CN112233292B - Door control using method and door control device based on acquaintance visiting - Google Patents

Door control using method and door control device based on acquaintance visiting Download PDF

Info

Publication number
CN112233292B
CN112233292B CN202011026963.0A CN202011026963A CN112233292B CN 112233292 B CN112233292 B CN 112233292B CN 202011026963 A CN202011026963 A CN 202011026963A CN 112233292 B CN112233292 B CN 112233292B
Authority
CN
China
Prior art keywords
user
access control
track
track fingerprint
control device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011026963.0A
Other languages
Chinese (zh)
Other versions
CN112233292A (en
Inventor
叶志钢
李明栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Greenet Information Service Co Ltd
Original Assignee
Wuhan Greenet Information Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Greenet Information Service Co Ltd filed Critical Wuhan Greenet Information Service Co Ltd
Priority to CN202011026963.0A priority Critical patent/CN112233292B/en
Publication of CN112233292A publication Critical patent/CN112233292A/en
Application granted granted Critical
Publication of CN112233292B publication Critical patent/CN112233292B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention relates to the technical field of access control, in particular to an access control using method and an access control device based on acquaintance visit, wherein the method comprises the following steps: establishing a track fingerprint library in a cloud server of a user B side access control device, wherein track information of a plurality of users acquainted with the user B is stored in the track fingerprint library; when a user A visits and arrives at the location of a user B, the entrance guard device acquires the historical track fingerprint of the user A through the intelligent equipment of the user A; the access control device verifies the acquired historical track fingerprint of the user A according to the track fingerprint library; and if the verification is successful, executing a preset result action to enable the user A to enter. The invention can utilize the portable intelligent equipment to record the motion trail and verify the visitor through the historical motion trail, the successful verification party can execute the door opening access control operation, the visitor does not need to open the door, the use is convenient, the identity verification can be carried out, and the user experience is improved.

Description

Door control using method and door control device based on acquaintance visiting
[ technical field ] A method for producing a semiconductor device
The invention relates to the technical field of access control, in particular to an access control using method and an access control device based on acquaintance visit.
[ background of the invention ]
With the rapid development of science and technology, the construction of smart communities and smart traffic is concerned by more and more people, and the community convenience service inevitably goes up to an intelligent and scientific road. The traditional entrance guard device of the prior community adopts the traditional metal key at the entrance of the unit, the traditional metal key is carried about every time the door is out, the loss and the supplement are troublesome, and the key is easy to copy, so the safety is poor; with the development and progress of science and technology, the entrance guard of a community and a unit building can be opened by using a smart phone at present, and great convenience is brought to users.
In the conventional access control device, when a visitor comes, the visitor needs to inquire about the home of the visitor by using a method of dialing a call by pressing a key and waits for opening the door. After the visitor hears the call sound, the visitor needs to go to the gate to inquire and verify the identity of the visitor, and the gate of the unit building is opened after verification so that the visitor can enter the building. Therefore, every time a visitor needs to enter the building door for calling, the visitor needs to take down things in the hand to go to the door for identity verification and door opening, and the use is very inconvenient; especially, if the visitor calls the visitor, the visitor is doing housework and the like, the visitor may be inconvenient to leave the hand to open the door temporarily, and the door cannot be opened in time at the moment.
In view of the above, it is an urgent problem in the art to overcome the above-mentioned drawbacks of the prior art.
[ summary of the invention ]
The technical problems to be solved by the invention are as follows:
in traditional entrance guard's device, the visitor needs the dialing call to the house inquiry of being visited the person, and the person hears to call the back and need to move towards the door department and verify the identity of visitor, opens building entrance guard again and makes the visitor get into, and this brings inconvenience for being visited person's use, probably can't in time open entrance guard, and user experience is poor.
The invention achieves the above purpose by the following technical scheme:
in a first aspect, the invention provides an access control use method based on acquaintance visit, comprising the following steps:
establishing a track fingerprint library aiming at the user B in a cloud server of a user B side access control device; the track fingerprint database stores track information corresponding to a plurality of users acquainted with the user B;
when a user A visits and arrives at the location of a user B, the entrance guard device acquires the historical track fingerprint of the user A in the latest preset time period through the intelligent equipment of the user A; wherein, the user A is any one of the users acquainted with the user B;
the access control device verifies the acquired historical track fingerprint of the user A according to the plurality of track information in the track fingerprint database; and if the verification is successful, executing a preset result action to enable the user A to enter.
Preferably, the preset result action includes: the method comprises the steps of opening one or more of an access control of a community where the user B is located, opening an access control of a building where the user B is located, triggering an access control device ring of the user B side, triggering an intelligent device ring of the user B side and sending a message to the intelligent device of the user B side.
Preferably, the access control device obtains the historical track fingerprint of the user a in the latest preset time period through the intelligent device of the user a, and specifically includes:
the entrance guard device sends a request for acquiring the historical track fingerprint in the latest preset time period to the intelligent equipment of the user A after receiving the doorbell pressing operation of the user A;
and after receiving the request, the intelligent equipment of the user A sends one or more historical track fingerprints of the user A in the latest preset time period to the access control device.
Preferably, the information interaction between the access control device and the intelligent equipment of the user A is realized in a Bluetooth or 5G Internet of things protocol mode.
Preferably, the track fingerprint library stores a plurality of historical track fingerprints corresponding to a plurality of users identified by the user B, and the access control device verifies the acquired historical track fingerprint of the user a according to a plurality of track information in the track fingerprint library, including:
the access control device sends the acquired historical track fingerprint of the user A in the latest preset time period to a cloud server where the access control device is located;
the cloud server determines a track fingerprint database corresponding to the user B and a plurality of corresponding historical track fingerprints according to the house number of the user B; the number of the user B is determined according to the doorbell pressing operation of the user A;
the cloud server respectively verifies the matching degree between the user A and a plurality of users in the track fingerprint database according to the acquired historical track fingerprint of the user A and the plurality of historical track fingerprints in the track fingerprint database;
if the matching degree between the user A and any user in the track fingerprint database meets the preset requirement, the identity verification of the user A is successful, and then the preset result action is executed, so that the user A enters.
Preferably, if more than a preset number of historical track fingerprints in the acquired historical track fingerprints of the user A can be successfully matched with the historical track fingerprint corresponding to any user X in the track fingerprint database, determining that the matching degree between the user A and the user X meets a preset requirement;
or if the historical track fingerprints exceeding the preset proportion in the acquired historical track fingerprints of the user A can be successfully matched with the historical track fingerprints corresponding to any user X in the track fingerprint database respectively, determining that the matching degree between the user A and the user X meets the preset requirement.
Preferably, the track fingerprint library stores home address information of a plurality of users acquainted with the user B, and the access control device verifies the acquired historical track fingerprint of the user a according to the plurality of track information in the track fingerprint library, specifically including:
the access control device sends the acquired historical track fingerprint of the user A in the latest preset time period to a cloud server where the access control device is located;
the cloud server determines a track fingerprint database corresponding to the user B and a plurality of pieces of corresponding home address information according to the house number of the user B; the number of the user B is determined according to the doorbell pressing operation of the user A;
the cloud server respectively verifies the relevance between the user A and a plurality of users in the track fingerprint database according to the acquired historical track fingerprint of the user A and the plurality of pieces of home address information in the track fingerprint database;
if the relevance between the user A and any user in the track fingerprint database meets the preset requirement, the identity verification of the user A is successful, and then the preset result action is executed, so that the user A enters.
Preferably, when the relevance between the user a and a plurality of users in the track fingerprint database is verified, whether the relevance between the user a and each user in the track fingerprint database meets a preset requirement is judged according to the number of times that the home address corresponding to each user in the track fingerprint database appears in the acquired historical track fingerprint of the user a;
or judging whether the relevance between the user A and each user in the track fingerprint database meets the preset requirement or not according to the number ratio of the historical track fingerprints including the home addresses of each user in the acquired historical track fingerprints of the user A.
Preferably, the smart device is a smart phone, a smart bracelet or a smart watch, and is used for recording and storing the track fingerprint of the user in real time.
In a second aspect, the present invention provides an access control device based on an acquaintance visit, including at least one processor and a memory, where the at least one processor and the memory are connected through a data bus, and the memory stores instructions executable by the at least one processor, and the instructions, after being executed by the processor, can be used to complete the access control using method based on an acquaintance visit according to the first aspect.
Compared with the prior art, the invention has the beneficial effects that:
in the access control using method provided by the embodiment of the invention, the intelligent equipment carried by the user can be used for recording the motion track of the user in real time, and the identity of the visiting user is effectively verified by verifying whether the historical motion track is reasonable, so that corresponding actions are executed after the verification is successful, for example, the access control is opened to enable the user A to enter; in the process, the visited user does not need to open the access control in front of himself, the use is more convenient, the identity of the visited user can be automatically authenticated, only the person passing the identity verification enters the system, the use is more intelligent, and the user experience is improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below. It is obvious that the drawings described below are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
Fig. 1 is a flowchart of an access control method based on acquaintance visit according to an embodiment of the present invention;
fig. 2 is a system architecture diagram in an access control method according to an embodiment of the present invention;
FIG. 3 is a flowchart of an embodiment of a method for performing step 302 of FIG. 1;
FIG. 4 is a flowchart illustrating an embodiment of a method for implementing step 303 of FIG. 1;
FIG. 5 is a flowchart of another embodiment of the method of step 303 of FIG. 1 according to the present invention;
fig. 6 is an architecture diagram of an access control device based on an acquaintance visiting according to an embodiment of the present invention.
[ detailed description ] embodiments
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
In the description of the present invention, the terms "inside", "outside", "longitudinal", "lateral", "upper", "lower", "top", "bottom", "left", "right", "front", "rear", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of describing the present invention but do not require that the present invention must be constructed and operated in a specific orientation, and thus should not be construed as limiting the present invention.
In addition, the technical features involved in the respective embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other. The invention will be described in detail below with reference to the figures and examples.
Example 1:
the embodiment of the invention provides an access control using method based on acquaintance visiting, which can record the motion trail of a user according to intelligent equipment carried by the user, and further open the access control by verifying the historical motion trail of the user. The smart device can be a smart phone, a smart bracelet or a smart watch and the like which are frequently carried by a user, and the smart device is a smart phone generally because the smart phone is most commonly used.
Assuming that the user a is a visitor and the user B is a visited person, in an application scenario of the embodiment of the present invention, the user a is a person acquainted with the user B and is not well agreed with the user B, for example, temporarily passes through a cell of the user B and wants to temporarily visit. In this scenario, the user B cannot determine whether the user a will visit, when to visit, where to start to visit, etc., but the home address and the history track fingerprint of the user a can be determined, so that the user a can be authenticated accordingly when the user a visits temporarily, and the user a can enter. As shown in fig. 1, the access control method provided by the embodiment of the invention specifically includes the following steps:
step 301, establishing a track fingerprint database for a user B in a cloud server of a user B side access control device; and the track fingerprint database stores track information respectively corresponding to a plurality of users acquainted with the user B.
In this step, the trajectory information of the multiple users identified with user B is collected and recorded in the cloud server for use in subsequent verification. The track information may be a plurality of historical track fingerprints corresponding to a plurality of users acquainted with the user B, and information such as a most frequently-visited place and a most frequently-visited route of each user is recorded; the home address information may be information corresponding to each of a plurality of users who are acquainted with the user B.
Step 302, when a user A visits and arrives at the location of a user B, the entrance guard device obtains the historical track fingerprint of the user A in the latest preset time period through the intelligent equipment of the user A; wherein, the user A is any one of the users acquainted with the user B.
Here, the access control device may be an access control switch in charge of a cell where the user B is located and an access control switch of a building where the user B is located layer by layer, or may be an access control switch in charge of only a building where the user B is located, which is not limited herein. Because the intelligent device of the user A has a GPS positioning function and can record and store the position and the motion trail of the user A at any time, a plurality of historical trail fingerprints of the user A are usually stored in the intelligent device, the information such as the most frequent place and the most frequent route of the user A is recorded in the historical trail fingerprints, and when the intelligent device of the user A reaches the place where the user B is located, the intelligent device of the user A can realize information interaction with the entrance guard device in the modes such as Bluetooth or 5G internet of things protocol.
If the smart device stores all historical track fingerprints of the user since history, a large amount of memory may be occupied, and even the operating speed of the smart device may be affected. In order to save the occupied memory of the intelligent equipment and effectively store the representative historical track fingerprints of the user, the intelligent equipment can only store one or more historical track fingerprints of the user within the latest preset time period; the preset time period can be set according to parameters such as the maximum used memory of the intelligent device, the memory allocation condition and the running speed. For example, the smart device may only store the historical track fingerprints of the user within the last 5-10 days, which may not only avoid the memory occupation from being too large, but also obtain the recent motion track of the user, and the historical track fingerprints within the last 5-10 days have great representativeness to the knowledge of the user track. Correspondingly, the access control device only needs to acquire the historical track fingerprint of the user A in the latest preset time period for verification.
Step 303, the access control device verifies the acquired historical track fingerprint of the user A according to a plurality of track information in the track fingerprint database; and if the verification is successful, executing a preset result action to enable the user A to enter.
Wherein the preset result action comprises: the method comprises the steps of opening one or more of an access control of a community where the user B is located, opening an access control of a building where the user B is located, triggering an access control device ring of the user B side, triggering an intelligent device ring of the user B side and sending a message to the intelligent device of the user B side. Taking the case that the access control device is mainly responsible for an access control switch of a building where the user B is located, and the preset result action is to open the access control of the building where the user B is located as an example, when verification is performed, firstly, a track fingerprint library corresponding to the user B is confirmed according to the building and a house number of the user B, and then, a plurality of track information is confirmed; and then, the historical track fingerprint of the user A is verified according to the plurality of track information, if the verification is successful, the user A is considered to be a acquaintance of the user B and is authorized to enter the building, and the cloud server can further control the building entrance guard to be opened so that the user A enters the building. Accordingly, if the authentication fails, the user a is considered not to be an acquaintance of the user B, and does not have the right to enter the building, the entrance guard is not opened, and the user a cannot enter the building.
In the access control using method provided by the embodiment of the invention, the intelligent device carried by the user can be used for recording the motion track of the user in real time, and the identity of the visiting user is effectively verified by verifying whether the historical motion track is reasonable, so that corresponding actions are executed after the verification is successful, for example, a corresponding access control is opened to enable the visiting user to enter; in the process, the visited user does not need to open the access control in front of himself, the use is more convenient, the identity of the visited user can be automatically authenticated, only the person passing the identity verification enters the system, the use is more intelligent, and the user experience is improved.
Referring to fig. 2, the access control device is in wireless communication with the cloud server, and the access control device performs track fingerprint verification, identity judgment of the user a and the like through the corresponding cloud server; the intelligent device of the user A and the entrance guard device can perform information interaction in a wireless mode, so that the cloud server can acquire the track fingerprint of the user A; the intelligent equipment of the user B is bound with the access control device in advance, and therefore information interaction between the intelligent equipment of the user B and the cloud server can be achieved.
Further referring to fig. 3, in practical application, the access control device obtains one or more historical track fingerprints of the user a in a recent preset time period through the smart device of the user a, that is, step 302, may specifically include the following steps:
step 3021, after receiving the doorbell pressing operation of the user a, the access control device sends a request for obtaining the historical track fingerprint in the latest preset time period to the intelligent device of the user a.
Taking the access control device mainly responsible for the access control switch of the building where the user B is located as an example, when the user A arrives at the building where the user B is located, the doorbell can be pressed according to the house number of the user B; after receiving the doorbell pressing operation of the user A, the access control device can send a historical track fingerprint request to one or more intelligent devices (including the intelligent device of the user A) in a preset range around the building door in a Bluetooth or 5G Internet of things protocol mode and the like; user A should be within a preset range around the building door, and therefore can receive a historical track fingerprint request from the entrance guard device. For example, the preset range may be set to 2m, that is, the smart devices within 2m from the building door may all receive the corresponding request, and the user a presses the doorbell to be sure within 2m from the building door, so that the smart device may receive the track fingerprint request from the door lock device.
Step 3022, after receiving the request, the smart device of the user a sends one or more historical track fingerprints of the user a in a recent preset time period to the access control device.
Correspondingly, after receiving the request, the intelligent device of the user A can send the historical track fingerprint of the user A in the latest preset time period to the access control device in the modes of Bluetooth or 5G Internet of things protocol and the like. It should be noted that if there are other smart devices within the preset range around and receiving the same request, the request can be directly ignored without responding because the corresponding other users do not need to verify that the access control is passed. In an alternative scheme, if all the historical track fingerprints of the user are stored in the intelligent device, and one side of the access control device only needs to acquire the historical track fingerprint in the latest preset time period for quick verification, the intelligent device of the user a can intercept the corresponding historical track fingerprint in the latest preset time period from all the historical track fingerprints after receiving the request, and then send the historical track fingerprint to the access control device.
Referring to fig. 4 further, when a plurality of historical track fingerprints corresponding to a plurality of users identified by the user B are stored in the track fingerprint database, the access control device verifies the acquired historical track fingerprint of the user a according to a plurality of track information in the track fingerprint database, that is, step 303, which may further include the following steps:
step 3031, the access control device sends the acquired historical track fingerprint of the user A in the latest preset time period to a cloud server where the access control device is located;
step 3032, the cloud server determines a track fingerprint library corresponding to the user B and a plurality of corresponding historical track fingerprints according to the house number of the user B.
The number of the user B is determined according to the doorbell pressing operation of the user A; specifically, in step 3021, when the user a arrives at the building where the user B is located, the doorbell pressing operation is performed according to the number of the user B, and after the door access device receives the doorbell pressing operation of the user a, the cloud server may determine the track fingerprint library corresponding to the user B according to the corresponding number of the user B, and further determine a plurality of historical track fingerprints.
Step 3033, the cloud server respectively verifies the matching degree between the user A and a plurality of users in the track fingerprint database according to the acquired historical track fingerprint of the user A and the plurality of historical track fingerprints in the track fingerprint database.
If the matching degree between the user A and any user in the track fingerprint database meets the preset requirement, the identity verification of the user A is successful, and then a preset result action is executed, so that the user A enters. Assuming that the preset result action is specifically as follows: opening an entrance guard of a building where the user B is located, and sending a message to intelligent equipment on the side of the user B; and if the identity authentication of the user A is successful, the cloud server controls the entrance guard to be opened to enable the user A to enter the building, and sends a corresponding notification message (the user A enters) to the intelligent equipment of the user B, so that the user B knows that the user A arrives and enters the building. Correspondingly, if the identity authentication of the user A fails, the cloud server cannot control the access control device to open the door, and can also send a corresponding warning message to the intelligent device of the user B, so that the user B knows that the identity of the user A is suspicious.
Further, when matching degree verification is carried out, if more than a preset number of historical track fingerprints exist in the acquired historical track fingerprints of the user A and can be successfully matched with the historical track fingerprint corresponding to any user X in the track fingerprint library respectively, determining that the matching degree between the user A and the user X meets a preset requirement; or if the historical track fingerprints exceeding the preset proportion in the acquired historical track fingerprints of the user A can be successfully matched with the historical track fingerprints corresponding to any user X in the track fingerprint database respectively, determining that the matching degree between the user A and the user X meets the preset requirement. The preset number and the preset proportion can be flexibly set according to actual requirements. For example, if more than 5 fingerprints in the acquired historical track fingerprints of the user a can be successfully matched with the historical track fingerprints corresponding to the user X, it is determined that the matching degree between the user a and the user X meets the preset requirement. For another example, if more than 50% of the acquired historical track fingerprints of the user a can be successfully matched with the historical track fingerprint corresponding to the user X, it is determined that the matching degree between the user a and the user X meets the preset requirement.
Referring to fig. 5 further, when the track fingerprint library stores home address information of a plurality of users acquainted with the user B, the access control device verifies the acquired historical track fingerprint of the user a according to the plurality of track information in the track fingerprint library, that is, step 303, may further include the following steps:
step 3031', the access control device sends the acquired historical track fingerprint of the user A in the latest preset time period to a cloud server where the access control device is located;
step 3032', the cloud server determines a track fingerprint library corresponding to the user B and a plurality of pieces of corresponding home address information according to the house number of the user B.
The number of the user B is determined according to the doorbell pressing operation of the user A; specifically, in step 3021, when the user a arrives at the building where the user B is located, a corresponding doorbell pressing operation is performed according to the number of the user B, and after the door access device receives the doorbell pressing operation of the user a, the cloud server may determine the track fingerprint library corresponding to the user B according to the corresponding number, and further determine a plurality of home addresses.
Step 3033', the cloud server respectively verifies the relevance between the user a and a plurality of users in the track fingerprint database according to the acquired historical track fingerprint of the user a and the plurality of pieces of home address information in the track fingerprint database.
If the relevance between the user A and any user in the track fingerprint database meets the preset requirement, the identity of the user A is successfully verified, and then a preset result action is executed to enable the user A to enter. When the relevance between the user A and a plurality of users in the track fingerprint database is verified, whether the relevance between the user A and each user in the track fingerprint database meets a preset requirement or not can be judged according to the number of times of occurrence of the home address corresponding to each user in the track fingerprint database in the acquired historical track fingerprint of the user A; or judging whether the relevance between the user A and each user in the track fingerprint database meets the preset requirement or not according to the number proportion of the historical track fingerprints including the home addresses of the users in the acquired historical track fingerprints of the user A. For example, in all the acquired historical track fingerprints of the user a within the latest preset time period, if the total number of times of occurrence of the home address corresponding to a certain user X in the track fingerprint library exceeds n times, it can be considered that the user a has a high association with the user X, the user a should be an acquaintance of the user B (i.e., the user X), that is, the association meets the preset requirement, and the verification is successful; wherein, n can be flexibly selected according to actual needs, such as 3-8 times. For another example, if the number ratio of the historical track fingerprints including the home address corresponding to a certain user X in the track fingerprint library exceeds m in all the acquired historical track fingerprints of the user a in the latest preset time period, it may be considered that there is a high association between the user a and the user X, and the user a should be an acquaintance of the user B (i.e., the user X), that is, the association meets the preset requirement, and the verification is successful; wherein, m can be flexibly selected according to actual needs, such as 30-80 percent.
In real life, there may also be the following scenarios: the user a originally wants to visit the user C (with the number of the house number of 201), but does not respond after pressing the doorbell of the user C, and at this time, in order to smoothly enter the building, the user a may press the doorbell of another user, for example, the doorbell of the user B (with the number of the house number of 202), so that the access control device or the intelligent device on the side of the user B rings, and thus, the user B is disturbed to some extent. To avoid the above phenomenon, the preset result action may specifically be: triggering the ringing of the access control device on the side of the user B or triggering the ringing of the intelligent equipment on the side of the user B, and opening the access control of the building where the user B is located. Therefore, when the user a arrives at the terminal and presses the doorbell, the access control device or the intelligent device on the user B side does not ring immediately, but in step 303, when the historical track fingerprint of the user a is successfully verified, the access control device or the intelligent device on the user B side rings, and the cloud server controls the building access control to be opened, so that the user a enters the building; and if the track fingerprint verification of the user A fails, the user A is not a visitor of the user B and belongs to a harassment situation, at the moment, the access control device or the intelligent equipment on the side of the user B cannot ring, and the cloud server cannot control the building access control to be opened, so that the interference to the user B can be avoided.
Example 2:
on the basis of the access control use method based on acquaintance visit provided by the embodiment 1, the invention further provides an access control device capable of realizing the method, and as shown in fig. 6, the access control device is a schematic device architecture diagram of the embodiment of the invention. The gate inhibition device based on the visit of an acquaintance in the embodiment comprises one or more processors 21 and a memory 22. In fig. 6, one processor 21 is taken as an example.
The processor 21 and the memory 22 may be connected by a bus or other means, and fig. 6 illustrates the connection by a bus as an example.
The memory 22, as a non-volatile computer-readable storage medium based on the access control method when an acquaintance visits, may be used to store a non-volatile software program, a non-volatile computer-executable program, and a module, such as the access control method based on the acquaintance visits in embodiment 1. The processor 21 executes various functional applications and data processing of the door control device based on an acquaintance visit by running the nonvolatile software program, instructions and modules stored in the memory 22, that is, the door control using method based on an acquaintance visit of embodiment 1 is realized.
The memory 22 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 22 may optionally include memory located remotely from the processor 21, and these remote memories may be connected to the processor 21 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The program instructions/modules are stored in the memory 22, and when executed by the one or more processors 21, perform the method for using an access control based on an acquaintance visit in embodiment 1, for example, perform the steps shown in fig. 1, fig. 3, fig. 4, and fig. 5 described above.
Those of ordinary skill in the art will appreciate that all or part of the steps of the various methods of the embodiments may be implemented by associated hardware as instructed by a program, which may be stored on a computer-readable storage medium, which may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic or optical disk, or the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (7)

1. An access control use method based on acquaintance visit is characterized by comprising the following steps:
establishing a track fingerprint library aiming at the user B in a cloud server of a user B side access control device; the track fingerprint database stores track information corresponding to a plurality of users acquainted with the user B;
when a user A visits and arrives at the location of a user B, the entrance guard device acquires the historical track fingerprint of the user A in the latest preset time period through the intelligent equipment of the user A; wherein, the user A is any one of the users acquainted with the user B;
the access control device verifies the acquired historical track fingerprint of the user A according to the plurality of track information in the track fingerprint database; if the verification is successful, executing a preset result action to enable the user A to enter;
the track fingerprint database stores a plurality of historical track fingerprints corresponding to a plurality of users identified by the user B, and the access control device verifies the acquired historical track fingerprint of the user a according to a plurality of track information in the track fingerprint database, and the method specifically includes the following steps:
the access control device sends the acquired historical track fingerprint of the user A in the latest preset time period to a cloud server where the access control device is located;
the cloud server determines a track fingerprint database corresponding to the user B and a plurality of corresponding historical track fingerprints according to the house number of the user B; the number of the user B is determined according to the doorbell pressing operation of the user A;
the cloud server respectively verifies the matching degree between the user A and a plurality of users in the track fingerprint database according to the acquired historical track fingerprint of the user A and the plurality of historical track fingerprints in the track fingerprint database;
if the matching degree between the user A and any user in the track fingerprint database meets a preset requirement, the identity verification of the user A is successful, and a preset result action is executed to enable the user A to enter;
the track fingerprint database stores home address information of a plurality of users acquainted with the user B, and the access control device verifies the acquired historical track fingerprint of the user a according to the plurality of track information in the track fingerprint database, and the method specifically includes:
the access control device sends the acquired historical track fingerprint of the user A in the latest preset time period to a cloud server where the access control device is located;
the cloud server determines a track fingerprint database corresponding to the user B and a plurality of pieces of corresponding home address information according to the house number of the user B; the number of the user B is determined according to the doorbell pressing operation of the user A;
the cloud server respectively verifies the relevance between the user A and a plurality of users in the track fingerprint database according to the acquired historical track fingerprint of the user A and the plurality of pieces of home address information in the track fingerprint database;
if the relevance between the user A and any user in the track fingerprint database meets a preset requirement, the identity verification of the user A is successful, and a preset result action is executed to enable the user A to enter;
when the relevance between the user A and a plurality of users in the track fingerprint database is verified, judging whether the relevance between the user A and each user in the track fingerprint database meets a preset requirement or not according to the number of times of occurrence of the home address corresponding to each user in the track fingerprint database in the acquired historical track fingerprint of the user A;
or judging whether the relevance between the user A and each user in the track fingerprint database meets the preset requirement or not according to the number ratio of the historical track fingerprints including the home addresses of each user in the acquired historical track fingerprints of the user A.
2. The use method of an entrance guard based on acquaintance visiting as claimed in claim 1, wherein the preset result action comprises: the method comprises the steps of opening one or more of an access control of a community where the user B is located, opening an access control of a building where the user B is located, triggering an access control device ring of the user B side, triggering an intelligent device ring of the user B side and sending a message to the intelligent device of the user B side.
3. The method for using an access control device according to claim 1, wherein the access control device obtains the historical track fingerprint of the user a in the latest preset time period through the intelligent device of the user a, and specifically comprises:
the entrance guard device sends a request for acquiring the historical track fingerprint in the latest preset time period to the intelligent equipment of the user A after receiving the doorbell pressing operation of the user A;
and after receiving the request, the intelligent equipment of the user A sends one or more historical track fingerprints of the user A in the latest preset time period to the access control device.
4. The use method of the entrance guard based on acquaintance visit according to claim 1, wherein the entrance guard device and the intelligent device of the user A realize information interaction in a Bluetooth or 5G Internet of things protocol mode.
5. The access control use method based on acquaintance visit according to claim 1, wherein if more than a preset number of historical track fingerprints in the acquired historical track fingerprints of the user A can be successfully matched with the historical track fingerprint corresponding to any user X in the track fingerprint library respectively, the matching degree between the user A and the user X is determined to meet a preset requirement;
or if the historical track fingerprints exceeding the preset proportion in the acquired historical track fingerprints of the user A can be successfully matched with the historical track fingerprints corresponding to any user X in the track fingerprint database respectively, determining that the matching degree between the user A and the user X meets the preset requirement.
6. The access control use method based on acquaintance visit according to any one of claims 1 to 5, wherein the intelligent device is a smart phone, a smart bracelet or a smart watch, and is used for recording and storing the track fingerprint of the user in real time.
7. An access control device based on an acquaintance visit, comprising at least one processor and a memory, wherein the at least one processor and the memory are connected through a data bus, and the memory stores instructions executable by the at least one processor, and the instructions are used for completing the access control use method based on the acquaintance visit according to any one of claims 1 to 6 after being executed by the processor.
CN202011026963.0A 2020-09-25 2020-09-25 Door control using method and door control device based on acquaintance visiting Active CN112233292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011026963.0A CN112233292B (en) 2020-09-25 2020-09-25 Door control using method and door control device based on acquaintance visiting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011026963.0A CN112233292B (en) 2020-09-25 2020-09-25 Door control using method and door control device based on acquaintance visiting

Publications (2)

Publication Number Publication Date
CN112233292A CN112233292A (en) 2021-01-15
CN112233292B true CN112233292B (en) 2022-06-21

Family

ID=74108840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011026963.0A Active CN112233292B (en) 2020-09-25 2020-09-25 Door control using method and door control device based on acquaintance visiting

Country Status (1)

Country Link
CN (1) CN112233292B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853535A (en) * 2010-05-25 2010-10-06 无锡中星微电子有限公司 Door control system and door control management method
CN105632000A (en) * 2016-03-07 2016-06-01 上海斐讯数据通信技术有限公司 Door lock control method and system based on mobile terminal
CN111583485A (en) * 2020-04-16 2020-08-25 北京澎思科技有限公司 Community access control system, access control method and device, access control unit and medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5146096B2 (en) * 2008-05-13 2013-02-20 日産自動車株式会社 Destination prediction apparatus and destination prediction method
CN102291435B (en) * 2011-07-15 2012-09-05 武汉大学 Mobile information searching and knowledge discovery system based on geographic spatiotemporal data
US10237733B2 (en) * 2016-07-20 2019-03-19 Salesforce.Com, Inc Behavioral authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853535A (en) * 2010-05-25 2010-10-06 无锡中星微电子有限公司 Door control system and door control management method
CN105632000A (en) * 2016-03-07 2016-06-01 上海斐讯数据通信技术有限公司 Door lock control method and system based on mobile terminal
CN111583485A (en) * 2020-04-16 2020-08-25 北京澎思科技有限公司 Community access control system, access control method and device, access control unit and medium

Also Published As

Publication number Publication date
CN112233292A (en) 2021-01-15

Similar Documents

Publication Publication Date Title
US8396453B2 (en) Method and apparatus for surreptitiously triggering the collection of data from a lost wireless communications device equipped with audio and/or video collection means
CN107862774B (en) Access control calling method, system and client
CN109523678A (en) The exchange method and device of intelligent entrance guard
CN109145560A (en) The method and device of accessing monitoring equipment
CN108174142A (en) A kind of long-range control locking method locked based on intelligent doorbell and intelligent cloud, system
CN107464325A (en) A kind of multi-layer gate control system and its implementation
CN103329179A (en) Intelligent emergency signal transmission system using mobile phone and method thereof
JP2016177484A (en) Security system
CN107396328B (en) Calling method of terminal and related equipment
CN104537744A (en) Intelligent electronic entrance guard system
CN112927408A (en) Visitor visiting processing method and device
CN112911207A (en) Calling method and intelligent talkback system
EA030774B1 (en) Method and system for biometric authentication
CN106355706A (en) Intelligent door lock system
CN112233292B (en) Door control using method and door control device based on acquaintance visiting
CN107301496B (en) Anti-occupation system and anti-occupation method for shared bicycle
CN114519906A (en) Building entrance guard control method and system based on smart home
CN112233291A (en) Entrance guard using method and entrance guard device based on intelligent device track
CN111047761A (en) Voice interactive visitor identity recognition method and system based on intelligent terminal
CN112233290B (en) Entrance guard using method and entrance guard device based on stranger visiting
CN111768544B (en) Intelligent access control method, device and system, electronic equipment and storage medium
KR101803348B1 (en) Car relief number service apparatus and method using qr code
CN114399864A (en) Intelligent access control method and system
CN111489276B (en) Personnel management method and related device
JP2005348240A (en) Telephone device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant