CN111402452A - Access control management method, device and system - Google Patents

Access control management method, device and system Download PDF

Info

Publication number
CN111402452A
CN111402452A CN201811623110.8A CN201811623110A CN111402452A CN 111402452 A CN111402452 A CN 111402452A CN 201811623110 A CN201811623110 A CN 201811623110A CN 111402452 A CN111402452 A CN 111402452A
Authority
CN
China
Prior art keywords
state
access control
entrance guard
instruction
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811623110.8A
Other languages
Chinese (zh)
Inventor
陶多磊
沈志明
夏冬冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision System Technology Co Ltd
Original Assignee
Hangzhou Hikvision System Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision System Technology Co Ltd filed Critical Hangzhou Hikvision System Technology Co Ltd
Priority to CN201811623110.8A priority Critical patent/CN111402452A/en
Priority to PCT/CN2019/114106 priority patent/WO2020134525A1/en
Publication of CN111402452A publication Critical patent/CN111402452A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B47/00Operating or controlling locks or other fastening devices by electric or magnetic means
    • E05B47/0001Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof
    • E05B47/0002Operating or controlling locks or other fastening devices by electric or magnetic means with electric actuators; Constructional features thereof with electromagnets
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

The disclosure relates to an access control management method, device and system, and belongs to the technical field of security and protection. The method comprises the following steps: acquiring a lock control instruction aiming at a target access control; according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction; acquiring the actual state of a target entrance guard after executing the action corresponding to the lock control instruction; and if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormity indication message to the appointed terminal. By adopting the method and the system, the specific condition of the entrance guard can be mastered in real time, and the safety of a place can be guaranteed.

Description

Access control management method, device and system
Technical Field
The present disclosure relates to the field of security technologies, and in particular, to a method, an apparatus, and a system for managing an access control.
Background
Along with the improvement of the demand of social security, more and more places are provided with access control systems to ensure the safety in the places. The electric mortice lock on the entrance guard can carry out locking operation and unlocking operation, when the electric mortice lock is locked, the entrance guard can not be pulled out, and when the electric mortice lock is unlocked, the entrance guard can be pulled out. The electric mortise lock mainly comprises two parts, namely a lock tongue and a lock hole. The spring bolt can set up on entrance guard, and the lockhole can set up on the door frame. When the inside motor of electric mortiser lock operates, can push into the lockhole with the spring bolt, the electric mortiser lock is in the state of locking, when the inside motor of electric mortiser lock operates in the reverse direction, can drive the spring bolt and leave the lockhole, the electric mortiser lock is in the unblock state. In order to enable the lock tongue and the lock hole to be aligned more accurately, door magnets can be arranged on the entrance guard and the door frame respectively, the entrance guard and the door frame can be attached to each other when the two door magnets attract each other, and then the lock tongue and the lock hole on the entrance guard and the door frame can be aligned.
In practical application, before a certain user enters a place provided with an access control system, the user needs to swipe a card on a card reader for identity confirmation, if the user is determined to be a legal user, the card reader sends a lock control instruction such as an unlocking instruction to an access controller, and the access controller can control an electric mortise lock to perform unlocking operation based on the unlocking instruction. After the legal user gets into the place, the entrance guard can kick back automatically, and after the length of time of presetting locking, the entrance guard controller automatic control electric mortiser lock is locked and is operated.
In the process, if a lawbreaker trails a legal user, the lawbreaker may block between the lock tongue and the lock hole by the hard snap plate after the legal user enters the place, so that the electric mortise lock cannot be locked, and the lawbreaker can push the entrance guard to enter the place at any time.
In carrying out the present disclosure, the inventors found that at least the following problems exist:
the condition of the entrance guard after the entrance guard executes the action corresponding to the lock control instruction cannot be determined, and the safety of the place cannot be guaranteed.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides the following technical solutions:
according to a first aspect of the embodiments of the present disclosure, there is provided an access control method, including:
acquiring a lock control instruction aiming at a target access control;
according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction;
acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction;
and if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormity indication message to a specified terminal.
Optionally, the determining a theoretical state of the target access control after executing the action corresponding to the lock control instruction includes:
if the lock control instruction is an unlocking instruction, determining that the theoretical state of the target access control after executing the action corresponding to the lock control instruction comprises that the electric lock of the target access control is in a locked state and the door magnetism of the access control is in an attraction state;
the acquiring the actual state of the target access control after executing the action corresponding to the lock control instruction comprises the following steps:
and when the current lock control instruction of the target access control is acquired and the preset time length is reached, acquiring the actual state of the target access control after the action corresponding to the lock control instruction is executed.
Optionally, after acquiring the lock control instruction for the target access control, the method further includes:
acquiring the current configuration state of the target access control, wherein the configuration state comprises a conventional state and an unconventional state, and the unconventional state comprises a non-automatic locking state and a high-level authority unlocking state;
and updating the configuration state of the target entrance guard based on the current configuration state of the target entrance guard and the lock control instruction of the target entrance guard.
Optionally, the method further comprises:
and when a preset detection period is reached, acquiring the current state of the target access control, judging whether the current state of the target access control is a normal state or not based on the current configuration state of the target access control, and if not, sending an access control abnormity indication message to a designated terminal.
Optionally, the acquiring a lock control instruction for the target access control includes: receiving an alarm event, and acquiring a non-automatic locking instruction aiming at the entrance guard related to the alarm event when the alarm event is a first type event; and when the alarm event is a second type event, acquiring a high-level authority unlocking instruction aiming at the entrance guard related to the alarm event.
Optionally, the method further comprises:
after an advanced permission unlocking instruction is sent to the entrance guard related to the alarm event, if the unlocking instruction is obtained, whether the user permission corresponding to the unlocking instruction is the advanced permission or not is judged, and if the user permission is the advanced permission, the unlocking instruction is sent to the entrance guard appointed by the unlocking instruction;
and after a non-automatic locking instruction is sent to the entrance guard related to the alarm event, if a locking instruction is obtained, the locking instruction is sent to the entrance guard appointed by the locking instruction.
Optionally, the acquiring a lock control instruction for the target access control includes:
acquiring a defense deployment plan of a target access control, wherein the defense deployment plan comprises the starting time of an advanced permission unlocking state and the ending time of the advanced permission unlocking state, and acquiring an advanced permission unlocking instruction for the target access control when the starting time of the advanced permission unlocking state is reached; and when the end time of the high-level authority unlocking state is reached, acquiring a lock instruction aiming at the target entrance guard.
Optionally, the access control abnormality indication message includes: the identification of the target entrance guard is used for displaying the abnormal state of the target entrance guard on a map according to the entrance guard abnormal indication message after the specified terminal receives the entrance guard abnormal indication message;
and/or the presence of a gas in the gas,
the door access abnormity indication message comprises: and the camera identification associated with the target access control enables the appointed terminal to display the video collected by the camera associated with the target access control according to the access control abnormity indication message after receiving the access control abnormity indication message.
According to a second aspect of the embodiments of the present disclosure, there is provided an access control management apparatus, the apparatus including:
the acquisition module is used for acquiring a lock control instruction aiming at the target access control;
the determining module is used for determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction according to the lock control instruction;
the acquisition module is further used for acquiring the actual state of the target access control after the action corresponding to the lock control instruction is executed;
and the sending module is used for sending an entrance guard abnormity indication message to the appointed terminal when the theoretical state is inconsistent with the actual state.
Optionally, the determining module is configured to determine, when the lock control instruction is an unlock instruction, that a theoretical state of the target access control after executing an action corresponding to the lock control instruction includes that an electric lock of the target access control is a locked state and a door magnet of the access control is an attracted state;
the acquiring module is used for acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction when the current lock control instruction of the target entrance guard reaches the preset time length.
Acquiring a lock control instruction aiming at a target access control;
according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction;
optionally, the obtaining module is further configured to obtain a current configuration state of the target access control, where the configuration state includes a conventional state and an unconventional state, and the unconventional state includes a non-automatic locking state and an advanced permission unlocking state;
the device further comprises:
and the updating module is used for updating the configuration state of the target entrance guard based on the current configuration state of the target entrance guard and the lock control instruction of the target entrance guard.
Optionally, the obtaining module is further configured to:
and when a preset detection period is reached, acquiring the current state of the target access control, judging whether the current state of the target access control is a normal state or not based on the current configuration state of the target access control, and if not, sending an access control abnormity indication message to a designated terminal.
Optionally, the obtaining module is configured to:
receiving an alarm event, and acquiring a non-automatic locking instruction aiming at the entrance guard related to the alarm event when the alarm event is a first type event; and when the alarm event is a second type event, acquiring a high-level authority unlocking instruction aiming at the entrance guard related to the alarm event.
Optionally, the sending module is further configured to:
after an advanced permission unlocking instruction is sent to the entrance guard related to the alarm event, if the unlocking instruction is obtained, whether the user permission corresponding to the unlocking instruction is the advanced permission or not is judged, and if the user permission is the advanced permission, the unlocking instruction is sent to the entrance guard appointed by the unlocking instruction;
and after a non-automatic locking instruction is sent to the entrance guard related to the alarm event, if a locking instruction is obtained, the locking instruction is sent to the entrance guard appointed by the locking instruction.
Optionally, the obtaining module is configured to:
acquiring a defense deployment plan of a target access control, wherein the defense deployment plan comprises the starting time of an advanced permission unlocking state and the ending time of the advanced permission unlocking state, and acquiring an advanced permission unlocking instruction for the target access control when the starting time of the advanced permission unlocking state is reached; and when the end time of the high-level authority unlocking state is reached, acquiring a lock instruction aiming at the target entrance guard.
Optionally, the access control abnormality indication message includes: the identification of the target entrance guard is used for displaying the abnormal state of the target entrance guard on a map according to the entrance guard abnormal indication message after the specified terminal receives the entrance guard abnormal indication message;
and/or the presence of a gas in the gas,
the door access abnormity indication message comprises: and the camera identification associated with the target access control enables the appointed terminal to display the video collected by the camera associated with the target access control according to the access control abnormity indication message after receiving the access control abnormity indication message.
According to a third aspect of the embodiments of the present disclosure, there is provided an access control system, the system including a target access control and an access control platform, wherein:
the access control platform is used for acquiring a lock control instruction aiming at the target access control; according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction; acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction; and if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormity indication message to a specified terminal.
According to a fourth aspect of embodiments of the present disclosure, there is provided a server comprising a processor, a communication interface, a memory, and a communication bus, wherein:
the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory is used for storing a computer program;
the processor is used for executing the program stored in the memory so as to realize the access control management method.
According to a fifth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the above-mentioned access control method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
by the method provided by the embodiment of the disclosure, after the target entrance guard is controlled, the theoretical state of the target entrance guard after the lock control instruction is executed can be determined, and the actual state of the target entrance guard after the lock control instruction is executed can be determined. Therefore, the appointed terminal can perform corresponding prompt operation, and an access control administrator can check the abnormal prompt information of the access control and perform corresponding processing. Furthermore, the specific conditions of the entrance guard can be mastered in real time, and the safety of the place can be guaranteed.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. In the drawings:
fig. 1 is a flowchart illustrating a method of access control according to an example embodiment;
fig. 2 is a schematic block diagram illustrating an access management system according to an exemplary embodiment;
FIG. 3 is a flowchart illustrating a method of access control according to an example embodiment;
FIG. 4 is a flowchart illustrating a method of access control according to an example embodiment;
fig. 5 is a schematic diagram illustrating a structure of an access control management apparatus according to an exemplary embodiment;
fig. 6 is a schematic diagram illustrating a configuration of a server according to an example embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
An exemplary embodiment of the present disclosure provides an access control management method, as shown in fig. 1, a processing flow of the method may include the following steps:
and step S110, acquiring a lock control instruction aiming at the target entrance guard.
Wherein, entrance guard can be the entrance guard's equipment that materials such as rigid metal, rigidity glass made, and entrance guard's equipment is difficult to by the violence destruction. The lock control command may include a lock command and an unlock command.
In implementation, the access control platform may obtain a lock control instruction for the target access control, where the access control platform may be disposed in a server in the background. The lock control instruction can be generated in the process of remotely controlling the target entrance guard through a client installed in a designated terminal, can also be generated after a front-end entrance guard controller authenticates card data after a user conducts card swiping operation, can also be automatically generated according to an entrance guard defense deployment plan and the like. As shown in fig. 2, no matter how the lock control instruction for the target access control is generated, the lock control instruction can be reported to the access control platform.
For example, before a certain user enters a place where an access control system is installed, the user needs to swipe a card through a card reader for identity confirmation, and if the user is confirmed to be a legal user, the access control device generates an unlocking instruction. Meanwhile, the access controller can also send an unlocking instruction aiming at the target access control to the access control platform. In the implementation, whether the user to enter the place provided with the access control system is a legal user can be confirmed through other authentication modes such as face recognition, fingerprint recognition and the like. For convenience of explanation, the following description will be made with respect to an embodiment in which the lock control command is generated by an authentication method, and the user card swiping method is taken as an example.
And step S120, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction according to the lock control instruction.
In implementation, the entrance guard control platform may pre-store a corresponding relationship between the lock control instruction and the theoretical state, and then the entrance guard control platform may determine, according to the acquired lock control instruction, the theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction. The theoretical state may include a state of a door magnet, a state of an electric latch, and the like.
And step S130, acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction.
In implementation, the access controller may obtain an actual state after executing the action corresponding to the lock control instruction, and report the actual state after executing the action corresponding to the lock control instruction to the access control platform. The access control platform can acquire the actual state of the target access control after executing the action corresponding to the lock control instruction. The actual state may include a state of a door magnet, a state of an electric latch, and the like.
And step S140, if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormal indication message to the appointed terminal.
In implementation, after acquiring a theoretical state of the target access control after executing the action corresponding to the lock control instruction and an actual state of the target access control after executing the action corresponding to the lock control instruction, the access control platform can compare the two states, and if the theoretical state is inconsistent with the actual state, an access abnormality indication message can be sent to the designated terminal; and if the theoretical state is consistent with the actual state, sending an entrance guard normal indication message to the appointed terminal. The designated terminal can be a terminal used by an access control administrator, can be bound with the access control system, and is used for receiving a prompt message sent by the access control system or inquiring the state of the access control. As shown in fig. 2, a client connected to the access control platform may be installed in the designated terminal, and the administrator may open the client and input a user name and a password in the client to log in the access control platform. The access control platform can push some messages such as access abnormity indication messages to the client.
If the access control platform sends the normal instruction message of entrance guard to appointed terminal, appointed terminal can not indicate the normal instruction message of entrance guard after receiving the normal instruction message of entrance guard, when the state of entrance guard was looked over to the access control administrator, reminds again that the entrance guard is in normal condition.
Alternatively, step S120 may include: if the lock control instruction is an unlocking instruction, determining that the theoretical state of the target access control after executing the action corresponding to the lock control instruction comprises that the electric lock of the target access control is in a locked state and the door magnetism of the access control is in an attraction state; step S130 may include: and when the current lock control instruction of the target entrance guard is obtained and the preset time length is reached, obtaining the actual state of the target entrance guard after executing the action corresponding to the lock control instruction.
In implementation, the access control platform may determine whether the acquired lock control instruction is a locking instruction or an unlocking instruction, and if the lock control instruction is an unlocking instruction, when the current lock control instruction of the target access reaches a preset duration after the current lock control instruction is acquired, may acquire an actual state of the target access after executing an action corresponding to the lock control instruction. The preset duration can be default of the system and can also be set by an access control administrator. The preset time length can be N seconds, and the time length for pushing away the entrance guard and passing through the entrance guard by a general user can be N seconds.
Meanwhile, at the front end, after the target entrance guard performs the unlocking operation, the user can push the target entrance guard away and enter the place. When the user pushes the target entrance guard open, the electric mortise lock is in an unlocking state and the door magnet is in a non-attraction state. Under normal conditions, after the user got into in the place, the entrance guard can kick-back automatically, and entrance guard controller automatic control electric mortiser lock is locked the operation, and the electric mortiser lock switches to the lock state and the door magnetism switches to the actuation state. Therefore, the entrance guard controller can detect that the state of the electric mortise lock is a locking state and the state of the door magnet is an attraction state, and can report the detected state of the electric mortise lock and the detected state of the door magnet to the entrance guard control platform. The access control platform can acquire the actual state of the target access control after executing the action corresponding to the lock control instruction.
The access control may detect the state of the electric plug lock and the state of the door magnet in the following manner. The state detection circuit of the electric mortise lock and the state detection circuit of the door magnet can be arranged in an electric loop corresponding to the electric mortise lock and the door magnet of the door control, when the electric mortise lock is in a locking state, the state detection circuit of the electric mortise lock outputs a first electric signal to the door control controller, and when the electric mortise lock is in an unlocking state, the state detection circuit of the electric mortise lock outputs a second electric signal to the door control controller. Similarly, when the door magnet is in the attraction state, the state detection circuit of the door magnet outputs a third electric signal to the access controller, and when the door magnet is not in the attraction state, the state detection circuit of the door magnet outputs a fourth electric signal to the access controller. The entrance guard controller can receive the electric signals and determine the states of the electric mortise lock and the door magnet according to the electric signals.
If the entrance guard control platform determines that the actual state of the target entrance guard after executing the action corresponding to the lock control instruction is that the electric mortise lock is in an unlocked state and the door magnet is in a non-attraction state, the target entrance guard can be determined to be in an abnormal state, and an entrance guard abnormity indication message is sent to the appointed terminal. Or, the entrance guard control platform determines that the actual state of the target entrance guard after executing the action corresponding to the lock control instruction is that the electric mortise lock is in an unlocked state and the door magnet is in an attraction state, and may also determine that the entrance guard is in an abnormal state and send an entrance guard abnormal indication message to the designated terminal. Or, the entrance guard control platform determines that the actual state of the target entrance guard after executing the action corresponding to the lock control instruction is that the electric mortise lock is in a locked state and the door magnet is in a non-attraction state, and may also determine that the entrance guard is in an abnormal state and send an entrance guard abnormal indication message to the designated terminal.
Optionally, the access control abnormality indication message may include: the identification of the target entrance guard is used for displaying the abnormal state of the target entrance guard on a map according to the entrance guard abnormal indication message after the specified terminal receives the entrance guard abnormal indication message; and the camera mark is associated with the target access control, so that after the appointed terminal receives the access control abnormity indication message, the video collected by the camera associated with the target access control is displayed according to the access control abnormity indication message.
Or, the access control abnormality indication message may include: the identification of the target entrance guard is used for displaying the abnormal state of the target entrance guard on a map according to the entrance guard abnormal indication message after the specified terminal receives the entrance guard abnormal indication message; or the camera mark associated with the target access control, so that after the appointed terminal receives the access control abnormity indication message, the video collected by the camera associated with the target access control is displayed according to the access control abnormity indication message.
In implementation, the place can be provided with not only one entrance guard, but also a plurality of entrance guards, and in order to facilitate the management of a plurality of entrance guards, a unique entrance guard identification can be allocated to each entrance guard. As shown in fig. 2, if a new entrance guard is newly added in the site, a new entrance guard can be added in the entrance guard control platform.
If the target access control is abnormal, the identification of the target access control can be acquired, the identification of the target access control is carried in the abnormal access control indication message and sent to the appointed terminal, so that the appointed terminal marks the position of the target access control on a preset map according to the abnormal access control indication message after receiving the abnormal access control indication message, and the abnormal type of the target access control is prompted. Or after receiving the door access abnormity indication message, the appointed terminal can perform popup operation according to the door access abnormity indication message, and display the identification, position, abnormity information and the like of the abnormal target door access in the popup window.
When the appointed terminal is used for prompting operation, control options such as locking options of the abnormal entrance guard can be provided, and an entrance guard manager can conveniently and quickly perform related operation on the abnormal entrance guard.
In addition, the access control management platform can also determine the identification of the camera managed by the target access control, carry the identification of the camera managed by the target access control in the access control abnormity indication message and send the identification to the appointed terminal, so that the appointed terminal can display the video collected by the camera associated with the target access control according to the access control abnormity indication message after receiving the access control abnormity indication message. Therefore, an access control administrator can quickly check whether an illegal user carries out illegal operation on the access control by automatically calling the field picture acquired by the monitor near the abnormal access control.
For the door control, as shown in fig. 3, only when the electric mortise lock is in a locking state and the door sensor is in an attraction state, the door control is considered to be normally locked, when a certain user needs to pass through the door control, the user needs to swipe a card on the card reader to confirm identity, and at this time, the door control is in a state that the user needs to open the door by using the certificate. When in use
When the electric mortice lock is the unblock state and door magnetism is not the actuation state, can regard as entrance guard not to lock, when certain user need pass through entrance guard, need not to punch the card on the card reader and confirm the identity, entrance guard is in the state that need not the voucher and open the door this moment. Or when the electric mortise lock is in an unlocked state and the door sensor is in an attraction state, the entrance guard can be considered as unlocked, when a certain user needs to pass through the entrance guard, the identity does not need to be confirmed by swiping a card on the card reader, and the entrance guard is in a state that the door is opened without a certificate. Or when the electric mortise lock is in a locked state and the door magnet is in an unabsorbed state, the door control can be considered to be unlocked, when a certain user needs to pass through the door control, the user does not need to swipe a card on the card reader to confirm identity, and the door control is in a state that the user does not need to open the door by using a certificate.
When the entrance guard is in the state of opening the door without the certificate, the safety of the place cannot be guaranteed, so that an entrance guard administrator needs to pay extra attention to the entrance guard in the state of opening the door without the certificate, and corresponding prompt information can be sent to the appointed terminal.
Optionally, after receiving a lock control instruction for the target access control, the method provided by the embodiment of the present disclosure may further include: acquiring the current configuration state of a target access control; and updating the configuration state of the target entrance guard based on the current configuration state of the target entrance guard and the lock control instruction of the target entrance guard.
The configuration state comprises a normal state and an unconventional state, and the unconventional state comprises a non-automatic locking state and a high-level authority unlocking state.
The conventional state can be a state that a certificate is needed to open the door, namely when a certain user needs to pass through the entrance guard, the identity needs to be confirmed by swiping a card on a card reader. The normal state may also be an auto-lock state.
The irregular states may include a non-auto-lock state and a high-level rights unlock state. The non-automatic locking state can also be called a normally open state, namely when the entrance guard rebounds, the electric mortise lock is controlled not to automatically lock, so that the entrance guard is in a state that the door is opened without a certificate, and any user can push the entrance guard to enter a place. This kind of state can be used for, when team's visit place, has a large amount of users to loop through entrance guard, if entrance guard is in normally open state, a large amount of users need not to punch the card in proper order and pass through, can loop through entrance guard under relevant personnel's the area of taking, get into in the place.
The high-level authority unlocking state can also be called a normally closed state, legal users can be divided into legal users with high-level authorities and common legal users, the cards held by the legal users with high-level authorities are different from the cards held by the common legal users, the authorities of the legal users with high-level authorities are also different, and when the access control is in the high-level authority unlocking state, only a certain user is authenticated to have high-level authority, and the access control controller can control the electric mortise lock to carry out unlocking operation. And for a common legal user, the identity is confirmed by swiping the card through the card reader, and even if the identity is confirmed to be legal, the authority level is not high enough, and the access controller cannot control the electric mortise lock to unlock.
The current configuration state of the target entrance guard can be recorded in the entrance guard control platform, and after the entrance guard control platform acquires the lock control instruction of the target entrance guard, the configuration state of the target entrance guard can be updated based on the current configuration state of the target entrance guard and the lock control instruction of the target entrance guard. For example, if the current configuration state of the target access control is an unconventional state, when the updated configuration state of the target access control is a conventional state based on the current configuration state of the target access control and the lock control instruction of the target access control, the configuration state of the target access control may be switched to the conventional state, and an indication message indicating that the configuration state of the access control is switched to the conventional state is sent to the designated terminal. For another example, if the current configuration state of the target access control is a normal state, when the updated configuration state of the target access control is an abnormal state based on the current configuration state of the target access control and the lock control instruction of the target access control, the configuration state of the target access control may be switched to an abnormal state, and an indication message indicating that the configuration state of the access control is switched to the abnormal state is sent to the designated terminal.
As shown in fig. 4, after the access control platform obtains the unlocking instruction of the target access control, the current configuration state of the access control can be obtained. If the current configuration state of the access control is a high-level authority unlocking state (normally closed state), the configuration state of the access control can be switched to a conventional state, and an indication message indicating that the configuration state of the access control is switched to the conventional state is sent to the designated terminal. Or after the access control platform acquires the locking instruction of the access control, the current configuration state of the access control can be acquired. If the current configuration state of the access control is a non-automatic locking state (normally open state), the configuration state of the access control can be switched to a conventional state, and an indication message indicating that the configuration state of the access control is switched to the conventional state is sent to the designated terminal.
In the above process, the unlocking instruction may be an unlocking instruction sent when the authentication of a valid user with a high-level authority passes, specifically, the card may be swiped by an access control administrator, the access control administrator may log in a management account, an unlocking option is selected, and the like. The locking instruction may be generated when the user performs a preset toggle operation on the electric mortise lock, and may be generated when an access manager logs in a management account and selects a locking option.
Optionally, the method provided by the embodiment of the present disclosure may further include: and receiving a configuration message which is sent by a specified terminal and corresponds to the target configuration state. And switching the configuration state of the access control to a target configuration state.
The target configuration state comprises a normal state and an abnormal state, and the abnormal state comprises a non-automatic locking state and a high-level authority unlocking state.
In implementation, whether the configuration state of the access control is a normal state or an abnormal state may be determined based on an operation of an access control administrator. For example, an access control administrator logs in a management account in a designated terminal and sets the configuration state of the access control to an irregular state, and then the access control platform may receive a configuration message corresponding to the target configuration state sent by the designated terminal and set the configuration state of the access control to the irregular state. And then the configuration state of the access control is continuously in an unconventional state until an access control administrator logs in the management account again, and the configuration state of the access control is switched into a conventional state, or the configuration state of the access control is automatically switched into the conventional state until a lock control instruction for the access control is received.
Optionally, the method provided by the embodiment of the present disclosure may further include: acquiring a defense deployment plan of a target access control, wherein the defense deployment plan comprises the starting time of an advanced permission unlocking state and the ending time of the advanced permission unlocking state, and acquiring an advanced permission unlocking instruction aiming at the target access control when the starting time of the advanced permission unlocking state is reached; and when the end time of the high-level authority unlocking state is reached, a locking instruction aiming at the target entrance guard is obtained.
In implementation, a deployment plan of the target entrance guard may be preset, for example, during the period from eight nights to eight morning next day, all people in the site should be in an away state, so that the target entrance guard may be configured to be in a high-level permission unlocking state from eight nights to eight morning next day. The administrator can set the defense arrangement plan of the target entrance guard through the appointed terminal, upload the defense arrangement plan of the target entrance guard to the entrance guard control platform, and execute the defense arrangement plan of the target entrance guard by the entrance guard control platform.
The entrance guard control platform can obtain a defense arrangement plan of the target entrance guard, and the defense arrangement plan comprises the starting time of the high-level authority unlocking state and the ending time of the high-level authority unlocking state. When the starting time of the high-level authority unlocking state is reached, the access control platform acquires a high-level authority unlocking instruction aiming at a target access; and when the end time of the high-level authority unlocking state is reached, the access control platform acquires a locking instruction aiming at the target access control. Like this, when reaching the end time of senior authority unblock state, access control platform can acquire the instruction of locking to target entrance guard, will lock the instruction and send target entrance guard to set up target entrance guard into conventional state.
Alternatively, the access controller may determine the state of the electric plug lock and the state of the door magnet by: and if the access controller detects an interruption event of the electric plug lock status port, determining the changed state of the electric plug lock based on the level signal of the electric plug lock status port. And if the access controller detects an interrupt event of the door magnetic state port, determining the state after the door magnetic change based on the level signal of the door magnetic state port. The entrance guard controller can report the state of the electric mortise lock and the state of the door magnet after being changed to the entrance guard control platform.
In implementation, the access controller does not need to detect the states of the electric mortise lock and the door magnet in real time and report the states of the electric mortise lock and the door magnet in real time, and can detect the states of the electric mortise lock or the door magnet and report the states of the electric mortise lock and the door magnet only when the states of the electric mortise lock or the door magnet change. The pin of the output level signal of the state detection circuit of the electric mortise lock can be connected to the electric mortise lock state port of the access controller, if the voltage of the output level signal of the state detection circuit of the electric mortise lock is 1-3V when the electric mortise lock is in an unlocked state, and the voltage of the output level signal of the state detection circuit of the electric mortise lock is 0.8-0V when the electric mortise lock is in a locked state. Normally, the electric mortise lock is in a locked state for a long time, the voltage of a level signal output by the state detection circuit of the electric mortise lock is 0.8-0V and belongs to a low level, and only when the electric mortise lock is unlocked, the voltage of the level signal output by the state detection circuit of the electric mortise lock is 1-3V and belongs to a high level, so that the level signal jumps and changes from the low level to the high level to trigger an interrupt event. When the access controller detects an interruption event of the electric mortise lock state port, the state of the electric mortise lock after being changed is determined based on a level signal of the electric mortise lock state port, the state of the electric mortise lock after being changed is reported to the access control platform, and the access control platform can judge whether an indication message indicating the state of the electric mortise lock after being changed needs to be sent to a designated terminal. When an indication message indicating the state of the electric mortise lock after change needs to be sent to the specified terminal, the access control platform may send the indication message indicating the state of the electric mortise lock after change to the specified terminal. The detection principle of the state of the door magnet is similar, and the description is omitted here.
Optionally, the method provided by the embodiment of the present disclosure may further include: and when a preset detection period is reached, acquiring the current state of the target access control, judging whether the current state of the target access control is a normal state or not based on the current configuration state of the target access control, and if not, sending an access control abnormity indication message to the appointed terminal.
In implementation, under the condition that the access controller needs to process a large number of tasks, the occupancy rate of the access controller is high, and an interrupt event is easy to lose. When there is a transition in the level signal that triggers the generation of an interrupt event, the access controller may lose the interrupt event. Or other special conditions exist, so that the access controller loses the interruption event, the actual electromagnetic lock may be in the locked state, but the access controller does not detect the state after the electromagnetic lock changes, and does not report the state after the electromagnetic lock changes to the access control platform, so that the access control platform still stores the information that the electromagnetic lock is currently in the unlocked state, and the information stored by the access control platform is wrong.
In order to correct the error when the condition occurs, a polling mechanism can be arranged on the electromagnetic lock and the door magnet. When a preset detection period is reached, the access control platform can actively acquire the level signal of the electric mortise lock state port through the access controller, and determine the current state of the electric mortise lock according to the level signal of the electric mortise lock state port. Similarly, when the preset detection period is reached, the access control platform can actively acquire the level signal of the door magnet state port through the access controller, and determine the current state of the door magnet according to the level signal of the door magnet state port.
And then, the access control platform can judge whether the current state of the target access control is a normal state or not based on the current configuration state of the target access control, and if not, sends an access control abnormity indication message to the designated terminal. For example, the target access control executes an unlocking instruction, after a preset time length, the actual state of the target access control after the unlocking instruction is executed can be acquired, or the actual state of the target access control after the unlocking instruction is executed is acquired through a routing inspection mechanism, if the actual state is inconsistent with the theoretical state, it can be judged that the current state of the target access control is not a normal state, and an access control abnormity indication message is sent to the appointed terminal.
Optionally, receiving an alarm event, and when the alarm event is a first type event, acquiring a non-automatic locking instruction for the entrance guard related to the alarm event; and when the alarm event is a second type event, acquiring a high-level authority unlocking instruction aiming at the entrance guard related to the alarm event.
In implementation, the access control platform may further receive a message carrying an alarm event sent by the designated terminal. For example, a door management interface at a given terminal may provide the option of a one-key normally closed venue door. Therefore, when a violent incident or a theft incident occurs in the place, the access control administrator can enable the appointed terminal to generate a second type incident by selecting the option, and the second type incident is carried in the message and sent to the access control platform. The entrance guard control platform can receive the alarm event, and when the alarm event is a second type event, the entrance guard control platform acquires an advanced permission unlocking instruction aiming at entrance guards related to the alarm event, and sends the advanced permission unlocking instruction to entrance guards in the local area in the place so as to set the configuration state of the entrance guards in the local area in the place to be a normally closed state to control a suspect to escape from the site. In implementation, the alarm event may also be reported by an alarm device, which is not limited in this embodiment of the present application.
In implementation, all access control options in a one-key normally-open place can be provided on an access control management interface of a designated terminal. Therefore, when an emergency such as a fire occurs in a place, an access control administrator can enable the appointed terminal to generate a first type event by selecting the option, and the first type event is carried in the message and sent to the access control platform. The entrance guard control platform can receive the alarm event, when the alarm event is a first type event, a non-automatic locking instruction aiming at entrance guards related to the alarm event is obtained, and the non-automatic locking instruction is sent to all related entrance guards in the place so as to set the configuration state of all the entrance guards in the place to be a normally open state, and therefore people in the place can rapidly leave the place.
Optionally, the method provided by the embodiment of the present disclosure may further include: after an advanced permission unlocking instruction is sent to the entrance guard related to the alarm event, if the unlocking instruction is obtained, whether the user permission corresponding to the unlocking instruction is the advanced permission or not is judged, and if the user permission is the advanced permission, the unlocking instruction is sent to the entrance guard appointed by the unlocking instruction; after a non-automatic locking instruction is sent to the entrance guard related to the alarm event, if a locking instruction is obtained, the locking instruction is sent to the entrance guard appointed by the locking instruction.
In implementation, after the access control platform sends an advanced permission unlocking instruction to the access control related to the alarm event, if the unlocking instruction is obtained, whether the user permission corresponding to the unlocking instruction is the advanced permission or not can be judged, and if the user permission is the advanced permission, the unlocking instruction is sent to the access control appointed by the unlocking instruction. In practical application, if a suspect is caught, an administrator can open the access control to allow people to pass normally.
Or after a non-automatic locking instruction is sent to the entrance guard related to the alarm event, if the locking instruction is obtained, the locking instruction is sent to the entrance guard designated by the locking instruction. In practical application, if the dangerous case is removed, an administrator can set the access control to be in a normal state, and the access control is in a state that the voucher is required to open the door.
By the method provided by the embodiment of the disclosure, after the target entrance guard is controlled, the theoretical state of the target entrance guard after the lock control instruction is executed can be determined, and the actual state of the target entrance guard after the lock control instruction is executed can be determined. Therefore, the appointed terminal can perform corresponding prompt operation, and an access control administrator can check the abnormal prompt information of the access control and perform corresponding processing. Furthermore, the specific conditions of the entrance guard can be mastered in real time, and the safety of the place can be guaranteed.
Yet another exemplary embodiment of the present disclosure provides an access control management apparatus, as shown in fig. 5, including:
an obtaining module 510, configured to obtain a lock control instruction for a target access control;
a determining module 520, configured to determine, according to the lock control instruction, a theoretical state of the target access control after executing an action corresponding to the lock control instruction;
the obtaining module 510 is further configured to obtain an actual state of the target access control after executing the action corresponding to the lock control instruction;
a sending module 530, configured to send an indication message of abnormal access control to a designated terminal when the theoretical state is inconsistent with the actual state.
Optionally, the determining module 520 is configured to determine that, when the lock control instruction is an unlocking instruction, the theoretical state of the target access control after executing the action corresponding to the lock control instruction includes that the electric lock of the target access control is a locked state and the door magnetism of the access control is an attraction state;
the obtaining module 510 is configured to obtain an actual state of the target access control after executing an action corresponding to the lock control instruction when a preset time length is reached after obtaining the current lock control instruction of the target access control.
Acquiring a lock control instruction aiming at a target access control;
according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction;
optionally, the obtaining module 510 is further configured to obtain a current configuration state of the target access control, where the configuration state includes a conventional state and an unconventional state, and the unconventional state includes a non-automatic locking state and an advanced permission unlocking state;
the device further comprises:
and the updating module is used for updating the configuration state of the target entrance guard based on the current configuration state of the target entrance guard and the lock control instruction of the target entrance guard.
Optionally, the obtaining module 510 is further configured to:
and when a preset detection period is reached, acquiring the current state of the target access control, judging whether the current state of the target access control is a normal state or not based on the current configuration state of the target access control, and if not, sending an access control abnormity indication message to a designated terminal.
Optionally, the obtaining module 510 is configured to:
receiving an alarm event, and acquiring a non-automatic locking instruction aiming at the entrance guard related to the alarm event when the alarm event is a first type event; and when the alarm event is a second type event, acquiring a high-level authority unlocking instruction aiming at the entrance guard related to the alarm event.
Optionally, the sending module 530 is further configured to:
after an advanced permission unlocking instruction is sent to the entrance guard related to the alarm event, if the unlocking instruction is obtained, whether the user permission corresponding to the unlocking instruction is the advanced permission or not is judged, and if the user permission is the advanced permission, the unlocking instruction is sent to the entrance guard appointed by the unlocking instruction;
and after a non-automatic locking instruction is sent to the entrance guard related to the alarm event, if a locking instruction is obtained, the locking instruction is sent to the entrance guard appointed by the locking instruction.
Optionally, the obtaining module 510 is configured to:
acquiring a defense deployment plan of a target access control, wherein the defense deployment plan comprises the starting time of an advanced permission unlocking state and the ending time of the advanced permission unlocking state, and acquiring an advanced permission unlocking instruction for the target access control when the starting time of the advanced permission unlocking state is reached; and when the end time of the high-level authority unlocking state is reached, acquiring a locking instruction aiming at the target entrance guard.
Optionally, the access control abnormality indication message includes: the identification of the target entrance guard is used for displaying the abnormal state of the target entrance guard on a map according to the entrance guard abnormal indication message after the specified terminal receives the entrance guard abnormal indication message;
and/or the presence of a gas in the gas,
the door access abnormity indication message comprises: and the camera identification associated with the target access control enables the appointed terminal to display the video collected by the camera associated with the target access control according to the access control abnormity indication message after receiving the access control abnormity indication message.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
By the device provided by the embodiment of the disclosure, after the target entrance guard is controlled, the theoretical state of the target entrance guard after the lock control instruction is executed can be determined, and meanwhile, the actual state of the target entrance guard after the lock control instruction is executed can be determined. Therefore, the appointed terminal can perform corresponding prompt operation, and an access control administrator can check the abnormal prompt information of the access control and perform corresponding processing. Furthermore, the specific conditions of the entrance guard can be mastered in real time, and the safety of the place can be guaranteed.
It should be noted that: the door access management device provided by the above embodiment is exemplified by only the division of the above functional modules when performing door access management, and in practical applications, the above function distribution can be completed by different functional modules as needed, so as to complete all or part of the above described functions. In addition, the embodiment of the access control management device and the embodiment of the access control management method provided by the embodiment belong to the same concept, and the specific implementation process is described in the embodiment of the method for details, which is not described herein again.
Yet another exemplary embodiment of the present disclosure provides an access control management system, the system includes a target access control and an access control platform, wherein:
the access control platform is used for acquiring a lock control instruction aiming at the target access control; according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction; acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction; and if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormity indication message to a specified terminal.
With regard to the system in the above embodiment, the specific manner in which the target access control and access control platform perform operations has been described in detail in the embodiment related to the method, and will not be described in detail here.
Fig. 6 shows a schematic structural diagram of a server 1900 provided in an exemplary embodiment of the present disclosure. The server 1900 may have a large difference due to different configurations or performances, and may include one or more processors (CPUs) 1910 and one or more memories 1920. The memory 1920 stores at least one instruction, and the at least one instruction is loaded and executed by the processor 1910 to implement the access control method according to the above embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (13)

1. A method for access control, the method comprising:
acquiring a lock control instruction aiming at a target access control;
according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction;
acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction;
and if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormity indication message to a specified terminal.
2. The method of claim 1, wherein the determining the theoretical state of the target access control after executing the action corresponding to the lock control instruction comprises:
if the lock control instruction is an unlocking instruction, determining that the theoretical state of the target access control after executing the action corresponding to the lock control instruction comprises that the electric lock of the target access control is in a locked state and the door magnetism of the access control is in an attraction state;
the acquiring the actual state of the target access control after executing the action corresponding to the lock control instruction comprises the following steps:
and when the current lock control instruction of the target access control is acquired and the preset time length is reached, acquiring the actual state of the target access control after the action corresponding to the lock control instruction is executed.
3. The method of claim 1, wherein after obtaining the lock control instruction for the target access control, the method further comprises:
acquiring the current configuration state of the target access control, wherein the configuration state comprises a conventional state and an unconventional state, and the unconventional state comprises a non-automatic locking state and a high-level authority unlocking state;
and updating the configuration state of the target entrance guard based on the current configuration state of the target entrance guard and the lock control instruction of the target entrance guard.
4. The method of claim 1, further comprising:
and when a preset detection period is reached, acquiring the current state of the target access control, judging whether the current state of the target access control is a normal state or not based on the current configuration state of the target access control, and if not, sending an access control abnormity indication message to a designated terminal.
5. The method of claim 1, wherein the obtaining the lock control instruction for the target access control comprises: receiving an alarm event, and acquiring a non-automatic locking instruction aiming at the entrance guard related to the alarm event when the alarm event is a first type event; and when the alarm event is a second type event, acquiring a high-level authority unlocking instruction aiming at the entrance guard related to the alarm event.
6. The method of claim 5, further comprising:
after an advanced permission unlocking instruction is sent to the entrance guard related to the alarm event, if the unlocking instruction is obtained, whether the user permission corresponding to the unlocking instruction is the advanced permission or not is judged, and if the user permission is the advanced permission, the unlocking instruction is sent to the entrance guard appointed by the unlocking instruction;
and after a non-automatic locking instruction is sent to the entrance guard related to the alarm event, if a locking instruction is obtained, the locking instruction is sent to the entrance guard appointed by the locking instruction.
7. The method of claim 1, wherein the obtaining the lock control instruction for the target access control comprises:
acquiring a defense deployment plan of a target access control, wherein the defense deployment plan comprises the starting time of an advanced permission unlocking state and the ending time of the advanced permission unlocking state, and acquiring an advanced permission unlocking instruction for the target access control when the starting time of the advanced permission unlocking state is reached; and when the end time of the high-level authority unlocking state is reached, acquiring a locking instruction aiming at the target entrance guard.
8. The method of claim 1, wherein the access anomaly indication message comprises: the identification of the target entrance guard is used for displaying the abnormal state of the target entrance guard on a map according to the entrance guard abnormal indication message after the specified terminal receives the entrance guard abnormal indication message;
and/or the presence of a gas in the gas,
the door access abnormity indication message comprises: and the camera identification associated with the target access control enables the appointed terminal to display the video collected by the camera associated with the target access control according to the access control abnormity indication message after receiving the access control abnormity indication message.
9. An access control management apparatus, comprising:
the acquisition module is used for acquiring a lock control instruction aiming at the target access control;
the determining module is used for determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction according to the lock control instruction;
the acquisition module is further used for acquiring the actual state of the target access control after the action corresponding to the lock control instruction is executed;
and the sending module is used for sending an entrance guard abnormity indication message to the appointed terminal when the theoretical state is inconsistent with the actual state.
10. The apparatus according to claim 9, wherein the determining module is configured to determine, when the lock control instruction is an unlock instruction, that the theoretical state of the target access control after executing the action corresponding to the lock control instruction includes that an electric lock of the target access control is a locked state and a door sensor of the access control is an attracted state;
the acquiring module is used for acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction when the current lock control instruction of the target entrance guard reaches the preset time length.
11. The utility model provides an access control management system which characterized in that, the system includes target entrance guard and access control platform, wherein:
the access control platform is used for acquiring a lock control instruction aiming at the target access control; according to the lock control instruction, determining a theoretical state of the target entrance guard after executing the action corresponding to the lock control instruction; acquiring the actual state of the target entrance guard after executing the action corresponding to the lock control instruction; and if the theoretical state is inconsistent with the actual state, sending an entrance guard abnormity indication message to a specified terminal.
12. A server, comprising a processor, a communication interface, a memory, and a communication bus, wherein:
the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory is used for storing a computer program;
the processor is configured to execute the program stored in the memory to implement the method steps of any of claims 1-8.
13. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of the claims 1-8.
CN201811623110.8A 2018-12-28 2018-12-28 Access control management method, device and system Pending CN111402452A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811623110.8A CN111402452A (en) 2018-12-28 2018-12-28 Access control management method, device and system
PCT/CN2019/114106 WO2020134525A1 (en) 2018-12-28 2019-10-29 Access control management method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811623110.8A CN111402452A (en) 2018-12-28 2018-12-28 Access control management method, device and system

Publications (1)

Publication Number Publication Date
CN111402452A true CN111402452A (en) 2020-07-10

Family

ID=71129663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811623110.8A Pending CN111402452A (en) 2018-12-28 2018-12-28 Access control management method, device and system

Country Status (2)

Country Link
CN (1) CN111402452A (en)
WO (1) WO2020134525A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111987797A (en) * 2020-07-31 2020-11-24 西安西拓电气股份有限公司 Control method and device of switch cabinet
CN113160534A (en) * 2021-03-02 2021-07-23 广州朗国电子科技有限公司 Method, equipment and storage medium for alarming abnormity of intelligent access control system
CN115951623A (en) * 2023-03-10 2023-04-11 北京市农林科学院信息技术研究中心 Control method, control device, control system, moving object, electronic apparatus, and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202257702U (en) * 2011-08-25 2012-05-30 佛山市汇泰龙五金卫浴制造有限公司 Electronic anti-theft lock system with normally open mode
CN103208147A (en) * 2013-04-07 2013-07-17 四川长虹电器股份有限公司 Method and system for intelligent alarm access control monitor
CN205068527U (en) * 2015-09-22 2016-03-02 苏州工业园区职业技术学院 Automatic access control device stage by stage
CN206058325U (en) * 2016-08-23 2017-03-29 四川志文网络工程有限公司 A kind of intelligent automatic door control system
US20170167166A1 (en) * 2015-12-14 2017-06-15 Checkpoint Systems, Inc. Security device with multiple control states
CN108537929A (en) * 2018-04-12 2018-09-14 京东方科技集团股份有限公司 Remote de-locking system and remote de-locking method
CN108961501A (en) * 2018-06-28 2018-12-07 云丁网络技术(北京)有限公司 A kind of intelligent door lock control method, relevant device and system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05298562A (en) * 1992-04-23 1993-11-12 Matsushita Electric Works Ltd Security burglar prevention system
JP2013229031A (en) * 2013-05-09 2013-11-07 Hochiki Corp Access control device
CN104050743B (en) * 2014-06-30 2016-06-08 重庆米睿科技有限公司 A kind of set up defences supervisory system and the method for gate control system
CN205050228U (en) * 2015-10-14 2016-02-24 北京华想互联科技有限公司 National treasury access control system of bank based on iris discernment
CN106296924A (en) * 2016-08-15 2017-01-04 Tcl商用信息科技(惠州)股份有限公司 A kind of gate inhibition's state monitoring method and system
CN106875523A (en) * 2017-01-12 2017-06-20 深圳达实信息技术有限公司 A kind of Yunmen access control system and its management method
CN206833543U (en) * 2017-04-14 2018-01-02 上海博超联石智能科技有限公司 A kind of electronic access control system with barcode scanning identification
CN207092724U (en) * 2017-06-02 2018-03-13 瑞高科技(深圳)有限责任公司 A kind of intelligent electronic lock and intelligent safety door

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202257702U (en) * 2011-08-25 2012-05-30 佛山市汇泰龙五金卫浴制造有限公司 Electronic anti-theft lock system with normally open mode
CN103208147A (en) * 2013-04-07 2013-07-17 四川长虹电器股份有限公司 Method and system for intelligent alarm access control monitor
CN205068527U (en) * 2015-09-22 2016-03-02 苏州工业园区职业技术学院 Automatic access control device stage by stage
US20170167166A1 (en) * 2015-12-14 2017-06-15 Checkpoint Systems, Inc. Security device with multiple control states
CN206058325U (en) * 2016-08-23 2017-03-29 四川志文网络工程有限公司 A kind of intelligent automatic door control system
CN108537929A (en) * 2018-04-12 2018-09-14 京东方科技集团股份有限公司 Remote de-locking system and remote de-locking method
CN108961501A (en) * 2018-06-28 2018-12-07 云丁网络技术(北京)有限公司 A kind of intelligent door lock control method, relevant device and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111987797A (en) * 2020-07-31 2020-11-24 西安西拓电气股份有限公司 Control method and device of switch cabinet
CN113160534A (en) * 2021-03-02 2021-07-23 广州朗国电子科技有限公司 Method, equipment and storage medium for alarming abnormity of intelligent access control system
CN115951623A (en) * 2023-03-10 2023-04-11 北京市农林科学院信息技术研究中心 Control method, control device, control system, moving object, electronic apparatus, and storage medium

Also Published As

Publication number Publication date
WO2020134525A1 (en) 2020-07-02

Similar Documents

Publication Publication Date Title
US11830306B2 (en) Systems and methods for controlling access to physical space
CN103370717B (en) Always-available embedded theft reaction subsystem
US7741969B2 (en) Door entry security device with electronic lock
CN111402452A (en) Access control management method, device and system
CN103899156B (en) Realize the method and system of door lock expanded application
CN105401798A (en) Electronic lock and monitoring method and system of electronic lock
JP5121122B2 (en) Monitoring device
CN106027789A (en) Anti-theft cellphone and anti-theft method for cellphone
CN110322603A (en) A kind of temporary password security protection method and system for intelligent door lock
EP3058553A1 (en) Method for operating a locking system, locking system, and tube safe
CN104967825A (en) Gatekeeper electronic dog system
CN105913513A (en) Control method and system for door lock system
KR20180060901A (en) Meothod for controlling locking device
US20220014388A1 (en) Virtual security guard
CN110599636A (en) Customs lock, customs lock key, and customs lock opening and closing method and system
JP2009108575A (en) Room entrance/exit control system
CN110288727A (en) The intelligent system on duty in unmanned laboratory
JP2014015774A (en) Key management device and key management system
US9852558B2 (en) Security apparatus for energy storage system
CN106778173A (en) The method and device that a kind of application lock based on intelligent operating system is set
CN102354270A (en) Method and system for locking contact in instant messaging
KR101372575B1 (en) Emergency reporting system and method using disguised code
JP5258251B2 (en) Security equipment
CN106558144B (en) A kind of self-help terminal equipment and the method and apparatus for controlling self-help terminal equipment
US20220229898A1 (en) Tamper-evident devices equipped with secure re-image file(s)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200710