, according to the magnitude of the pressure value received by the pressure sensor, the force is divided into 5 force levels from small to large according to the pressure, different force levels correspond to 5 sound volumes from low to high, and the beating sound matched with the sound volumes is synchronously output at a host mobile terminal.
Preferably, the visitor mobile terminal and the host mobile terminal are capable of point-to-point short range wireless communication, such as communication via bluetooth or infrared. Acquiring the beating operation information on the visitor mobile terminal, acquiring beating force, and acquiring corresponding sound volume based on the corresponding relation between the preset beating force and the sound volume; based on the short-range wireless communication, the master mobile terminal synchronously outputs the knocker sound matched with the sound volume, so that the synchronous matching of the visitor knocker and the master mobile terminal knocker is realized.
After triggering the master mobile terminal to output response information aiming at the visit request message, the master mobile terminal confirms or prohibits the operation of opening the access. Preferably, the operation of confirming or prohibiting the opening of the door may include the following.
In one mode, a trigger control is clicked to confirm the activation or deactivation of the activation.
And secondly, collecting voice information of the host, and judging whether a voice instruction for confirming or prohibiting the opening of the access is corresponding after voice recognition.
And thirdly, collecting body action image information of the host, and judging whether an action instruction for confirming or prohibiting opening of the door access is corresponding after image recognition.
The invention discloses an access control calling system.
The access control calling system comprises an owner mobile terminal, a visitor mobile terminal and an access control server which are in communication connection.
The visitor mobile terminal is used for triggering a visit request message based on address information.
The access control server side is used for collecting registration information of an owner in the access control client side, storing a corresponding relation between the owner authentication information and the owner address information, acquiring the owner authentication information corresponding to the address information according to a visit request message based on the address information, acquiring owner mobile terminal information and triggering the owner mobile terminal.
The host mobile terminal is used for outputting response information aiming at the visit request message.
Preferably, the system further comprises an access control device, the access control device comprises an access control controller and an electric control lock, the input end of the access control controller is connected with the access control server, and the output end of the access control controller is connected with the electric control lock.
Details of the specific arrangement of the devices are referred to in the foregoing embodiments. For the structure of the electric control lock, the electric control lock in the door control system in the prior art can be referred to for setting, which is not the improvement point of the invention, and is not described herein.
In particular, the visitor mobile terminal and the host mobile terminal are capable of point-to-point short range wireless communication, such as communication via Bluetooth or infrared.
Referring to fig. 10, in another embodiment of the present invention, an access control client is disclosed.
The access client 300 includes a guest module 310, a host module 320, and an information processing module 330, which are communicatively connected.
The visitor module 310 is connected with the information processing module 330, and is configured to trigger a call request message based on address information, and send the call request message to the information processing module 330.
The host module 320 is connected to the information processing module 330, and is configured to collect the registration information of the host, send the registration information to the information processing module 330, receive the call request message forwarded by the information processing module, and output response information for the call request message.
The information processing module 330 is configured to store a correspondence between host authentication information and host address information according to registration information of a host, and obtain host authentication information corresponding to the address information according to a call request message based on the address information, obtain host mobile terminal information, and trigger the host mobile terminal.
By way of example and not limitation, a user registers with the owner module 320, such as through a door access client, based on his owner identity and address information. The server checks the information, feeds back the registration result after the authentication is passed, and stores the authentication information of the user, the address information of the user and the corresponding relation between the authentication information and the address information.
After confirming that the registration is successful, the user can log in to the access control client with the owner's identity through the owner module 320. The authentication information is owner authentication information, and may include, but is not limited to, a name, a nickname, a phone, a mailbox, and/or a mobile terminal identification number of the user. The address information used in the registration is the host address information. The host authentication information has a corresponding relation with host address information, the host authentication information can be obtained based on the address information, and the host mobile terminal can be obtained based on the host authentication information.
The mobile terminal can be various commonly used mobile terminals such as smart phones, tablet computers, palm computers, tablet computers and the like, and various intelligent wearable electronic devices such as intelligent glasses, intelligent watches and the like. In this embodiment, a mobile phone is preferable. For example, a user may register with the access control client through a mobile phone number.
The registered identity may be a host or a guest, and may be registered through the host module 320 and the guest module 310, respectively. When the registered identity is the host, the address information of the user is acquired, and the authenticated mobile phone number and the address information can be stored correspondingly. When the registered identity is a guest, it may not be necessary to acquire address information of the user.
Of course, the user registered by the host identity may also be a guest, and the user registered by the guest identity may need to provide address information to further register as the host identity. Through the access control client of the embodiment, a user can receive visit information with the host identity or send the visit information with the visitor identity according to the requirement.
In this embodiment, the access control client 100 may be connected to an access control device, where the access control device includes an access control controller and an electric control lock, an input end of the access control controller is connected to an information processing module of the access control client, and an output end of the access control controller is connected to the electric control lock.
The guest module may also include a knock acquisition sub-module. The door knocking action acquisition sub-module is used for outputting an induction interface after acquiring the host mobile terminal, acquiring the knocking action of the induction interface, and sending a visit request message when judging that the knocking action accords with a preset door knocking trigger condition.
Preferably, the method comprises the steps of collecting the beating operation information on the visitor mobile terminal, obtaining beating force, and obtaining corresponding sound volume based on the corresponding relation between the preset beating force and the sound volume; and synchronously outputting the knocker sound matched with the sound volume at the host mobile terminal. By way of example and not limitation, such as setting a pressure sensor on a screen of a mobile phone, collecting the beating force of a user on the screen through the pressure sensor, wherein the force is associated with the pressure received by the pressure sensor, for example, according to the magnitude of the pressure value received by the pressure sensor, the pressure is divided into 5 force levels from small to large, different force levels correspond to 5 sound volumes from low to high, and the beating sound matched with the sound volumes is synchronously output at a host mobile terminal. In particular, the visitor mobile terminal and the host mobile terminal are capable of point-to-point short range wireless communication, such as communication via Bluetooth or infrared. Acquiring the beating operation information on the visitor mobile terminal, acquiring beating force, and acquiring corresponding sound volume based on the corresponding relation between the preset beating force and the sound volume; based on the short-range wireless communication, the master mobile terminal synchronously outputs the knocker sound matched with the sound volume, so that the synchronous matching of the visitor knocker and the master mobile terminal knocker is realized.
In the above description, the disclosure of the present invention is not intended to limit itself to these aspects. Rather, the components may be selectively and operatively combined in any number within the scope of the present disclosure. In addition, terms like "comprising," "including," and "having" should be construed by default as inclusive or open-ended, rather than exclusive or closed-ended, unless expressly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Common terms found in dictionaries should not be too idealized or too unrealistically interpreted in the context of the relevant technical document unless the present disclosure explicitly defines them as such. Any alterations and modifications of the present invention, which are made by those of ordinary skill in the art based on the above disclosure, are intended to be within the scope of the appended claims.

Claims (30)

1. An access control calling method is characterized by comprising the following steps:
collecting registration information of an owner at an access control client, and presetting a corresponding relation between owner authentication information and owner address information; the method comprises the steps that a user registers on the basis of own host identity and address information at an access control client, a server feeds back a registration result after authentication is passed, and authentication information of the user, address information of the user and a corresponding relation between the authentication information and the address information are stored;
Collecting a visit request message triggered by a visitor mobile terminal and based on address information;
acquiring owner mobile terminal information according to the owner authentication information corresponding to the address information;
triggering the host mobile terminal to output response information aiming at the visit request message; the response sounds the host mobile terminal to alert the host.
2. The entrance guard calling method as in claim 1, wherein: the visit request message also comprises visitor identity information, wherein the visitor identity information comprises one or more of a mobile terminal identification number, name information, identity card information, occupation information, contact information and biological characteristic identification information of the visitor.
3. The entrance guard calling method as in claim 1, wherein: the visitor registers the user for the access control client, and when the object to be visited is the contact person of the visitor, the visitor mobile terminal triggers the visit request message in the way that,
opening a contact list through an access control client, searching a contact object to be visited, and sending a visit request message through triggering the contact object;
the contact list is a contact list special for the access control client or other clients associated with the access control client.
4. The entrance guard calling method as in claim 1, wherein: the visitor registers the user for the access control client, and the visitor mobile terminal triggers the visit request message under the condition that the object to be visited is not a visitor contact,
the visitor inputs address information of an object to be visited through an access control client, and obtains a host mobile terminal corresponding to the address information;
the visitor mobile terminal outputs an induction interface and collects the beating action of a visitor on the induction interface;
and when the knocking action is judged to be in accordance with a preset knocking trigger condition, a visit request message is sent.
5. The entrance guard calling method as in claim 4, wherein: and the access control server side acquires information of the host mobile terminal according to the visit request message and triggers the host mobile terminal to send doorbell sound or knock sound.
6. The entrance guard calling method as in claim 1, wherein: the visitor registers the user for the access control client, and the visitor mobile terminal triggers the visit request message under the condition that the object to be visited is not a visitor contact,
and the visitor inputs the address information of the object to be visited through the access control client, and the access control client sends a visit request message to the corresponding host mobile terminal based on the address information.
7. The entrance guard calling method as in claim 6, wherein: and under the condition that the address information corresponds to a plurality of host mobile terminals, sending a visit request message to each host mobile terminal or screening the plurality of host mobile terminals.
8. The entrance guard calling method as in claim 7, wherein: the process of screening the plurality of host mobile terminals includes,
collecting a response sequence of a master mobile terminal preset in an access control client;
and according to the response sequence, sending a visit request message to the host mobile terminal with the highest priority.
9. The entrance guard calling method as in claim 7, wherein: the process of screening the plurality of host mobile terminals includes,
collecting current positioning information of a plurality of host mobile terminals;
judging whether the current positioning information accords with the address information or not;
and acquiring the corresponding host mobile terminal and sending out a visit request message.
10. The entrance guard calling method as in claim 7, wherein: the process of screening the plurality of host mobile terminals includes,
collecting remark information of each host mobile terminal in the access control client;
Judging whether the host mobile terminal currently receives a visit request or not according to the remark information;
and sending a visit request message to the host mobile terminal receiving the visit request.
11. The entrance guard calling method as in claim 7, wherein: the process of screening the plurality of host mobile terminals includes,
collecting owner identity information of each owner mobile terminal in an access control client;
returning the identity information of the plurality of owners to the visitor mobile terminal;
and collecting the selection information of the visitor mobile terminal, and sending a visit request message to the selected host mobile terminal.
12. The entrance guard calling method as in claim 1, wherein: the visitor mobile terminal triggers the call request message in such a way that,
collecting a distance triggering condition preset by a visitor;
and acquiring real-time positioning information of the visitor, and sending out a visit request message when the distance between the positioning information and the address information meets the distance triggering condition.
13. The entrance guard calling method as in claim 1, wherein: before triggering the host mobile terminal to output the response information for the visit request message, the method also comprises the steps of,
Collecting the current position information of the visitor mobile terminal;
acquiring the distance between the current position information and the address information;
judging whether the distance is within a preset distance threshold range or not;
and when the distance is within a preset distance threshold range, triggering the host mobile terminal to output response information aiming at the visit request message.
14. The entrance guard calling method as in claim 13, wherein: when the distance is not within the preset distance threshold value range, storing the visit request message and the host mobile terminal correspondingly;
and triggering the host mobile terminal to output response information aiming at the visit request message when the distance meets the distance threshold range.
15. The entrance guard calling method as in claim 1, wherein: before triggering the host mobile terminal to output the response information for the visit request message, the method also comprises the steps of,
collecting visit authority set by the host mobile terminal in the access control client;
judging whether visitor identity information corresponding to the visitor mobile terminal meets the visiting authority or not;
and triggering the host mobile terminal to output response information aiming at the visit request message under the condition that the visitor identity information meets the visit authority.
16. The entrance guard calling method of claim 15, wherein:
and under the condition that the visitor identity information does not meet the visit authority, prohibiting triggering the host mobile terminal to output response information aiming at the visit request message.
17. The entrance guard calling method of claim 15, wherein: the setting mode of the visit authority is one of the following modes,
firstly, acquiring a contact list in a host mobile terminal, and setting a contact object in the contact list as a visitor object;
a second mode is that a history visitor record in the host mobile terminal is obtained, visit times of each visitor are counted according to the history visitor record, the visit times reach a preset time threshold value, and the visit times are set as a visitor;
thirdly, visitor identity information is acquired, the visitor identity information is identified, and visitors meeting the trust level are set as accessible objects according to the trust level requirements preset in the host mobile terminal;
the fourth mode is that visitor identity information is obtained, identity identification is carried out on the visitor based on an identification rule preset by an access control client, and the visitor identified as express or outgoing is set as a visitor capable of being visited;
And fifthly, obtaining visitor identity information, wherein the visitor identity information comprises visitor with identical identity card photo and face data information and is set as a visitor.
18. The entrance guard calling method of claim 15, wherein:
the abnormal response condition in the case that the preset visitor identity information does not meet the aforementioned visit authority,
judging whether the visitor mobile terminal meets an abnormal response condition or not under the condition that visitor identity information does not meet the visiting authority;
and when the abnormal response condition is met, triggering the host mobile terminal to output response information aiming at the visit request message.
19. The entrance guard calling method of claim 18, wherein: the abnormal response condition is that the visitor mobile terminal prepays a visit deposit through the access control client, and the visit deposit meets the visit deposit requirement of the host client.
20. The entrance guard calling method of claim 19, wherein: the step of triggering the host mobile terminal to output the response information for the visit request message is further included,
and returning the collected safety confirmation information of the host mobile terminal to the visitor mobile terminal according to the safety confirmation information.
21. The entrance guard calling method as in claim 1, wherein: triggering the host mobile terminal to output response information aiming at the visit request message, and simultaneously sending visitor identity information to the host mobile terminal in the form of a business card; the business card is a visiting business card which is made by a visitor in the access control client side in advance, or is automatically generated by the access control server based on identity information of the visitor, and information in the business card can be stored in an address book of the host mobile terminal.
22. The entrance guard calling method as in claim 21, wherein: the business card information comprises one or more of the time of the visit, an object, a specific event, a visitor mobile terminal number and visitor face image information besides the visitor basic identity information.
23. The entrance guard calling method as in claim 1, wherein:
acquiring the beating operation information on the visitor mobile terminal, acquiring beating force, and acquiring corresponding sound volume based on the corresponding relation between the preset beating force and the sound volume;
and synchronously outputting the knocker sound matched with the sound volume at the host mobile terminal.
24. The entrance guard calling method as in claim 1, wherein: after triggering the master mobile terminal to output the response information aiming at the visit request message, the master mobile terminal confirms or prohibits the operation of opening the access control.
25. The entrance guard calling method of claim 24, wherein: the operation of confirming or prohibiting the opening of the door access includes one of the following ways,
in the first mode, clicking a trigger control for confirming opening or prohibiting opening;
the second mode is to collect the voice information of the host, and after voice recognition, judge whether there is a voice instruction for confirming or prohibiting the opening of the door access;
and thirdly, collecting body action image information of the host, and judging whether an action instruction for confirming or prohibiting opening of the door access is corresponding after image recognition.
26. An access control call system according to the access control call method of claim 1, comprising a host mobile terminal, a visitor mobile terminal and an access control server terminal which are in communication connection, characterized in that:
the visitor mobile terminal is used for triggering a visit request message based on address information;
the access control server side is used for collecting registration information of an owner in the access control client side, storing a corresponding relation between the owner authentication information and the owner address information, acquiring the owner authentication information corresponding to the address information according to a visit request message based on the address information, acquiring owner mobile terminal information and triggering the owner mobile terminal;
The host mobile terminal is used for outputting response information aiming at the visit request message.
27. The access control call system of claim 26, wherein: the system also comprises an access control device, wherein the access control device comprises an access control controller and an electric control lock, the input end of the access control controller is connected with the access control server, and the output end of the access control controller is connected with the electric control lock.
28. An access control client according to the access control calling method of claim 1, comprising a host module, a visitor module and an information processing module which are in communication connection, characterized in that:
the visitor module is connected with the information processing module and is used for triggering a visit request message based on the address information and sending the visit request message to the information processing module;
the host module is connected with the information processing module and is used for collecting registration information of the host, sending the registration information to the information processing module, receiving a visit request message forwarded by the information processing module and outputting response information aiming at the visit request message;
the information processing module is used for storing the corresponding relation between the host authentication information and the host address information according to the registration information of the host, acquiring the host authentication information corresponding to the address information according to the visit request information based on the address information, acquiring the host mobile terminal information and triggering the host mobile terminal.
29. The access control client of claim 28, wherein: the entrance guard client is connected with the entrance guard device, the entrance guard device comprises an entrance guard controller and an electric control lock, the input end of the entrance guard controller is connected with the information processing module of the entrance guard client, and the output end of the entrance guard controller is connected with the electric control lock.
30. The access control client of claim 28, wherein: the visitor module comprises a door knocking action acquisition sub-module, wherein the door knocking action acquisition sub-module is used for outputting an induction interface after acquiring a host mobile terminal, acquiring the knocking action of the induction interface and sending a visit request message when judging that the knocking action accords with a preset door knocking trigger condition.
CN201711223064.8A 2017-11-29 2017-11-29 Access control calling method, system and client Active CN107862774B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711223064.8A CN107862774B (en) 2017-11-29 2017-11-29 Access control calling method, system and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711223064.8A CN107862774B (en) 2017-11-29 2017-11-29 Access control calling method, system and client

Publications (2)

Publication Number Publication Date
CN107862774A CN107862774A (en) 2018-03-30
CN107862774B true CN107862774B (en) 2024-04-05

Family

ID=61704301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711223064.8A Active CN107862774B (en) 2017-11-29 2017-11-29 Access control calling method, system and client

Country Status (1)

Country Link
CN (1) CN107862774B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734827A (en) * 2018-04-13 2018-11-02 深圳爱酷智能科技有限公司 Communication means, smart lock, server based on smart lock and readable storage medium storing program for executing
CN109285259B (en) * 2018-09-21 2023-10-31 上海学敬会展服务中心 Control system for intelligent access control and control method thereof
CN109035539A (en) * 2018-10-30 2018-12-18 四川洪诚电气科技有限公司 access control system
CN109544746A (en) * 2018-11-20 2019-03-29 北京千丁互联科技有限公司 A kind of community's access control system control method and its device
CN109658560A (en) * 2018-11-28 2019-04-19 任明和 Realize the authorization method of the long-range acoustic control dynamic code of smart lock
CN109658559A (en) * 2018-11-28 2019-04-19 任明和 Dynamic code smart lock remote-authorization method based on personalized acoustic control
CN109636967B (en) * 2018-11-28 2021-12-14 任明和 Remote dynamic code authorization method for realizing intelligent lock based on public account
CN109920110A (en) * 2019-03-04 2019-06-21 王德生 A kind of visitor information processing method and processing device
CN111862396A (en) * 2019-04-24 2020-10-30 珠海格力电器股份有限公司 Remote unlocking method and system
CN110443930A (en) * 2019-08-27 2019-11-12 恒大智慧科技有限公司 Community's caller management method and system, computer readable storage medium
CN112950826B (en) * 2021-03-23 2022-08-16 苏州金睿澳科物联网科技有限公司 Intelligent converged communication scheduling system for Internet of vehicles
CN113936365A (en) * 2021-11-25 2022-01-14 青岛海信智慧生活科技股份有限公司 Remote unlocking method and device
CN115512527B (en) * 2022-11-21 2023-03-10 广州宏途数字科技有限公司 Campus visitor management method and system based on visitor identity recognition

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102663846A (en) * 2012-05-11 2012-09-12 尤敦朋 Intelligent visitor management system based on android operating platform and control method thereof
CN103049945A (en) * 2011-10-14 2013-04-17 富泰华工业(深圳)有限公司 Electronic lock system as well as control device and control method thereof
CN105072511A (en) * 2015-08-29 2015-11-18 安徽味唯网络科技有限公司 Internet intelligent building intercom system and device
CN105528641A (en) * 2015-12-11 2016-04-27 苏州翊高科技有限公司 Method for carrying out visit appointment based on local address book, terminal and server
CN105578312A (en) * 2016-02-25 2016-05-11 广东家视通传媒有限公司 Mobile internet APP building identity recognizing and advertisement releasing method and integrated system
CN105635091A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Remote calling method and system
CN106056707A (en) * 2016-05-19 2016-10-26 李悌荷 Residential quarter network access control scheme
CN106663344A (en) * 2014-05-19 2017-05-10 阿克赛思Ip控股公司 Mobile key devices systems and methods for programming and communicating with an electronic programmable key

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049945A (en) * 2011-10-14 2013-04-17 富泰华工业(深圳)有限公司 Electronic lock system as well as control device and control method thereof
CN102663846A (en) * 2012-05-11 2012-09-12 尤敦朋 Intelligent visitor management system based on android operating platform and control method thereof
CN106663344A (en) * 2014-05-19 2017-05-10 阿克赛思Ip控股公司 Mobile key devices systems and methods for programming and communicating with an electronic programmable key
CN105635091A (en) * 2015-02-12 2016-06-01 北京神器科技有限公司 Remote calling method and system
CN105072511A (en) * 2015-08-29 2015-11-18 安徽味唯网络科技有限公司 Internet intelligent building intercom system and device
CN105528641A (en) * 2015-12-11 2016-04-27 苏州翊高科技有限公司 Method for carrying out visit appointment based on local address book, terminal and server
CN105578312A (en) * 2016-02-25 2016-05-11 广东家视通传媒有限公司 Mobile internet APP building identity recognizing and advertisement releasing method and integrated system
CN106056707A (en) * 2016-05-19 2016-10-26 李悌荷 Residential quarter network access control scheme

Also Published As

Publication number Publication date
CN107862774A (en) 2018-03-30

Similar Documents

Publication Publication Date Title
CN107862774B (en) Access control calling method, system and client
CN108412315B (en) Intelligent door lock warning system and control method thereof
CN103280009B (en) A kind of Multifunctional access device
CN107093243B (en) Door lock verification alarm method and system and terminal
CN103329179A (en) Intelligent emergency signal transmission system using mobile phone and method thereof
CN111489464A (en) Identity verification method and device, electronic equipment and computer readable storage medium
CN102663846A (en) Intelligent visitor management system based on android operating platform and control method thereof
KR101939377B1 (en) Video phone system using internet of things
CN108810470B (en) Intelligent doorbell and intelligent broadcasting method and device
JP2004013871A (en) Security system
KR102328402B1 (en) Smart door look control system and method
CN201682580U (en) Visual talkback system capable of recognizing human faces
JP2009100334A (en) Apparatus and mobile terminal for dealing with visitor, and system therefor
CN209842734U (en) Face recognition access control system with visitor function
KR20070023880A (en) Apparatus and method of user recognizing for portable device
CN108625723B (en) Method and system for controlling a physical object to be shared by several potential users
CN111047761A (en) Voice interactive visitor identity recognition method and system based on intelligent terminal
JP5331510B2 (en) Visitor management system, visitor management method, and management apparatus
JP4344303B2 (en) Entrance / exit management system
CN116311573A (en) Method and device for checking in coal preparation plant
JP2010212787A (en) Door intercom device, program to function as each of means in door intercom device, door intercom system and information processing method for the door intercom device
CN107730683A (en) Access control system based on Quick Response Code
CN111713092A (en) Setting method of Wi-Fi doorbell, integrated residence communication system and weather information providing system
CN210377604U (en) Multifunctional community access control system
KR20070041280A (en) Access blocker of parking lot driven by caller ID of public telephone network and IP telephone network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant