CN113824716A - Access control method and access control device - Google Patents

Access control method and access control device Download PDF

Info

Publication number
CN113824716A
CN113824716A CN202111098816.9A CN202111098816A CN113824716A CN 113824716 A CN113824716 A CN 113824716A CN 202111098816 A CN202111098816 A CN 202111098816A CN 113824716 A CN113824716 A CN 113824716A
Authority
CN
China
Prior art keywords
access
user
network
physical position
access equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111098816.9A
Other languages
Chinese (zh)
Inventor
董兴水
谢庆锋
肖日永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Everything Safety Technology Co ltd
Original Assignee
Shenzhen Everything Safety Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Everything Safety Technology Co ltd filed Critical Shenzhen Everything Safety Technology Co ltd
Priority to CN202111098816.9A priority Critical patent/CN113824716A/en
Publication of CN113824716A publication Critical patent/CN113824716A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an admission control method and an admission control device, wherein the admission control method comprises the following steps: acquiring the physical position of a user and the physical position of access equipment; acquiring a network access physical position of the access equipment according to the communication access of the access equipment; and judging whether the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are consistent, if so, allowing the access equipment to access the network. The physical position of the user, the physical position of the access equipment and the physical position corresponding to the network position of the access equipment are combined for admission judgment, the access equipment is allowed to access the network only when the physical positions of the user, the access equipment and the access equipment coincide with each other, illegal terminal access is avoided through comprehensive judgment of multiple factors, and the safety of a network environment is improved.

Description

Access control method and access control device
Technical Field
The present invention relates to the field of internet access control technologies, and in particular, to an access control method and apparatus.
Background
In recent years, with the rapid development of internet technology, the legitimacy requirement of various industries on network terminal access is increasing day by day. For example, after a visitor (including an internal visitor and an external visitor) of an enterprise network accesses the network, for security, the visitor usually needs to perform operations such as auditing and authentication on the network access behavior to limit the access right of the visitor.
The existing device admission mode generally adopts 802.1x or other authentication modes (such as artificial authentication) for a non-dumb terminal; for the dumb terminal, a MAC (Media Access Control) authentication or a fingerprint identification authentication is generally adopted. However, these methods have certain defects, and have problems of illegal terminal access caused by counterfeit MAC or leakage of user name and password.
Disclosure of Invention
The present invention aims to provide an admission control method, apparatus, device and storage medium for overcoming the above-mentioned deficiencies in the prior art, and combines the physical location of the user, the physical location of the access device and the physical location corresponding to the network location of the access device to perform admission judgment, and avoids illegal terminal access through comprehensive judgment of multiple factors.
In order to achieve the above purpose, the embodiment of the present invention adopts the following technical solutions:
in a first aspect of embodiments of the present invention, a method for admission control is provided, including:
acquiring the physical position of a user and the physical position of access equipment;
acquiring a network access physical position of the access equipment according to the communication access of the access equipment;
and judging whether the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are consistent, if so, allowing the access equipment to access the network.
Preferably, the method further comprises:
and if the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are inconsistent, triggering an abnormal access alarm.
Preferably, the acquiring the physical location of the user and the physical location of the access device includes:
configuring positioning modules for the user and the access equipment in advance respectively;
acquiring the physical position of the user and the physical position of the access equipment according to the positioning module of the user and the positioning module of the access equipment;
the positioning module adopts one of a UWB positioning base station and a micro-tag, an RFID micro-tag or positioning software.
Preferably, the acquiring a network access physical location of the access device according to the communication access of the access device includes:
obtaining data of the access device through an access network of the access device;
acquiring the network position of the access equipment according to the acquired data of the access equipment;
and acquiring the network access physical position of the access equipment according to the admitted network position.
Preferably, before allowing the access device to access the network, the method further comprises:
acquiring the biological characteristics of a user;
and judging whether the user is a white list user or not according to the pre-stored biological characteristic information of the user, and if so, allowing the access equipment to access the network.
In a second aspect of the embodiments of the present invention, an admission control apparatus is provided, including:
the first acquisition module is used for acquiring the physical position of a user and the physical position of the access equipment;
the second acquisition module is used for acquiring the network access physical position of the access equipment according to the communication access of the access equipment;
and the first processing module is used for judging whether the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are consistent, and if so, allowing the access equipment to access the network.
Preferably, the apparatus further comprises:
and the second processing module is used for triggering an abnormal access alarm if the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are inconsistent.
Preferably, the first obtaining module includes:
the configuration module is used for respectively configuring a positioning module for the user and the access equipment in advance;
the acquisition submodule is used for acquiring the physical position of the user and the physical position of the access equipment according to the positioning module of the user and the positioning module of the access equipment;
the positioning module adopts one of a UWB positioning base station and a micro-tag, an RFID micro-tag or positioning software.
Preferably, the second obtaining module includes:
an obtaining module, configured to obtain data of the access device through an access network of the access device;
the third processing module is used for acquiring the network position of the access equipment according to the acquired data of the access equipment;
and the fourth processing module is used for acquiring the network access physical position of the access equipment according to the admitted network position.
Preferably, the apparatus further comprises:
the third acquisition module is used for acquiring the biological characteristics of the user;
and the fifth processing module is used for judging whether the user is a white list user or not according to the pre-stored biological characteristic information of the user, and if so, allowing the access equipment to access the network.
In a third aspect of the embodiments of the present invention, an admission control apparatus is provided, including: at least one processor and memory; the memory stores a computer program; the at least one processor executes the computer program stored by the memory to implement the admission control method described above.
In a fourth aspect of the embodiments of the present invention, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program, when executed, implements the above-mentioned admission control method.
The admission control method in the technical scheme provided by the embodiment of the invention judges the admission by combining the physical position of the user, the physical position of the access equipment and the physical position corresponding to the network position of the access equipment, allows the access equipment to access the network only if the physical positions of the user, the access equipment and the access equipment coincide with each other, avoids illegal terminal access through comprehensive judgment of multiple factors and improves the safety of the network environment.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of an admission control method according to an embodiment of the present invention;
fig. 2 is a topology diagram of an admission control network according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an admission control apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an admission control device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. It should be noted that, in the case of no conflict, various features in the embodiments of the present invention may be combined with each other, and the combined embodiments are still within the scope of the present invention.
The admission control method is applied to a central controller, and the central controller is used for managing and controlling all access devices in a regional network (such as a local area network of a company) and verifying the devices to be accessed. The admission control method of the invention judges from the position information obtained by the network and the position information obtained by the positioning equipment, and controls the admission of the suspicious user, the position of the access equipment and the situation that the physical position is not coincident. Referring to fig. 1 and 2, the admission control method of the present invention includes the following steps:
s101, acquiring the physical position of a user and the physical position of access equipment.
In this embodiment, the physical locations of the user and the access device are obtained through the positioning module, the positioning module is in communication connection with the central controller, and the central controller can obtain the physical location of the user and the physical location of the access device through the positioning information obtained by the positioning module.
Specifically, positioning modules are respectively configured for a user and an access device in advance, and the physical position of the user and the physical position of the access device are obtained according to the positioning module of the user and the positioning module of the access device. The positioning module may adopt one of a positioning base station and a micro tag of UWB (Ultra Wide Band), a micro tag of RFID (Radio Frequency Identification), or positioning software.
In one embodiment, the physical positions of the user and the access device are obtained by a UWB positioning base station and a micro tag, that is, the micro tag is configured on the user and the access device respectively, the micro tag obtains the physical positions of the user and the access device by communicating with the UWB positioning base station, and the UWB positioning base station is in communication connection with the central controller, so that the physical position information of the user and the access device is sent to the central controller.
In another embodiment, the physical locations of the user and the access device are obtained by RFID micro tags, that is, RFID micro tags are respectively configured on the user and the access device, an RFID identification device is configured at a preset physical location, the physical locations of the user and the access device are obtained by radio frequency identification of the RFID micro tag and the RFID identification device, and the RFID identification device is in communication connection with the central controller, so as to send the physical location information of the user and the access device to the central controller.
In another embodiment, the user can also perform physical location positioning through positioning software installed in the portable electronic device, the access device can perform physical location positioning through the positioning software installed in the access device, and the electronic device and the access device carried by the user can be in communication connection with the central controller, so that the physical location information of the user and the access device is sent to the central controller.
Of course, in other embodiments, the user may perform physical location verification by means of card punching, fingerprint verification, face recognition verification, or the like.
S102, according to the communication access of the access equipment, the network access physical position of the access equipment is obtained.
In this embodiment, the access device performs communication access with the network in the control area, and the network access position may be acquired according to the network access point. Specifically, data of the access device is obtained through an access network of the access device; acquiring the network position of the access equipment according to the acquired data of the access equipment; and acquiring the network access physical position of the access equipment according to the admitted network position.
The access device may access the network by a physical connection (i.e., a connection with a communication interface) or a communication connection (e.g., a wireless network). The obtained data may be used to obtain the network location to which the access device is attached by obtaining the data from a network device (e.g., an AC/AP or switch, router, or base station location, etc.). The network physical position corresponding to the network position is obtained and stored in advance, and the central controller can obtain the network access physical position through inquiry according to the network position accessed by the access equipment.
S103, judging whether the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are consistent, and if so, allowing the access equipment to access the network.
In this embodiment, the access device or the access behavior of the user is considered to be a normal access behavior only if the physical location of the user, the physical location of the access device, and the network access physical location of the access device coincide.
In addition, before the access device is allowed to access the network, the admission control method of the present invention further includes: acquiring the biological characteristics of a user; and judging whether the user is a white list user or not according to the pre-stored biological characteristic information of the user, and if so, allowing the access equipment to access the network.
In this embodiment, the acquired biometric features of the user include fingerprints, faces, irises, and other biometric features. Specifically, a camera, a recognition device, or the like may be added to the physical location to capture the characteristics of the person to determine whether the correspondence between the person and the tag is correct.
Further, the method further comprises: if the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are inconsistent, an abnormal access alarm is triggered, and managers can be timely reminded of processing abnormal access through the abnormal alarm so as to ensure the safety of the network environment.
The admission control method in the technical scheme provided by the embodiment of the invention judges the admission by combining the physical position of the user, the physical position of the access equipment and the physical position corresponding to the network position of the access equipment, allows the access equipment to access the network only if the physical positions of the user, the access equipment and the access equipment coincide with each other, avoids illegal terminal access through comprehensive judgment of multiple factors and improves the safety of the network environment.
Based on the above admission control method, the present invention further provides an admission control apparatus, referring to fig. 3 in combination with fig. 2, the admission control apparatus includes:
a first obtaining module 301, configured to obtain a physical location of a user and a physical location of an access device;
a second obtaining module 302, configured to obtain a network access physical location of the access device according to the communication access of the access device;
a first processing module 303, configured to determine whether the physical location of the user, the physical location of the access device, and the network access physical location of the access device are consistent, and if so, allow the access device to access the network.
In some embodiments, the apparatus further comprises:
and the second processing module is used for triggering an abnormal access alarm if the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are inconsistent.
In some embodiments, the first obtaining module 301 comprises:
the configuration module is used for respectively configuring a positioning module for the user and the access equipment in advance;
the acquisition submodule is used for acquiring the physical position of the user and the physical position of the access equipment according to the positioning module of the user and the positioning module of the access equipment;
the positioning module adopts one of a UWB positioning base station and a micro-tag, an RFID micro-tag or positioning software.
In some embodiments, the second obtaining module 302 comprises:
an obtaining module, configured to obtain data of the access device through an access network of the access device;
the third processing module is used for acquiring the network position of the access equipment according to the acquired data of the access equipment;
and the fourth processing module is used for acquiring the network access physical position of the access equipment according to the admitted network position.
In some embodiments, the apparatus further comprises:
the third acquisition module is used for acquiring the biological characteristics of the user;
and the fifth processing module is used for judging whether the user is a white list user or not according to the pre-stored biological characteristic information of the user, and if so, allowing the access equipment to access the network.
Fig. 4 is a schematic structural diagram of an admission control apparatus according to the present invention, and as shown in fig. 4, the admission control apparatus includes: at least one processor and memory; the memory stores a computer program; the at least one processor executes the computer program stored by the memory to implement the admission control method provided by the above-described embodiments.
Still another embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed, implements the admission control method described above.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, electronic devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing electronic device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing electronic device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing electronic devices to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing electronic device to cause a series of operational steps to be performed on the computer or other programmable electronic device to produce a computer implemented process such that the instructions which execute on the computer or other programmable electronic device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or electronic device that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or electronic device. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or electronic device that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. An admission control method, comprising:
acquiring the physical position of a user and the physical position of access equipment;
acquiring a network access physical position of the access equipment according to the communication access of the access equipment;
and judging whether the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are consistent, if so, allowing the access equipment to access the network.
2. The method of claim 1, further comprising:
and if the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are inconsistent, triggering an abnormal access alarm.
3. The method of claim 1, wherein obtaining the physical location of the user and the physical location of the access device comprises:
configuring positioning modules for the user and the access equipment in advance respectively;
acquiring the physical position of the user and the physical position of the access equipment according to the positioning module of the user and the positioning module of the access equipment;
the positioning module adopts one of a UWB positioning base station and a micro-tag, an RFID micro-tag or positioning software.
4. The method of claim 1, wherein the obtaining the network access physical location of the access device according to the communication access of the access device comprises:
obtaining data of the access device through an access network of the access device;
acquiring the network position of the access equipment according to the acquired data of the access equipment;
and acquiring the network access physical position of the access equipment according to the admitted network position.
5. The method of claim 1, wherein prior to allowing the access device to access a network, the method further comprises:
acquiring the biological characteristics of a user;
and judging whether the user is a white list user or not according to the pre-stored biological characteristic information of the user, and if so, allowing the access equipment to access the network.
6. An admission control apparatus, comprising:
the first acquisition module is used for acquiring the physical position of a user and the physical position of the access equipment;
the second acquisition module is used for acquiring the network access physical position of the access equipment according to the communication access of the access equipment;
and the first processing module is used for judging whether the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are consistent, and if so, allowing the access equipment to access the network.
7. The apparatus of claim 6, further comprising:
and the second processing module is used for triggering an abnormal access alarm if the physical position of the user, the physical position of the access equipment and the network access physical position of the access equipment are inconsistent.
8. The apparatus of claim 6, wherein the first obtaining module comprises:
the configuration module is used for respectively configuring a positioning module for the user and the access equipment in advance;
the acquisition submodule is used for acquiring the physical position of the user and the physical position of the access equipment according to the positioning module of the user and the positioning module of the access equipment;
the positioning module adopts one of a UWB positioning base station and a micro-tag, an RFID micro-tag or positioning software.
9. The apparatus of claim 6, wherein the second obtaining module comprises:
an obtaining module, configured to obtain data of the access device through an access network of the access device;
the third processing module is used for acquiring the network position of the access equipment according to the acquired data of the access equipment;
and the fourth processing module is used for acquiring the network access physical position of the access equipment according to the admitted network position.
10. The apparatus of claim 6, further comprising:
the third acquisition module is used for acquiring the biological characteristics of the user;
and the fifth processing module is used for judging whether the user is a white list user or not according to the pre-stored biological characteristic information of the user, and if so, allowing the access equipment to access the network.
CN202111098816.9A 2021-09-18 2021-09-18 Access control method and access control device Pending CN113824716A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111098816.9A CN113824716A (en) 2021-09-18 2021-09-18 Access control method and access control device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111098816.9A CN113824716A (en) 2021-09-18 2021-09-18 Access control method and access control device

Publications (1)

Publication Number Publication Date
CN113824716A true CN113824716A (en) 2021-12-21

Family

ID=78914900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111098816.9A Pending CN113824716A (en) 2021-09-18 2021-09-18 Access control method and access control device

Country Status (1)

Country Link
CN (1) CN113824716A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859357A (en) * 2006-03-16 2006-11-08 华为技术有限公司 Communication method, system and device
CN102930470A (en) * 2012-09-18 2013-02-13 深圳一卡通新技术有限公司 Mobile phone position based bank card transaction safety pre-warning method
US20160057626A1 (en) * 2014-08-22 2016-02-25 Ebay Inc. Using a wireless beacon to provide access credentials to a secure network
CN106302597A (en) * 2015-06-02 2017-01-04 中国移动通信集团江苏有限公司 A kind of method of data synchronization, terminal and system
AU2018101720A4 (en) * 2018-11-16 2018-12-20 Mehrzaad MOGRELIA A computer implemented method for preventing unauthorized access to a secured network
CN109660949A (en) * 2019-02-01 2019-04-19 Oppo广东移动通信有限公司 Radio scan control method, device, mobile terminal and storage medium
CN112601176A (en) * 2020-12-07 2021-04-02 四川迅游网络科技股份有限公司 Acceleration method and system based on user terminal positioning information

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859357A (en) * 2006-03-16 2006-11-08 华为技术有限公司 Communication method, system and device
CN102930470A (en) * 2012-09-18 2013-02-13 深圳一卡通新技术有限公司 Mobile phone position based bank card transaction safety pre-warning method
US20160057626A1 (en) * 2014-08-22 2016-02-25 Ebay Inc. Using a wireless beacon to provide access credentials to a secure network
CN106302597A (en) * 2015-06-02 2017-01-04 中国移动通信集团江苏有限公司 A kind of method of data synchronization, terminal and system
AU2018101720A4 (en) * 2018-11-16 2018-12-20 Mehrzaad MOGRELIA A computer implemented method for preventing unauthorized access to a secured network
CN109660949A (en) * 2019-02-01 2019-04-19 Oppo广东移动通信有限公司 Radio scan control method, device, mobile terminal and storage medium
CN112601176A (en) * 2020-12-07 2021-04-02 四川迅游网络科技股份有限公司 Acceleration method and system based on user terminal positioning information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吕锦扬;: "融合环境下IMS紧急呼叫业务技术及应用研究", 电信网技术, no. 09, 15 September 2013 (2013-09-15) *

Similar Documents

Publication Publication Date Title
EP3208778B1 (en) Systems and methods of preventing access to users of an access control system
US11295567B1 (en) Information-based, biometric, asynchronous access control system
JP4461119B2 (en) Authenticating maintenance access to electronic units via wireless communication
CN104641669B (en) The device and method of control switching for the electronic access client in the case where not requiring network to access
US7559468B2 (en) Reader/writer secure module access control method
KR100721520B1 (en) Apparatus and Method for Information Protection of RFID System
CN102037706B (en) Method for the temporary personalization of a communication device
US20140067682A1 (en) Nfc-based information exchange method and device
CN104809773A (en) Entrance guard control method, entrance guard control apparatus, and entrance guard system
KR101937136B1 (en) System and method for authenticating identity using multi-biometrics
AU2015356909B2 (en) Method implemented in an identity document and associated identity document
CN109255863A (en) The intelligent door lock and its operation method verified based on user's face and two dimensional code
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
CN103297236B (en) Subscriber authentication authoring system
CN109478352A (en) Method and apparatus for configuring multiple access control apparatus in installation site
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
CN109993250A (en) Elevator maintenance management system
CN110379030A (en) The method, apparatus that is authenticated using positioning cards, medium
CN107294981B (en) Authentication method and equipment
US20070006298A1 (en) Controlling access to a workstation system via wireless communication
CN113824716A (en) Access control method and access control device
CN107197075B (en) Clean boot means of defence, device and computer readable storage medium
CN104641379A (en) Read/write device and transponder for exchanging data via an electromagnetic field
CN112669501B (en) Access control method, device and computer readable storage medium
EP1675418B1 (en) Method and apparatus for control of data synchronization between a user equipment and a user authentication card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination