CN110570558A - access control management method based on wireless communication network - Google Patents

access control management method based on wireless communication network Download PDF

Info

Publication number
CN110570558A
CN110570558A CN201910776317.7A CN201910776317A CN110570558A CN 110570558 A CN110570558 A CN 110570558A CN 201910776317 A CN201910776317 A CN 201910776317A CN 110570558 A CN110570558 A CN 110570558A
Authority
CN
China
Prior art keywords
access control
mobile terminal
control device
server
wireless communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910776317.7A
Other languages
Chinese (zh)
Inventor
戴红山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Enjoy Key Technology Co Ltd
Original Assignee
Hangzhou Enjoy Key Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Enjoy Key Technology Co Ltd filed Critical Hangzhou Enjoy Key Technology Co Ltd
Priority to CN201910776317.7A priority Critical patent/CN110570558A/en
Publication of CN110570558A publication Critical patent/CN110570558A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses an access control management method based on a wireless communication network, which comprises the following steps: the mobile terminal scans the two-dimensional code of the access control device to obtain equipment information of the access control device; the mobile terminal transmits the equipment information to the server; the server verifies the equipment information, and if the equipment information is correct, the server sends a first digital key corresponding to the equipment information to the mobile terminal; the mobile terminal sends the first digital secret key to the access control device through a Bluetooth protocol; the entrance guard device judges whether the first digital secret key is matched with a second digital secret key prestored in the entrance guard device; and the access control device outputs a control signal for driving the driving device according to the matching result. The intelligent access control system has the beneficial effects that the mobile terminal, the server and the access control device are combined into a complete intelligent service circle, so that humanized and intelligent management and a method for using the access control device are realized.

Description

Access control management method based on wireless communication network
Technical Field
The application relates to a management method of an access control system, in particular to an access control management method based on a wireless communication network.
Background
In the related art, an access control system performs identification and access control using an authorized IC card. However, the access control system using the IC card for identification usually has the following defects:
the existing access control system has the following defects:
firstly, the door opening modes of the district unit door and the pedestrian gate are single, and the owner card can not pass through the district unit door and the pedestrian gate if forgetting to take or losing the district unit door and the pedestrian gate; the card supplementing mode is single, the working time of the owner conflicts with the property, and the owner and the property do not understand each other;
Secondly, the card is easy to copy, which is not beneficial to the safety of community owners;
The aging serious failure rate of the lines and equipment of the access control system is high for more than five years, the cost of rearranging a new system is high, and the property business is difficult to advance and retreat, and the current general current situation is that the access control facilities in the community are basically in an idle or paralyzed state;
The visitors are manually registered, the visitor identity checking waiting time is long due to large security workload, the efficiency is low, and the checking difficulty is large afterwards;
fifthly, the repair cost of the building access control system is high, and the owner and the visitor are very inconvenient to enter because the door cannot be opened normally;
sixthly, the difficulty of controlling the safety of the personnel entering the community is high;
And seventhly, the use of the passing equipment is not ideal, the owner has large opinions and deep property contradiction, the difficulty of collecting property fees is increased, and vicious circle is realized.
Disclosure of Invention
The main objective of the present application is to provide an access control management method based on a wireless communication network, so as to solve the problem of inconvenient use of an access control system.
in order to achieve the above object, according to one aspect of the present application, a method for access control management based on a wireless communication network is provided.
The access control system based on wireless communication network according to the application includes: a mobile terminal capable of accessing at least one wireless communication network; the access control device at least can access the wireless communication network; the server at least forms data interaction with the mobile terminal and the access control device; wherein the mobile terminal includes: the image acquisition equipment is at least used for acquiring a two-dimensional code image; the first communication module is at least used for receiving and transmitting communication signals; the first processor is used for controlling the image acquisition equipment and the first communication module and carrying out data processing; the entrance guard's device includes: the door lock mechanism is used for realizing unlocking or locking of the entrance guard; a driving device for driving the door lock mechanism; the second communication module is at least used for receiving and transmitting communication signals to form interaction with the first communication module; and the second processor is used for controlling the driving device and the second communication module and processing data.
The access control management method based on the wireless communication network comprises the following steps:
the mobile terminal scans the two-dimensional code of the access control device to obtain the equipment information of the access control device;
the mobile terminal transmits the equipment information to the server;
The server verifies the equipment information, and if the equipment information is correct, a first digital key corresponding to the equipment information is sent to the mobile terminal;
The mobile terminal sends the first digital secret key to the access control device through a Bluetooth protocol;
The access control device judges whether the first digital secret key is matched with a second digital secret key prestored in the access control device;
And the access control device outputs a control signal for driving the driving device according to the matching result.
furthermore, the first communication module and the second communication module form data interaction at least according to a Bluetooth communication protocol.
further, the server transmits the encrypted first digital key to the mobile terminal.
Further, the server encrypts the first digital key using AES.
further, the first processor obtains the device name of the access control device or the second communication module thereof according to the two-dimensional code acquired by the image acquisition device.
Further, the first processor obtains the MAC address of the access control device or the second communication module thereof according to the two-dimensional code acquired by the image acquisition device.
Further, the first processor controls the first communication module and the second communication module to perform communication pairing according to the device name and the MAC address.
Further, the first processor sends a data request for obtaining the first digital key to the server after the first communication module and the second communication module complete communication pairing.
Further, the server receives a data request of the mobile terminal, and after the authority check of the mobile terminal is passed, the server sends the corresponding first digital key to the mobile terminal according to the device name or the MAC address.
Further, the server transmits a check data to the mobile terminal along with the first digital key.
The application has the advantages that:
The access control management method based on the wireless communication network is provided, and the mobile terminal, the server and the access control device are combined into a complete intelligent service circle, so that humanized and intelligent management and use of the access control device are realized.
Drawings
the accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
In the drawings:
fig. 1 is a schematic structural diagram of an access control system based on a wireless communication network according to an embodiment of the present disclosure;
fig. 2 is a schematic block diagram of a structure of an access control system based on a wireless communication network according to an embodiment of the present application;
Fig. 3 is a schematic structural diagram of an access control device provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a second access control system based on a wireless communication network according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a third wireless communication network-based access control system according to an embodiment of the present disclosure;
Fig. 6 is a schematic flowchart of a method for door access management based on a wireless communication network according to an embodiment of the present application.
Detailed Description
in order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
it should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
As shown in fig. 1, in the first embodiment of the present application, a gate inhibition system 100 includes a mobile terminal 101, a gate inhibition device 102, and a server 103.
the mobile terminal 101 can access at least one wireless communication network, for example, WIFI, bluetooth, NFC, NB-IOT, Zigbee, and the like; as a specific scheme, the system can also be accessed to a long-distance wireless communication network, such as a CDMA, WCDMA, GSM, TD-SCDMA, TD-LTE, 5G and other mobile networks.
Specifically, as shown in fig. 2, the mobile terminal 101 includes an image capturing device, a first communication module, and a first processor.
As a specific solution, the mobile terminal 101 may further include: terminal power, terminal touch-sensitive screen, terminal stereo set and some other equipment. The terminal power supply is used for supplying power to other equipment of the mobile terminal 101; the terminal touch screen is mainly used for feeding back image information to a user and providing an input interface for the user; the terminal sound box is used for feeding back sound information to the user.
The image capturing device may include a front camera or a rear camera, which are respectively disposed on two opposite sides of the mobile terminal 101. The front camera or the rear camera can acquire image information.
the first communication module is used for realizing the communication function of the mobile terminal 101, and the first communication module can at least transmit data through a bluetooth protocol. Of course, the first communication module can also implement data transmission of other communication protocols.
as a specific solution, the mobile terminal 101 further includes a human body information sensor for identifying a physical feature of the user. These physical characteristics include human face characteristics, fingerprint characteristics, or iris characteristics, or a combination of these characteristics. As a specific scheme, the human body information sensor comprises a camera, a fingerprint sensor and an iris sensor to collect human body characteristics so as to identify different users.
As mentioned above, the mobile terminal 101 may be configured with two cameras, both of which may be used as an embodiment of an image acquisition device or a human body information sensor, as a preferred scheme, the rear camera is used as an image acquisition device for acquiring identification information of the access control device 102, and the front camera is used as a human body information sensor for acquiring a face image and further acquiring face feature data.
As another specific solution, the iris sensor may be implemented by selecting a high-precision optical camera, and as a preferable solution, the iris sensor and the camera for recognizing the human face are both front cameras of the mobile terminal 101. The fingerprint recognition sensor may be constituted by a particular device of the mobile terminal 101, or may be constituted by a pressure-sensitive touch screen provided to the mobile terminal 101, or may employ an optical fingerprint recognition technique.
the access control device 102 includes three main parts: entrance guard's body, door lock device and controlling means.
The access control body mainly constitutes the entrance control body of separation to the space, specifically can be constructed as room door, floodgate or other forms of entity mechanism. The entrance guard body in this application should be understood as the most generalized entrance guard body.
The door lock mechanism is also understood to be a device or a mechanism which can realize the mechanical or electromechanical combination for limiting the position of the door lock body in the broadest sense. For example, a lock cylinder mechanism in a room door and a lock cylinder motor driving the lock cylinder, and for example, an electromagnet device of a glass door and a driving circuit driving the electromagnet; for another example, a gate of a gate machine and a gate motor driving the gate. As is apparent from the above, the door lock device includes: the mechanical part for realizing physical contact or obstruction is defined as a door lock mechanism, and the other part can be a driving device for converting electric energy into mechanical energy for driving the mechanical part. The control means may be a variety of chips, chip combinations or a combination of chips and peripheral circuits capable of control signal output.
As an embodiment, as shown in fig. 2 and 3, the door lock device 102 further includes a door lock mechanism, a door lock motor, a second communication module, and a second processor in addition to the door lock body.
As mentioned above, the door lock mechanism is used to unlock and lock the door, i.e. to control the state of the door, so that the door lock mechanism has an unlocked state that enables a user to enter a certain space and a locked state that enables the user to not enter the certain space through the position of the door lock body.
The entrance guard motor is used as a driving device of the door lock mechanism, and can drive the lock cylinder in the door lock mechanism to be embedded into or withdraw from the building structure through rotation to form a lock groove, so that the function of locking is realized.
The second processor is used as a control device which can control the entrance guard motor and can form data interaction based on the electric signal with the second communication module. The second processor controls the operation of the access control motor by sending an electrical signal to the access control motor. The second communication module can at least form communication connection with the first communication module, so that the mobile terminal 101 and the access control device 102 form data interaction.
The second communication module can also be at least accessed to a wireless communication network like the first communication module, such as WIFI, Bluetooth, NFC, NB-IOT and the like; as a specific scheme, the system can also be accessed to a long-distance wireless communication network, such as a CDMA, WCDMA, GSM, TD-SCDMA, TD-LTE, 5G and other mobile networks.
as an extension, the door access device 102 further includes an input device for a user to operate to input information, and an output device for outputting information to the user. Specifically, the input device and the second processor form a data connection so that the user input information and data can be transmitted to the second processor; the output device is in data connection with the second processor such that the output device is capable of outputting information under control of said second processor.
As shown in fig. 3, the door access device 102 may be provided with a door access camera 11, an iris sensor 12, a fingerprint sensor 13, a touch screen 14, and a combination dial 15 in addition to the housing 10 of the door access device 102.
the door access camera 11 can realize face recognition to unlock directly, and can also be used as a peripheral of the mobile terminal 101 or a peripheral camera of the other server 103 through a short-range wireless communication network.
the iris sensor 12 and the fingerprint sensor 13 and the combination disk 15 may be used as input devices for a user to input information to the second processor of the door access device 102.
The touch screen 14 may be used as an input device of the access control device 102 or an output device of the access control device 102, and may display information to the user, such as pattern information, such as a two-dimensional code, for the mobile terminal 101 to scan to identify the access control device 102. Of course, the touch panel 14 may be replaced with a general display panel for presenting information to the user, and the combination dial 15 may be used as an input device.
as an extension, the output device further comprises an audio device, which may be used to prompt the user with information.
as an alternative, the access control system of the present application further includes a gateway device, which can be disposed between the server 103 and the access control device 102, and the gateway device directly forms data interaction with the second communication module of the access control device 102, so as to implement remote control of the access control device 102 through the gateway device. The server 103 then directly interacts with the gateway device and indirectly interacts with the gate device 102. The server 103 may communicate with the gateway device through a wireless network or a wired network.
as a specific scheme, the present application provides a bluetooth device, which can be used as a control device and is compatible with an electronic access control device 102 having only a door lock mechanism and an access control motor to expand specific functions.
as a specific scheme, the bluetooth device includes: bluetooth module, treater and circuit board. The Bluetooth module is at least used for receiving and transmitting Bluetooth signals; the processor is used for controlling the access control motor and judging whether the electronic key transmitted by the Bluetooth accords with the electronic key stored in the processor; the circuit board is used for connecting the Bluetooth module with the circuit board to form a battery core.
more specifically, the circuit board is provided with a power access point for accessing the circuit board and is provided with a power access point for accessing 4V to 6V.
the width dimension of the circuit board ranges from 10mm to 15mm, and the length dimension of the circuit board ranges from 15mm to 25 mm. Preferably, the width of the circuit board is 13mm, and the length of the circuit board is 23 mm.
The area of the circuit board is 250mm2to 350mm2. Preferably, the area of the circuit board is 299 mm.
the circuit board is provided with a plurality of half holes, the half holes are used for connecting external circuits, and the value range of the distance between the half holes is 1mm to 1.5 mm. Preferably, the spacing between the half holes is 1.27 mm.
The circuit board is provided with a motor driving pin, and the output voltage of the electrode driving pin is between 4V and 6V.
As a specific scheme, the specific parameters of the bluetooth device are as follows:
The working frequency band is 2.4GHz ISM frequency band; the communication distance is 30m (condition: open area/class II); the working voltage is 4V to 6V; the temperature range is-40 ℃ to 85 ℃.
The interface includes: high level output, low level output, state indication output, external trigger detection, serial ports, motor drive output and a customized function IO interface.
As a specific scheme, the Bluetooth device adopts an onboard antenna; a Bluetooth module of the Bluetooth module adopts a low-power-consumption BLE4.0 Bluetooth single-mode chip and integrates a standard BLE4.0 protocol stack;
In addition, the Bluetooth device is also provided with a standard UART (TTL) interface, a serial port capable of being directly connected with an external MCU or a serial port peripheral module pad adopts a half-hole process, the hole distance is standard 1.27mm, and the Bluetooth device can be directly welded on the mainboard of other types of access control devices 102.
On the basis of the above scheme, the technical scheme of the software part in the present application is described below.
The mobile terminal is provided with a corresponding application program in advance, the access control device is also provided with a corresponding pre-stored control program in advance, the access control device is activated in advance, and a unique equipment identifier is set for each access control device.
Specifically, the data protocols of the bluetooth device of the present application include a base protocol and an application layer protocol. The basic protocol comprises an equipment activating/Bluetooth binding protocol, a time synchronization protocol, a synchronization authority protocol, a synchronous use record protocol, a request report information protocol, a report information protocol, an obtained information protocol, a factory reset protocol and a mobile terminal door opening protocol; the application layer protocol comprises adding authority, adding authority with physical information, deleting authority, modifying authority, forbidding/enabling authority, setting a door opening mode and inquiring battery electric quantity.
In order to enable the management system to effectively and safely manage the access control device, a unique equipment identifier is set for the access control device. If the entrance guard's device is the integrated manufacturing, then after equipment bluetooth module and treater, carry out equipment activation and the binding of bluetooth, make treater and bluetooth module bind into a whole. Preferably, in order to enable the mobile terminal to be paired with the bluetooth module of the access control device, pairing information of the bluetooth module or device information of the access control device may be attached to the access control device or disposed around the access control device in the form of a readable image such as a two-dimensional code. The information such as the two-dimensional code may include the name and MAC address of the bluetooth module.
as an alternative, the touch screen of the access control device may be activated to display a two-dimensional code corresponding to the access control device.
On the basis of the technical solution described above, referring to fig. 6, the present application also discloses a management method of an access control device.
The management method includes an unlocking method. Specifically, the unlocking method comprises the following steps:
The mobile terminal scans the two-dimensional code of the access control device to obtain the equipment information of the access control device.
the mobile terminal transmits the device information to the server.
The server verifies the equipment information, and if the equipment information is correct, the server sends a first digital key corresponding to the equipment information to the mobile terminal.
and the mobile terminal sends the first digital key to the access control device through a Bluetooth protocol.
the entrance guard device judges whether the first digital secret key is matched with a second digital secret key prestored in the entrance guard device.
And the access control device outputs a control signal for driving the access control motor according to the matched result.
As a preferred scheme, the mobile terminal obtains a verification data related to the access serial number of the bluetooth device of the current access control device from the first digital key obtained by the server. The door control device determines whether the first digital key and the second digital key are matched and also determines whether the check data meets the requirements.
specifically, the check data is equal to the access serial number of the bluetooth device stored in the server, and is subjected to one operation, for example, 1 is added to the original access requirement, or other operations are naturally available, then the combination of the check data after the operation and the first digital key is subjected to AES encryption, and then the combination is sent to the mobile terminal, and meanwhile, the server uses the check data of this time and replaces the original stored access serial number. And if the access control device passes the matching, covering the current verification data with the original access serial number.
The access sequence number and the check data are for security reasons. And if the check data received by the Bluetooth device is larger than the current access serial number, making a response, and using the check data as the next access serial number. And if the sequence number received by the receiver is less than or equal to the currently recorded sequence number, discarding the instruction, returning a sequence number packet, and informing the sender that the sequence number is wrong, wherein the sequence number parameter is the current sequence number parameter. When the current sequence number is 0xFFFFFF, the next sequence number is 0x 000000.
alternatively, the check data may be a set of random numbers in a set format. The judgment standard is that the check data is different from the current access serial number.
Therefore, the access sequence number is changed when the secret key is acquired every time, the secret key is prevented from being repeatedly used by a person after being intercepted, namely the secret key is automatically invalidated after being opened, and the safety of the secret key is ensured.
as a specific scheme, the management method includes:
Applying for registering a property manager account and a password through a property management client (a data background is on a cloud server);
the registration application of the property manager is checked through a system management end, a corresponding account password is established for the registration application, and the authority is distributed and stored;
After the property manager account is established, the user can log in the cloud server to set property related information such as: property unit information, each property owner information, entrance guard control equipment information, entrance guard installation positions and the like, and the cloud server is stored. The property unit information comprises a property name and the number of terminal users; the access control equipment information comprises an access control channel name and a Bluetooth equipment name;
A4, a property owner logs in a WeChat applet by using an intelligent mobile terminal, a camera code scanning access control device fixing two-dimensional code (namely the name of a Bluetooth device and an MAC address) is called by clicking a button 'code scanning door opening', the name of the Bluetooth device is checked and matched with the MAC address, and if the matching is successful, the property owner has the right to apply for a key to a cloud server; wherein, the specific entry is an entry requiring a user name and a password of the wechat applet. The WeChat account login mode is realized, namely the WeChat quick login can be clicked to enter the WeChat state.
After receiving the key request, the cloud server adds 1 to the maximum serial number of the corresponding Bluetooth device recorded in the cloud database, combines a secret key in the database, encrypts the combined content in an AES (advanced encryption standard) mode and then sends the encrypted content to the requesting mobile terminal;
The WeChat applet transmits the received secret key returned by the cloud server to the Bluetooth equipment for decryption according to the protocol, and the decrypted content must satisfy the following conditions: the serial number is larger than the serial number recorded in the Bluetooth equipment, the secret key is matched with the secret key in the Bluetooth module, if the conditions of the serial number and the secret key are met simultaneously, the electronic control door lock is opened by returning success and outputting a signal, otherwise, the electronic control door lock is opened without outputting a signal after returning failure, and the door lock is prompted to be opened failure; the content of obtaining the secret key at the cloud server is composed of two parts, one part is the access serial number of the current access control Bluetooth module plus 1, and the other part is the secret key of the Bluetooth module. The two parts of contents are encrypted and issued in an AES mode, and the current access serial number in the database is replaced at the same time, so that the access serial number is only increased when the secret key is obtained every time, the secret key is prevented from being reused by a person after the secret key is intercepted, namely the secret key is automatically invalidated after the secret key is opened, and the safety of the secret key is ensured.
And covering the current sequence number into the Bluetooth equipment after the return is successful, and preparing for the next comparison. The processing ensures that the secret key must be acquired from the cloud server in real time, and the security and timeliness of the secret key are ensured.
and a property manager of the property management client is responsible for managing the door opening permission of the terminal user, such as issuing a new secret key permission or recovering a secret key and the like, and storing the result in the cloud server. And checking or counting the door opening records and the door opening authority in the jurisdiction range according to the needs.
In a specific scheme, in order to improve unlocking safety, when a user registers by using a mobile terminal, information to be filled in includes that a mobile terminal number is filled or the mobile terminal logs in a micro-signal mode, identity verification is required, an identity card number needs to be input, the mobile terminal shoots a face and uploads the face to a database of a national identity card (such as a national identity card center library and a public security first research institute) for comparison, and other operations can be carried out only when the identity verification is passed.
The remote cloud server in the master door opening process contains owner information including property units, building numbers, owner names and owner addresses; the entrance guard information comprises an entrance guard name, a Bluetooth device name and an MAC address, and effective start-stop time is obtained; the action information of the owner entrance guard opening door is sent to a remote cloud server through a wide area network by an intelligent mobile terminal (APP or an applet) to be stored for query.
As an extension scheme, when the door lock device is installed or a part of the door lock device is installed, an installed user can enter an installation interface through a small program or in a form of accessing a public number and the like, then an address location function is used, address information is obtained through a mobile terminal, such as a location module of a mobile phone, such as a GPS module, and then the address information is bound with the device.
As a specific scheme, simultaneously, in the process of code scanning unlocking, face recognition is required, the face recognition is acquired through an image acquisition device of the mobile terminal and then uploaded to a server for comparison, or the face recognition is uploaded to a server of a database of a national identification card (such as a national identification card center library and a public security first research institute) through the server for comparison. And comparing the secret keys through Bluetooth only when the face recognition is successful and the user is actually used.
Therefore, the real-name access control management can be realized, and the system can be applied to places needing real-name check-in, such as residences, hotels and the like.
As an alternative scheme, the entrance guard device is also provided with a camera, the camera of the entrance guard device can be used for collecting face information, then the face information is transmitted to the mobile terminal through Bluetooth, and then the face information is uploaded to the server through the mobile terminal to be compared. This can improve safety.
As another alternative, after the mobile terminal performs face comparison, the camera of the access control device collects face information again for comparison, so as to ensure that the user is entering.
similar tests can of course be performed with other body recognition sensors or combinations of sensors.
As an extension, since the above scheme has a function of real-name authentication, the scheme can be applied to check-in management of rental places such as residences, hotels, public rental houses, and the like.
Specifically, the server described above is a generalized server, and the generalized server may include a plurality of servers, such as the first server 103 and the second server 105, as a specific solution.
As a specific scheme, three sub-servers may be included: a key server, an identity server and a management server. Data interaction can be formed among the three servers.
The key server is used for realizing the key transmission and matching of the bluetooth device, and is used for supporting data services related to the basic functions of the access control system in the application.
The identity server can be an external server or a self-built internal server, and at least stores face information for identity recognition. The key server may be externally connected to a server of a national identity card database (e.g., a national identity card repository, a public security first research institute) to serve as the identity server. No matter the electronic key is shared or other electronic keys are obtained, the user can obtain the address information of the door lock through the information of the electronic key so as to navigate.
The management server is used for daily management of places such as hotels and the like, can store the corresponding relation between the user and the access control device into the relation between hotel rooms and the user, and can directly or indirectly form communication with the communication module of the access control device so as to master the information of the user.
When a user opens a door, the face recognition of the user firstly realizes real-name authentication of the user, then, in the unlocking process, the user and the room number are stored in the management server in a correlated mode, in order to ensure safety, the entrance guard device can collect the face information of the user entering the door again, and whether the user is in real name is checked again.
as an extension, a millimeter wave radar may be installed inside a room, and the accuracy of the millimeter wave radar is adjusted to only identify whether a human body is present.
Of course, corresponding precision can be set so that the millimeter wave radar can only recognize the approximate outline of the human body, and the processor connected with the millimeter wave radar can judge which image is the human body in a convolution nerve learning mode, so that millimeter wave radar detection can be carried out after a user enters, and whether redundant personnel appear or not is detected.
therefore, as long as the key server and the management server of the hotel and the server of the national identity card center form data interconnection, the card-free access of the user can be realized, the real-name authentication and registration can be completed when the user opens the entrance guard, the time of the user is saved, and meanwhile, the unmanned management is realized, so that the method is particularly suitable for residential homes or other forms of cyber-contracted rooms or unmanned hotels.
In addition, as another aspect of the present application, the above scheme may also be applied to an access control system of a community, and similarly, the management server is used to implement general management of property, and the identity server is used for identity recognition of a user.
The difference is that the community management server does not need to match and register users with the access control devices in a one-to-one correspondence, but only needs to register passing users.
As a specific scheme, the access control of the community needs to distinguish users, which can be divided into owner users and visitor users, the owner users can only complete the passing-through function without monitoring the access time of the owner users, and for the visitor users, except for the time limit of the secret key server, the management server also needs to monitor the visitor users, especially the visitor users such as express delivery, takeaway and the like.
It will be apparent to those skilled in the art that the modules or steps of the present application described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present application is not limited to any specific combination of hardware and software.
the above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A door control management method based on a wireless communication network is characterized in that:
The access control system based on wireless communication network includes:
A mobile terminal capable of accessing at least one wireless communication network;
The access control device at least can access the wireless communication network;
The server at least forms data interaction with the mobile terminal and the access control device;
wherein the content of the first and second substances,
The mobile terminal includes:
The image acquisition equipment is at least used for acquiring a two-dimensional code image;
The first communication module is at least used for receiving and transmitting communication signals;
the first processor is used for controlling the image acquisition equipment and the first communication module and carrying out data processing;
The entrance guard's device includes:
the door lock mechanism is used for realizing unlocking or locking of the entrance guard;
A driving device for driving the door lock mechanism;
The second communication module is at least used for receiving and transmitting communication signals to form interaction with the first communication module;
The second processor is used for controlling the driving device and the second communication module to perform data processing;
The management method comprises the following steps:
the mobile terminal scans the two-dimensional code of the access control device to obtain the equipment information of the access control device;
The mobile terminal transmits the equipment information to the server;
the server verifies the equipment information, and if the equipment information is correct, a first digital key corresponding to the equipment information is sent to the mobile terminal;
the mobile terminal sends the first digital secret key to the access control device through a Bluetooth protocol;
The access control device judges whether the first digital secret key is matched with a second digital secret key prestored in the access control device;
And the access control device outputs a control signal for driving the driving device according to the matching result.
2. The wireless communication network-based access control management method according to claim 1, characterized in that:
The first communication module and the second communication module form data interaction at least by a Bluetooth communication protocol.
3. The wireless communication network-based access control management method according to claim 1, characterized in that:
And the server transmits the encrypted first digital key to the mobile terminal.
4. the wireless communication network-based access control management method according to claim 1, characterized in that:
The server encrypts the first digital key using AES.
5. the wireless communication network-based access control management method according to claim 1, characterized in that:
And the first processor acquires the equipment name of the access control device or the second communication module thereof according to the two-dimensional code acquired by the image acquisition equipment.
6. the wireless communication network-based access control management method according to claim 5, wherein:
And the first processor acquires the MAC address of the access control device or the second communication module thereof according to the two-dimension code acquired by the image acquisition equipment.
7. The wireless communication network-based access control management method according to claim 6, wherein:
and the first processor controls the first communication module and the second communication module to carry out communication pairing according to the equipment name and the MAC address.
8. The wireless communication network-based access control management method according to claim 7, wherein:
and the first processor sends a data request for acquiring a first digital key to the server after the first communication module and the second communication module finish communication pairing.
9. the wireless communication network-based access control management method according to claim 8, wherein:
And the server receives a data request of the mobile terminal, and after the authority verification of the mobile terminal passes, the server sends the corresponding first digital key to the mobile terminal according to the equipment name or the MAC address.
10. The wireless communication network-based access control management method according to claim 9, wherein:
The server sends the first digital key to the mobile terminal and simultaneously sends a check data.
CN201910776317.7A 2019-08-21 2019-08-21 access control management method based on wireless communication network Pending CN110570558A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910776317.7A CN110570558A (en) 2019-08-21 2019-08-21 access control management method based on wireless communication network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910776317.7A CN110570558A (en) 2019-08-21 2019-08-21 access control management method based on wireless communication network

Publications (1)

Publication Number Publication Date
CN110570558A true CN110570558A (en) 2019-12-13

Family

ID=68773986

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910776317.7A Pending CN110570558A (en) 2019-08-21 2019-08-21 access control management method based on wireless communication network

Country Status (1)

Country Link
CN (1) CN110570558A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116071860A (en) * 2023-03-07 2023-05-05 雷图志悦(北京)科技发展有限公司 Access control data management method and system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701503A (en) * 2013-12-25 2014-04-02 深圳市文鼎创数据科技有限公司 Bluetooth pairing method and system, and Bluetooth KEY
CN103763786A (en) * 2014-01-20 2014-04-30 梅平 Equipment pairing method, terminal and system
CN104424678A (en) * 2013-08-30 2015-03-18 聚龙股份有限公司 Electronic password lock system and control method thereof
CN105069920A (en) * 2015-07-30 2015-11-18 魏初舜 Password-dynamic-synchronization-based collection system
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN105788042A (en) * 2016-02-26 2016-07-20 姜恒 Bluetooth door opening method and system
CN106713431A (en) * 2016-12-13 2017-05-24 上海众人网络安全技术有限公司 Unlocking/locking control method and system for vehicle
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
US9767629B1 (en) * 2017-03-07 2017-09-19 Nxp B.V. System and method for controlling access to vehicle
CN107240179A (en) * 2017-06-08 2017-10-10 电子科技大学 A kind of base station Intelligent entrance guard management system
CN107393274A (en) * 2017-08-17 2017-11-24 成都千嘉科技有限公司 It is a kind of based on internet+long-distance meter-reading system and method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104424678A (en) * 2013-08-30 2015-03-18 聚龙股份有限公司 Electronic password lock system and control method thereof
CN103701503A (en) * 2013-12-25 2014-04-02 深圳市文鼎创数据科技有限公司 Bluetooth pairing method and system, and Bluetooth KEY
CN103763786A (en) * 2014-01-20 2014-04-30 梅平 Equipment pairing method, terminal and system
CN105069920A (en) * 2015-07-30 2015-11-18 魏初舜 Password-dynamic-synchronization-based collection system
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN105788042A (en) * 2016-02-26 2016-07-20 姜恒 Bluetooth door opening method and system
CN106713431A (en) * 2016-12-13 2017-05-24 上海众人网络安全技术有限公司 Unlocking/locking control method and system for vehicle
CN106898064A (en) * 2017-01-09 2017-06-27 云丁网络技术(北京)有限公司 A kind of generation method and its system of the off-line verification code based on intelligent door lock system
US9767629B1 (en) * 2017-03-07 2017-09-19 Nxp B.V. System and method for controlling access to vehicle
CN107240179A (en) * 2017-06-08 2017-10-10 电子科技大学 A kind of base station Intelligent entrance guard management system
CN107393274A (en) * 2017-08-17 2017-11-24 成都千嘉科技有限公司 It is a kind of based on internet+long-distance meter-reading system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李永忠: "《物联网信息安全》", 31 May 2016 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116071860A (en) * 2023-03-07 2023-05-05 雷图志悦(北京)科技发展有限公司 Access control data management method and system

Similar Documents

Publication Publication Date Title
CN104966336B (en) Intelligent lock and authorization management method and device of intelligent lock
CN107967741A (en) Double-channel testimony of a witness in-one intelligent lock control method and system
CN205405639U (en) Access control system based on cloud ware
CN110570559A (en) Electronic key sharing method in access control system based on mobile terminal
EP2888855B1 (en) Systems and methods for lock access management using wireless signals
CN107734158A (en) The method and system of remote management is carried out using intelligent hand-held terminal Lock device with two same action member
US20170236350A1 (en) Electronic door lock system
US9256723B2 (en) Security key using multi-OTP, security service apparatus, security system
CN106803298A (en) Intelligent intercom system and method based on recognition of face
CN110570557A (en) access control system based on wireless communication network
CN106534080B (en) Object access right management method, corresponding background system, device and user terminal
CN110570560A (en) access control system based on identity recognition
CN111882704B (en) Control method of intelligent door lock system and intelligent door lock management system
CN107563712A (en) A kind of mobile terminal punch card method, device, equipment and system
CN106251438A (en) A kind of E.E.G lock system and method
CN103985169A (en) System utilizing handheld terminal and USB interface to lock/unlock door lock and controlling method thereof
CN110415419A (en) Electron key share system in access control system based on mobile terminal
CN112734989B (en) Bluetooth key distribution method for intelligent door lock
CN214752023U (en) Fingerprint acquisition device and fingerprint management system
CN207938069U (en) A kind of intelligent door lock
EP3062294B1 (en) Method and devices for upgrading an existing access control system
CN110570558A (en) access control management method based on wireless communication network
CN109587448A (en) A kind of intelligent substation inspection tour system
CN104579664A (en) Mobile police terminal capable of effectively guaranteeing data security and using method thereof
CN110648435A (en) Access control management method based on identity recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 311113 room 1425, building 1, Shangyi center, Dufu village, Liangzhu street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Enjoy Key Technology Co.,Ltd.

Address before: 310000 room 301-2, building 1, Xigang development center, Sandun Town, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: Hangzhou Enjoy Key Technology Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20191213

RJ01 Rejection of invention patent application after publication