CN111260836A - Access control method, device and system, storage system and electronic equipment - Google Patents

Access control method, device and system, storage system and electronic equipment Download PDF

Info

Publication number
CN111260836A
CN111260836A CN202010044638.0A CN202010044638A CN111260836A CN 111260836 A CN111260836 A CN 111260836A CN 202010044638 A CN202010044638 A CN 202010044638A CN 111260836 A CN111260836 A CN 111260836A
Authority
CN
China
Prior art keywords
user
access control
identity information
mobile terminal
control device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010044638.0A
Other languages
Chinese (zh)
Inventor
汪宝康
徐天计
张宗品
王能
张家荣
蔡葆锐
廖晓峰
孙灿
余云江
朱聪
王斌
杨洋
程亚晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chuxiong Power Supply Bureau of Yunnan Power Grid Co Ltd
Original Assignee
Chuxiong Power Supply Bureau of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuxiong Power Supply Bureau of Yunnan Power Grid Co Ltd filed Critical Chuxiong Power Supply Bureau of Yunnan Power Grid Co Ltd
Publication of CN111260836A publication Critical patent/CN111260836A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides an access control method, an access control device, an access control system, a warehousing system and electronic equipment, wherein the access control method comprises the following steps: acquiring an instruction which is sent by a mobile terminal and represents that the access control device needs to be controlled to be opened; the instructions include: identity information of a user and geographical position information of the mobile terminal; determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user; when the user is determined to be a legal user, searching all forbidden devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal based on the geographical position information of the mobile terminal and the geographical position information of all the access control devices; the entrance guard's device that control distance is nearest is in the open mode, need not to input entrance guard's device's identification information on mobile terminal, just can open for the entrance guard's device that the user selection matches, easy operation, and user experience is high.

Description

Access control method, device and system, storage system and electronic equipment
Technical Field
The application relates to the technical field of intelligent control, in particular to an access control method, an access control device, an access control system, a warehousing system and electronic equipment.
Background
The existing access control method generally comprises the steps of swiping an access card on a card puncher to send an instruction for opening an access control device, and then checking whether the access card is legal to control the state of the access control device, wherein the access card is easy to lose, and when a user swipes the access card to send the instruction, the user is required to be located beside the card puncher, and when the user has a certain distance from the card puncher, the access control device cannot be opened by swiping the card on the card puncher.
The existing access control method also sends an access control instruction through a mobile terminal, the access control instruction is not needed in the method, when a user is at a distance from the access control device, the access control device can be opened through the mobile terminal, however, when all the access control devices which can be opened by the user are arranged, the access control instruction is required to carry identification information of the access control device to be opened in the method generally, however, the premise that the identification of the access control device is carried in the instruction is that the user inputs the identification information of the access control device to be opened on the mobile terminal, the operation is complex, meanwhile, the situation that the user forgets the identification of the access control device to be opened can also exist in actual life, and under the situation, the user can not control the access control device to be opened through the mobile terminal to be in an open state.
Therefore, when the user sends an access control command near one of all the access control devices that the user can open, if the access control command does not include the identification information of the access control device to be opened, the user cannot select the matched access control device to open, and the user experience is poor.
Disclosure of Invention
In view of this, an object of the embodiments of the present application is to provide an access control method, an access control device, an access control system, a warehousing system, and an electronic device, where when a user sends an access control instruction near one of all openable access devices through a mobile terminal, the user can select a matched access device for opening without inputting identification information of the access device to be opened on the mobile terminal, so that the operation is simple, and the user experience is improved.
In a first aspect, an embodiment of the present application provides an access control method, where the method includes: acquiring an instruction which is sent by a mobile terminal and represents that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal; determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user; when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; and controlling the nearest access control device to be in an open state.
The closer a user is to a certain openable access control device, the higher the possibility that the user wants to open the access control device is, so that in the implementation process, an access control instruction is sent through the mobile terminal without an access card, when the user is at a distance from the access control device, the access control device can be opened through the mobile terminal, and after the instruction is obtained, whether the user is a legal user is determined based on the identity information of the user and the pre-stored identity information of the legal user, so that the access control device is prevented from being opened by an illegal user; secondly, searching all the access control devices corresponding to the identity information of the user from the corresponding relationship between the predetermined identity information of the user and the access control devices, and then preventing the access control device of the user A from being opened by the user B to ensure the safety; and finally, based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices, determining the access control device closest to the mobile terminal from all the access control devices, controlling the access control device closest to the mobile terminal to be in an open state, and opening the access control device by selecting the matched access control device for the user without inputting identification information of the access control device to be opened on the mobile terminal by the user.
Based on the first aspect, in a possible design, the controlling the nearest access control device to be in an open state includes: determining whether the distance between the nearest access control device and the mobile terminal is smaller than a preset distance; and when the distance is determined to be smaller than the preset distance, controlling the nearest access control device to be in an open state.
When the entrance guard's device of waiting to open at the user distance was far away, if control entrance guard's device was in the open mode, then lead to easily that illegal personnel have enough time and in this user's careless room of getting into and installing this entrance guard's device, there is higher potential safety hazard, consequently, at above-mentioned realization in-process, being confirmed the distance is less than when predetermineeing the distance, just control the nearest entrance guard's device of distance is in the open mode, prevents then that illegal personnel from not paying attention to getting into the room of installing this entrance guard's device when this user, further improves the security.
In a possible design based on the first aspect, the instructions further include: an electronic certificate of the user; from the predetermined corresponding relation between the identity information of the legal user and the access control devices, all the access control devices corresponding to the identity information of the user are found out, and the method comprises the following steps: determining whether the electronic certificate of the user is legal or not based on a prestored legal electronic certificate; and when the electronic certificate of the user is determined to be legal, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
Since the identity information of the legal user may be stolen, in the implementation process, by verifying whether the electronic certificate of the user is legal, the illegal user cannot control the access control device to be opened even if the identity information of the legal user is stolen by the illegal user, and the high security of the access control is further improved.
In a possible design based on the first aspect, the step of determining whether the electronic certificate of the user is legal includes: searching out an electronic certificate corresponding to the identity information of the user based on a prestored corresponding relation between a legal electronic certificate and the identity information of the user; determining whether the corresponding electronic certificate is the same as the electronic certificate of the user, wherein if the corresponding electronic certificate is the same as the electronic certificate of the user, the electronic certificate representing the user is legal; and if the corresponding electronic certificate is different from the electronic certificate of the user, the electronic certificate representing the user is illegal.
In the implementation process, the identity information of the user is bound with the electronic certificate, so that the access control device cannot be controlled to be opened even if an illegal user steals the identity information of a legal user A and the electronic certificates of other legal users, and further the security of the access control is ensured.
In a possible design based on the first aspect, the instructions further include: a device identifier of the mobile terminal; before all the access control devices corresponding to the identity information of the user are found out from the predetermined corresponding relationship between the identity information of the user and the access control devices, the method further comprises the following steps: and determining that the pre-stored equipment identification comprises the equipment identification of the mobile terminal.
In the implementation process, the device identification of the mobile terminal is verified, so that even if an illegal user steals the identity information of a legal user, the illegal user can be prevented from controlling the access control device to be opened.
In a second aspect, an embodiment of the present application provides an access control device, where the access control device includes: the access control device comprises an acquisition unit, a control unit and a control unit, wherein the acquisition unit is used for acquiring an instruction which is sent by the mobile terminal and indicates that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal; the first determining unit is used for determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user; the searching unit is used for searching all the access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices when the user is determined to be a legal user; the second determining unit is used for determining the access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; and the control unit is used for controlling the nearest access control device to be in an open state.
Based on the second aspect, in a possible design, the control unit is specifically configured to determine whether a distance between the nearest access control device and the mobile terminal is less than a preset distance; and when the distance is determined to be smaller than the preset distance, controlling the nearest access control device to be in an open state.
In a possible design based on the second aspect, the instructions further include: an electronic certificate of the user; the searching unit is specifically configured to determine whether the electronic certificate of the user is legal based on a pre-stored legal electronic certificate; and when the electronic certificate of the user is determined to be legal, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
In a possible design based on the second aspect, the step of determining whether the electronic certificate of the user is legal includes: searching out an electronic certificate corresponding to the identity information of the user based on a prestored corresponding relation between a legal electronic certificate and the identity information of the user; determining whether the corresponding electronic certificate is the same as the electronic certificate of the user, wherein if the corresponding electronic certificate is the same as the electronic certificate of the user, the electronic certificate representing the user is legal; and if the corresponding electronic certificate is different from the electronic certificate of the user, the electronic certificate representing the user is illegal.
In a possible design based on the second aspect, the instructions further include: a device identifier of the mobile terminal; entrance guard's controlling means still includes: and the identification determining unit is used for determining that the prestored equipment identification comprises the equipment identification of the mobile terminal.
In a third aspect, an embodiment of the present application provides an access control system, where the access control system includes: a server, a gateway and an access control device; the gateway is used for receiving an instruction which is sent by a mobile terminal and indicates that the access control device closest to the mobile terminal needs to be controlled to open; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal; and sending the instruction to the server; the server is used for determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user; when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; sending a control instruction for representing and controlling the closest access control device to be in an open state to the gateway; and the gateway is further used for controlling the nearest access control device to be in an open state based on the control instruction.
The closer a user is to a certain openable access control device, the higher the possibility that the user wants to open the access control device is, so that in the implementation process, an access control instruction is sent through the mobile terminal, an access card is not needed, when the user is at a certain distance from the access control device, the access control device can be opened through the mobile terminal, and after the server obtains the instruction, whether the user is a legal user is determined based on the identity information of the user and the identity information of the legal user stored in advance, so that the access control device is prevented from being opened by an illegal user; secondly, from predetermined user's identity information and entrance guard's corresponding relation, find out with all entrance guard's devices that user's identity information corresponds, avoid A user's entrance guard's device to be opened by B user then, guarantee the security, at last based on mobile terminal's geographical position information with all entrance guard's device's geographical position information follows determine among all entrance guard's devices with mobile terminal is apart from nearest entrance guard's device, then the server passes through gateway control distance nearest entrance guard's device is in the open mode, need not the user and input the identification information who waits to open entrance guard's device on mobile terminal, just can open for the entrance guard's device that the user selection matches, easy operation improves user experience.
Based on the third aspect, in one possible design, the access control system further includes: the mobile terminal, the gateway and the mobile terminal are connected through Bluetooth.
In the implementation process, under the condition that the network signal is poor or no network signal exists, the mobile terminal can also be connected with the gateway Bluetooth to control the access control device to be in an open state.
In a fourth aspect, an embodiment of the present application provides a warehousing system, including: a plurality of warehouses and third aspect access control system, wherein, install on the warehouse door in every warehouse access control system's entrance guard device installs in every warehouse access control system's gateway.
The closer a user is to an access control device of a warehouse which can be opened, the higher the possibility that the user wants to open the access control device of the warehouse is, therefore, in the implementation process, an access control instruction is sent through a mobile terminal, an access card is not needed, when the user is at a distance from the access control device, the access control device can also be opened through the mobile terminal, and after the server obtains the instruction, whether the user is a legal user is determined based on the identity information of the user and the identity information of the legal user which is stored in advance, so that the access control device is prevented from being opened by an illegal user; secondly, from predetermined user's identity information and entrance guard's corresponding relation, find out with all entrance guard's devices that user's identity information corresponds, avoid A user's entrance guard's device to be opened by B user then, guarantee the security, at last based on mobile terminal's geographical position information with all entrance guard's device's geographical position information follows determine among all entrance guard's devices with mobile terminal is apart from nearest entrance guard's device, then the server passes through gateway control distance nearest entrance guard's device is in the open mode, need not the user and input the identification information who waits to open entrance guard's device on mobile terminal, just can open for the entrance guard's device in the warehouse that the user selection matches, easy operation improves user experience.
In a possible design according to the fourth aspect, the warehouse is provided with goods and materials, and the goods and materials are attached with labels; the system further comprises a material scanning device; the server is used for receiving an instruction which is sent by the material scanning equipment through scanning a label on the material to be received and represents the material to be received; wherein, the instruction comprises: the warehouse where the goods to be picked up are located and the identification information of the goods to be picked up; and the server is also used for responding to the instruction and marking the state of the goods to be picked up as a picked-up state in a database for storing goods and materials information of the warehouse. In the implementation process, a material getting person scans identification information on materials through a material scanning device, sends an instruction representing getting of the materials to be got to a server, and finishes self-service material getting.
In a fifth aspect, an embodiment of the present application provides an electronic device, including a processor and a memory connected to the processor, where a computer program is stored in the memory, and when the computer program is executed by the processor, the electronic device is caused to perform the method of the first aspect.
In a sixth aspect, an embodiment of the present application provides a storage medium, where a computer program is stored, and when the computer program runs on a computer, the computer is caused to execute the method of the first aspect.
Additional features and advantages of the present application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the present application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart of an access control method provided in an embodiment of the present application.
Fig. 2 is a schematic structural diagram of an access control system provided in an embodiment of the present application.
Fig. 3 is a flowchart of a method of an access control device according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a warehousing system provided in the embodiment of the present application.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solution in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Referring to fig. 1, fig. 1 is a flowchart of an access control method according to an embodiment of the present application, where the method includes: s100, S200, S300, S400, and S500.
S100: acquiring an instruction which is sent by a mobile terminal and represents that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of the user and geographical location information of the mobile terminal.
S200: and determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user.
S300: and when the user is determined to be a legal user, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
S400: and based on the geographical position information of the mobile terminal and the geographical position information of all the access control devices, determining the access control device closest to the mobile terminal from all the access control devices.
S500: and controlling the nearest access control device to be in an open state.
The above method is described in detail below.
S100: acquiring an instruction which is sent by a mobile terminal and represents that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of the user and geographical location information of the mobile terminal.
In an actual implementation process, S100 may be implemented in such a manner that a user logs in an access control page through a mobile terminal, and inputs identity information of the user in a login information input box, where the identity information includes: the method comprises the steps that a login account and a login password are used, wherein the login account has uniqueness, namely, login accounts corresponding to different users are different, and after identity information is input, a command for representing that an access control device needs to be controlled to be opened is generated and sent by selecting a function option representing that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of the user and geographical location information of the mobile terminal. The geographic position information of the mobile terminal is acquired in real time through a Global Positioning System (GPS) chip installed on the mobile terminal after a function option representing that the access control device needs to be controlled to be opened is selected.
After the instruction is acquired, step S200 is executed: and determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user.
Extracting the identity information of the user from the instruction, comparing the identity information of the user with pre-stored identity information of a legal user, wherein a specific comparison mode can be that the login account of the user is compared with the login accounts in the identity information of the legal user one by one, when the login account in the identity information of the legal user has an account which is the same as the login account of the user, comparing the login password of the user with the login password corresponding to the same account in the identity information of the legal user, and when the login password of the user is the same as the corresponding login password, representing that the user is a legal user, otherwise, representing that the user is an illegal user.
S300: and when the user is determined to be a legal user, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
When the user is determined to be a legal user, comparing the identity information of the user with identity information of the user in the corresponding relation of the preselected determined user and the access control device one by one, and when the identity information of the user is consistent in the corresponding relation, searching the identification information of all the access control devices corresponding to the consistent identity information from the corresponding relation. It can be understood that one access control device corresponds to one identifier, and the identifier information of any two access control devices is different.
Wherein, the number of all corresponding access control devices can be one, two, three, etc.
When the number of all corresponding door access devices is one, step S500 may be directly performed after S300, and all corresponding door access devices are the door access devices closest to the distance in S500.
Since the identity information of the legitimate user may be stolen, as an embodiment, the instruction further includes: the electronic certificate of the user, S300, includes the steps of: a1 and a 2.
A1: and determining whether the electronic certificate of the user is legal or not based on a prestored legal electronic certificate.
When the user is determined to be a legal user, extracting the electronic certificate of the user from the instruction, comparing the electronic certificate of the user with the prestored legal electronic certificates one by one, and when the prestored legal electronic certificates have the same certificate as the electronic certificate of the user, representing that the electronic certificate of the user is legal, otherwise, representing that the electronic certificate of the user is illegal. It is understood that the electronic certificates of different users may be the same or different.
The comparison method of the electronic certificate is well known in the art, and therefore, the detailed description thereof is omitted.
Wherein, as an implementation manner, the step of determining whether the electronic certificate of the user is legal comprises: b1 and B2.
B1: and searching the electronic certificate corresponding to the identity information of the user based on the corresponding relation between the pre-stored legal electronic certificate and the identity information of the user.
When the user is determined to be a legal user, extracting the electronic certificate of the user from the instruction, comparing the identity information in the corresponding relation between the prestored legal electronic certificate and the identity information of the user with the identity information of the user one by one, and finding out the electronic certificate corresponding to the matched identity information from the corresponding relation between the prestored legal electronic certificate and the identity information of the user when the identity information matched with the identity information of the user exists in the identity information in the corresponding relation between the prestored legal electronic certificate and the identity information of the user.
After finding the electronic certificate corresponding to the identity information of the user, step B2 is executed: determining whether the corresponding electronic certificate is the same as the electronic certificate of the user, wherein if the corresponding electronic certificate is the same as the electronic certificate of the user, the electronic certificate representing the user is legal; and if the corresponding electronic certificate is different from the electronic certificate of the user, the electronic certificate representing the user is illegal.
Comparing the electronic certificate of the user with the corresponding electronic certificate, and if the corresponding electronic certificate is the same as the electronic certificate of the user, representing that the electronic certificate of the user is legal; and if the corresponding electronic certificate is different from the electronic certificate of the user, the electronic certificate representing the user is illegal.
By binding the identity information of the user with the electronic certificate, even if the identity information of the legal user A is stolen by an illegal user and the electronic certificates of other legal users, the access control device cannot be controlled to be opened, and further the access control safety is ensured.
A2: and when the electronic certificate of the user is determined to be legal, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
When the electronic certificate of the user is determined to be legal, comparing the identity information in the corresponding relation between the predetermined identity information of the user and the access control device with the identity information of the user acquired from the instruction one by one, and searching the identification information of all the access control devices corresponding to the same identity information from the corresponding relation between the predetermined identity information of the user and the access control device when the identity information same as the identity information of the user exists in the corresponding relation between the predetermined identity information of the user and the access control device.
In the implementation process, whether the electronic certificate of the user is legal or not is verified, and then the illegal user cannot control the entrance guard device to be opened under the condition that the identity letter of the legal user is stolen by the illegal user, so that the entrance guard safety is further improved.
After the identification information of all the access control devices is acquired, executing step S400: and based on the geographical position information of the mobile terminal and the geographical position information of all the access control devices, determining the access control device closest to the mobile terminal from all the access control devices.
Searching geographical position information corresponding to the identification information of each access control device in the identification information of all the access control devices from the corresponding relation between the pre-stored identification information and the geographical position information of the access control devices, determining the distance between the geographical position information of the mobile terminal in the command and each geographical position information in the geographical position information of all the access control devices, and then determining the access control device closest to the mobile terminal from all the access control devices.
After determining the access control device closest to the mobile terminal from all the access control devices, executing step S500: and controlling the nearest access control device to be in an open state.
And sending a control instruction to the access control device to control the nearest access control device to be in an open state.
The closer a user is to a certain openable access control device, the higher the possibility that the user wants to open the access control device, so in the implementation process, an access control instruction is sent through the mobile terminal; the access control device can be opened through the mobile terminal when the user is away from the access control device for a certain distance without an access control card, and after an instruction is obtained, whether the user is a legal user is determined based on the identity information of the user and the pre-stored identity information of the legal user, so that the access control device is prevented from being opened by an illegal user; secondly, from predetermined user's identity information and entrance guard's corresponding relation, find out with all entrance guard's devices that user's identity information corresponds, avoid A user's entrance guard's device to be opened by B user then, guarantee the security, at last based on mobile terminal's geographical position information with all entrance guard's device's geographical position information follows determine among all entrance guard's devices with mobile terminal is apart from nearest entrance guard's device, and control distance nearest entrance guard's device is in the open mode, need not the user and input the identification information who waits to open entrance guard's device on mobile terminal, just can open for the entrance guard's device that the user selection matches, easy operation improves user experience.
When the user is far away from the entrance guard device to be opened, if the entrance guard device is controlled to be in an open state, it is easy to cause an illegal person to have enough time to inadvertently enter the room in which the entrance guard device is installed by the user, and a higher potential safety hazard exists, so that, as an implementation mode, the S500 includes the steps of: c1 and C2.
C1: and determining whether the distance between the nearest access control device and the mobile terminal is less than a preset distance.
And after the distance between the entrance guard device closest to the mobile terminal and the mobile terminal is determined, comparing the distance with the preset distance to obtain a comparison result.
C2: and when the distance is determined to be smaller than the preset distance, controlling the nearest access control device to be in an open state.
And when the comparison result represents that the distance is smaller than the preset distance, sending a control instruction to the nearest access control device to control the nearest access control device to be in an open state.
In the implementation process, when the distance is determined to be smaller than the preset distance, the nearest access control device is controlled to be in an open state, so that illegal personnel are prevented from entering a room provided with the access control device while the user is not aware of the entrance control device, and the safety is further improved.
As an implementation manner, when it is determined that the distance is greater than or equal to the preset distance, continuously acquiring the distance between the mobile terminal and the nearest access control device, and controlling the nearest access control device to be in an open state until the distance is less than the preset distance.
The instructions further comprise: a device identifier of the mobile terminal; as an embodiment, before all the access control devices corresponding to the identity information of the user are found from the predetermined correspondence between the identity information of the user and the access control devices, the method further includes: and determining that the pre-stored equipment identification comprises the equipment identification of the mobile terminal.
And when the user is a legal user, acquiring the equipment identifier of the mobile terminal from the instruction, comparing the equipment identifier of the mobile terminal with the prestored equipment identifiers one by one, and when the prestored equipment identifiers are determined to have identifiers which are the same as the identifiers of the mobile terminal, determining that the prestored equipment identifiers comprise the equipment identifiers of the mobile terminal, otherwise, determining that the prestored equipment identifiers do not comprise the equipment identifiers of the mobile terminal.
In the implementation process, the device identification of the mobile terminal is verified, so that even if an illegal user steals the identity information of a legal user, the illegal user can be prevented from controlling the access control device to be opened.
Referring to fig. 2, fig. 2 is a schematic structural diagram of an access control system 300 according to an embodiment of the present application, where the access control system 300 includes: a server 10, a gateway 20 and an access control device; the gateway 20 is in communication connection with the server 10 and the access control device respectively. It is worth mentioning that one access control device may be connected to one gateway, or a plurality of access control devices may be connected to one gateway.
The gateway 20 is configured to receive an instruction sent by a mobile terminal, indicating that an access control device closest to the mobile terminal needs to be controlled to open; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal; and sends the instruction to the server 10.
The server 10 is configured to determine whether the user is a valid user based on the identity information of the user and pre-stored identity information of a valid user; when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; sending a control instruction for representing and controlling the closest access control device to be in an open state to the gateway;
the gateway 20 is further configured to control the nearest access control device to be in an open state based on the control instruction.
As an embodiment, the access control system 300 further includes: the mobile terminal, the gateway 20 and the mobile terminal are connected by Bluetooth. It is understood that the gateway 20 and the mobile terminal have bluetooth chips installed therein.
The specific implementation of the access control system may refer to the foregoing method embodiments, and details are not repeated here.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an access control apparatus 400 according to an embodiment of the present application, where the access control apparatus 400 includes:
the obtaining unit 410 is configured to obtain an instruction, sent by the mobile terminal, indicating that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of the user and geographical location information of the mobile terminal.
A first determining unit 420, configured to determine whether the user is a valid user based on the identity information of the user and pre-stored identity information of a valid user.
The searching unit 430 is configured to, when it is determined that the user is a valid user, search for all the access control devices corresponding to the identity information of the user from a predetermined correspondence between the identity information of the user and the access control devices.
And a second determining unit 440, configured to determine, from all the access control devices, an access control device closest to the mobile terminal based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices.
And the control unit 450 is configured to control the nearest access control device to be in an open state.
As an embodiment, the control unit 450 is specifically configured to determine whether a distance between the nearest access control device and the mobile terminal is less than a preset distance; and when the distance is determined to be smaller than the preset distance, controlling the nearest access control device to be in an open state.
As an embodiment, the instructions further include: an electronic certificate of the user; the searching unit 430 is specifically configured to determine whether the electronic certificate of the user is legal based on a pre-stored legal electronic certificate; and when the electronic certificate of the user is determined to be legal, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
As an embodiment, the step of determining whether the electronic certificate of the user is legal includes: searching out an electronic certificate corresponding to the identity information of the user based on a prestored corresponding relation between a legal electronic certificate and the identity information of the user; determining whether the corresponding electronic certificate is the same as the electronic certificate of the user, wherein if the corresponding electronic certificate is the same as the electronic certificate of the user, the electronic certificate representing the user is legal; and if the corresponding electronic certificate is different from the electronic certificate of the user, the electronic certificate representing the user is illegal.
As an embodiment, the instructions further include: a device identifier of the mobile terminal; entrance guard's controlling means still includes: and the identification determining unit is used for determining that the prestored equipment identification comprises the equipment identification of the mobile terminal.
For the process of implementing each function by each functional unit in this embodiment, please refer to the content described in the embodiment shown in fig. 1, which is not described herein again.
Referring to fig. 4, an embodiment of the present application provides a schematic structural diagram of a warehousing system, including: a plurality of warehouses and the access control system 300 of the above embodiment, wherein, install on the warehouse door of every warehouse entrance guard device among the access control system 300, install in every warehouse gateway 20 among the access control system 300, every gateway 20 respectively with the server 10 is connected.
Wherein, all having arranged goods shelves in every warehouse, every goods shelves have a plurality of goods positions, and every goods position is attached to have the label, and the goods position is used for placing goods and materials, and every goods and materials is attached to have the label, and the label has the uniqueness, and every goods position, goods and materials's label all is different.
As an embodiment, the warehousing system further comprises: one or more of a label printer, a camera, a video recorder, a router, a switch, a host, an electric lamp and the like are arranged in each warehouse.
The router is connected to the server 10 and the switch, the switch is connected to the gateway 20, the host and the video recorder, the camera and the video recorder are connected via a Power Over Ethernet (POE) network, the video recorder supplies Power to the camera via the POE network, and the video recorder sends the obtained video information to the switch, so that the switch sends the video information to the server.
The host computer with the label printer respectively with the label printer with gateway 20 is connected, mobile terminal passes through gateway 20 with the host computer control the label printer prints goods and materials label. The specific implementation of warehousing and delivering materials is well known in the art, and therefore, will not be described herein.
The gateway 20 is connected with the electric lamp, and the mobile terminal controls the working state of the electric lamp through the gateway 20.
In one embodiment, the label printer is connected to the host computer through a serial port, and the host computer is connected to the gateway 20 through a serial port.
As one implementation mode, materials are placed in the warehouse, and labels are attached to the materials; the system further comprises a material scanning device; the server is used for receiving an instruction which is sent by the material scanning equipment through scanning a label on the material to be received and represents the material to be received; wherein, the instruction comprises: the warehouse where the goods to be picked up are located and the identification information of the goods to be picked up; and the server is also used for responding to the instruction and marking the state of the goods to be picked up as a picked-up state in a database for storing goods and materials information of the warehouse.
The label has uniqueness, and the label is a two-dimensional code label printed by the label printer. The label comprises the material information of the material to be received, the identification information of the material to be received and the identification information of the warehouse where the material to be received is located, and the label also comprises the goods position information of the goods shelf where the material to be received is located, the position information of the warehouse where the goods shelf is located and the like.
When a user needs to open a warehouse door of a certain warehouse in a warehousing system and the user carries a mobile terminal and is located outside a warehouse door far away from the warehouse, the identity information of the user is input through the mobile terminal and an instruction representing that an access control device needs to be opened is sent to the gateway 20, wherein the instruction comprises the identity information of the user and the geographic position information of the mobile terminal, the gateway 20 sends the instruction to the server 10, and the identity information of the user and the identity information of a pre-stored legal user of the server 10 determine whether the user is a legal user; when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; the server 10 sends a control instruction indicating that the nearest access control device is controlled to be in an open state to the gateway 20 nearest to the nearest access control device, and the nearest gateway 20 controls the nearest access control device to be in the open state based on the control instruction.
When the user needs to receive the goods and materials to be received, the user scans the labels on the goods and materials to be received through a goods and materials scanning device so as to send an instruction representing the goods and materials to be received to the server, wherein the instruction comprises identification information of a warehouse where the goods and materials to be received are located and identification information of the goods and materials to be received; the instruction may further include information on a goods position of a shelf where the goods and materials to be taken are located, and position information of the warehouse. The server acquires the identification information of the goods and materials to be received and the identification information of the warehouse based on the instruction, searches out the database corresponding to the identification information of the warehouse based on the predetermined corresponding relationship between the identification information of the warehouse and the database, searches out the state of the goods and materials to be received corresponding to the identification information of the goods and materials to be received from the corresponding database based on the identification information of the goods and materials to be received, and then changes the state of the goods and materials to be received into the received state or deletes the goods and materials information of the goods and materials to be received from the corresponding database.
The material scanning device may also be the mobile terminal.
Referring to fig. 5, an embodiment of the present application provides an electronic device 100, where the electronic device 100 may be the server 10 mentioned in the access control system 300, and the electronic device 100 may be a Personal Computer (PC), a tablet computer, a smart phone, a Personal Digital Assistant (PDA), or the like.
The electronic device 100 may include: a memory 102, a processor 101, a communication interface 103, and a communication bus for enabling connection communication of these components.
The Memory 102 is used for storing various data such as the identity information of a legitimate user, the correspondence between the identity information of the user and the access control device, the geographic location information of the access control device, and the computer program instructions corresponding to the access control method and device, where the Memory 102 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like.
The processor 101 is configured to obtain an instruction, sent by the mobile terminal, indicating that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal; determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user; when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; and controlling the nearest access control device to be in an open state.
The processor 101 may be an integrated circuit chip having signal processing capability. The Processor 101 may be a general-purpose Processor 101, including a Central Processing Unit (CPU) 101, a Network Processor 101 (NP), and the like; but may also be a digital signal processor 101(DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. The general purpose processor 101 may be a microprocessor 101 or the processor 101 may be any conventional processor 101 or the like.
And the communication interface 103 is used for acquiring an instruction which is sent by the mobile terminal and indicates that the access control device needs to be controlled to be opened.
In addition, a storage medium is provided in an embodiment of the present application, and a computer program is stored in the storage medium, and when the computer program runs on a computer, the computer is caused to execute the method provided in any embodiment of the present application.
To sum up, according to the access control method, the access control device, the access control system, the warehousing system and the electronic device provided by the embodiments of the present application, since the closer a user is to a certain openable access control device, the greater the possibility that the user wants to open the access control device, the more the access control command is sent through the mobile terminal, an access card is not needed, when the user is at a distance from the access control device, the access control device can be opened through the mobile terminal, after the command is obtained, whether the user is a legal user is determined based on the identity information of the user and the pre-stored identity information of the legal user, and then the access control device is prevented from being opened by an illegal user; secondly, from predetermined user's identity information and entrance guard's corresponding relation, find out with all entrance guard's devices that user's identity information corresponds, avoid A user's entrance guard's device to be opened by B user then, guarantee the security, at last based on mobile terminal's geographical position information with all entrance guard's device's geographical position information follows determine among all entrance guard's devices with mobile terminal is apart from nearest entrance guard's device, and control distance nearest entrance guard's device is in the open mode, need not the user and input the identification information who waits to open entrance guard's device on mobile terminal, just can open for the entrance guard's device that the user selection matches, easy operation improves user experience.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based devices that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (11)

1. An access control method, comprising:
acquiring an instruction which is sent by a mobile terminal and represents that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal;
determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user;
when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices;
determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices;
and controlling the nearest access control device to be in an open state.
2. The method of claim 1, wherein controlling the nearest access device to be in an open state comprises:
determining whether the distance between the nearest access control device and the mobile terminal is smaller than a preset distance;
and when the distance is determined to be smaller than the preset distance, controlling the nearest access control device to be in an open state.
3. The method of claim 1, wherein the instructions further comprise: an electronic certificate of the user; from the predetermined corresponding relation between the identity information of the legal user and the access control devices, all the access control devices corresponding to the identity information of the user are found out, and the method comprises the following steps:
determining whether the electronic certificate of the user is legal or not based on a prestored legal electronic certificate;
and when the electronic certificate of the user is determined to be legal, searching all the access control devices corresponding to the identity information of the user from the predetermined corresponding relation between the identity information of the user and the access control devices.
4. The method of claim 3, wherein determining whether the electronic certificate of the user is legitimate comprises:
searching out an electronic certificate corresponding to the identity information of the user based on a prestored corresponding relation between a legal electronic certificate and the identity information of the user;
determining whether the corresponding electronic certificate is the same as the electronic certificate of the user, wherein if the corresponding electronic certificate is the same as the electronic certificate of the user, the electronic certificate representing the user is legal; and if the corresponding electronic certificate is different from the electronic certificate of the user, the electronic certificate representing the user is illegal.
5. The method of claim 1, wherein the instructions further comprise: a device identifier of the mobile terminal; before all the access control devices corresponding to the identity information of the user are found out from the predetermined corresponding relationship between the identity information of the user and the access control devices, the method further comprises the following steps:
and determining that the pre-stored equipment identification comprises the equipment identification of the mobile terminal.
6. An access control device, comprising:
the access control device comprises an acquisition unit, a control unit and a control unit, wherein the acquisition unit is used for acquiring an instruction which is sent by the mobile terminal and indicates that the access control device needs to be controlled to be opened; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal;
the first determining unit is used for determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user;
the searching unit is used for searching all the access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices when the user is determined to be a legal user;
the second determining unit is used for determining the access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices;
and the control unit is used for controlling the nearest access control device to be in an open state.
7. An access control system, comprising: a server, a gateway and an access control device;
the gateway is used for receiving an instruction which is sent by a mobile terminal and indicates that the access control device closest to the mobile terminal needs to be controlled to open; wherein, the instruction comprises: identity information of a user and geographical location information of the mobile terminal; and sending the instruction to the server;
the server is used for determining whether the user is a legal user or not based on the identity information of the user and the pre-stored identity information of the legal user; when the user is determined to be a legal user, searching all access control devices corresponding to the identity information of the user from the corresponding relation between the predetermined identity information of the user and the access control devices; determining an access control device closest to the mobile terminal from all the access control devices based on the geographic position information of the mobile terminal and the geographic position information of all the access control devices; sending a control instruction for representing and controlling the closest access control device to be in an open state to the gateway;
and the gateway is further used for controlling the nearest access control device to be in an open state based on the control instruction.
8. The access control system of claim 7, further comprising: the mobile terminal, the gateway and the mobile terminal are connected through Bluetooth.
9. A warehousing system, characterized in that the warehousing system comprises: the access control system of claim 7 or 8 and a plurality of warehouses, wherein the entrance guard device of the access control system is installed on the warehouse door of each warehouse, and the gateway of the access control system is installed in each warehouse.
10. The system of claim 9, wherein the warehouse has supplies disposed therein and the supplies have labels affixed thereto; the system further comprises a material scanning device;
the server is used for receiving an instruction which is sent by the material scanning equipment through scanning a label on the material to be received and represents the material to be received; wherein, the instruction comprises: the warehouse where the goods to be picked up are located and the identification information of the goods to be picked up;
and the server is also used for responding to the instruction and marking the state of the goods to be picked up as a picked-up state in a database for storing goods and materials information of the warehouse.
11. An electronic device comprising a memory and a processor, the memory having stored therein computer program instructions that, when read and executed by the processor, perform the method of any of claims 1-5.
CN202010044638.0A 2019-12-31 2020-01-15 Access control method, device and system, storage system and electronic equipment Pending CN111260836A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911425192X 2019-12-31
CN201911425192 2019-12-31

Publications (1)

Publication Number Publication Date
CN111260836A true CN111260836A (en) 2020-06-09

Family

ID=70948973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010044638.0A Pending CN111260836A (en) 2019-12-31 2020-01-15 Access control method, device and system, storage system and electronic equipment

Country Status (1)

Country Link
CN (1) CN111260836A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112053484A (en) * 2020-08-25 2020-12-08 青岛聚好联科技有限公司 Door opening method and device of access control equipment, electronic equipment and medium
CN112700575A (en) * 2021-03-23 2021-04-23 成都宜泊信息科技有限公司 Vehicle entrance and exit management method and system, electronic device and storage medium
CN114157988A (en) * 2021-11-22 2022-03-08 上海邻里邻外信息科技有限公司 Control method, device and medium for electronic equipment
CN115223290A (en) * 2022-07-19 2022-10-21 中国银行股份有限公司 Access control method and device, electronic equipment and computer readable storage medium
CN116308071A (en) * 2023-05-24 2023-06-23 北京应天海乐科技发展有限公司 Material management method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5339385A (en) * 1992-07-22 1994-08-16 Itt Corporation Speaker verifier using nearest-neighbor distance measure
CN101894404A (en) * 2010-07-29 2010-11-24 深圳市戴文科技有限公司 Method for realizing access control, terminal, access control device and access control system
CN104063930A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Multi-access intelligent recognition system based on position and method
CN106296948A (en) * 2016-08-31 2017-01-04 北京厚文知识产权顾问有限公司 Gate control system based on GPS location and door opening method
CN107657689A (en) * 2017-09-08 2018-02-02 深圳传音通讯有限公司 A kind of gate inhibition's method for unlocking, mobile terminal and computer-readable medium
CN108473109A (en) * 2015-10-13 2018-08-31 法拉第未来公司 Seamless vehicle accesses system
CN108765646A (en) * 2018-05-02 2018-11-06 贵安新区搜床科技有限公司 A kind of control method for door lock and device based on GPS positioning
CN109214747A (en) * 2018-08-02 2019-01-15 平安科技(深圳)有限公司 Warehouse management method, device, computer equipment and storage medium
CN110070652A (en) * 2019-04-26 2019-07-30 广东昇辉电子控股有限公司 A kind of access control method, system, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5339385A (en) * 1992-07-22 1994-08-16 Itt Corporation Speaker verifier using nearest-neighbor distance measure
CN101894404A (en) * 2010-07-29 2010-11-24 深圳市戴文科技有限公司 Method for realizing access control, terminal, access control device and access control system
CN104063930A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Multi-access intelligent recognition system based on position and method
CN108473109A (en) * 2015-10-13 2018-08-31 法拉第未来公司 Seamless vehicle accesses system
CN106296948A (en) * 2016-08-31 2017-01-04 北京厚文知识产权顾问有限公司 Gate control system based on GPS location and door opening method
CN107657689A (en) * 2017-09-08 2018-02-02 深圳传音通讯有限公司 A kind of gate inhibition's method for unlocking, mobile terminal and computer-readable medium
CN108765646A (en) * 2018-05-02 2018-11-06 贵安新区搜床科技有限公司 A kind of control method for door lock and device based on GPS positioning
CN109214747A (en) * 2018-08-02 2019-01-15 平安科技(深圳)有限公司 Warehouse management method, device, computer equipment and storage medium
CN110070652A (en) * 2019-04-26 2019-07-30 广东昇辉电子控股有限公司 A kind of access control method, system, electronic equipment and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112053484A (en) * 2020-08-25 2020-12-08 青岛聚好联科技有限公司 Door opening method and device of access control equipment, electronic equipment and medium
CN112700575A (en) * 2021-03-23 2021-04-23 成都宜泊信息科技有限公司 Vehicle entrance and exit management method and system, electronic device and storage medium
CN114157988A (en) * 2021-11-22 2022-03-08 上海邻里邻外信息科技有限公司 Control method, device and medium for electronic equipment
CN114157988B (en) * 2021-11-22 2024-04-05 上海邻里邻外信息科技有限公司 Control method, device and medium of electronic equipment
CN115223290A (en) * 2022-07-19 2022-10-21 中国银行股份有限公司 Access control method and device, electronic equipment and computer readable storage medium
CN116308071A (en) * 2023-05-24 2023-06-23 北京应天海乐科技发展有限公司 Material management method and system

Similar Documents

Publication Publication Date Title
CN111260836A (en) Access control method, device and system, storage system and electronic equipment
CN104574167B (en) Lease processing method, related device and system
CN104636921B (en) On-line payment method based on communication group, payment system and server system
EP2355050B1 (en) Method and system for permitting remote check-in and coordinating access control
WO2014026616A1 (en) Nfc-based information exchange method and device
WO2015065763A1 (en) Door access and package delivery
EP1710692A1 (en) Secure device, terminal device, gate device, and device
US10555154B2 (en) Wireless communication device and method for transferring a secure data package to a communication device based on location
CN106327649A (en) Two-dimensional code based access control system and door opening method
CN103514397A (en) Server, terminal and authority management and permission method
EP2751733B1 (en) Method and system for authorizing an action at a site
CN106790262B (en) Authentication method and device
CN102984689A (en) System and method for verifying mobile terminal
US20140233855A1 (en) Verifying vendor identification and organization affiliation of an individual arriving at a threshold location
CN104021334A (en) Device, information processing system and control method
CN104156648A (en) Screen unlocking method and device
CN109460653B (en) Rule engine based verification method, verification device, storage medium and apparatus
US10810566B2 (en) System for controlling a service station related to a vehicle
CN104899496B (en) data reading method and terminal thereof
CN110750765B (en) Service system, front-end page control method thereof, computer device, and storage medium
KR20160003932A (en) System and method for issuing pass switched identification card using mobile terminal
CN107396363B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
JP2017066707A (en) Receiving box system
CN105653989B (en) A kind of information leakage preventing method and device
CN107333005B (en) Emergency unlocking method, unlocking server, user equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609

RJ01 Rejection of invention patent application after publication