CN110021088A - It is distributed the page control open-door system and method for authorization architecture - Google Patents

It is distributed the page control open-door system and method for authorization architecture Download PDF

Info

Publication number
CN110021088A
CN110021088A CN201811270211.1A CN201811270211A CN110021088A CN 110021088 A CN110021088 A CN 110021088A CN 201811270211 A CN201811270211 A CN 201811270211A CN 110021088 A CN110021088 A CN 110021088A
Authority
CN
China
Prior art keywords
user
server
access control
object information
openid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811270211.1A
Other languages
Chinese (zh)
Other versions
CN110021088B (en
Inventor
周韦华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Ajar Linkage Technology Ltd
Original Assignee
Shenzhen City Ajar Linkage Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Ajar Linkage Technology Ltd filed Critical Shenzhen City Ajar Linkage Technology Ltd
Priority to CN201811270211.1A priority Critical patent/CN110021088B/en
Publication of CN110021088A publication Critical patent/CN110021088A/en
Application granted granted Critical
Publication of CN110021088B publication Critical patent/CN110021088B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C2209/00Indexing scheme relating to groups G07C9/00 - G07C9/38
    • G07C2209/04Access control involving a hierarchy in access rights

Abstract

The present invention relates to a kind of page control open-door systems and method for being distributed authorization architecture.By that will realize that data a part of authentication is arranged on third-party server, another part is arranged on access control applications server, is thusly-formed the framework of distribution authorization.Incidence relation between permission object and permission can be established according in existing logic disposably access control applications server, i.e. it is not necessary that complete authorization database is established and safeguarded in access control applications server in order to realize authentication, both the deployment speed that gate inhibition's service can have been promoted, can also promote the safety of user information.And, in the enabling request that the preset control that user triggers the wechat public platform page is sent and subsequent authentication process does not include direct user information, that is to say, preventing access control applications server by permission object information association to specific personal information during authentication, to further improve the information security of user.

Description

It is distributed the page control open-door system and method for authorization architecture
Technical field
The present invention relates to access control fields, and in particular to it is a kind of be distributed authorization architecture page control open-door system and side Method.
Background technique
It is serviced in order to facilitate using gate inhibition, handset Wechat, which can be used, in a kind of existing gate inhibition's scheme to open the door, this The basic step of scheme includes establishing authorization database and later period user in advance using the wechat application program installed on mobile phone The step of cell gate inhibition realizes authentication, is opened in scanning.
However, in existing gate inhibition's scheme, first, need matching for administrator and all users that use gate inhibition service Authorization database is established in conjunction one by one on gate inhibition's server, and the time so needed is also long, it is difficult to realize quickly deployment. Second, community is with the good application of internet, and other than gate inhibition's service, there are also other services for infrastructure equally to be awarded using similar Weigh process.In this way, there are such scene, if gate inhibition's service is the service of relatively new near-end administration, user is in order to use herein Community service before has been repeated as many times cooperation and has completed corresponding authorization.At this point, being needed if still using identical authorization flow To bother user that the processes such as registration binding is cooperated to will also experience the resentment of user in this way, not only deployment time is long again, Such case can further tie down the deployment of gate inhibition's service in turn.Third builds individual in order not to same service respectively Database between information and permission, is also easy that there are security risks.4th, when resident, which moves into or moves out etc., to be changed, property Need to increase in multiple service platforms or delete household information, cumbersome and trouble in management.It is various above to affect gate inhibition's service Deployment, and improve the security risk of user information.
Summary of the invention
The technical problem to be solved in the present invention is that in view of the above drawbacks of the prior art, providing a kind of distribution authorization frame The page control open-door system and method for structure overcome and dispose low efficiency present in existing technology, and user information safety wind The high defect in danger.
The technical solution adopted by the present invention to solve the technical problems is: providing a kind of page control for being distributed authorization architecture Open-door system, comprising:
Gate inhibition's unit, it is electric including electric lockset, the access controller being electrically connected with electric lockset, and with access controller Gate inhibition's gateway of connection;And access control applications server, third-party server, wherein
Access control applications server is used to receive the preset control triggering on subscriber terminal equipment through the wechat public platform page It opens the door and requests, enabling request includes public platform mark and user openid;
Access control applications server be also used to receive open the door request after according to the data-interface of public platform mark to the Tripartite's server sends user openid request and returns to the permission object information for being associated with the user openid;
Third-party server is used to inquire stored personal information, user openid, Yi Jiquan according to user openid The incidence relation between object information is limited, and is returned and user's openid corresponding authority object information to access control applications server;
Access control applications server, which is also used to be returned the result according to permission object information, judges whether the user openid has permission, Access control applications server has the incidence relation between permission object information and permission in advance;
Access control applications server is also used to the wechat public platform if the user openid has permission to subscriber terminal equipment The page returns to gate inhibition's identification list corresponding with permission;
Access control applications server is also used to receive on subscriber terminal equipment to be selected from permissions list through the wechat public platform page It takes the gate inhibition of input to identify, and is identified according to the gate inhibition of acquisition to access controller and send corresponding unlocking instruction.
The present invention also provides a kind of page control door opening methods for being distributed authorization architecture, this method comprises:
Step 100: access control applications server receives the preset control touching on subscriber terminal equipment through the wechat public platform page The enabling of hair is requested, and enabling request includes public platform mark and user openid;
Step 120: access control applications server sends to third-party server according to the data-interface that the public platform identifies and uses Openid request in family returns to the permission object information for being associated with the user openid;
Step 130: third-party server according to user openid inquire stored personal information, user openid, with And the incidence relation between permission object information, and return to access control applications server and believe with user's openid corresponding authority object Breath;
Step 140: access control applications server is returned the result according to permission object information judges whether the user openid has the right Limit, access control applications server have the incidence relation between permission object information and permission in advance;
Step 160: if the judging result of step 140 be it is yes, access control applications server is then to the micro- of subscriber terminal equipment Believe that the public platform page returns to gate inhibition's identification list corresponding with permission;
Step 180: access control applications server receives on subscriber terminal equipment through the wechat public platform page from permissions list Choose gate inhibition's mark of input;
Step 200: access control applications server, which is identified according to the gate inhibition of acquisition to the corresponding unlocking of access controller transmission, to be referred to It enables.
The beneficial effects of the present invention are, by that will realize that data a part of authentication is arranged on third-party server, Another part is arranged on access control applications server, is thusly-formed the framework of distribution authorization.Specifically, third-party server On the basis of incidence relation between the personal information of storage, user openid and permission object information, permission object and permission it Between incidence relation can be established according in existing logic disposably access control applications server, i.e., without in order to realize authentication And complete authorization database is established and safeguarded in access control applications server, the deployment speed of gate inhibition's service can have both been promoted, The safety of user information can be promoted.Also, it is asked in the enabling that the preset control that user triggers the wechat public platform page is sent Information related to user is user openid in asking, rather than direct user information;Gate inhibition is returned in third-party server The permission object information of application server is same, does not include direct user information, that is to say, preventing during authentication Stop access control applications server for permission object information association to specific personal information, thus, further improve the letter of user Breath safety.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is the schematic diagram of an embodiment of the page control open-door system of distribution authorization architecture of the invention;
Fig. 2 is the flow diagram of the page control door opening method first embodiment of distribution authorization architecture of the invention;
Fig. 3 is the flow diagram of the page control door opening method second embodiment of distribution authorization architecture of the invention;
Fig. 4 is the flow diagram of the page control door opening method 3rd embodiment of distribution authorization architecture of the invention;
Fig. 5 is the flow diagram of the page control door opening method fourth embodiment of distribution authorization architecture of the invention;
Fig. 6 is the flow diagram of the 5th embodiment of page control door opening method of distribution authorization architecture of the invention;
Fig. 7 is the flow diagram of the page control door opening method sixth embodiment of distribution authorization architecture of the invention.
Specific embodiment
Now in conjunction with attached drawing, elaborate to presently preferred embodiments of the present invention.
As shown in Figure 1, a kind of page control open-door system of distribution authorization architecture of the present embodiment, comprising:
Gate inhibition's unit, it is electric including electric lockset, the access controller being electrically connected with electric lockset, and with access controller Gate inhibition's gateway of connection;And access control applications server, third-party server, wherein
Access control applications server is used to receive the preset control triggering on subscriber terminal equipment through the wechat public platform page It opens the door and requests, enabling request includes public platform mark and user openid;
Access control applications server be also used to receive open the door request after according to the data-interface of public platform mark to the Tripartite's server sends user openid request and returns to the permission object information for being associated with the user openid;
Third-party server is used to inquire stored personal information, user openid, Yi Jiquan according to user openid The incidence relation between object information is limited, and is returned and user's openid corresponding authority object information to access control applications server;
Access control applications server, which is also used to be returned the result according to permission object information, judges whether the user openid has permission, Access control applications server has the incidence relation between permission object information and permission in advance;
Access control applications server is also used to the wechat public platform if the user openid has permission to subscriber terminal equipment The page returns to gate inhibition's identification list corresponding with permission;
Access control applications server is also used to receive on subscriber terminal equipment to be selected from permissions list through the wechat public platform page It takes the gate inhibition of input to identify, and is identified according to the gate inhibition of acquisition to access controller and send corresponding unlocking instruction.
In an embodiment of the present invention, in the present embodiment, electric lockset is a kind of device locked or unlocked using electric power, Such as the switching realizing locking by being driven by electricity movable member and unlocking, it common are the flexible lock of electromagnetism.Access controller is used It is equipped with and the matched driving circuit of electric lockset or instruction transceiver module in the movement of control electric lockset, such as its master control borad. Gate inhibition's gateway is then used to receive or parse the control command of upper network transmission, such as by cable broadband, wireless 4g, bluetooth or Narrowband network receives control command, and the control command of parsing is being sent to access controller, so that access controller controls electricity Sub- lockset.
Access control applications server is generally provided by service provider, such as crack interconnection science and technology.Access control applications server can be Cloud Server, in this way, can conveniently be serviced simultaneously for different cells.By being electrically connected with access controller or communication connection can be with Achieve the purpose that long-range access control controller.
User manipulates subscriber terminal equipment, logs in wechat application program and enters the public platform page, " key is opened by striking The control of door " printed words, such as text or icon can issue request of opening the door by subscriber terminal equipment.Here,
User is the permission people of permission object, such as owner is the permission people of a certain cell unit house property, he/her possesses The access permission of the cell and building unit.
Subscriber terminal equipment refers generally to the common mobile phone of user, and application is installed using the intrinsic function of mobile phone or on mobile phone Program such as wechat can be checked with sending permission and be requested.
User openid is a kind of implicit identification, and openid is unique subscriber identification of the wechat user under public platform mark (public platform mark is different, then the openid got is just different), can be used for one user of permanent marks.
The data-interface of docking third-party server has been preestablished in public platform configuration file, carries openid to third Square server issues the request for obtaining information.In this step, access control applications server only touches implicit identification, such to keep away The personal information of exposed user is exempted from.Such as access control applications server, in the case of only openid, no normal direction user initiates The request of " adding wechat good friend ".
Third-party server is generally received community platform or residential property by the sea of Tencent and is configured, and gives one example, if one Cell has 1000 house-owners, and each house-owner receives in the sea as third-party server and server registration and binds house property information, Personal information may include WeChat ID and cell-phone number, implicit identification openid, then for each house-owner, server is received in sea Such associated record will all be established;
Field 1 Field 2 Field 3 Field 4
WeChat ID ... openid…… Cell-phone number ... Permission object ...
Assuming that there are such one records on third-party server;
Field 1 Field 2 Field 3 Field 4
WeChat ID user A Openid user A Cell-phone number 135 ... 1 room -102 of star cell
It is then inquired using field 2 " openid user A ", " star cell 1-102 can be returned to access control applications server Character string as room ".
Permission object can correspond to cell room, laboratory, hotel room etc.;Cell room can use the big of respective cell Door, the enabling permission at He Loudong unit gate;Laboratory corresponds to the gate in laboratory;Hotel room corresponds to room door;
When being applied to cell gate inhibition, due to specific room and cell gate or cell door authority relation be it is fixed, Therefore incidence relation table in this way can be established quickly.
Then sea receives server and has authenticated the example of user A above, it is assumed that incidence relation has been established in access control applications server Table:
Field 1 Permission
1 room -102 of star cell 1 cell gate, gate 1, gate 2
2 rooms -101 of star cell 2 cell gates, gate 1, gate 2
So according to sea receive server return " room permission object 1-102 ", then return 1 cell gate, gate 1, gate 2 supply User further selects.If user can select gate 1 corresponding in the outside at gate 1, user according to the permissions list of return Permission, identified in this way, just sending corresponding with gate 1 gate inhibition to access control applications server.Access control applications server, according to The gate inhibition at gate 1 identifies to the access controller at gate 1 and sends unlocking instruction, to open gate 1 for user.
The beneficial effects of the present invention are the beneficial effects of the present invention are by the data a part that will realize authentication It is arranged on third-party server, another part is arranged on access control applications server, is thusly-formed the framework of distribution authorization.Tool Body, incidence relation between the stored personal information of third-party server, user openid and permission object information On the basis of, the incidence relation between permission object and permission can be built according in existing logic disposably access control applications server It is vertical, i.e., it is not necessary that complete authorization database is established and safeguarded in access control applications server in order to realize authentication, can both be promoted The deployment speed of gate inhibition's service, can also promote the safety of user information.Also, the wechat public platform page is triggered in user Information related to user is user openid in the enabling request that preset control is sent, rather than direct user information;? The permission object information that tripartite's server returns to access control applications server is same, does not include direct user information, Prevent access control applications server by permission object information association to specific personal information during authentication with regard to saying, thus, Further improve the information security of user.
About the association between personal information stored on third-party server, implicit identification and permission object information Relationship stores under resident's cooperation when the data of these incidence relations are that residential property department carries out other business, these numbers Be managed and safeguard according to by third party (or property department), have the characteristics that it is accurate, comprehensive, for example, property department collects Property fees, the resident's relevant information obtained when withholding the living expenses such as water power coal gas, these information would generally cover entire cell Almost all house property, and generally will include house-owner's personal information, implicit identification and corresponding house property information, also can sometimes Personal information including principal family member (such as house-owner spouse), and the personal information of principal family member is also and corresponding room It produces associated.
As it can be seen that being docked by the user data with third-party server, can save user is to be serviced using gate inhibition And cooperate the process authorized again, improve the usage experience of user.Meanwhile passing through the number of users with third-party server According to being docked, additionally it is possible to exempt access control applications server in the demand for locally carrying out data storage and maintenance, save server Storage and computing overhead.
For example, user's first is the resident of a certain cell, and is the identity of house-owner or kinsfolk, the door of the cell Prohibit service release third party user data docking service, and when user's first handles other business before this, has retained personal letter The incidence relation of breath, implicit identification (user openid) and house property information.Then, when user's first enters gate inhibition's service the public, Authentication can be achieved that in the operation without any registration binding.
In the prior art, user is when carrying out servicing required authentication using gate inhibition, it is always necessary to be manually entered house in advance Front yard address, personal information and the binding for being able to achieve itself through auditing rear, in contrast, method for authenticating of the invention is in rapidity Advantage with operation convenience etc. be the prior art it is incomparable, therefore the acceptance of user is also higher, it is easier to It popularizes.
About the distribution authorization architecture of gate inhibition's service, if personal information, user openid, Yi Jiquan on third-party server Limiting the incidence relation between object information is the first incidence relation, and gating prohibits the permission object information and permission established on application server Between incidence relation be the second incidence relation, the core of the first incidence relation be need authenticate and establish personal information and power The incidence relation between object information is limited, the first incidence relation is since user has been established prior to gate inhibition's service using on the time, thus The certification again of most users or whole user can be removed from, specifically, permission object information in the first incidence relation and the The consistent information bar number of permission object information in two incidence relations is approximately or equal to permission object information in the second incidence relation Item number.That is the user authenticated in advance on access control applications server is using enabling system of the invention for the first time When system, go to authenticate again without user.Further, since the second incidence relation focus on establishing permission object information and permission it Between incidence relation, and the foundation of this relationship can disposably be established according to known logic.Generally speaking, the first association is closed It has been authenticated before tying up to gate inhibition's service arrangement, the participation that the second incidence relation may not need user is disposably established, exactly such The deployment speed that distribution authorization architecture services gate inhibition is promoted.
Further, the access control applications server is judging the user for returning the result according to permission object information Whether openid is specifically used for when having permission:
It is returned the result according to permission object information and judges whether the user has bound permission object information in third-party server;
If the user binds permission object information in third-party server, further determine whether and permission object information Corresponding authority records.
In the present embodiment, if returning the result as sky for permission object, may determine that user not yet ties up in third-party server Fixed any permission object information.Equally by taking cell above as an example, if permission object information and cell is not corresponding, the permission object is not Have the authority records of the corresponding cell.If certain user is the user of moon cell, which logs in the public affairs of association star cell Many numbers and the preset enabling control of striking, then permission object information corresponding power of the access control applications server inquiry less than the user Limit record.
Further, if the access control applications server is judging the user for returning the result according to permission object information Openid does not have permission, then access control applications server is further used for: the note of third-party server is sent to subscriber terminal equipment Volume address;
Third-party server is also used to receive the registration request that subscriber terminal equipment is sent according to registered address, registration request Including user openid and personal information;
Third-party server is also used to the incidence relation established between personal information, user openid according to registration request;
Third-party server is further used for receiving the bind request that subscriber terminal equipment is sent according to bind address, binding Request includes personal information, user openid, permission object information.
Third-party server is further used for auditing bind request, and judges whether audit passes through, and basis is tied up if passing through Personal information, user openid, the incidence relation between permission object information are established in fixed request.
In the present embodiment, if the access control applications server is judging the use for returning the result according to permission object information Family openid does not have permission, there are two kinds of situations, one is unregistered, another situation is that registered but unbound, no matter which Kind situation, is first directed the user to the enrollment page of third-party server, user is facilitated smoothly to be serviced using gate inhibition, this is arranged and sentences Cutout journey can play the role of supplement.
In general, only a few users are not yet authenticated in third-party server in cell, therefore the user is the Tripartite's server does not have record;Such as cell purchase house vacant a period of time after or buy the cell second-hand house and The user of cell is moved in for the first time, because any service for infrastructure of cell is not used, is not registered in third-party server Or binding house property.By guiding this step certain customers to register and binding, be conducive to make the log-on data of third-party server more It is complete.User needs to cooperate and be registered to third-party server, to facilitate further to further realize permission verification Binding permission object information.
Since binding implicit identification and personal information are not related to substantive right generally, third-party server is connecing After receiving registration request, the incidence relation between personal information, implicit identification can be established automatically.
User has just been associated with personal information and implicit identification's information when third-party server is registered;Confirm permission object Authority information then need to authenticate personal information, request bind request is by binding personal information and permission object information, in turn Bind implicit identification and permission object information.
Third-party server can realize machine audit by artificial intelligence identification technology, can also can be by bind request It is transmitted to administrator, administrator is allowed to verify the content of bind request, authenticate.Such as between cell-phone number and specific house property Binding, administrator made a phone call by this cell-phone number to user, it is desirable that user submits other necessary data, or according to Whether the data verification put on record should cell-phone number and the binding of specific house property.
If the personal information that administrator thinks that user provides is answered with permission object Asymmetry information, can refuse to bind, i.e., Corresponding auditing result is not pass through.Cell-phone number generally all real name verification, if the corresponding user's name of cell-phone number, with house property Owner's title unanimously then pass through audit.Administrator is by forwarding auditing result to third-party server, so as to third party Server is further processed.
If third-party server audit passes through, personal information is established, implicit identification, the association between permission object information are closed System, facilitates and is called using gate inhibition's server.So far, it is bound by the guidance of application gate inhibition's server, third-party server Binding data it is more complete, so can be wider user service.
Further, access control applications server is in the data-interface for being identified according to the public platform to third-party server It sends and is also used to request to return to personal information when user openid request returns to the permission object information for being associated with the user openid;
Third-party server for according to user openid inquire stored personal information, user openid and Incidence relation between permission object information, and to when the return of access control applications server and user's openid corresponding authority object information It is also used to return personal information mark corresponding with the personal information;
Access control applications server is judging whether the user has taken in third party for returning the result according to permission object information It is specifically used for when business device binding permission object information:
Whether judge that permission object information returns the result is empty;
If permission object information returns the result not to be empty, access control applications server further judges that personal information returns the result It whether is empty;
Access control applications server is also used to when whether it is sky that permission object information returns the result, and is sent to subscriber terminal equipment The bind address of third-party server;
Third-party server is also used to receive the registration request that subscriber terminal equipment is sent according to registered address, registration request Including user openid and personal information;
Third-party server is also used to the incidence relation established between personal information, user openid according to registration request;
Third-party server is further used for receiving the bind request that subscriber terminal equipment is sent according to bind address, binding Request includes personal information, user openid, permission object information.
Third-party server is further used for auditing bind request, and judges whether audit passes through, and basis is tied up if passing through Personal information, user openid, the incidence relation between permission object information are established in fixed request.
In the present embodiment, the personal information that the request of access control applications server returns can be cell-phone number, name or identity card Number, it can be convenient whether verification user has completed registration in third-party server using the personal information of return.
In order to guarantee privacy of user, when access control applications server requests to return to personal information, it is returned only to and believes with the individual Cease corresponding personal information mark.Such as the cell-phone number that personal information is 11, then returning to the mobile phone for omitting several bit digitals Number, i.e., digital cell-phone number will be omitted as the mark of cell-phone number, and specifically, starting is 135, the mark for the cell-phone number that tail number is 3356 Knowing is 135****3356.
Each embodiment of the page control door opening method to present invention distribution authorization architecture is elaborated below.
Referring to figure 2., it is distributed in the first embodiment of page control door opening method of authorization architecture, this method comprises:
Step 100: access control applications server receives the preset control touching on subscriber terminal equipment through the wechat public platform page The enabling of hair is requested, and enabling request includes public platform mark and user openid;
Specifically, user logs in the i.e. triggerable request of opening the door of webpage control of striking " key enabling " after public platform.If with Family not yet pay close attention to public platform then can by way of scanning or search public platform mode pay close attention to.
User is the permission people of permission object, such as owner is the permission people of a certain cell unit house property, he/her possesses The access permission of the cell and building unit.
Terminal device refers generally to the common mobile phone of user, and application program is installed using the intrinsic function of mobile phone or on mobile phone Such as wechat can be checked with sending permission and be requested.
Access control applications server is generally provided by service provider, such as crack interconnection science and technology.Access control applications server can be Cloud Server, in this way, can conveniently be serviced simultaneously for different cells.By being electrically connected with access controller or communication connection can be with Achieve the purpose that long-range access control controller.
User openid is a kind of implicit identification, and openid is unique subscriber identification of the wechat user under public platform mark (public platform mark is different, then the openid got is just different), can be used for one user of permanent marks.Implicit identification is a kind of The public can not directly using and touch the information of user, personal information then belong to the public can directly using and touch user's Information.Such as WeChat ID, cell-phone number belong to personal information.User logs in wechat public platform with WeChat ID, and wechat platform is that this is micro- The openid that signal distribution is associated with the wechat public platform then belongs to implicit identification, and the public can not be directly contacted using the openid User.
Step 120: access control applications server sends to third-party server according to the data-interface that the public platform identifies and uses Openid request in family returns to the permission object information for being associated with the user openid;
The data-interface of docking third-party server has been preestablished in public platform configuration file, carries openid to third Square server issues the request for obtaining information.In this step, access control applications server only touches implicit identification, such to keep away The personal information of exposed user is exempted from.Such as access control applications server, in the case of only openid, no normal direction user initiates The request of " adding wechat good friend ".
Third-party server is generally received community platform or residential property by the sea of Tencent and is configured, and gives one example, if one Cell has 1000 house-owners, and each house-owner receives in the sea as third-party server and server registration and binds house property information, Personal information may include WeChat ID and cell-phone number, implicit identification openid, then for each house-owner, server is received in sea Such associated record will all be established;
Field 1 Field 2 Field 3 Field 4
WeChat ID ... openid…… Cell-phone number ... Permission object ...
Step 130: third-party server according to user openid inquire stored personal information, user openid, with And the incidence relation between permission object information, and return to access control applications server and believe with user's openid corresponding authority object Breath;
Assuming that there are such one records on third-party server;
Field 1 Field 2 Field 3 Field 4
WeChat ID user A Openid user A Cell-phone number 135 ... 1 room -102 of star cell
It is then inquired using field 2 " openid user A ", " star cell 1-102 can be returned to access control applications server Character string as room ".
Step 140: access control applications server is returned the result according to permission object information judges whether the user openid has the right Limit, access control applications server have the incidence relation between permission object information and permission in advance;
It should be understood that the corresponding field of permission object information and the corresponding field of permission are not sky, both may determine that The user openID has permission.
Permission object can correspond to cell room, laboratory, hotel room etc.;Cell room can use the big of respective cell Door, the enabling permission at He Loudong unit gate;Laboratory corresponds to the gate in laboratory;Hotel room corresponds to room door;
When being applied to cell gate inhibition, due to specific room and cell gate or cell door authority relation be it is fixed, Therefore incidence relation table in this way can be established quickly.
Then sea receives server and has authenticated the example of user A above, it is assumed that incidence relation has been established in access control applications server Table:
Field 1 Permission
1 room -102 of star cell 1 cell gate, gate 1, gate 2
2 rooms -101 of star cell 2 cell gates, gate 1, gate 2
Step 160: if the judging result of step 140 be it is yes, access control applications server is then to the micro- of subscriber terminal equipment Believe that the public platform page returns to gate inhibition's identification list corresponding with permission;
It continues the example above, what Ruo Haina server returned is " room permission object 1-102 ", then access control applications server returns It is for further selection by the user to go back to 1 cell gate, gate 1, gate 2.
Step 180: access control applications server receives on subscriber terminal equipment through the wechat public platform page from permissions list Choose gate inhibition's mark of input;
If user can select the corresponding permission in gate 1 according to the permissions list of return in the outside at gate 1, user, In this way, just sending gate inhibition's mark corresponding with gate 1 to access control applications server.
Step 200: access control applications server, which is identified according to the gate inhibition of acquisition to the corresponding unlocking of access controller transmission, to be referred to It enables.
Access control applications server identifies to the access controller at gate 1 according to the gate inhibition with gate 1 and sends unlocking instruction, with Gate 1 is opened for user.
Further, referring to figure 3., it is distributed in the second embodiment of page control door opening method of authorization architecture, step 140 specifically include:
Step 141: whether access control applications server is returned the result according to permission object information judges the user in third party Server binds permission object information;
If permission object returns the result as sky, it may determine that user not yet binds any permission object in third-party server Information.
Step 142: if the judging result of step 141 be it is yes, access control applications server has been further determined whether and has been weighed Limit the corresponding authority records of object information.
Equally by taking cell above as an example, if permission object information and cell is not corresponding, which does not have correspondence The authority records of the cell.Such as the user of moon cell logs in the public platform progress striking preset control enabling of star cell Operation will not find corresponding authority records even if the permission object information then returned is not sky.
Further, referring to figure 4., it is distributed in the 3rd embodiment of page control door opening method of authorization architecture, the party Method further include:
Step 220: if the judging result of step 140 be it is no, access control applications server sends the to subscriber terminal equipment The registered address of tripartite's server;
It is understood that if the judging result of step 140 be it is no, there are two kinds of situations, and first is unregistered, and second has infused Volume but it is unbound, no matter which kind of situation, first direct the user to the enrollment page of third-party server, user facilitated smoothly to use Gate inhibition's service, is arranged the judgement process, so as to play the role of supplement.In general, only a small number of in a cell to use Family is not yet authenticated in third-party server, therefore the user does not have record in third-party server;Such as in cell purchase It after house vacant a period of time or buys the second-hand house of the cell and moves in the user of cell for the first time, because cell is not used Any service for infrastructure, therefore house property is not registered or bound in third-party server.By guiding this step certain customers to register And binding, be conducive to make the log-on data of third-party server more complete.
Step 240: third-party server receives the registration request that subscriber terminal equipment is sent according to registered address, and registration is asked It asks including user openid and personal information;
User needs to cooperate and be registered to third-party server, to facilitate into one to further realize permission verification The binding permission object information of step.
Step 260: third-party server according to registration request, close by the association established between personal information, user openid System;
Since binding implicit identification and personal information are not related to substantive right generally, third-party server is connecing The incidence relation between personal information, implicit identification can be established automatically after receiving registration request.
Step 300: third-party server receives the bind request that subscriber terminal equipment is sent according to bind address, and binding is asked It asks including personal information, user openid, permission object information;
User has just been associated with personal information and implicit identification's information when third-party server is registered;Confirm permission object Authority information then need to authenticate personal information, request bind request is by binding personal information and permission object information, in turn Bind implicit identification and permission object information.
Step 320: third-party server audits bind request;
It is understood that third-party server can realize machine audit in conjunction with the technology of recognition of face, can also incite somebody to action Bind request is transmitted to administrator, and administrator is allowed to verify the content of bind request, authenticate.Such as cell-phone number and specific Binding between house property, administrator are made a phone call by this cell-phone number to user, it is desirable that and user submits other necessary data, Or whether should cell-phone number and the binding of specific house property according to the data verification put on record.
Step 340: whether audit passes through;
If then knowing auditing result immediately after the completion of audit as machine is audited;If being administrator's manual examination and verification, pipe The personal information that reason person thinks that user provides is answered with permission object Asymmetry information, then can refuse to bind, i.e., corresponding auditing result Not pass through.Cell-phone number generally all real name verification, owner's title if the corresponding user's name of cell-phone number, with house property It is consistent then pass through audit.Administrator is by forwarding auditing result to third-party server, so that third-party server is further located Reason.
Step 360: if the auditing result of step 340 is to pass through, third-party server is established personal according to bind request Information, user openid, the incidence relation between permission object information.
Bind request is reviewed by rear, then third-party server establish personal information, implicit identification, permission object information it Between incidence relation, facilitate and be called using gate inhibition's server.So far, it is bound by the guidance of application gate inhibition's server, the The binding data of tripartite's server is more complete, so can be wider user service.
Preferably, this method further include: step 380: prompt letter is sent to access control applications server or subscriber terminal equipment Breath.In this way, access control applications server can be that user further services according to prompt information.Such as inform that user does not pass through The concrete reason of permission verification guides user further to work;Audit does not pass through, it may be possible to because what user submitted Permission object information is wrong;Or user belongs to malice binding etc..Directly issuing subscriber terminal equipment also facilitates user to know power Limit the result of verification.
Further, referring to figure 5., it is distributed in the fourth embodiment of page control door opening method of authorization architecture,
Step 120 specifically includes: the data-interface that access control applications server is identified according to the public platform is to third party's service Device sends user openid request and returns to the permission object information for being associated with the user openid, and personal information;
Requesting the personal information returned can be cell-phone number, name or identification card number, can be with using the personal information of return Facilitate whether verification user completes to register in third-party server.
Step 130 specifically includes: third-party server inquires stored personal information, user according to user openid Incidence relation between openid and permission object information, and corresponding permission object information is returned to access control applications server, and Personal information mark corresponding with the personal information;
In order to guarantee privacy of user, when access control applications server requests to return to personal information, it is returned only to and believes with the individual Cease associated personal information mark.Such as personal information is 11 cell-phone number not, then returning to the mobile phone for omitting several bit digitals Number, i.e., digital cell-phone number will be omitted as the mark of cell-phone number, and specifically, starting is 135, the mark for the cell-phone number that tail number is 3356 Knowing is 135****3356.
Step 141 specifically includes:
Step 141a: whether it is empty that access control applications server judges that permission object information returns the result;
Judge whether returning the result for permission object information is that sky then can determine whether out user openid whether in third party Server registration.If permission object information returns the result not for sky, specification active user openid is in third party's service Device registration.
Step 141b: if the judging result of step 141a be it is no, access control applications server further judges personal information Whether return the result is empty;
If permission object information returns the result not for sky, judge whether returning the result for personal information is that sky can determine whether out to work as Whether preceding openid has bound with personal information.
This method further include:
Step 400: if the judging result of step 141a be it is yes, access control applications server to subscriber terminal equipment send third The bind address of square server;
User openid is registered but unbound, by the binding to subscriber terminal equipment transmission third-party server Location can guide user to carry out bindings, to use gate inhibition's services component of the invention to authenticate basis.
Step 420: third-party server receives subscriber terminal equipment according to bind address to the bind request of transmission, binds Request includes personal information, user openid, permission object information;
User has just been associated with personal information and implicit identification's information when third-party server is registered;Confirm permission object Authority information then need to authenticate personal information, request bind request is by binding personal information and permission object information, in turn Bind implicit identification and permission object information.
Step 440: third-party server audits bind request;
It is identical as step 320, it is to be understood that third-party server can realize machine in conjunction with the technology of recognition of face Audit, can also be transmitted to administrator for bind request, administrator is allowed to verify the content of bind request, authenticate.Such as Binding between cell-phone number and specific house property, administrator are made a phone call by this cell-phone number to user, it is desirable that user submits Other necessary data, or whether should cell-phone number and the binding of specific house property according to the data verification put on record.
Step 460: whether audit passes through;
It is identical as step 340, if then knowing auditing result immediately after the completion of audit as machine is audited;If being pipe Reason person's manual examination and verification, the personal information that administrator thinks that user provides answer with permission object Asymmetry information, then can refuse to bind, i.e., Corresponding auditing result is not pass through.Cell-phone number generally all real name verification, if the corresponding user's name of cell-phone number, with house property Owner's title unanimously then pass through audit.Administrator is by forwarding auditing result to third-party server, so as to third party Server is further processed.
Step 480: third-party server according to bind request, establish personal information, user openid, permission object information it Between incidence relation.
Identical as step 360, bind request is reviewed by rear, then third-party server establishes personal information, recessive mark Know, the incidence relation between permission object information, facilitates and be called using gate inhibition's server.So far, it is serviced by application gate inhibition The guidance of device is bound, and the binding data of third-party server is more complete, so can be wider user service.
Further, Fig. 6 is please referred to, is distributed in the 5th embodiment of the page control door opening method of authorization architecture, the party Method further include:
Step 220: access control applications server sends the registered address of third-party server to subscriber terminal equipment;
Step 240: third-party server receives the registration request that subscriber terminal equipment is sent according to registered address, and registration is asked It asks including user openid and personal information;
Step 260: third-party server according to registration request, close by the association established between personal information, user openid System;
Step 520: third-party server sends the bind address of third-party server to subscriber terminal equipment.
Further, Fig. 7 is please referred to, is distributed in the sixth embodiment of page control door opening method of authorization architecture,
Step 200 specifically includes: gate inhibition's server identifies to access controller according to the gate inhibition of acquisition and sends corresponding open Lock instruction, and notice of having unlocked is sent to subscriber terminal equipment.It can be informed by transmission notice and be completed out on user program Lock, if actually door lock is not opened, user can look for property to feed back according to the notice.
It should be understood that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations, to ability It for field technique personnel, can modify to technical solution illustrated in the above embodiments, or special to part of technology Sign is equivalently replaced;And all such modifications and replacement, it should all belong to the protection domain of appended claims of the present invention.

Claims (10)

1. a kind of page control open-door system for being distributed authorization architecture characterized by comprising
Gate inhibition's unit, including electric lockset, and the access controller being electrically connected with electric lockset;
Access control applications server and third-party server, wherein
Access control applications server is used to receive the enabling of the preset control triggering on subscriber terminal equipment through the wechat public platform page Request, enabling request include public platform mark and user openid;
Access control applications server be also used to receive open the door request after according to the data-interface of public platform mark to third party Server sends user openid request and returns to the permission object information for being associated with the user openid;
Third-party server is used to inquire stored personal information, user openid and permission object according to user openid Incidence relation between information, and returned and user's openid corresponding authority object information to access control applications server;
Access control applications server, which is also used to be returned the result according to permission object information, judges whether the user openid has permission, gate inhibition Application server has the incidence relation between permission object information and permission in advance;
Access control applications server is also used to the wechat public platform page if the user openid has permission to subscriber terminal equipment Return to gate inhibition's identification list corresponding with permission;
Access control applications server be also used to receive on subscriber terminal equipment chosen from permissions list through the wechat public platform page it is defeated The gate inhibition's mark entered, and identified according to the gate inhibition of acquisition to access controller and send corresponding unlocking instruction.
2. the page control open-door system of distribution authorization architecture as described in claim 1, which is characterized in that
The access control applications server is judging whether the user openid has permission for returning the result according to permission object information When be specifically used for:
It is returned the result according to permission object information and judges whether the user has bound permission object information in third-party server;
If the user binds permission object information in third-party server, further determine whether corresponding with permission object information Authority records.
3. the page control open-door system of distribution authorization architecture as claimed in claim 2, which is characterized in that
If the access control applications server is judging that the user openid is not weighed for returning the result according to permission object information Limit, then access control applications server is further used for: the registered address of third-party server is sent to subscriber terminal equipment;
Third-party server is also used to receive the registration request that subscriber terminal equipment is sent according to registered address, and registration request includes User openid and personal information;
Third-party server is also used to the incidence relation established between personal information, user openid according to registration request;
Third-party server is further used for receiving the bind request that subscriber terminal equipment is sent according to bind address, bind request Including personal information, user openid, permission object information;
Third-party server is further used for auditing bind request, and judges whether audit passes through, if being asked if according to binding It asks, establishes personal information, user openid, the incidence relation between permission object information.
4. the page control open-door system of distribution authorization architecture as claimed in claim 2, which is characterized in that
Access control applications server sends user to third-party server in the data-interface for identifying according to the public platform Openid request is also used to request to return to personal information when returning to the permission object information for being associated with the user openid;
Third-party server is for inquiring stored personal information, user openid and permission according to user openid Incidence relation between object information, and to access control applications server return with user's openid corresponding authority object information when also use It is identified in returning to personal information corresponding with the personal information;
Whether access control applications server is judging the user in third-party server for being returned the result according to permission object information It is specifically used for when binding permission object information:
Whether judge that permission object information returns the result is empty;
If permission object information return the result not for sky, access control applications server further judge personal information return the result whether For sky;
Access control applications server is also used to when whether it is sky that permission object information returns the result, and sends third to subscriber terminal equipment The bind address of square server;
Third-party server is also used to receive the registration request that subscriber terminal equipment is sent according to registered address, and registration request includes User openid and personal information;
Third-party server is also used to the incidence relation established between personal information, user openid according to registration request;
Third-party server is further used for receiving the bind request that subscriber terminal equipment is sent according to bind address, bind request Including personal information, user openid, permission object information.
Third-party server is further used for auditing bind request, and judges whether audit passes through, if being asked if according to binding It asks, establishes personal information, user openid, the incidence relation between permission object information.
5. a kind of page control door opening method for being distributed authorization architecture, which is characterized in that this method comprises:
Step 100: access control applications server receives the preset control triggering on subscriber terminal equipment through the wechat public platform page It opens the door and requests, enabling request includes public platform mark and user openid;
Step 120: access control applications server sends user to third-party server according to the data-interface that the public platform identifies Openid request returns to the permission object information for being associated with the user openid;
Step 130: third-party server inquires stored personal information, user openid, Yi Jiquan according to user openid The incidence relation between object information is limited, and is returned and user's openid corresponding authority object information to access control applications server;
Step 140: access control applications server is returned the result according to permission object information judges whether the user openid has permission, door Prohibit application server and has the incidence relation between permission object information and permission in advance;
Step 160: if the judging result of step 140 be it is yes, access control applications server is then public to the wechat of subscriber terminal equipment Crowd's page returns to gate inhibition's identification list corresponding with permission;
Step 180: access control applications server, which receives, to be chosen from permissions list on subscriber terminal equipment through the wechat public platform page The gate inhibition of input identifies;
Step 200: access control applications server identifies to access controller according to the gate inhibition of acquisition and sends corresponding unlocking instruction.
6. the page control door opening method of distribution authorization architecture as claimed in claim 5, which is characterized in that
Step 140 specifically includes:
Step 141: whether access control applications server is returned the result according to permission object information judges the user in third party's service Device binds permission object information;
Step 142: if the judging result of step 141 be it is yes, access control applications server has further determined whether and permission object The corresponding authority records of information.
7. the page control door opening method of distribution authorization architecture as claimed in claim 6, which is characterized in that this method is also wrapped It includes:
Step 220: if the judging result of step 140 be it is no, access control applications server to subscriber terminal equipment send third party The registered address of server;
Step 240: third-party server receives the registration request that subscriber terminal equipment is sent according to registered address, registration request packet Include user openid and personal information;
Step 260: third-party server establishes the incidence relation between personal information, user openid according to registration request;
Step 300: third-party server receives the bind request that subscriber terminal equipment is sent according to bind address, bind request packet Include personal information, user openid, permission object information;
Step 320: third-party server audits bind request;
Step 340: whether audit passes through;
Step 360: if the auditing result of step 340 is to pass through, third-party server establishes personal letter according to bind request Breath, user openid, the incidence relation between permission object information.
8. the page control door opening method of distribution authorization architecture as claimed in claim 6, which is characterized in that step 120 is specific The data-interface that include: access control applications server identify according to the public platform sends user openid request to third-party server Return to the permission object information for being associated with the user openid, and personal information;
Step 130 specifically includes: third-party server inquires stored personal information, user according to user openid Incidence relation between openid and permission object information, and corresponding permission object information is returned to access control applications server, and Personal information mark corresponding with the personal information;
Step 141 specifically includes:
Step 141a: whether it is empty that access control applications server judges that permission object information returns the result;
Step 141b: if the judging result of step 141a be it is no, access control applications server further judge personal information return It as a result whether is empty;
This method further include:
Step 400: if the judging result of step 141a be it is yes, access control applications server to subscriber terminal equipment send third party clothes The bind address of business device;
Step 420: third-party server receives subscriber terminal equipment according to bind address to the bind request of transmission, bind request Including personal information, user openid, permission object information;
Step 440: third-party server audits bind request;
Step 460: whether audit passes through;
Step 480: third-party server establishes personal information, user openid, between permission object information according to bind request Incidence relation.
9. the page control door opening method of distribution authorization architecture as claimed in claim 8, which is characterized in that this method is also wrapped It includes:
Step 220: access control applications server sends the registered address of third-party server to subscriber terminal equipment;
Step 240: third-party server receives the registration request that subscriber terminal equipment is sent according to registered address, registration request packet Include user openid and personal information;
Step 260: third-party server establishes the incidence relation between personal information, user openid according to registration request;
Step 520: third-party server sends the bind address of third-party server to subscriber terminal equipment.
10. such as the page control door opening method of the described in any item distribution authorization architectures of claim 5-9, which is characterized in that
Step 200 specifically includes: gate inhibition's server, which is identified according to the gate inhibition of acquisition to the corresponding unlocking of access controller transmission, to be referred to It enables, and sends notice of having unlocked to subscriber terminal equipment.
CN201811270211.1A 2018-10-29 2018-10-29 Page control door opening system and method of distributed authorization architecture Active CN110021088B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811270211.1A CN110021088B (en) 2018-10-29 2018-10-29 Page control door opening system and method of distributed authorization architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811270211.1A CN110021088B (en) 2018-10-29 2018-10-29 Page control door opening system and method of distributed authorization architecture

Publications (2)

Publication Number Publication Date
CN110021088A true CN110021088A (en) 2019-07-16
CN110021088B CN110021088B (en) 2021-06-29

Family

ID=67188501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811270211.1A Active CN110021088B (en) 2018-10-29 2018-10-29 Page control door opening system and method of distributed authorization architecture

Country Status (1)

Country Link
CN (1) CN110021088B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111192393A (en) * 2019-09-19 2020-05-22 腾讯科技(深圳)有限公司 Network door opening method and device and computer equipment
CN114677810A (en) * 2021-05-20 2022-06-28 腾讯云计算(北京)有限责任公司 Storage data processing method and device, electronic equipment and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080093446A1 (en) * 2002-02-07 2008-04-24 Minolta Company, Ltd. Verification system, server, and electronic instrument
CN104240342A (en) * 2014-08-25 2014-12-24 中国航天科工集团第四研究院指挥自动化技术研发与应用中心 Access control method and device
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN105735826A (en) * 2016-04-08 2016-07-06 国网安徽省电力公司宣城供电公司 Intelligent key management box system
CN105869238A (en) * 2016-03-24 2016-08-17 深圳市前海铂智科技有限公司 Access control system based on WeChat platform and WeChat control method
CN106373237A (en) * 2016-08-31 2017-02-01 北京厚文知识产权顾问有限公司 Remote control door lock system based on Wechat
CN106447849A (en) * 2016-08-31 2017-02-22 北京厚文知识产权顾问有限公司 Authenticating method of door access system based on WeChat services
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
CN108597080A (en) * 2018-04-24 2018-09-28 吴东辉 Door-access control method and device based on instant messaging and system
CN108734813A (en) * 2017-04-19 2018-11-02 腾讯科技(深圳)有限公司 The distribution method and device of Temporary Access Control Card

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080093446A1 (en) * 2002-02-07 2008-04-24 Minolta Company, Ltd. Verification system, server, and electronic instrument
CN104240342A (en) * 2014-08-25 2014-12-24 中国航天科工集团第四研究院指挥自动化技术研发与应用中心 Access control method and device
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN105869238A (en) * 2016-03-24 2016-08-17 深圳市前海铂智科技有限公司 Access control system based on WeChat platform and WeChat control method
CN105735826A (en) * 2016-04-08 2016-07-06 国网安徽省电力公司宣城供电公司 Intelligent key management box system
CN106373237A (en) * 2016-08-31 2017-02-01 北京厚文知识产权顾问有限公司 Remote control door lock system based on Wechat
CN106447849A (en) * 2016-08-31 2017-02-22 北京厚文知识产权顾问有限公司 Authenticating method of door access system based on WeChat services
CN108734813A (en) * 2017-04-19 2018-11-02 腾讯科技(深圳)有限公司 The distribution method and device of Temporary Access Control Card
CN108230508A (en) * 2018-01-09 2018-06-29 桑田智能技术(上海)有限公司 One kind is based on the control of Internet of Things intelligent object Yunmen access control system and management method
CN108597080A (en) * 2018-04-24 2018-09-28 吴东辉 Door-access control method and device based on instant messaging and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111192393A (en) * 2019-09-19 2020-05-22 腾讯科技(深圳)有限公司 Network door opening method and device and computer equipment
CN111192393B (en) * 2019-09-19 2022-04-22 腾讯科技(深圳)有限公司 Network door opening method and device and computer equipment
CN114677810A (en) * 2021-05-20 2022-06-28 腾讯云计算(北京)有限责任公司 Storage data processing method and device, electronic equipment and medium

Also Published As

Publication number Publication date
CN110021088B (en) 2021-06-29

Similar Documents

Publication Publication Date Title
CN106652135B (en) Access control method and its system based on cloud and planar bar code technology
CN103679906B (en) Entrance guard management system and method based on wireless network
CN110021092B (en) Tenant access control method based on openid
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN103295304B (en) Based on community intelligent entrance guard control method and the device thereof of mobile phone 3G network
KR101920654B1 (en) Enterance control system and method based on near field communication
CN103312676B (en) Terminal, server and terminal safety management method
CN204791237U (en) Wireless Intelligence entrance guard's intercom system
CN104158824B (en) Genuine cyber identification authentication method and system
CN104952136A (en) Wireless intelligent access control talk-back system
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN106355708A (en) Door control system capable of conferring opening authority to visitors and door control management method
CN102903167A (en) Management system for renting and selling houses
CN104732636A (en) Bluetooth cellphone-based intelligent community access control system and method
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN110021086B (en) Openid-based temporary authorization access control method
US20070248219A1 (en) System and Method for Wirelessly Actuating a Moveable Structure
CN110021085A (en) A kind of open-door system and method for barcode scanning parallel proof
CN110021093A (en) Access control method based on openid
CN111292458A (en) Bluetooth access control system and unlocking method thereof
CN110021088A (en) It is distributed the page control open-door system and method for authorization architecture
CN109285250A (en) A kind of intelligent entrance guard control system based on wechat public platform
CN108447167A (en) One kind can call Guest Pass integrated system and its control method
CN109523665A (en) The intelligent door lock key hair fastener platform realized based on blue-tooth technology
CN111784901A (en) Cloud access control system based on cloud computing and mobile internet and implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant