CN111210544A - Door control method and device based on cloud computing - Google Patents

Door control method and device based on cloud computing Download PDF

Info

Publication number
CN111210544A
CN111210544A CN201811306591.XA CN201811306591A CN111210544A CN 111210544 A CN111210544 A CN 111210544A CN 201811306591 A CN201811306591 A CN 201811306591A CN 111210544 A CN111210544 A CN 111210544A
Authority
CN
China
Prior art keywords
door lock
cloud
door
response message
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811306591.XA
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811306591.XA priority Critical patent/CN111210544A/en
Publication of CN111210544A publication Critical patent/CN111210544A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

According to the door control method and device based on the cloud computing, the door control device collects at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor; then, sending the collected at least one piece of first characteristic information to the cloud end equipment, and carrying out cloud end identity verification on the visitor by the cloud end equipment based on the received at least one piece of first characteristic information; the gate control equipment receives at least one cloud identity verification response message fed back by the cloud equipment; the gate control equipment performs local identity authentication on the visitor based on the acquired at least one piece of second characteristic information to obtain at least one response message of the local identity authentication; and finally, the door control equipment generates a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication, and then executes intelligent control operation aiming at the door lock according to the door lock control instruction.

Description

Door control method and device based on cloud computing
Technical Field
The invention relates to the field of intelligent control, in particular to a door control method and device based on cloud computing.
Background
At present, most of intelligent door locks in the market are realized by adopting local identification modes such as human faces, voiceprints, fingerprints, passwords, access control cards and the like. Because the data volume of the biological characteristic information such as the human face or the voiceprint is large, a processor with strong computing power is needed in the identity verification process; and only information such as fingerprints or passwords with small data size is used for identity authentication, although the requirement on the computing power of the processor is low, the information is easy to crack due to the weak computing power.
Therefore, in order to overcome the problem that the computing power of the intelligent door lock is weak, it is necessary to provide a method capable of improving the overall computing power of the intelligent door lock by using cloud computing.
Disclosure of Invention
The embodiment of the invention provides a door control method and device based on cloud computing, aiming at improving the overall computing capacity of an intelligent door lock by using the cloud computing.
According to a first aspect of the present invention, a door control method based on cloud computing is provided, which is applied to a door control device, and the door control device and a cloud device are connected in a network communication manner; the method comprises the following steps: the door control equipment acquires at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, wherein the data volume of the first characteristic information is larger than that of the second characteristic information; the gate control device sends the collected at least one piece of first characteristic information to the cloud end device, so that the cloud end device carries out cloud end identity verification on the visitor based on the received at least one piece of first characteristic information; the gate control equipment receives at least one cloud identity verification response message fed back by the cloud equipment; the gate control equipment performs local identity authentication on the visitor based on the acquired at least one piece of second characteristic information to obtain at least one response message of the local identity authentication; the door control equipment generates a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication; and the door control equipment executes intelligent control operation aiming at the door lock according to the door lock control instruction.
According to an embodiment of the present invention, the door control device generates a door lock control instruction according to the response message of the at least one cloud authentication and the response message of the at least one local authentication, including: the gate control equipment analyzes the conditions of successful response messages and/or failed response messages in the response messages of the at least one cloud identity authentication and the response messages of the at least one local identity authentication to obtain analysis results; and the door control equipment generates a door lock control instruction according to the obtained analysis result.
According to an embodiment of the present invention, the door control apparatus generating a door lock control command according to the obtained analysis result includes: if the analysis result is that the total type number of the determined successful response messages reaches the specified type number, the door control equipment generates a first door lock control instruction, and the first door lock control instruction is used for controlling and executing intelligent unlocking operation aiming at the door lock; correspondingly, the door control equipment executes intelligent control operation aiming at the door lock according to the door lock control instruction, and the intelligent control operation comprises the following steps: and the door control equipment executes intelligent unlocking operation aiming at the door lock according to the first door lock control instruction.
According to an embodiment of the present invention, the door control apparatus generating a door lock control command according to the obtained analysis result includes: if the analysis result is that the total number of types of the determined successful response messages does not reach the number of the specified types, the door control equipment generates a second door lock control instruction, and the second door lock control instruction is used for controlling and responding to the unlocking refusing operation of the door lock; correspondingly, the door control equipment executes intelligent control operation aiming at the door lock according to the door lock control instruction, and the intelligent control operation comprises the following steps: and the door control equipment responds to the unlocking refusing operation aiming at the door lock according to the second door lock control instruction.
According to an embodiment of the present invention, after the gate control device analyzes a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message to obtain an analysis result, the method further includes: if the analysis result indicates that the response messages of the at least one cloud identity authentication are all failure response messages and the response messages of the at least one local identity authentication reach the specified types of number of success response messages, determining that the at least one first characteristic message is qualified information; and generating and sending an update instruction, wherein the update instruction is used for instructing the cloud device to add the at least one piece of first characteristic information to an authentication database so as to update the authentication database.
According to a second aspect of the present invention, there is also provided a door control device based on cloud computing, where the door control device is connected to a cloud device in a network communication manner; the door control apparatus comprises: the information acquisition unit is used for acquiring at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, and the data volume of the first characteristic information is larger than that of the second characteristic information; the communication unit is used for sending the collected at least one piece of first characteristic information to the cloud end equipment so as to carry out cloud end identity verification on the visitor by the cloud end equipment based on the received at least one piece of first characteristic information; the cloud terminal equipment is also used for receiving at least one cloud terminal identity verification response message fed back by the cloud terminal equipment; the local identity authentication unit is used for carrying out local identity authentication on the visitor based on the acquired at least one piece of second characteristic information to obtain at least one response message of the local identity authentication; the instruction generating unit is used for generating a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication; and the execution unit is used for executing intelligent control operation aiming at the door lock according to the door lock control instruction.
According to an embodiment of the present invention, the instruction generating unit includes: the analysis subunit is configured to analyze a situation of a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message to obtain an analysis result; and the generating subunit is used for generating a door lock control instruction according to the obtained analysis result.
According to an embodiment of the present invention, the generating subunit is further configured to, if the analysis result is that the total number of types of the determined successful response messages reaches a specified number of types, generate a first door lock control instruction by the door control device, where the first door lock control instruction is used to control to execute an intelligent unlocking operation for a door lock; correspondingly, the execution unit is further used for executing intelligent unlocking operation aiming at the door lock according to the first door lock control instruction.
According to an embodiment of the present invention, the generating subunit is further configured to, if the analysis result indicates that the total number of types of the determined successful response messages does not reach the specified number of types, generate, by the door control device, a second door lock control instruction, where the second door lock control instruction is used to control a response to a lock-unlocking-refusal operation for the door lock; correspondingly, the execution unit is further used for responding to the unlocking refusing operation aiming at the door lock according to the second door lock control instruction.
According to an embodiment of the present invention, the generating subunit is further configured to, after the analyzing subunit analyzes the successful response message and/or the failed response message in the at least one cloud authentication response message and the at least one local authentication response message, and obtains an analysis result, determine that the at least one first feature information is the qualified information if the analysis result indicates that the at least one cloud authentication response message is the failed response message and the at least one local authentication response message reaches the specified number of types of successful response messages; and generating and sending an update instruction, wherein the update instruction is used for instructing the cloud device to add the at least one piece of first characteristic information to an authentication database so as to update the authentication database.
According to the cloud computing-based door control method and the cloud computing-based door control equipment, the door control equipment collects at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, and the data volume of the first characteristic information is larger than that of the second characteristic information; then, the gate control device sends the collected at least one piece of first characteristic information to the cloud device, so that the cloud device performs cloud identity verification on the visitor based on the received at least one piece of first characteristic information, and after the cloud identity verification is completed, the gate control device receives at least one response message of the cloud identity verification fed back by the cloud device; further, the door control equipment performs local identity verification on the visitor based on the collected at least one piece of second characteristic information to obtain at least one response message of local identity verification; and finally, the door control equipment generates a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication, and then executes intelligent control operation aiming at the door lock according to the door lock control instruction. Therefore, the first characteristic information, such as biological characteristics of a face or a voiceprint, is fully considered, the data volume contained in the first characteristic information is large, and similar biological characteristics of the face or the voiceprint can change along with the change of physiological characteristics of a user or dressing and dressing of the user, so that when the biological characteristics are used for user identity authentication, the operation amount can be increased, and the calculation amount is greatly required.
It is to be understood that the teachings of the present invention need not achieve all of the above-described benefits, but rather that specific embodiments may achieve specific technical results, and that other embodiments of the present invention may achieve benefits not mentioned above.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present invention will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Fig. 1 is a schematic flow chart illustrating an implementation of a cloud computing-based gating method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a network architecture of a cloud computing-based gating method according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a structural configuration of a door control device based on cloud computing according to an embodiment of the present invention.
Detailed Description
The principles and spirit of the present invention will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the invention, and are not intended to limit the scope of the invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The technical solution of the present invention is further elaborated below with reference to the drawings and the specific embodiments.
Fig. 1 is a schematic flow chart illustrating an implementation of a cloud computing-based gating method according to an embodiment of the present invention; fig. 2 is a schematic diagram of a network architecture of a cloud computing-based gating method according to an embodiment of the present invention.
As shown in fig. 1, the door control method based on cloud computing according to the embodiment of the present invention is applied to a door control device, where the door control device and a cloud device are connected in a network communication manner; the method comprises the following steps: operation 101, the door control device acquires at least one first characteristic information and at least one second characteristic information of a visitor, where a data volume of the first characteristic information is greater than a data volume of the second characteristic information; at operation 102, the door control device sends the collected at least one piece of first characteristic information to the cloud end device, so that the cloud end device performs cloud end identity verification on the visitor based on the received at least one piece of first characteristic information; at operation 103, the door control device receives at least one cloud authentication response message fed back by the cloud device; in operation 104, the door control device performs local identity authentication on the visitor based on the collected at least one piece of second feature information to obtain at least one response message of the local identity authentication; operation 105, the door control device generates a door lock control instruction according to the at least one cloud authentication response message and the at least one local authentication response message; and operation 106, the door control device executes intelligent control operation aiming at the door lock according to the door lock control instruction.
In operation 101, as shown in fig. 2, the at least one first feature information may include a relatively complex biometric feature such as a human face or a voiceprint; the at least one second biometric characteristic may include a fingerprint, which is a relatively simple biometric characteristic, or may include a non-biometric characteristic such as a password or a signature. Obviously, the biometric features such as the face or the voiceprint themselves contain much more data than the features such as the fingerprint, the password or the signature.
Here, it should be understood by those skilled in the art that the door control device may acquire at least one first feature information of the visitor through an image acquisition module (e.g., a face acquisition module) or a sound acquisition module (e.g., a voiceprint acquisition module); the door control device can also collect at least one piece of second characteristic information of the visitor through a fingerprint collection module or a password keyboard or a signature board.
At operation 102, as shown in fig. 2, since the biological features such as the human face or the voiceprint may change along with the change of the physiological features of the user or the dressing and grooming of the user, when the user identity authentication is performed by using the biological features, the amount of computation may be increased, and the requirement on the amount of computation is high, so the identity authentication based on the at least one piece of first feature information is performed by the cloud device connected to the gate device in the embodiment of the present invention.
Further, as shown in fig. 2, the cloud device performs cloud authentication on the visitor based on the received at least one piece of first feature information; and after the cloud identity authentication is finished, feeding back at least one response message of the cloud identity authentication to the gate control equipment.
It should be added that, the cloud authentication and the local authentication in the embodiment of the present invention are not limited in time sequence, that is, the execution sequence of the operation 102 and the operation 104 may be arbitrarily changed in the specific implementation, so the execution sequence is not limited in the present invention.
In addition, referring to the network architecture of the cloud computing-based gating method shown in fig. 2, in the process of performing data transmission between the gating device and the cloud device in operations 102 and 103, encryption and decryption operations may be performed on data, and reliability of data transmission is also ensured. Of course, the specific data encryption algorithm and decryption algorithm are not limited herein.
According to an embodiment of the present invention, in operation 105, the gate control device analyzes a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message to obtain an analysis result; and the door control equipment generates a door lock control instruction according to the obtained analysis result.
Here, the analysis result may include at least the following cases: 1) the total type number of the determined successful response messages reaches the specified type number; 2) the determined total number of types of successful response messages does not reach the specified number of types; 3) the at least one cloud authentication response message is a failure response message, and the at least one local authentication response message reaches a specified type number of successful response messages. Wherein, the number of the specified types is at least 2, that is, at least two types of successful response messages of identity authentication exist.
The process of generating the door lock control command under the condition that different analysis results correspond to each other is specifically described below.
According to an embodiment of the present invention, in operations 105 to 106, if the analysis result is that the total number of types of the determined successful response messages reaches the specified number of types, the door control device generates a first door lock control instruction, where the first door lock control instruction is used to control execution of an intelligent unlocking operation for a door lock; and the door control equipment executes intelligent unlocking operation aiming at the door lock according to the first door lock control instruction.
According to an embodiment of the present invention, in operations 105 to 106, if the analysis result is that the total number of types of the determined successful response messages does not reach the number of specified types, the door control device generates a second door lock control instruction, where the second door lock control instruction is used to control a response to a lock-unlocking-refusal operation for the door lock; and the door control equipment responds to the unlocking refusing operation aiming at the door lock according to the second door lock control instruction.
According to an embodiment of the present invention, in operations 105 to 106, if the analysis result indicates that the response messages of the at least one cloud authentication are all failure response messages, and the response messages of the at least one local authentication reach the number of success response messages of the specified type, it is determined that the at least one first feature information is qualified information; and generating and sending an update instruction, wherein the update instruction is used for instructing the cloud device to add the at least one piece of first characteristic information to an authentication database so as to update the authentication database.
According to the cloud computing-based gating method, the gating equipment acquires at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, and the data volume of the first characteristic information is larger than that of the second characteristic information; then, the gate control device sends the collected at least one piece of first characteristic information to the cloud device, so that the cloud device performs cloud identity verification on the visitor based on the received at least one piece of first characteristic information, and after the cloud identity verification is completed, the gate control device receives at least one response message of the cloud identity verification fed back by the cloud device; further, the door control equipment performs local identity verification on the visitor based on the collected at least one piece of second characteristic information to obtain at least one response message of local identity verification; and finally, the door control equipment generates a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication, and then executes intelligent control operation aiming at the door lock according to the door lock control instruction. Therefore, the first characteristic information, such as biological characteristics of a face or a voiceprint, is fully considered, the data volume contained in the first characteristic information is large, and similar biological characteristics of the face or the voiceprint can change along with the change of physiological characteristics of a user or dressing and dressing of the user, so that when the biological characteristics are used for user identity authentication, the operation amount can be increased, and the calculation amount is greatly required.
Based on the above cloud computing-based gating method, an embodiment of the present invention further provides a cloud computing-based gating device, including: one or more processors; a memory; a program stored in the memory, which when executed by the one or more processors, causes the processors to perform at least the operational steps of: operation 101, the door control device acquires at least one first characteristic information and at least one second characteristic information of a visitor, where a data volume of the first characteristic information is greater than a data volume of the second characteristic information; at operation 102, the door control device sends the collected at least one piece of first characteristic information to the cloud end device, so that the cloud end device performs cloud end identity verification on the visitor based on the received at least one piece of first characteristic information; at operation 103, the door control device receives at least one cloud authentication response message fed back by the cloud device; in operation 104, the door control device performs local identity authentication on the visitor based on the collected at least one piece of second feature information to obtain at least one response message of the local identity authentication; operation 105, the door control device generates a door lock control instruction according to the at least one cloud authentication response message and the at least one local authentication response message; and operation 106, the door control device executes intelligent control operation aiming at the door lock according to the door lock control instruction.
Also, based on the cloud computing-based gating method as described above, an embodiment of the present invention further provides a computer-readable storage medium storing a program, which, when executed by a processor, causes the processor to perform at least the following operation steps: operation 101, the door control device acquires at least one first characteristic information and at least one second characteristic information of a visitor, where a data volume of the first characteristic information is greater than a data volume of the second characteristic information; at operation 102, the door control device sends the collected at least one piece of first characteristic information to the cloud end device, so that the cloud end device performs cloud end identity verification on the visitor based on the received at least one piece of first characteristic information; at operation 103, the door control device receives at least one cloud authentication response message fed back by the cloud device; in operation 104, the door control device performs local identity authentication on the visitor based on the collected at least one piece of second feature information to obtain at least one response message of the local identity authentication; operation 105, the door control device generates a door lock control instruction according to the at least one cloud authentication response message and the at least one local authentication response message; and operation 106, the door control device executes intelligent control operation aiming at the door lock according to the door lock control instruction.
Fig. 3 is a schematic diagram illustrating a structural configuration of a door control device based on cloud computing according to an embodiment of the present invention. As shown in fig. 3, the door control device 30 based on cloud computing according to the embodiment of the present invention establishes a network communication connection with the cloud device 31; the door control apparatus 30 includes: the information acquisition unit 301 is configured to acquire at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, where a data volume of the first characteristic information is greater than a data volume of the second characteristic information; a communication unit 302, configured to send the acquired at least one piece of first feature information to the cloud device, so that the cloud device performs cloud identity verification on the visitor based on the received at least one piece of first feature information; the cloud terminal equipment is also used for receiving at least one cloud terminal identity verification response message fed back by the cloud terminal equipment; a local identity verification unit 303, configured to perform local identity verification on the visitor based on the acquired at least one piece of second feature information, to obtain at least one response message of local identity verification; the instruction generating unit 304 is configured to generate a door lock control instruction according to the at least one cloud authentication response message and the at least one local authentication response message; and the execution unit 305 is used for executing intelligent control operation aiming at the door lock according to the door lock control instruction.
According to an embodiment of the present invention, the instruction generating unit 304 includes: the analysis subunit is configured to analyze a situation of a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message to obtain an analysis result; and the generating subunit is used for generating a door lock control instruction according to the obtained analysis result.
According to an embodiment of the present invention, the generating subunit is further configured to, if the analysis result is that the total number of types of the determined successful response messages reaches a specified number of types, generate a first door lock control instruction by the door control device, where the first door lock control instruction is used to control to execute an intelligent unlocking operation for a door lock; correspondingly, the execution unit is further used for executing intelligent unlocking operation aiming at the door lock according to the first door lock control instruction.
According to an embodiment of the present invention, the generating subunit is further configured to, if the analysis result indicates that the total number of types of the determined successful response messages does not reach the specified number of types, generate, by the door control device, a second door lock control instruction, where the second door lock control instruction is used to control a response to a lock-unlocking-refusal operation for the door lock; correspondingly, the execution unit is further used for responding to the unlocking refusing operation aiming at the door lock according to the second door lock control instruction.
According to an embodiment of the present invention, the generating subunit is further configured to, after the analyzing subunit analyzes the successful response message and/or the failed response message in the at least one cloud authentication response message and the at least one local authentication response message, and obtains an analysis result, determine that the at least one first feature information is the qualified information if the analysis result indicates that the at least one cloud authentication response message is the failed response message and the at least one local authentication response message reaches the specified number of types of successful response messages; and generating and sending an update instruction, wherein the update instruction is used for instructing the cloud device to add the at least one piece of first characteristic information to an authentication database so as to update the authentication database.
Here, it should be noted that: the above description of the embodiment of the door control device based on cloud computing is similar to the description of the foregoing method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is omitted here. For technical details that are not disclosed in the embodiment of the cloud-computing-based gating device of the present invention, please refer to the description of the embodiment of the method of the present invention for understanding, and therefore, for brevity, details are not repeated.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A door control method based on cloud computing is applied to door control equipment and is characterized in that network communication connection is established between the door control equipment and cloud equipment; the method comprises the following steps:
the door control equipment acquires at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, wherein the data volume of the first characteristic information is larger than that of the second characteristic information;
the gate control device sends the collected at least one piece of first characteristic information to the cloud end device, so that the cloud end device carries out cloud end identity verification on the visitor based on the received at least one piece of first characteristic information;
the gate control equipment receives at least one cloud identity verification response message fed back by the cloud equipment;
the gate control equipment performs local identity authentication on the visitor based on the acquired at least one piece of second characteristic information to obtain at least one response message of the local identity authentication;
the door control equipment generates a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication;
and the door control equipment executes intelligent control operation aiming at the door lock according to the door lock control instruction.
2. The method of claim 1, wherein the door control device generates a door lock control command according to the at least one cloud authentication response message and the at least one local authentication response message, and comprises:
the gate control equipment analyzes the conditions of successful response messages and/or failed response messages in the response messages of the at least one cloud identity authentication and the response messages of the at least one local identity authentication to obtain analysis results;
and the door control equipment generates a door lock control instruction according to the obtained analysis result.
3. The method of claim 2,
the door control equipment generates a door lock control instruction according to the obtained analysis result, and the door lock control instruction comprises the following steps: if the analysis result is that the total type number of the determined successful response messages reaches the specified type number, the door control equipment generates a first door lock control instruction, and the first door lock control instruction is used for controlling and executing intelligent unlocking operation aiming at the door lock;
correspondingly, the door control equipment executes intelligent control operation aiming at the door lock according to the door lock control instruction, and the intelligent control operation comprises the following steps: and the door control equipment executes intelligent unlocking operation aiming at the door lock according to the first door lock control instruction.
4. The method of claim 2,
the door control equipment generates a door lock control instruction according to the obtained analysis result, and the door lock control instruction comprises the following steps: if the analysis result is that the total number of types of the determined successful response messages does not reach the number of the specified types, the door control equipment generates a second door lock control instruction, and the second door lock control instruction is used for controlling and responding to the unlocking refusing operation of the door lock;
correspondingly, the door control equipment executes intelligent control operation aiming at the door lock according to the door lock control instruction, and the intelligent control operation comprises the following steps: and the door control equipment responds to the unlocking refusing operation aiming at the door lock according to the second door lock control instruction.
5. The method according to claim 2, wherein after the gate control device analyzes a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message to obtain an analysis result, the method further comprises:
if the analysis result indicates that the response messages of the at least one cloud identity authentication are all failure response messages and the response messages of the at least one local identity authentication reach the specified types of number of success response messages, determining that the at least one first characteristic message is qualified information;
and generating and sending an update instruction, wherein the update instruction is used for instructing the cloud device to add the at least one piece of first characteristic information to an authentication database so as to update the authentication database.
6. The door control device based on cloud computing is characterized in that a network communication connection is established between the door control device and a cloud device; the door control apparatus comprises:
the information acquisition unit is used for acquiring at least one piece of first characteristic information and at least one piece of second characteristic information of a visitor, and the data volume of the first characteristic information is larger than that of the second characteristic information;
the communication unit is used for sending the collected at least one piece of first characteristic information to the cloud end equipment so as to carry out cloud end identity verification on the visitor by the cloud end equipment based on the received at least one piece of first characteristic information; the cloud terminal equipment is also used for receiving at least one cloud terminal identity verification response message fed back by the cloud terminal equipment;
the local identity authentication unit is used for carrying out local identity authentication on the visitor based on the acquired at least one piece of second characteristic information to obtain at least one response message of the local identity authentication;
the instruction generating unit is used for generating a door lock control instruction according to the response message of the at least one cloud identity authentication and the response message of the at least one local identity authentication;
and the execution unit is used for executing intelligent control operation aiming at the door lock according to the door lock control instruction.
7. The door control apparatus according to claim 6, wherein the instruction generation unit comprises:
the analysis subunit is configured to analyze a situation of a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message to obtain an analysis result;
and the generating subunit is used for generating a door lock control instruction according to the obtained analysis result.
8. The door control apparatus according to claim 7,
the generation subunit is further configured to, if the analysis result is that the total number of types of the determined successful response messages reaches a specified number of types, generate a first door lock control instruction by the door control device, where the first door lock control instruction is used to control execution of an intelligent unlocking operation for a door lock;
correspondingly, the execution unit is further used for executing intelligent unlocking operation aiming at the door lock according to the first door lock control instruction.
9. The door control apparatus according to claim 7,
the generation subunit is further configured to, if the analysis result indicates that the total number of types of the determined successful response messages does not reach the specified number of types, generate a second door lock control instruction by the door control device, where the second door lock control instruction is used to control a response to a lock-unlocking-refusal operation for the door lock;
correspondingly, the execution unit is further used for responding to the unlocking refusing operation aiming at the door lock according to the second door lock control instruction.
10. The door control apparatus according to claim 7,
the generating subunit is further configured to, after the analyzing subunit analyzes a successful response message and/or a failed response message in the at least one cloud authentication response message and the at least one local authentication response message, and obtains an analysis result, determine that the at least one piece of first feature information is qualified information if the analysis result indicates that the at least one cloud authentication response message is a failed response message and the at least one local authentication response message reaches a specified number of types of successful response messages; and generating and sending an update instruction, wherein the update instruction is used for instructing the cloud device to add the at least one piece of first characteristic information to an authentication database so as to update the authentication database.
CN201811306591.XA 2018-11-05 2018-11-05 Door control method and device based on cloud computing Pending CN111210544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811306591.XA CN111210544A (en) 2018-11-05 2018-11-05 Door control method and device based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811306591.XA CN111210544A (en) 2018-11-05 2018-11-05 Door control method and device based on cloud computing

Publications (1)

Publication Number Publication Date
CN111210544A true CN111210544A (en) 2020-05-29

Family

ID=70787816

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811306591.XA Pending CN111210544A (en) 2018-11-05 2018-11-05 Door control method and device based on cloud computing

Country Status (1)

Country Link
CN (1) CN111210544A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303724A (en) * 2007-05-10 2008-11-12 中国银联股份有限公司 Authentication authorization method and system
CN103778409A (en) * 2014-01-02 2014-05-07 深圳市元轩科技发展有限公司 Human face identification method based on human face characteristic data mining and device
CN106778607A (en) * 2016-12-15 2017-05-31 国政通科技股份有限公司 A kind of people based on recognition of face and identity card homogeneity authentication device and method
CN107909689A (en) * 2017-11-16 2018-04-13 长沙瑞晓知识产权服务有限公司 Access control system based on cloud computing framework
CN107967420A (en) * 2017-12-31 2018-04-27 刘兴丹 A kind of face, the method, apparatus of palm multiple location identification
CN108492421A (en) * 2018-03-29 2018-09-04 成都惠网远航科技有限公司 Low-power consumption face identification method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303724A (en) * 2007-05-10 2008-11-12 中国银联股份有限公司 Authentication authorization method and system
CN103778409A (en) * 2014-01-02 2014-05-07 深圳市元轩科技发展有限公司 Human face identification method based on human face characteristic data mining and device
CN106778607A (en) * 2016-12-15 2017-05-31 国政通科技股份有限公司 A kind of people based on recognition of face and identity card homogeneity authentication device and method
CN107909689A (en) * 2017-11-16 2018-04-13 长沙瑞晓知识产权服务有限公司 Access control system based on cloud computing framework
CN107967420A (en) * 2017-12-31 2018-04-27 刘兴丹 A kind of face, the method, apparatus of palm multiple location identification
CN108492421A (en) * 2018-03-29 2018-09-04 成都惠网远航科技有限公司 Low-power consumption face identification method

Similar Documents

Publication Publication Date Title
US6810480B1 (en) Verification of identity and continued presence of computer users
US20190130411A1 (en) Method and system for data processing
US20210004451A1 (en) Step-up authentication
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
CN109660509A (en) Login method, device, system and storage medium based on recognition of face
Martinovic et al. Authentication using pulse-response biometrics
EP1480105B1 (en) Secure messaging for security token
CN107491965B (en) Method and device for establishing biological feature library
CN105141427B (en) A kind of login authentication method, apparatus and system based on Application on Voiceprint Recognition
CN105659243B (en) The implicit registration and mark being apprised of
US11496471B2 (en) Mobile enrollment using a known biometric
US10389710B2 (en) Method and system for extracting characteristic information
US20190188364A1 (en) Biometric authentication
CN105337739B (en) Safe login method, device, server and terminal
CN112084476A (en) Biological identification identity verification method, client, server, equipment and system
Yıldırım et al. Android based mobile application development for web login authentication using fingerprint recognition feature
CN109598232A (en) A kind of integrated bio identification technology control method and its device
Belkhede et al. Biometric mechanism for enhanced security of online transaction on Android system: A design approach
US20220253514A1 (en) Method and system for seamless biometric system self-enrollment
CN113826135A (en) System and method for contactless authentication using voice recognition
US11170358B2 (en) System, method, and recording medium for identity fraud prevention in secure transactions using multi-factor verification
US10460094B2 (en) Method, apparatus, and storage medium for data processing
CN111210544A (en) Door control method and device based on cloud computing
CN115906028A (en) User identity verification method and device and self-service terminal
Alotaibi et al. A novel transparent user authentication approach for mobile applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200529

WD01 Invention patent application deemed withdrawn after publication