CN113487779A - Access control method, access terminal and storage medium - Google Patents

Access control method, access terminal and storage medium Download PDF

Info

Publication number
CN113487779A
CN113487779A CN202110834282.5A CN202110834282A CN113487779A CN 113487779 A CN113487779 A CN 113487779A CN 202110834282 A CN202110834282 A CN 202110834282A CN 113487779 A CN113487779 A CN 113487779A
Authority
CN
China
Prior art keywords
access control
preset
information
door
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110834282.5A
Other languages
Chinese (zh)
Inventor
曹敬修
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Skyworth RGB Electronics Co Ltd
Original Assignee
Shenzhen Skyworth RGB Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Skyworth RGB Electronics Co Ltd filed Critical Shenzhen Skyworth RGB Electronics Co Ltd
Priority to CN202110834282.5A priority Critical patent/CN113487779A/en
Publication of CN113487779A publication Critical patent/CN113487779A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses an access control method, an access terminal and a storage medium, wherein the access control method comprises the following steps: acquiring identity information of a current visitor; determining an identity authentication mode corresponding to a preset access control mode based on the current preset access control mode; verifying whether the identity information is legal or not according to the identity verification mode; and if the identity information is legal, executing unlocking operation. The access control method disclosed by the invention can solve the technical problem that the existing access unlocking mode is not flexible to use.

Description

Access control method, access terminal and storage medium
Technical Field
The invention belongs to the technical field of intelligent access control, and particularly relates to an access control method, an access terminal and a storage medium.
Background
At present, with the continuous progress of science and technology, the intelligent access control system gradually becomes a new choice for more users. The intelligent access control system brings safer, more convenient and easier new experience for users; compared with the traditional mechanical unlocking mode, the existing various intelligent door locks have more unlocking modes, such as face recognition, fingerprint recognition, fixed password and the like;
but current entrance guard's unblock mode is comparatively fixed, only can unblock through the unblock logic of factory setting in the use, for example to the lock that can all unblock through face identification and fingerprint identification, the user can unblock through the arbitrary mode in face or the fingerprint, but want to change the unblock mode when the user, make it need face and fingerprint to verify simultaneously and just can unblock, this demand then can't be realized, consequently, there is the inflexible problem of use, can't satisfy user diversified user demand.
Disclosure of Invention
In order to overcome the above disadvantages of the prior art, the present invention provides an access control method, an access terminal and a storage medium, and aims to solve the technical problem that the existing access unlocking method is not flexible to use.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
an access control method is applied to an access terminal, and comprises the following steps:
acquiring identity information of a current visitor;
determining an identity authentication mode corresponding to a preset access control mode based on the current preset access control mode;
verifying whether the identity information is legal or not according to the identity verification mode;
and if the identity information is legal, executing unlocking operation.
Further, before the step of determining the authentication mode corresponding to the preset access control mode based on the current preset access control mode, the method further includes:
the method comprises the steps of obtaining current time, and selecting the preset access control mode corresponding to the current time from a plurality of pre-stored access control modes according to the current time.
Further, the identity information comprises face information; the step of obtaining identity information of the current visitor comprises the following steps:
acquiring the light brightness of the current outdoor environment, and judging whether the light brightness is lower than a preset brightness threshold value;
and if the light brightness is lower than a preset brightness threshold value, acquiring the face information of the current visitor.
Further, after the step of verifying whether the identity information is legal according to the identity verification manner, the method further includes:
if the identity information is illegal and the face information is inconsistent with preset face information, continuously collecting the face information;
and when the duration time for acquiring the face information exceeds the preset time, sending corresponding first reminding information to the user terminal so as to remind the user that a stranger stays in the current outdoor environment.
Further, the method further comprises:
detecting whether a condition that a person knocks a door exists in the current outdoor environment;
if the current outdoor environment has a door knocking situation, judging whether the access control terminal is in a preset do-not-disturb state;
if the access control terminal is in a preset non-interference state, acquiring the face information of the current visitor and recording the acquisition time of the face information;
and sending the face information and the acquisition time to a user terminal for a user to check.
Further, judge whether entrance guard's terminal still includes after the step of the predetermined state of not disturbing:
if the access control terminal is not in a preset do-not-disturb state, judging whether a door opening instruction from a user terminal is received;
if a door opening instruction from a user terminal is received, executing the unlocking operation according to the door opening instruction, and generating temporary permission duration information;
and binding and storing the temporary permission duration information and the identity information.
Furthermore, the access control terminal is arranged in the anti-theft door, and the anti-theft door is provided with a hidden door handle; the step of performing an unlocking operation includes:
and controlling the hidden door handle to pop out of the security door and unlocking the security door.
Further, the method further comprises:
acquiring the smoke concentration of the current environment;
judging whether the smoke concentration exceeds a preset concentration threshold value or not;
and if the smoke concentration exceeds a preset concentration threshold value, executing alarm operation.
Correspondingly, the invention also provides an access control terminal, which comprises a memory, a processor and an access control program which is stored on the memory and can run on the processor, wherein the access control program is configured to realize the steps of the access control method.
Correspondingly, the invention also provides a storage medium, on which an access control program is stored, and the access control program realizes the steps of the access control method when being executed by a processor.
Compared with the prior art, the invention has the beneficial effects that:
according to the access control method provided by the invention, different authentication modes are corresponding to different preset access modes, so that different access modes can be set in different time periods or different states according to user requirements, and different authentication methods are determined for unlocking, so that the use flexibility of an access control system is improved; on the other hand, if some verification information is leaked, for example, a password and identity information (such as fingerprint information) are imitated, but the verification mode can only complete identity verification for unlocking in a corresponding access control mode; therefore, even if the verification information thief steals the verification information, the current preset unlocking mode is unknown, and the unlocking cannot be successful, so that the use safety is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an access control terminal in a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of an access control method according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments of the present invention and features of the embodiments may be combined with each other without conflict. In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention, and the described embodiments are merely a subset of the embodiments of the present invention, rather than a complete embodiment. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
As shown in fig. 1, fig. 1 is a schematic structural diagram of an access control terminal according to an embodiment of the present invention.
The access control terminal of the embodiment of the invention can be terminal equipment with access control function, such as an intelligent door lock.
As shown in fig. 1, the access control terminal may include: a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a DiSplay screen (diselay), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
It will be appreciated by those skilled in the art that the access terminal shown in figure 1 does not constitute a limitation of the terminal and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include an operating system, a network communication module, a user interface module, and an access control program therein.
In the access control terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 mainly includes an input unit such as a keyboard including a wireless keyboard and a wired keyboard, and is used to connect to the client and perform data communication with the client; the processor 1001 may be configured to call the access control program stored in the memory 1005 and perform the operations of the access control method in any of the following embodiments.
Based on the hardware structure, the embodiment of the access control method is provided.
Referring to fig. 2, an embodiment of the present invention provides an access control method, which is applied to an access terminal, and the method includes the following steps:
step S100, acquiring identity information of a current visitor;
s200, determining an identity authentication mode corresponding to a preset access control mode based on the current preset access control mode;
step S300, verifying whether the identity information is legal or not according to an identity verification mode;
and step S400, if the identity information is legal, unlocking operation is executed.
The entrance guard terminal comprises a communication module, the entrance guard terminal is in communication connection with a user terminal through the communication module, the entrance guard terminal receives the control of the user terminal and the setting of an entrance guard mode, the setting of the entrance guard mode is set by a user according to the user requirement, for example, 9-12 points are selected to be a working entrance guard mode, 12-14 points are a do-not-disturb mode, the entrance guard terminal starts an identity verification mode corresponding to the working entrance guard mode for a visitor at 9-12 points according to the setting, and starts an identity verification mode corresponding to the do-not-disturb entrance guard mode for the visitor at 12-14 points; and, the authentication mode that different entrance guard's mode corresponds also can set up according to user's demand, for example the authentication mode that work entrance guard's mode corresponds can set up to: the two verification modes of face verification and fingerprint verification can be unlocked by passing through the two verification modes at the same time, or the verification modes of face verification, fingerprint verification and password verification can be unlocked by passing through the two verification modes at the same time, and other different access control modes are similar, and are not described herein;
more specifically, different authentication modes are corresponding to different preset access control modes, so that different access control modes can be set in different time periods or different states according to user requirements, different authentication methods are determined for unlocking, and the use flexibility of the access control system is improved; on the other hand, if some verification information is leaked, for example, a password and identity information (such as fingerprint information) are imitated, but the verification mode can only complete identity verification for unlocking in a corresponding access control mode; therefore, even if the verification information thief steals the verification information, the current preset unlocking mode is unknown, and the unlocking cannot be successful, so that the use safety is improved.
Further, the identity authentication mode comprises one or more of face identification authentication, fingerprint identification authentication, voiceprint identification authentication, voice identification authentication, digital password authentication and radio frequency identification authentication.
Specifically, the camera or the face scanner is arranged on the anti-theft door or the anti-theft lock, so that the face information can be collected to perform face identification verification; the fingerprint identification device is arranged on the anti-theft door or the anti-theft lock, so that fingerprint identification verification by collecting fingerprint information can be realized; the audio acquisition and identification device is arranged on the anti-theft door or the anti-theft lock, so that voiceprint and voice information can be acquired to perform voiceprint identification and verification; the security door or the security lock is provided with the digital input keyboard or the touch screen input keyboard, so that the digital password information can be acquired to carry out digital password identification and verification, wherein the digital password is generated by a user terminal and is a random password refreshed once every 15 seconds and used as a dynamic password to verify identity, and the mode of adopting the random password is higher in security compared with the mode of setting a door opening password by a traditional user; the radio frequency verification device is arranged on the anti-theft door or the anti-theft lock, so that video identification verification can be carried out, namely, the access control card identification verification is carried out; the authentication method in this embodiment is not limited to the above authentication method, and any identification and authentication method that can perform authentication may be used; consistent with the scheme of the embodiment, the authentication mode corresponding to the access control mode in this embodiment may select one or more authentication modes for authentication according to the user requirement of the user.
Further, in an exemplary embodiment, before the step of determining, based on the current preset access control mode, an authentication manner corresponding to the preset access control mode, the method further includes:
and S110, acquiring the current time, and selecting a preset access control mode corresponding to the current time from a plurality of pre-stored access control modes according to the current time.
Specifically, in this embodiment, time is used as a main reference factor of the door control mode, for example, the user terminal is provided with a working door control mode, a do-not-disturb door control mode and a reception door control mode, and also sets corresponding time, 9-18 points correspond to the working door control mode, 18-21 points correspond to the working door control mode, and 21-9 points correspond to the do-not-disturb door control mode, when the current door control mode is determined, the door control terminal includes a plurality of door control modes, when a visitor arrives, first obtain the current time and determine which door control mode is determined according to the time, and then perform identity verification according to the identity verification mode corresponding to the door control mode; thereby the effect that different time quantums correspond different entrance guard modes has been realized.
Further, in one exemplary embodiment, the identity information includes face information; the step of obtaining the identity information of the current visitor includes:
step S500, obtaining the light brightness of the current outdoor environment, and judging whether the light brightness is lower than a preset brightness threshold value;
and step S600, if the light brightness is lower than a preset brightness threshold, acquiring the face information of the current visitor.
Specifically, the entrance guard terminal in this embodiment includes a brightness sensor, which is installed on the door and used for collecting light brightness data of the doorway; when a visitor arrives outside the door, the visitor can shield the light of the door, so that the brightness acquired by the brightness sensor is reduced, and when the brightness of the light is lower than a preset brightness threshold value, the door control terminal can judge that the current visitor arrives in front of the door, and simultaneously acquires the face information of the current visitor and identifies and judges the information of the current visitor; through the collection that increases light brightness information for entrance guard's terminal can just start face information collection when there is visitor to visit, consequently makes entrance guard's terminal not than the function that starts face information collection constantly, and then realizes resources are saved, reduces access control system's information processing volume's effect.
Further, in an exemplary embodiment, after the step of verifying whether the identity information is legal according to the identity verification method, the method further includes:
step S310, if the identity information is illegal and the face information is inconsistent with the preset face information, continuously collecting the face information;
step S320, when the duration time of the face information acquisition exceeds the preset time, corresponding first reminding information is sent to the user terminal to remind the user that a stranger stays in the current outdoor environment.
Specifically, when identity information of a visitor is verified, if the identity information is illegal and the face information is consistent with the preset face information, the visitor is proved to be a visitor, and at the moment, client visiting information is sent to a user terminal to prompt the user; when the identity information of the visitor is verified, if the identity information is illegal and the face information is inconsistent with the preset face information, the visitor is proved to be a stranger visitor; continuously acquiring face information, if the face information can be continuously acquired, indicating that the stranger visitor stays at the door, and when the stay time exceeds a preset time, sending corresponding first reminding information to the user terminal under the principle of protecting the safety of the access control terminal and preventing accidents, wherein the first reminding information comprises the face information of the visitor, the arrival time and the stay time of the visitor so as to remind the user that the current outdoor environment has the condition that the stranger stays; the user terminal makes a response action according to the current situation, for example, the user terminal is in voice and video communication connection with the entrance guard terminal, so that the communication between the user and the outdoor stay personnel is realized; or the user terminal directly performs processing modes such as alarm processing and the like;
more specifically, if the identity information is illegal and the face information is consistent with the preset face information, corresponding second reminding information is sent to the user terminal to remind the user that the visitor visits the current outdoor environment; the second reminding information comprises visitor identity information, so that when a visitor arrives, the user can directly and clearly know the identity of the visitor through the user terminal, and the user can conveniently make corresponding preparations in advance.
Further, in an exemplary embodiment, the access control method further includes:
step S700, detecting whether the current outdoor environment has a condition that someone knocks the door;
step S710, if the current outdoor environment has a knocking situation, judging whether the entrance guard terminal is in a preset do-not-disturb state;
step S720, if the entrance guard terminal is in a preset do-not-disturb state, acquiring the face information of the current visitor and recording the acquisition time of the face information;
and step S730, sending the face information and the acquisition time to a user terminal for a user to check.
Specifically, the access control terminal comprises a vibration detection device or a doorbell detection device, and is used for detecting the knocking action or the doorbell pressing action of a visitor; the do not disturb mode is not to receive the visitor, therefore when there is the visitor to arrive under this entrance guard's mode, entrance guard terminal only is used for gathering visitor's information and acquisition time to send visitor's information and acquisition time to user terminal, supply the user's leisure time to look over, played the effect that prevents the user and omit visitor's information with this.
Further, in an exemplary embodiment, after the step of determining whether the access control terminal is in the preset do-not-disturb state, the method further includes:
step S711, if the entrance guard terminal is not in a preset do-not-disturb state, judging whether a door opening instruction from the user terminal is received;
step S712, if a door opening instruction from the user terminal is received, unlocking operation is executed according to the door opening instruction, and temporary permission duration information is generated;
and step S713, binding and storing the temporary permission duration information and the identity information.
Specifically, when a visitor visits and the access control terminal is not in a do-not-disturb state, the visitor can open the door by self through identity information verification; if the visitor cannot verify the door opening by itself, the access control terminal sends visitor visiting information to the user terminal, the user terminal can send a door opening instruction to the access control terminal, and the access control terminal executes unlocking operation according to the door opening instruction; and generating temporary permission time length information, binding and storing the temporary permission time length information and the identity information, wherein the temporary permission time length information comprises legal visitor identity information and valid time length information, the legal visitor identity information is the collected current visitor information and endows the collected current visitor information with validity, so that the visitor can complete identity verification through the self identity information, the valid time length information is the legal time length of the visitor identity information of the visitor, the visitor can freely complete identity verification to open a door within the legal time length, when the valid time length information is expired, the temporary permission time length information of the visitor can be removed by an entrance guard terminal to ensure that the identity information of the visitor loses the validity, thereby completing the method of providing temporary access control for strange visitors, and realizing the effect of flexible use.
Further, in an exemplary embodiment, the access terminal is built in the security door, and the security door is provided with a hidden door handle; the step of performing the unlocking operation includes:
and controlling the hidden door handle to pop up from the security door and unlocking the security door.
Specifically, the hidden door handle is telescopically mounted on the antitheft door and normally hidden and retracted in the antitheft door, and when the door control terminal executes unlocking operation, the hidden door handle is controlled to pop out of the antitheft door and unlock the antitheft door; therefore when the normality need not carry out the operation of unblanking, hidden door handle is the state that the shrink is hidden, and the effect that outside personnel are difficult to destroy hidden door handle or rotate hidden door handle by force through violence.
Further, in an exemplary embodiment, the access control method further includes:
acquiring the smoke concentration of the current environment;
judging whether the smoke concentration exceeds a preset concentration threshold value or not;
and if the smoke concentration exceeds a preset concentration threshold value, executing alarm operation.
Specifically, the access control terminal comprises a smoke sensor and an MCU, wherein the smoke sensor is used for detecting the smoke concentration near a door and judging whether the smoke concentration exceeds a preset concentration threshold value, if the smoke concentration exceeds the preset concentration threshold value, the MCU is fed back in time to give an alarm prompt to a user and property management through a service end, and fire and abnormal accidents are prevented; therefore, the effect of preventing fire is achieved, and the safety of the entrance guard terminal is improved.
Correspondingly, an embodiment of the present invention further provides a storage medium, where an access control program is stored on the storage medium, and the access control program, when executed by a processor, implements the steps of the access control method.
In the present embodiment, the storage medium may include, but is not limited to, any type of disk (including floppy disk, hard disk, optical disk, CD-ROM, and magneto-optical disk), ROM (Read-Only Memory), RAM (Random access systems Memory), EPROM (erasable Programmable Read-Only Memory), EEPROM (Electrically erasable Programmable Read-Only Memory), flash Memory, magnetic card, or optical card, and various media capable of storing program codes.
It will be apparent to those skilled in the art that the modules or steps of the invention described above may be implemented in a general purpose computing device, centralized on a single computing device or distributed across a network of computing devices, or alternatively implemented in program code executable by a computing device, such that the steps shown and described may be executed by a computing device stored in a memory device and, in some cases, executed in a sequence other than that shown and described herein, or fabricated separately as individual integrated circuit modules or fabricated as a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It should be noted that other contents of the access control method, the access control terminal and the storage medium disclosed by the present invention may be referred to in the prior art, and are not described herein again.
The above description is only an alternative embodiment of the present invention, and is not intended to limit the present invention in any way, so that any modification, equivalent change and modification made to the above embodiment according to the technical essence of the present invention are within the scope of the technical solution of the present invention, unless departing from the technical solution of the present invention.

Claims (10)

1. An access control method is applied to an access terminal, and is characterized by comprising the following steps:
acquiring identity information of a current visitor;
determining an identity authentication mode corresponding to a preset access control mode based on the current preset access control mode;
verifying whether the identity information is legal or not according to the identity verification mode;
and if the identity information is legal, executing unlocking operation.
2. The access control method according to claim 1, wherein before the step of determining the authentication mode corresponding to the preset access mode based on the current preset access mode, the access control method further comprises:
the method comprises the steps of obtaining current time, and selecting the preset access control mode corresponding to the current time from a plurality of pre-stored access control modes according to the current time.
3. The access control method according to claim 1, wherein the identity information includes face information; the step of obtaining identity information of the current visitor comprises the following steps:
acquiring the light brightness of the current outdoor environment, and judging whether the light brightness is lower than a preset brightness threshold value;
and if the light brightness is lower than a preset brightness threshold value, acquiring the face information of the current visitor.
4. The door access control method according to claim 3, wherein after the step of verifying whether the identity information is legal according to the identity verification manner, the method further comprises:
if the identity information is illegal and the face information is inconsistent with preset face information, continuously collecting the face information;
and when the duration time for acquiring the face information exceeds the preset time, sending corresponding first reminding information to the user terminal so as to remind the user that a stranger stays in the current outdoor environment.
5. The access control method of claim 1, further comprising:
detecting whether a condition that a person knocks a door exists in the current outdoor environment;
if the current outdoor environment has a door knocking situation, judging whether the access control terminal is in a preset do-not-disturb state;
if the access control terminal is in a preset non-interference state, acquiring the face information of the current visitor and recording the acquisition time of the face information;
and sending the face information and the acquisition time to a user terminal for a user to check.
6. The door access control method according to claim 5, wherein after the step of determining whether the door access terminal is in a preset do-not-disturb state, the method further comprises:
if the access control terminal is not in a preset do-not-disturb state, judging whether a door opening instruction from a user terminal is received;
if a door opening instruction from a user terminal is received, executing the unlocking operation according to the door opening instruction, and generating temporary permission duration information;
and binding and storing the temporary permission duration information and the identity information.
7. The access control method according to claim 1, wherein the access terminal is built in a security door provided with a hidden door handle; the step of performing an unlocking operation includes:
and controlling the hidden door handle to pop out of the security door and unlocking the security door.
8. The access control method according to any one of claims 1 to 7, wherein the method further comprises:
acquiring the smoke concentration of the current environment;
judging whether the smoke concentration exceeds a preset concentration threshold value or not;
and if the smoke concentration exceeds a preset concentration threshold value, executing alarm operation.
9. An access terminal comprising a memory, a processor, and an access control program stored on the memory and executable on the processor, the access control program being configured to implement the steps of the access control method of any one of claims 1 to 8.
10. A storage medium having stored thereon an access control program which, when executed by a processor, performs the steps of the access control method according to any one of claims 1 to 8.
CN202110834282.5A 2021-07-22 2021-07-22 Access control method, access terminal and storage medium Pending CN113487779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110834282.5A CN113487779A (en) 2021-07-22 2021-07-22 Access control method, access terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110834282.5A CN113487779A (en) 2021-07-22 2021-07-22 Access control method, access terminal and storage medium

Publications (1)

Publication Number Publication Date
CN113487779A true CN113487779A (en) 2021-10-08

Family

ID=77942146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110834282.5A Pending CN113487779A (en) 2021-07-22 2021-07-22 Access control method, access terminal and storage medium

Country Status (1)

Country Link
CN (1) CN113487779A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114116886A (en) * 2021-10-18 2022-03-01 德明尚品科技集团有限公司 Access control data management method and system based on block chain
CN114445934A (en) * 2021-12-21 2022-05-06 广东欧朗安防科技有限公司 Lock control method, lock, control device, door and storage medium
CN116012979A (en) * 2022-11-30 2023-04-25 广东蓝水花智能电子有限公司 Automatic door control method based on fingerprint identification self-locking and unlocking and automatic door

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568063A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Door opening method for door control system, and door control system
CN103971428A (en) * 2014-04-24 2014-08-06 四川长虹电器股份有限公司 Door control monitoring method and door control monitoring system
CN109147125A (en) * 2018-06-26 2019-01-04 胡渐佳 Intelligent door lock theft preventing method and anti-theft intelligent door lock
CN110853190A (en) * 2019-11-01 2020-02-28 西京学院 Disturbance-free mute access control system based on Internet of things
CN111243143A (en) * 2020-03-25 2020-06-05 广东汇泰龙科技股份有限公司 Method and system for identifying and warning strangers outside door

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568063A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Door opening method for door control system, and door control system
CN103971428A (en) * 2014-04-24 2014-08-06 四川长虹电器股份有限公司 Door control monitoring method and door control monitoring system
CN109147125A (en) * 2018-06-26 2019-01-04 胡渐佳 Intelligent door lock theft preventing method and anti-theft intelligent door lock
CN110853190A (en) * 2019-11-01 2020-02-28 西京学院 Disturbance-free mute access control system based on Internet of things
CN111243143A (en) * 2020-03-25 2020-06-05 广东汇泰龙科技股份有限公司 Method and system for identifying and warning strangers outside door

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114116886A (en) * 2021-10-18 2022-03-01 德明尚品科技集团有限公司 Access control data management method and system based on block chain
CN114116886B (en) * 2021-10-18 2022-12-20 北京中环鑫融科技有限公司 Access control data management method and system based on block chain
CN114445934A (en) * 2021-12-21 2022-05-06 广东欧朗安防科技有限公司 Lock control method, lock, control device, door and storage medium
CN116012979A (en) * 2022-11-30 2023-04-25 广东蓝水花智能电子有限公司 Automatic door control method based on fingerprint identification self-locking and unlocking and automatic door

Similar Documents

Publication Publication Date Title
CN113487779A (en) Access control method, access terminal and storage medium
KR102323171B1 (en) Method and system for managing a door entry using beacon signal
CN106652106A (en) Door lock control method, device and terminal
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US7856558B2 (en) Biometric verification and duress detection system and method
US20060090079A1 (en) Voice authenticated alarm exit and entry interface system
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN105893802A (en) Method for locking/unlocking computer screen based on Bluetooth
CN114360114B (en) User authority management method and system
KR102483794B1 (en) Entrance management system and method thereof
CN105857246A (en) Control method, device and system for automobile starting lock
JP2003056227A (en) Security system and security method
US20030014642A1 (en) Security arrangement
US20060088192A1 (en) Identification system
JP2008057112A (en) System and program for management of entry into/exit from room
CN112669501B (en) Access control method, device and computer readable storage medium
CN210924713U (en) Access control system based on iBeacon technology
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN113163392A (en) Method and device for deleting user identity data file
KR20030034704A (en) System and method for managing going and coming and neglect one's duty using a bluetooth
CN107222465B (en) Network access control system of intelligent gateway
RU2260840C2 (en) Protection means
KR20100012156A (en) An identification of coming and going user, information transfer system based on biometrics
CN116311643B (en) NFC mobile device-based intelligent entrance guard authentication method
CN112907789B (en) Message information pushing method, intelligent door lock and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211008