CN110189448A - A kind of access control system control method - Google Patents
A kind of access control system control method Download PDFInfo
- Publication number
- CN110189448A CN110189448A CN201910471475.1A CN201910471475A CN110189448A CN 110189448 A CN110189448 A CN 110189448A CN 201910471475 A CN201910471475 A CN 201910471475A CN 110189448 A CN110189448 A CN 110189448A
- Authority
- CN
- China
- Prior art keywords
- current
- resident
- request
- control system
- access control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention belongs to entrance guard management technical fields, disclose a kind of access control system control method.The present invention includes: to receive request of opening the door, and judge to open the door and request whether to include authorization code, and request of then opening the door in this way is that resident requests, if request of otherwise opening the door is guest request;It whether effective verifies authorization code, then exports unlocking in this way and order and end task, such as otherwise acquire realtime graphic;Obtain human face region, verifying human face region whether with resident's database matching, then export in this way unlocking order and end task;Judge whether guest request includes temporary password string, then verifies current temporary password string in this way, such as otherwise judges whether comprising room number information or cell-phone number;It whether effective verifies temporary password string, then exports unlocking in this way and order and end task.Operation of the present invention is easy, and by the verifying of resident's database and authorization code and temporary password string, so that resident opens the door, record can be fully recorded, and convenient visitor is current, improves user experience, is suitable for promoting the use of.
Description
Technical field
The invention belongs to entrance guard management technical fields, and in particular to a kind of access control system control method.
Background technique
With the continuous development of science and technology, continuous improvement of people's living standards, smart home industry is increasingly popular, makees
For the basic product of smart home, intelligent access control system is also concerned;Intelligent access control system is different from tradition machinery gate inhibition,
Safety, identification, management aspect are more intelligent, and resident or visitor do not need Physical key, can generation by verification information
Gate inhibition is opened for traditional Physical key.
Existing access control system mostly uses greatly input password or the knowledge of ID card to open the door otherwise, and door-opening mode is excessively single,
There is inconvenience using more;Meanwhile visitor is when needing to open access control system, existing access control system can only by videophone with it is corresponding
Room or property are linked up, and particularly with the big place of user sessions, need frequently to open the door, the response time is too long, and increases enabling
Workload, practicability is low, and informs visitor's fixed password it will cause password leakages, causes security risk.
Summary of the invention
In order to solve the above problems existing in the present technology, it is an object of that present invention to provide a kind of access control system controlling parties
Method facilitates resident and visitor to use by a variety of door-opening modes, easy to operate, and it is hidden to avoid safety caused by fixed password leakage
Suffer from, it is safe and practical.
The technical scheme adopted by the invention is as follows:
A kind of access control system control method, comprising the following steps:
S1. the enabling request from access control system is received, and judges whether when button fly front request include authorization code, if so,
Then when button fly front request be resident request, enter step S2, if not, when button fly front request be guest request, enter step S4;
S2. whether verifying current grant code is effective, orders if so, then exporting unlocking to access control system, and terminates currently to open
Door request task, if not, acquiring the realtime graphic in front of current access control system;
S3. the human face region in current realtime graphic is obtained, and traverses resident's database, whether verifies current face region
It matches with any resident's face information in resident's database, orders if so, then exporting unlocking to access control system, and terminate current
Enabling request task, if not, output enabling failure information, and registration prompt is exported to access control system, then terminate currently to open
Door request task;
S4. judge whether current guest request includes temporary password string, if so, current temporary password string is then verified, if not,
Then continue to judge whether current guest request includes room number information or cell-phone number;
S5. it whether effective verifies current temporary password string, orders if so, then exporting unlocking to access control system, and terminate to work as
Button fly front request task, if not, continuing to judge whether current guest request includes room number information or cell-phone number;
S6. if current guest request includes room number information or cell-phone number, then export unlocking request to current room number information or
The corresponding register account number of cell-phone number, such as current guest request do not include room number information or cell-phone number, then export enabling failure information,
And terminate to work as button fly front request task.
Preferably, further comprising the steps of:
S7. judge whether to there is any register account number to respond in preset time and agree to current request of unlocking, if so, then exporting
It unlocks and orders to access control system, and terminate to work as button fly front request task, if not, output enabling failure information, then terminates to work as
Button fly front request task;Wherein, after any register account number response and the current unlocking of agreement are requested, the unlocking request of other accounts is
When interrupt.
Preferably, when current guest request does not include room number information or cell-phone number, the specific steps are as follows:
Whether real-time detection has the request of the human-computer interaction from access control system, if so, then acquiring testing for current visitor in real time
It demonstrate,proves video flowing and verifying audio stream and repeats step S1 if not, terminating to work as button fly front request task.
Judge in current video stream and audio stream whether to include keyword, order if so, then exporting unlocking to access control system,
And terminate to work as button fly front request task, if not, output enabling failure information, terminates to repeat step when button fly front request task
S1。
Preferably, the authorization code is made of room number information and corresponding fixed password, any room number is unique right
Ying Youyi authorization code.
Preferably, including multiple room number files in resident's database;Include in each room number file fixed authorization code,
Resident's identity information and room number data;Each resident's identity information uniquely corresponds to a login account.
Preferably, specific registration step is as follows after output registration prompt to access control system:
The registration information including room number, cell-phone number and identity information is received, by the room in current room number and resident's database
Number file is corresponding, then judge current identity information whether with the identity information matching in corresponding room number file, if so, then exporting
Face supplement prompt, if not, corresponding to the authentication information for creating current identity information in room number in resident's database;
Whether effective verify current authentication information, if so, current resident's identity information is then created in current room number file,
And it regard current phone number as current resident's identity information uniquely corresponding login account, if not, output registration failure information.
Preferably, after creating current resident's identity information in current room number file, output face information typing prompt,
Face image data is received, whether complete judges current face's image data, if so, then using current face's image data as working as
Preceding resident's identity information uniquely corresponds to resident's face information, if not, output face typing failure information;Each resident's identity letter
The unique corresponding resident's face information of breath.
Preferably, verifying current grant code it is whether effective when, traverse resident's database, judge current grant code whether with
Any fixed authorization code matching in resident's database, if so, then current grant code is effective, if not, current grant code is invalid.
Preferably, verify current temporary password string it is whether effective when, traverse temporary password table, judge in temporary password table
With the presence or absence of with the consistent temporary password string of current temporary password string, if so, then current temporary password string is effective, if not, working as
Preceding temporary password string is invalid.
Preferably, the setting steps of the temporary password string are as follows:
The interim unlocking request from register account number is received, then temporary password generator generates at random and exports fixed word
Long random cipher character, at the same obtain network time in time zone corresponding to current temporary password generator as it is current when
Between;
Irreversible face is generated after the authorization code of random cipher character, current time and current register account number is calculated
When password string, and the temporary password of generation is stored in temporary password table;Each temporary password string is effective in preset duration,
Wherein, preset duration=default out-of-service time-current time.
The invention has the benefit that
Resident and visitor is facilitated to use by a variety of door-opening modes, it is easy to operate, caused by avoiding fixed password leakage
Security risk simultaneously, and passes through the verifying of resident's database and authorization code and temporary password string, so that resident's enabling record can
It is fully recorded, and visitor foreground resignation system is become into the interviewed resident's authorizing system of visitor, do text registration again without visitor,
Reduce the workload of administrative staff, convenient visitor is current, improves user experience;The present invention can trace any time
Access control system passage situation in section is analyzed and is checked retrospect to suspicious current record, improves society with digitlization means
The safety index in area is suitable for promoting the use of.
Detailed description of the invention
Fig. 1 is flow diagram of the invention.
Specific embodiment
With reference to the accompanying drawing and specific embodiment does further explaination to the present invention.
Embodiment 1:
As shown in Figure 1, the present embodiment provides a kind of access control system control methods, comprising the following steps:
S1. the enabling request from access control system is received, and judges whether when button fly front request include authorization code, if so,
Then when button fly front request be resident request, enter step S2, if not, when button fly front request be guest request, enter step S4;
It is possible thereby to pass through the type classification visitor and resident of the received password of access control system, practicability is high;Request of opening the door can be shifting
What dynamic terminal issued, or user is issued by access control system, and when mobile terminal issues enabling request, request of opening the door is same
When received by background server and access control system, background server defaults enabling request from corresponding access control system.
S2. whether verifying current grant code is effective, orders if so, then exporting unlocking to access control system, and terminates currently to open
Door request task, if not, acquiring the realtime graphic in front of current access control system;Resident can preferentially be used by access control system
Password is current, the mode of recognition of face can also be used current in the situation of password mistake, various ways make resident pass through door
Access control system is more convenient.
In the present embodiment, authorization code is made of room number information and corresponding fixed password, and any room number is uniquely corresponding with
One authorization code;Authorization code is set when first used by current access control system;Resident's data are stored in after each authorization code creation
In library;So that any visitor for opening access control system can be corresponding with any room, so that managing caller is more just
Victory, trackability are high.
In the present embodiment, when whether verifying current grant code is effective, resident's database is traversed, whether judges current grant code
It is matched with any fixed authorization code in resident's database, if so, then current grant code is effective, if not, current grant code nothing
Effect;Individually compare so that access control system response speed faster, further increases user experience.
S3. the human face region in current realtime graphic is obtained, and traverses resident's database, whether verifies current face region
It matches with any resident's face information in resident's database, orders if so, then exporting unlocking to access control system, and terminate current
Enabling request task, if not, output enabling failure information, and registration prompt is exported to access control system, then terminate currently to open
Door request task;In typing face information, the human face data in each orientation, therefore the success rate pole in identification process need to be acquired
It is high;After having selected resident's request to request as enabling, such as authorizes code check and face verification not to pass through, then opens the door and fail,
User is needed to re-enter enabling request.
As a preferred embodiment, verifying current face region whether with any resident people in resident's database
When face information matches, progress facial Feature Localization first, and whether the distance between each facial characteristics is judged in default face
Within the scope of portion telorism, if so, then determining that human face region is matched with any resident's face information in resident's database, such as
It is no, then determine that human face region is mismatched with any resident's face information in resident's database.
As another preferred embodiment, facial characteristics includes eyes, nose, mouth and face mask, positions people
Multiple facial characteristics in face region, and then characteristic point coordinate of each facial characteristics in corresponding human face region is obtained, lead to
Iterative solution is crossed, the characteristic point three-dimensional coordinate of each characteristic point is obtained, passes through the space three using characteristic point three-dimensional coordinate composition
Information is tieed up, the In vivo detection to active user may be implemented, and improve the stability of Face datection in recognition of face.
It include multiple room number files in resident's database in the present embodiment;It include fixed authorization in each room number file
Code, resident's identity information and room number data;Each resident's identity information uniquely corresponds to a login account, so that each room number
And the information of each resident is relatively independent and complete.
In the present embodiment, after output registration prompt to access control system, specific registration step is as follows:
The registration information including room number, cell-phone number and identity information is received, by the room in current room number and resident's database
Number file is corresponding, then judge current identity information whether with the identity information matching in corresponding room number file, if so, then exporting
Face supplement prompt, if not, corresponding to the authentication information for creating current identity information in room number in resident's database;
Whether effective verify current authentication information, if so, current resident's identity information is then created in current room number file,
And it regard current phone number as current resident's identity information uniquely corresponding login account, if not, output registration failure information.
As one of preferred embodiment, verify whether current authentication information is effectively verified by manual examination and verification.
In the present embodiment, after current resident's identity information is created in current room number file, output face information typing is mentioned
Show, receives face image data, whether complete current face's image data is judged, if so, then making current face's image data
Resident's face information is uniquely corresponded to for current resident's identity information, if not, output face typing failure information;Each resident's body
Part information uniquely corresponds to resident's face information.
S4. judge whether current guest request includes temporary password string, if so, current temporary password string is then verified, if not,
Then continue to judge whether current guest request includes room number information or cell-phone number;
S5. it whether effective verifies current temporary password string, orders if so, then exporting unlocking to access control system, and terminate to work as
Button fly front request task, if not, continuing to judge whether current guest request includes room number information or cell-phone number;
In the present embodiment, verify current temporary password string it is whether effective when, traverse temporary password table, judge temporary password table
In with the presence or absence of with the consistent temporary password string of current temporary password string, if so, then current temporary password string is effective, if not,
Current temporary password string is invalid;It is possible thereby to trace the resident for inviting current visitor by verifying temporary password string, keep away simultaneously
Exempt from the leakage of fixed password.
In the present embodiment, the setting steps of the temporary password string are as follows:
The interim unlocking request from register account number is received, then temporary password generator generates at random and exports fixed word
Long random cipher character, at the same obtain network time in time zone corresponding to current temporary password generator as it is current when
Between;Wherein, interim request of unlocking is initiated by login account, and network time is obtained in real time by communication network, and having can not flow backwards
Property, thus avoiding the later period generates duplicate temporary password string, network time can with but be not limited only to include public date and base
In moment time-division of 24 hours systems.
Irreversible face is generated after the authorization code of random cipher character, current time and current register account number is calculated
When password string, and the temporary password of generation is stored in temporary password table;Each temporary password string is effective in preset duration,
Wherein, preset duration=default out-of-service time-current time.The default out-of-service time can for arbitrarily after current time when
Between, it can be arranged according to actual needs, the setting of preset duration makes after obtaining the specified out-of-service time, which loses
Effect, anyone can not reuse the temporary password string and open access control system, thus under the premise of ensuring safety, avoid solid
Determine the case where password leakage causes security risk, safety is high.
S6. if current guest request includes room number information or cell-phone number, then export unlocking request to current room number information or
The corresponding register account number of cell-phone number, such as current guest request do not include room number information or cell-phone number, then export enabling failure information,
And terminate to work as button fly front request task.
In the present embodiment, when current guest request does not include room number information or cell-phone number, the specific steps are as follows:
Whether real-time detection has the request of the human-computer interaction from access control system, if so, then acquiring testing for current visitor in real time
It demonstrate,proves video flowing and verifying audio stream and repeats step S1 if not, terminating to work as button fly front request task.Human-computer interaction request can be with
Convenient for administrative centers such as property or resident can remotely output unlocks order to access control system after verifying visitor's identity, avoids
Recognition of face failure or password open the door caused by forgetting to fail.
Judge in current video stream and audio stream whether to include keyword, order if so, then exporting unlocking to access control system,
And terminate to work as button fly front request task, if not, output enabling failure information, terminates to repeat step when button fly front request task
S1.Wherein, keyword can with but be not limited only to include resident's name, target room number and visitor's identity information etc..
Embodiment 2
The present embodiment is on the basis of embodiment 1, further comprising the steps of:
S7. judge whether to there is any register account number to respond in preset time and agree to current request of unlocking, if so, then exporting
It unlocks and orders to access control system, and terminate to work as button fly front request task, if not, output enabling failure information, then terminates to work as
Button fly front request task;Wherein, after any register account number response and the current unlocking of agreement are requested, the unlocking request of other accounts is
When interrupt.
The present invention is not limited to above-mentioned optional embodiment, anyone can show that other are each under the inspiration of the present invention
The product of kind form.Above-mentioned specific embodiment should not be understood the limitation of pairs of protection scope of the present invention, protection of the invention
Range should be subject to be defined in claims, and specification can be used for interpreting the claims.
Claims (10)
1. a kind of access control system control method, it is characterised in that: the following steps are included:
S1. receive from access control system enabling request, and judge when button fly front request whether include authorization code, if so, then when
Button fly front request is that resident requests, and enters step S2, if not, entering step S4 when button fly front request is guest request;
S2. whether verifying current grant code is effective, orders if so, then exporting unlocking to access control system, and terminates to ask when button fly front
Task is sought, if not, acquiring the realtime graphic in front of current access control system;
S3. obtain the human face region in current realtime graphic, and traverse resident's database, verify current face region whether with live
Any resident's face information matching in user data library, is ordered if so, then exporting unlocking to access control system, and terminates to work as button fly front
Request task, if not, output enabling failure information, then terminates when button fly front request task;
S4. judge whether current guest request includes temporary password string, if so, current temporary password string is then verified, if not, after
It is continuous to judge whether current guest request includes room number information or cell-phone number;
S5. it whether effective verifies current temporary password string, orders if so, then exporting unlocking to access control system, and terminate currently to open
Door request task, if not, continuing to judge whether current guest request includes room number information or cell-phone number;
S6. such as current guest request includes room number information or cell-phone number, then exports unlocking request to current room number information or mobile phone
Number corresponding register account number, such as current guest request do not include room number information or cell-phone number, then export enabling failure information, and tie
Beam works as button fly front request task.
2. access control system control method according to claim 1, it is characterised in that: further comprising the steps of:
S7. judge whether to there is any register account number to respond in preset time and agree to current request of unlocking, if so, then exporting unlocking
It orders to access control system, and terminates to work as button fly front request task, if not, output enabling failure information, then terminates currently to open
Door request task.
3. access control system control method according to claim 1, it is characterised in that: current guest request is believed not comprising room number
When breath or cell-phone number, the specific steps are as follows:
Whether real-time detection has the request of the human-computer interaction from access control system, if so, then acquiring the verifying view of current visitor in real time
Frequency flows and verifying audio stream, if not, terminating to repeat step S1 when button fly front request task.
Judge in current video stream and audio stream whether to include keyword, order if so, then exporting unlocking to access control system, and tie
Beam works as button fly front request task, if not, output enabling failure information, terminates to repeat step S1 when button fly front request task.
4. access control system control method according to claim 1 or 2 or 3, it is characterised in that: the authorization code is by room number
Information and corresponding fixed password are constituted, and any room number is uniquely corresponding with an authorization code.
5. access control system control method according to claim 4, it is characterised in that: include multiple room numbers in resident's database
File;It include fixed authorization code, resident's identity information and room number data in each room number file;Each resident's identity information is only
An one corresponding login account.
6. access control system control method according to claim 5, it is characterised in that: output registration prompt to access control system
Afterwards, specific registration step is as follows:
The registration information including room number, cell-phone number and identity information is received, by the room number text in current room number and resident's database
Part is corresponding, then judges whether current identity information matches with the identity information in corresponding room number file, if so, then exporting face
Supplement prompt, if not, corresponding to the authentication information for creating current identity information in room number in resident's database;
Whether effective current authentication information is verified, if so, then creating current resident's identity information in current room number file, and will
Current phone number is used as current resident's identity information uniquely corresponding login account, if not, output registration failure information.
7. access control system control method according to claim 6, it is characterised in that: created in current room number file current
After resident's identity information, output face information typing prompt receives face image data, whether judges current face's image data
Completely, if so, then uniquely corresponding to resident's face information for current face's image data as current resident's identity information, if not,
Then export face typing failure information;Each resident's identity information uniquely corresponds to resident's face information.
8. access control system control method according to claim 4, it is characterised in that: whether verifying current grant code is effective
When, resident's database is traversed, judges whether current grant code matches with any fixed authorization code in resident's database, if so,
Then current grant code is effective, if not, current grant code is invalid.
9. access control system control method according to claim 1 or 2 or 3, it is characterised in that: verify current temporary password string
Whether it is effective when, traverse temporary password table, judge in temporary password table with the presence or absence of consistent interim with current temporary password string
Password string, if so, then current temporary password string is effective, if not, current temporary password string is invalid.
10. access control system control method according to claim 9, it is characterised in that: the setting of the temporary password string walks
It is rapid as follows:
The interim unlocking request from register account number is received, then temporary password generator generates at random and exports fixed word length
Random cipher character, while the network time in time zone corresponding to current temporary password generator is obtained as current time;
It is generated after the authorization code of random cipher character, current time and current register account number is calculated irreversible interim close
Sequence, and the temporary password of generation is stored in temporary password table;Each temporary password string is effective in preset duration,
In, preset duration=default out-of-service time-current time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910471475.1A CN110189448A (en) | 2019-05-31 | 2019-05-31 | A kind of access control system control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910471475.1A CN110189448A (en) | 2019-05-31 | 2019-05-31 | A kind of access control system control method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110189448A true CN110189448A (en) | 2019-08-30 |
Family
ID=67719595
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910471475.1A Pending CN110189448A (en) | 2019-05-31 | 2019-05-31 | A kind of access control system control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110189448A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112349008A (en) * | 2020-09-29 | 2021-02-09 | 特斯联科技集团有限公司 | Artificial intelligent access control system and control method of artificial intelligent access control |
CN112907788A (en) * | 2021-01-25 | 2021-06-04 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN114360106A (en) * | 2021-12-22 | 2022-04-15 | 美翔智能科技(泉州)有限公司 | Unlocking method of intelligent lock, terminal and storage medium |
CN115346298A (en) * | 2022-08-09 | 2022-11-15 | 深圳市欧瑞博科技股份有限公司 | Intelligent access control method, device, equipment and storage medium |
CN115410305A (en) * | 2022-08-26 | 2022-11-29 | 大连爱加加智慧科技有限公司 | Visitor access control management method and system based on two-dimensional code |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160094815A1 (en) * | 2013-07-26 | 2016-03-31 | Joseph Frank Scalisi | Remote interactive identity verification of lodging guests |
CN106375641A (en) * | 2016-08-31 | 2017-02-01 | 深圳博科智能科技有限公司 | Home-entry video intercom robot and home-entry video intercom control method |
CN106600776A (en) * | 2016-12-08 | 2017-04-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and system of access control |
CN108134920A (en) * | 2017-11-28 | 2018-06-08 | 特斯联(北京)科技有限公司 | A kind of intelligence system and method for realizing building visitor identification and current management |
CN108289141A (en) * | 2017-12-27 | 2018-07-17 | 努比亚技术有限公司 | A kind of the screen locking unlocking method and mobile terminal of mobile terminal |
CN108305367A (en) * | 2018-02-22 | 2018-07-20 | 陕西卓居未来智能科技有限公司 | A kind of application method of intelligent peephole and intelligent peephole and high in the clouds management system |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of the temporary password of smart lock and its verification method |
-
2019
- 2019-05-31 CN CN201910471475.1A patent/CN110189448A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160094815A1 (en) * | 2013-07-26 | 2016-03-31 | Joseph Frank Scalisi | Remote interactive identity verification of lodging guests |
CN106375641A (en) * | 2016-08-31 | 2017-02-01 | 深圳博科智能科技有限公司 | Home-entry video intercom robot and home-entry video intercom control method |
CN106600776A (en) * | 2016-12-08 | 2017-04-26 | 宇龙计算机通信科技(深圳)有限公司 | Method and system of access control |
CN108134920A (en) * | 2017-11-28 | 2018-06-08 | 特斯联(北京)科技有限公司 | A kind of intelligence system and method for realizing building visitor identification and current management |
CN108289141A (en) * | 2017-12-27 | 2018-07-17 | 努比亚技术有限公司 | A kind of the screen locking unlocking method and mobile terminal of mobile terminal |
CN108305367A (en) * | 2018-02-22 | 2018-07-20 | 陕西卓居未来智能科技有限公司 | A kind of application method of intelligent peephole and intelligent peephole and high in the clouds management system |
CN109741500A (en) * | 2018-12-29 | 2019-05-10 | 北京方正数码有限公司 | A kind of setting of the temporary password of smart lock and its verification method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112349008A (en) * | 2020-09-29 | 2021-02-09 | 特斯联科技集团有限公司 | Artificial intelligent access control system and control method of artificial intelligent access control |
CN112907788A (en) * | 2021-01-25 | 2021-06-04 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN114360106A (en) * | 2021-12-22 | 2022-04-15 | 美翔智能科技(泉州)有限公司 | Unlocking method of intelligent lock, terminal and storage medium |
CN114360106B (en) * | 2021-12-22 | 2024-03-19 | 美翔智能科技(泉州)有限公司 | Unlocking method of intelligent lock, terminal and storage medium |
CN115346298A (en) * | 2022-08-09 | 2022-11-15 | 深圳市欧瑞博科技股份有限公司 | Intelligent access control method, device, equipment and storage medium |
CN115410305A (en) * | 2022-08-26 | 2022-11-29 | 大连爱加加智慧科技有限公司 | Visitor access control management method and system based on two-dimensional code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110189448A (en) | A kind of access control system control method | |
CN104240342B (en) | Access control method and device based on identity authentication | |
CN105096420A (en) | Access control system and data processing method for same | |
CN107833332A (en) | hospital inpatient area visitor management system and method based on internet of things | |
CN107800725A (en) | A kind of digital certificate remote online managing device and method | |
CN106599660A (en) | Terminal safety verification method and terminal safety verification device | |
CN108777015B (en) | Access control system based on dynamic password | |
CN110164012A (en) | A kind of community's access control system and working method thereof | |
CN108510626A (en) | A kind of dynamic password access control management method and its management system | |
CN108022338A (en) | The control method of access control system and access control system | |
Miller et al. | Realtime behavior-based continual authentication of users in virtual reality environments | |
CN110164013A (en) | A kind of retrospective caller management method | |
CN108205835A (en) | Access control method and access control system | |
CN108390884A (en) | A kind of identity identifying method and device | |
CN105721460A (en) | Voiceprint password vehicle control system and method | |
CN108773743A (en) | Authorization method, device, equipment and the storage medium of building hoist | |
CN108900700A (en) | Authentication method and system based on the double verification that recognition of face and sight position | |
CN205140028U (en) | Gate inhibition system | |
CN104753959B (en) | A kind of method and system to multiple Network Security Device centralized operation management and control | |
CN111653018A (en) | Personnel passing management platform based on face recognition | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
CN111091640A (en) | Network storage device capable of authorizing time management control | |
CN104703180A (en) | Implicit multiple authentication method based on mobile Internet and intelligent terminal | |
CN109522694A (en) | A kind of identification system based on computer network | |
CN109598829A (en) | A kind of intelligent lock system and method for unlocking unlocked using identity card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200417 Address after: 201499 1st floor, No. 1990, Jinbi Road, Fengxian District, Shanghai Applicant after: Shanghai Haoyun Technology Co., Ltd Address before: 510000 Room 1005, East 8 Pazhou Avenue, Haizhu District, Guangzhou City, Guangdong Province Applicant before: Guangzhou Soft Ying Technology Co.,Ltd. |
|
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190830 |