CN105741387A - Access control recognition method, access control card, server and access control recognition system - Google Patents

Access control recognition method, access control card, server and access control recognition system Download PDF

Info

Publication number
CN105741387A
CN105741387A CN201610044098.XA CN201610044098A CN105741387A CN 105741387 A CN105741387 A CN 105741387A CN 201610044098 A CN201610044098 A CN 201610044098A CN 105741387 A CN105741387 A CN 105741387A
Authority
CN
China
Prior art keywords
base station
time
wireless signal
identity information
access card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610044098.XA
Other languages
Chinese (zh)
Inventor
刘思超
颜世睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610044098.XA priority Critical patent/CN105741387A/en
Publication of CN105741387A publication Critical patent/CN105741387A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to an access control recognition method, an access control card, a server and an access control recognition system. The access control recognition method comprises the following steps: acquiring pre-stored identity information by the access control card; confirming transmission time of a wireless signal of each base station; calculating the product of transmission speed of the wireless signal multiplying by transmission time, thereby acquiring a distance from each base station; sending the identity information and the distance from each base station to the server, wherein the server is used for receiving the identity information and the distance from each base station sent by the access control card, acquiring the position information of each base station, calculating the position information of the access control card according to the position information of each base station and the distance from each base station and sending an instruction for allowing entry to the access control equipment when the position information is located in the preset recognition area and the identity information is correct. According to the scheme provided by the invention, the access control card can be quickly verified and the time for verifying the access control card can be saved, so that the efficiency of verifying the access control card can be increased.

Description

A kind of gate inhibition's recognition methods, access card, server and gate identification system
Technical field
The present invention relates to communication technical field, in particular, relate to gate inhibition's recognition methods, access card, server and gate identification system.
Background technology
At present, gate control system mainly include access card, for scan access card barcode scanning machine and for stop unauthorized person enter access control equipment.
User is when by gate control system, it is necessary to utilizing the alignment barcode scanning machine of the bar code on access card to be scanned, barcode scanning chance judges that whether the data in this bar code are correct, if correctly, illustrates that this user is competent person, and access control equipment will allow this user to pass through;If incorrect, illustrating that this user is for unauthorized person, access control equipment just will not allow this user to pass through.
In the process that the bar code on access card is scanned by barcode scanning machine, barcode scanning machine needs the bar code on alignment access card can complete scanning, if barcode scanning machine does not have the bar code on fully aligned access card, then it is possible that situation about cannot verify, in addition it is also necessary to rescan.
Therefore, may there is the possibility that cannot verify in the mode of above-mentioned checking user identity, so scanning process may waste the regular hour, when crowded, it is easy to cause obstruction.
Summary of the invention
The present invention provides a kind of gate inhibition's recognition methods, access card, server and gate identification system, quickly gate inhibition's card to be verified, thus improving the efficiency to access card checking.
First aspect according to embodiments of the present invention, it is provided that a kind of gate inhibition's recognition methods, including:
Obtain the identity information prestored;
Determine the transmission duration sending wireless signal to each base station;
Calculate transmission speed and the long-pending distance obtaining between described each base station of described transmission duration of described wireless signal;
By described identity information and and described each base station between distance be sent to server.
Optionally, after the transmission speed and the long-pending distance obtained between described each base station of described transmission duration of the described wireless signal of described calculating, described method also includes:
Judge whether that storage has predetermined encryption algorithm;
When storage has described predetermined encryption algorithm, utilize described predetermined encryption algorithm that described identity information is encrypted and add confidential information to generate, and by described add confidential information and and described each base station between distance be sent to server;
When not stored described predetermined encryption algorithm, trigger described by described identity information and and described each base station between distance be sent to the step of server.
Optionally, the described step determining the transmission duration sending wireless signal to each base station includes:
When sending wireless signal to each base station, the time sending wireless signal to described each base station is defined as the very first time;
When receiving the wireless signal that described each base station sends, obtaining the second time existed in the wireless signal that described each base station sends, described second time is the time that described each base station receives wireless signal;
The difference calculating described second time and the described very first time obtains transmission duration.
Optionally, the described step determining the transmission duration sending wireless signal to each base station includes:
When sending wireless signal to each base station, the time sending wireless signal to described each base station was defined as the 3rd time;
When receiving the wireless signal that described each base station sends, the time receiving the wireless signal that described each base station sends was defined as the 4th time;
Obtaining the 5th time and the 6th time that exist in the wireless signal that described each base station sends, described 5th time is the time that described each base station receives wireless signal, and described 6th time is the time that described each base station sends wireless signal;
According to described 3rd time, described 4th time, described 5th time and described 6th time, calculate the transmission duration sending wireless signal to each base station.
Second aspect according to embodiments of the present invention, it is provided that a kind of gate inhibition's recognition methods, including:
Receive access card send identity information and and each base station between distance;
Obtain the positional information of described each base station;
Positional information according to described each base station and and described each base station between distance, calculate the positional information of described access card;
When described positional information is in default identification region and described identity information is correct, send the instruction allowed access into access control equipment.
Optionally, described reception access card send identity information and and each base station between distance after, described method also includes:
Judge that whether described identity information is for adding confidential information;
When described identity information is not for adding confidential information, trigger the step of the positional information of the described each base station of described acquisition;
When described identity information is for adding confidential information, utilizes predetermined encryption algorithm to be decrypted described identity information to generate the identity information after deciphering, and trigger the step of the positional information of the described each base station of described acquisition.
Optionally, after the described positional information calculating described access card, described method also includes:
It is in preset at described positional information and identifies in region and during described identity information mistake, send off-limits instruction to access control equipment.
The third aspect according to embodiments of the present invention, it is provided that a kind of access card, including:
Acquisition module, for obtaining the identity information prestored;
Determine module, for determining the transmission duration sending wireless signal to each base station;
Computing module, the long-pending distance obtaining between described each base station of transmission speed and described transmission duration for calculating described wireless signal;
Sending module, for by described identity information and and described each base station between distance be sent to server.
Optionally, described device also includes:
Judge module, is used for judging whether that storage has predetermined encryption algorithm;
First performs module, for when storage has described predetermined encryption algorithm, utilizes described predetermined encryption algorithm that described identity information is encrypted and adds confidential information to generate, and by described add confidential information and and described each base station between distance be sent to server;
Second performs module, for when not stored described predetermined encryption algorithm, triggering described sending module.
Optionally, described determine that module includes:
First determines submodule, for when sending wireless signal to each base station, being defined as the very first time time sending wireless signal to described each base station;
First obtains submodule, and for when receiving the wireless signal that described each base station sends, obtaining the second time existed in the wireless signal that described each base station sends, described second time is the time that described each base station receives wireless signal;
First calculating sub module, the difference being used for calculating described second time and the described very first time obtains transmission duration.
Optionally, described determine that module includes:
Second determines submodule, for when sending wireless signal to each base station, being defined as the 3rd time the time sending wireless signal to described each base station;
3rd determines submodule, for when receiving the wireless signal that described each base station sends, being defined as the 4th time the time receiving the wireless signal that described each base station sends;
Second obtains submodule, for obtaining the 5th time and the 6th time existed in the wireless signal that described each base station sends, described 5th time is the time that described each base station receives wireless signal, and described 6th time is the time that described each base station sends wireless signal;
Second calculating sub module, for according to described 3rd time, described 4th time, described 5th time and described 6th time, calculating the transmission duration sending wireless signal to each base station.
Fourth aspect according to embodiments of the present invention, it is provided that a kind of server, including:
Receiver module, for receive access card send identity information and and each base station between distance;
Acquisition module, for obtaining the positional information of described each base station;
Computing module, for according to the positional information of described each base station and and described each base station between distance, calculate the positional information of described access card;
First sending module, for when described positional information is in default identification region and described identity information is correct, sending the instruction allowed access into access control equipment.
Optionally, described device also includes:
Judge module, is used for judging that whether described identity information is for adding confidential information;
First performs module, for when described identity information is not for adding confidential information, triggering described acquisition module;
Second performs module, for when described identity information is for adding confidential information, utilizing predetermined encryption algorithm to be decrypted described identity information to generate the identity information after deciphering, and trigger described acquisition module.
Optionally, described device also includes:
Second sending module, identifies in region and during described identity information mistake for being in preset at described positional information, sends off-limits instruction to access control equipment.
The 5th aspect according to embodiments of the present invention, it is provided that a kind of gate identification system, including access card, server, access control equipment and base station;
Described access card, for obtaining the identity information prestored, determine the transmission duration sending wireless signal to each base station, calculate the transmission speed of described wireless signal and the long-pending distance obtaining between described each base station of described transmission duration, by described identity information and and described each base station between distance be sent to server;
Described server, for receive access card send identity information and and each base station between distance, obtain the positional information of described each base station, positional information according to described each base station and and described each base station between distance, calculate the positional information of described access card, when described positional information is in default identification region and described identity information is correct, send the instruction allowed access into described access control equipment.
Compared with prior art, the technical scheme that the present embodiment provides has the following advantages and feature:
In scheme provided by the invention, access card needs first to get identity information, then determines that the transmission duration sending wireless signal to each base station, and the transmission speed and transmission duration calculation according to wireless signal goes out the distance between each base station.Server receive access card send identity information and and each base station between distance after, just can according to the positional information of each base station and and each base station between distance, calculate the positional information of access card, when server determines that this positional information is in default identification region and identity information is correct, server just sends the instruction allowed access into access control equipment, so that access control equipment allows the user having this access card to pass through.Therefore, gate inhibition's card can quickly be verified by scheme provided by the invention, saves the time to access card checking, thus improving the efficiency to access card checking.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The flow chart of a kind of gate inhibition's recognition methods that Fig. 1 provides for the embodiment of the present invention.
The flow chart of another kind of gate inhibition's recognition methods that Fig. 2 provides for the embodiment of the present invention.
The module diagram of a kind of access card that Fig. 3 provides for the embodiment of the present invention.
The module diagram of a kind of server that Fig. 4 provides for the embodiment of the present invention.
The module diagram of a kind of gate identification system that Fig. 5 provides for the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete description, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
The flow chart of a kind of gate inhibition's recognition methods that Fig. 1 provides for the embodiment of the present invention.Gate inhibition's recognition methods shown in Fig. 1, it is possible to in the equipment such as access card.Gate inhibition's card can quickly be verified by gate inhibition's recognition methods provided by the invention, saves the time to access card checking, thus improving the efficiency to access card checking.The method comprises the following steps.
The identity information that step S11, acquisition prestore.
Wherein, method provided by the invention can apply to access card, and access card provided by the invention can include the parts such as wireless module, controller and battery.Server provided by the invention can be the equipment such as desktop computer or notebook computer.Base station provided by the invention can also include the parts such as wireless module, controller and battery, and in the present invention, the quantity of base station is at least three.
The identity information of user can be pre-deposited in access card.Identity information can change according to the difference of application scenarios, for instance, when application scenarios is meeting-place, then identity information can be the seat number in the name of user and meeting-place;And for example, when application scenarios is exhibition, then identity information can be name and the numbering of user.User profile can be drafted voluntarily according to actual application scenarios.
Step S12, determine to each base station send wireless signal transmission duration.
Wherein, what access card can be real-time sends wireless signal to each base station, and determines the transmission duration sending wireless signal to each base station.Access card determines that the mode of the transmission duration sending wireless signal to each base station has multiple, and two ways is briefly described below.
First kind of way is applied under the clock of access card and the identical scene of clock of each base station, determine that the step of the transmission duration sending wireless signal to each base station can include following sub-step: when sending wireless signal to each base station, the time sending wireless signal to each base station is defined as the very first time;When receiving the wireless signal that each base station sends, obtaining the second time existed in the wireless signal that each base station sends, the second time was the time that each base station receives wireless signal;The difference calculating the second time and the very first time obtains transmission duration.
In first kind of way, access card needs to send wireless signal to base station, and the time sending wireless signal to base station is defined as the very first time.After base station receives the wireless signal that access card sends, base station is required for recording the time receiving the wireless signal that access card sends, and this time was defined as the second time, and the second time can be sent to access card by wireless signal by base station.When access card receives the wireless signal that base station sends, access card can obtain the second time existed in the wireless signal that base station sends, and calculates the difference of the second time and the very first time, thus obtaining the access card transmission wireless signal transmission duration to base station.
Under the scene that the clock of clock and each base station that the second way is applied to access card differs, determine that the step of the transmission duration sending wireless signal to each base station can include following sub-step: when sending wireless signal to each base station, the time sending wireless signal to each base station was defined as the 3rd time;When receiving the wireless signal that each base station sends, the time receiving the wireless signal that each base station sends was defined as the 4th time;Obtaining the 5th time and the 6th time that exist in the wireless signal that each base station sends, the 5th time was the time that each base station receives wireless signal, and the 6th time was the time that each base station sends wireless signal;According to the 3rd time, the 4th time, the 5th time and the 6th time, calculate the transmission duration sending wireless signal to each base station.
In the second way, access card needs to send wireless signal to base station, and the time sending wireless signal to base station was defined as the 3rd time.After base station receives the wireless signal that access card sends, base station is required for recording the time receiving the wireless signal that access card sends, and this time was defined as the 5th time;The time sending wireless signal to access card was defined as the 6th time by base station, and sent the wireless signal with the 5th time and the 6th time to access card.When access card receives the wireless signal that base station sends, base station can be sent time of wireless signal and be defined as the 4th time by access card, and obtains the 5th time and the 6th time that exist in the wireless signal that base station sends.Finally, access card according to the 3rd time, the 4th time, the 5th time and the 6th time, can calculate the transmission duration sending wireless signal to each base station.
For example, it is assumed that the clock of access card is different from the clock of base station.First, access card needs to send wireless signal to base station, and the time sending wireless signal to base station is defined as t1.After base station receives the wireless signal that access card sends, base station is required for recording the time receiving the wireless signal that access card sends, and this time is defined as t2;The time sending wireless signal to access card is defined as t3 by base station, and sends the wireless signal with t2 and t3 to access card.When access card receives the wireless signal that base station sends, base station can be sent time of wireless signal and be defined as t4 by access card, and obtains t2 and the t3 existed in the wireless signal that base station sends.Finally, access card has got t1, t2, t3 and t4, owing to the clock of access card and the clock of base station are different, and the time difference of access card and base station is unknown, it is also unknown that access card sends the transmission duration of wireless signal to base station, so needing the time difference assuming access card and base station is td, it is tt that access card sends the transmission duration of wireless signal to base station, then, following linear equation in two unknowns group is listed: (t2-td)-t1=tt, t4-(t3-td)=tt.Owing to t1, t2, t3 and t4 are known, tt and td is unknown, it is possible to solve tt and td, thus the transmission duration that access card can obtain sending wireless signal to base station is tt.
The long-pending distance obtaining between each base station of step S13, the transmission speed calculating wireless signal and transmission duration.
Wherein, determine at access card after the transmission duration sending wireless signal to each base station, owing to the transmission speed of wireless signal is known, so the transmission speed that access card can calculate wireless signal is with transmission duration long-pending, thus the distance obtained between access card and each base station.
Such as, assume there are 3 base stations, respectively base station A, base station B and base station C, access card is it was confirmed that be t1 to the transmission duration of base station A transmission wireless signal, the transmission duration sending wireless signal to base station B is t2, the transmission duration sending wireless signal to base station C is t3, owing to the transmission speed of wireless signal is known v, so access card can calculate the long-pending distance d1 obtaining between the A of base station of transmission speed v and transmission duration t1 of wireless signal, and the long-pending distance d2 obtaining between the B of base station of transmission speed v and transmission duration t2 calculating wireless signal, and the long-pending distance d3 obtaining between the C of base station of transmission speed v and transmission duration t3 calculating wireless signal.
Step S14, by identity information and and each base station between distance be sent to server.
Wherein, owing to being previously stored with the positional information of each base station in server, so access card needs the distance between each base station is sent to server, in order to server goes out the positional information of access card according to the positional information calculation of the distance between each base station and each base station.Simultaneously, access card also needs to identity information is sent to server, so that server is when determining that positional information is in default identification region and identity information is correct, send the instruction allowed access into access control equipment, so that access control equipment allows the user carrying this access card to pass through.
Optionally, in order to ensure that the identity information in access card will not be stolen by hacker, it is possible to increase following steps between step S13 and step S14: access card judges whether that storage has predetermined encryption algorithm;When access card storage has predetermined encryption algorithm, access card can utilize predetermined encryption algorithm that identity information is encrypted to add confidential information to generate, and by add confidential information and and each base station between distance be sent to server;When access card has not stored predetermined encryption algorithm, will triggered step S14 so that access card directly by identity information and and each base station between distance be sent to server.
The purpose of do so is, when access card internal memory contains predetermined encryption algorithm, illustrate that the identity information in access card is extremely important, need for confidentiality, so access card will utilize predetermined encryption algorithm that identity information is encrypted adds confidential information to generate, again by add confidential information and and each base station between distance be sent to server, server receive add confidential information and and each base station between distance after, server needs to utilize predetermined encryption algorithm to be decrypted and just can obtain identity information adding confidential information.When not stored predetermined encryption algorithm in access card, the identity information in access card is described and is not afraid of and is hacked visitor and steals, it is not necessary to secrecy, thus access card will directly by identity information and and each base station between distance be sent to server.
Predetermined encryption algorithm can be a lot of kind, for instance, predetermined encryption algorithm can be AES (AdvancedEncryptionStandard, Advanced Encryption Standard) AES.It is of course also possible to be other kinds of AES, the present invention is not limiting as the kind of AES.
In the embodiment shown in fig. 1, access card needs first to get identity information, then determines that the transmission duration sending wireless signal to each base station, and the transmission speed and transmission duration calculation according to wireless signal goes out the distance between each base station.Server receive access card send identity information and and each base station between distance after, just can according to the positional information of each base station and and each base station between distance, calculate the positional information of access card, when server determines that this positional information is in default identification region and identity information is correct, server just sends the instruction allowed access into access control equipment, so that access control equipment allows the user having this access card to pass through.Therefore, gate inhibition's card can quickly be verified by scheme provided by the invention, saves the time to access card checking, thus improving the efficiency to access card checking.
The flow chart of another kind of gate inhibition's recognition methods that Fig. 2 provides for the embodiment of the present invention, as in figure 2 it is shown, the gate inhibition's recognition methods shown in Fig. 2, it is possible to in server.Fig. 2 is the embodiment cooperated with Fig. 1, and in the embodiment shown in Figure 2, the part identical with the embodiment shown in Fig. 1 may refer to introduce in the embodiment shown in Fig. 1 and explain.Method shown in Fig. 2 comprises the following steps.
In the step s 21, receive access card send identity information and and each base station between distance.
Wherein, after the distance that access card calculates between access card and each base station, distance between each base station and identity information will be sent to server by access card, and server will receive the distance between that access card sends and each base station and identity information.
Such as, assume in access card, to be previously stored with identity information XYZ, and there are 3 base stations, respectively base station A, base station B and base station C, it is d1 that access card has calculated the distance between access card and base station A, distance between access card and base station B is d2, and the distance between access card and base station C is d3, and distance d1, d2 and the d3 between each base station and identity information XYZ will be sent to server by access card.Server will receive distance d1, d2 and d3 between that access card sends and each base station and identity information XYZ.
In step S22, obtain the positional information of each base station.
Wherein, the positional information of base station can be coordinate information.Coordinate information can be represented by the coordinate axes with X-axis, Y-axis and Z axis, and coordinate information can utilize that (x, y z) represent.
Such as, 3 base stations, respectively base station A, base station B and base station C are installed in the meeting-place of exhibition, then can in advance base station A be placed on (the 0 of coordinate axes, 0,0), on point, base station B is placed on (the 100,0 of coordinate axes, 0) on point, base station C is placed on (50,50,50) point of coordinate axes.So server just can get the coordinate information respectively (0,0,0) of these three base station, (100,0,0) and (50,50,50).
In step S23, according to the positional information of each base station and and each base station between distance, calculate the positional information of access card.
Wherein, the distance between that access card sends and each base station is received at server, and after getting the positional information of each base station, server just can according to the positional information of each base station and and each base station between distance, calculate the positional information of access card.
Refer to the computational methods of example below.
For example, it is assumed that install 3 base stations, respectively base station A, base station B and base station C in the meeting-place of exhibition, it is D1 that access card has calculated the distance with base station A, it is D2 with the distance of base station B, is D3 with the distance of base station C, and in access card, be previously stored with identity information XXX.The coordinate of these three base station respectively base station A (x1, y1, z1), base station B (x2, y2, z2) and base station C (x3, y3, z3), these three coordinate is all known, and staff pre-deposits in server.At access card by identity information XXX with after being sent to server with the distance D1 of these three base station, D2 and D3, server just gets access card and the distance D1 of these three base station, D2 and D3;Then, server can obtain the coordinate (x1, y1, z1), (x2, y2, z2) and (x3, y3, z3) of the these three base station pre-deposited;Finally, it is assumed that the coordinate of access card is that (x, y, z), server can list below equation group: (x1-x)2+(y1-y)2+(z1-z)2=D1, (x2-x)2+(y2-y)2+(z2-z)2=D2, (x3-x)2+(y3-y)2+(z3-z)2=D3, owing to x1, y1, z1, x2, y2, z2, x3, y3, z3, D1, D2 and D3 are known, it is possible to above-mentioned equation group solves and obtains the coordinate of access card, and (x, y, z), so that server obtains the positional information of access card.
In step s 24, when positional information is in default identification region and identity information is correct, the instruction allowed access into is sent to access control equipment.
Wherein, default identification region is the region that staff is pre-set, utilizes the coordinate axes with X-axis, Y-axis and Z axis to represent.
For example, it is assumed that default identification region is set as utilizing in the cube that 8 points are constituted by staff in advance, these 8 point respectively a (0,0,0), b (5,0,0), c (5,0,5), d (0,0,5), e (0,5,0), f (5,5,0), g (5,5,5) and h (0,5,5).Assuming that server receives the identity information of access card transmission is LYZ, it is i (2 that server calculates the positional information of access card, 2, 2), and server has determined that in data base is previously stored with identity information LYZ, illustrate that the identity information LYZ that not only access card sends is correct, but also illustrate that access card is exactly in the cube that above-mentioned 8 points are constituted, so server judges the positional information i (2 of access card, 2, 2) it is in default identification region and identity information LYZ is correct, server will send, to access control equipment, the instruction allowed access into, so that access control equipment allows the user having this access card to enter.
It addition, access control equipment can be a lot of kind, name two examples.Certainly, access control equipment is not limited to example below.
Such as, access control equipment can be the indicating arm with display lamp, and when server judges that the positional information of access card is in default identification region and identity information is correct, server can send, to the indicating arm with display lamp, the instruction that allow access into;When indicating arm receives the instruction allowed access into that server sends, the display lamp of indicating arm will be transformed into green by redness, and the user having this access card with instruction can enter.
And for example, access control equipment can also be audio amplifier, and when server judges that the positional information of access card is in default identification region and identity information is correct, server can send, to audio amplifier, the instruction that allow access into;When audio amplifier receives the instruction allowed access into that server sends, audio amplifier will export the voice of " identity information is correct, please enter ", and the user having this access card with instruction can enter.
Optionally, following steps can also be increased after step S24: be in preset at positional information and identify in region and during identity information mistake, send off-limits instruction to access control equipment.The purpose of do so is, in forbidding that unauthorized person enters.
For example, it is assumed that default identification region is set as utilizing in the cube that 8 points are constituted by staff in advance, these 8 point respectively a (0,0,0), b (5,0,0), c (5,0,5), d (0,0,5), e (0,5,0), f (5,5,0), g (5,5,5) and h (0,5,5).Assuming that server receives the identity information of access card transmission is LYZ, it is i (3,3,3) that server calculates the positional information of access card, and server has determined that in data base has not stored identity information LYZ, illustrate that the identity information LYZ that access card sends is wrong.Although access card is exactly in the cube that above-mentioned 8 points are constituted, but identity information LYZ is wrong, illustrate that the user having this access card is for unauthorized person, so server will send off-limits instruction to access control equipment, so that access control equipment forbids that the user having this access card enters.
Optionally, following steps can also be increased between step S21 and step S22: judge that whether identity information is for adding confidential information;When identity information is not for adding confidential information, triggered step S22, to obtain the positional information of each base station;When identity information is for adding confidential information, predetermined encryption algorithm is utilized to be decrypted identity information to generate the identity information after deciphering, then triggered step S22, to obtain the positional information of each base station.
The purpose of do so is, it is ensured that the identity information in access card will not be stolen by hacker.When identity information is not for adding confidential information, illustrate that this identity information is not belonging to important identity information;When identity information is for adding confidential information, illustrate that this identity information belongs to important identity information, then server will utilize predetermined encryption algorithm to be decrypted identity information to generate the identity information after deciphering.
In the embodiment shown in Figure 2, access card needs first to get identity information, then determines that the transmission duration sending wireless signal to each base station, and the transmission speed and transmission duration calculation according to wireless signal goes out the distance between each base station.Server receive access card send identity information and and each base station between distance after, just can according to the positional information of each base station and and each base station between distance, calculate the positional information of access card, when server determines that this positional information is in default identification region and identity information is correct, server just sends the instruction allowed access into access control equipment, so that access control equipment allows the user having this access card to pass through.Therefore, gate inhibition's card can quickly be verified by scheme provided by the invention, saves the time to access card checking, thus improving the efficiency to access card checking.
The module diagram of a kind of access card that Fig. 3 provides for the embodiment of the present invention.With reference to Fig. 3, this access card includes acquisition module 11, determines module 12, computing module 13 and sending module 14.Wherein:
Acquisition module 11, for obtaining the identity information prestored.
Determine module 12, for determining the transmission duration sending wireless signal to each base station.
Computing module 13, the long-pending distance obtaining between each base station of transmission speed and transmission duration for calculating wireless signal.
Sending module 14, for by identity information and and each base station between distance be sent to server.
Optionally, access card provided by the invention can also include with lower module: judge module, is used for judging whether that storage has predetermined encryption algorithm;First performs module, for when storage has predetermined encryption algorithm, utilizes predetermined encryption algorithm that identity information is encrypted and adds confidential information to generate, and by add confidential information and and each base station between distance be sent to server;Second performs module, for when not stored predetermined encryption algorithm, triggering sending module.
Optionally, it is determined that module 11 can include following submodule: first determines submodule, for when sending wireless signal to each base station, the time sending wireless signal to each base station being defined as the very first time.First obtains submodule, and for when receiving the wireless signal that each base station sends, obtaining the second time existed in the wireless signal that each base station sends, the second time was the time that each base station receives wireless signal.First calculating sub module, the difference being used for second time that calculated and the very first time obtains transmission duration.
Optionally, it is determined that module 11 can include following submodule: second determines submodule, for when sending wireless signal to each base station, the time sending wireless signal to each base station being defined as the 3rd time.3rd determines submodule, for when receiving the wireless signal that each base station sends, being defined as the 4th time the time receiving the wireless signal that each base station sends.Second obtains submodule, and for obtaining the 5th time and the 6th time existed in the wireless signal that each base station sends, the 5th time was the time that each base station receives wireless signal, and the 6th time was the time that each base station sends wireless signal.Second calculating sub module, for according to the 3rd time, the 4th time, the 5th time and the 6th time, calculating the transmission duration sending wireless signal to each base station.
The module diagram of a kind of server that Fig. 4 provides for the embodiment of the present invention.With reference to Fig. 4, this server includes receiver module 21, acquisition module 22, computing module 23 and the first sending module 24.Wherein:
Receiver module 21, for receive access card send identity information and and each base station between distance.
Acquisition module 22, for obtaining the positional information of each base station.
Computing module 23, for according to the positional information of each base station and and each base station between distance, calculate the positional information of access card.
First sending module 24, for when positional information is in default identification region and identity information is correct, sending the instruction allowed access into access control equipment.
Optionally, server provided by the invention can also include with lower module: judge module, is used for judging that whether identity information is for adding confidential information.First performs module, for when identity information is not for adding confidential information, triggering acquisition module.Second performs module, for when identity information is for adding confidential information, utilizing predetermined encryption algorithm to be decrypted identity information to generate the identity information after deciphering, and trigger acquisition module.
Optionally, server provided by the invention can also include with lower module: the second sending module, identifies in region and during identity information mistake for being in preset at positional information, sends off-limits instruction to access control equipment.
The module diagram of a kind of gate identification system that Fig. 5 provides for the embodiment of the present invention.With reference to Fig. 5, this gate identification system includes access card 31, server 32, access control equipment 33 and base station 34.Wherein:
Access card 31, for obtaining the identity information prestored, determine the transmission duration sending wireless signal to each base station 34, calculate transmission speed and the long-pending distance obtaining between each base station 34 of transmission duration of wireless signal, by identity information and and each base station 34 between distance be sent to server 32.
Server 32, for receive access card 31 send identity information and and each base station 34 between distance, obtain the positional information of each base station 34, positional information according to each base station 34 and and each base station 34 between distance, calculate the positional information of access card 31, when positional information is in default identification region and identity information is correct, send the instruction allowed access into access control equipment 33.
About the device in above-described embodiment, the concrete mode that wherein modules performs to operate has been described in detail in about the embodiment of the method, and explanation will be not set forth in detail herein.
In sum, the present invention can be greatly improved efficiency and the antifalsification of gate control system, is particularly suited for the application scenarios that exhibition, public place etc. are crowded, need high efficiency, accurately confirmation admission personnel identity.And, the invention solves personnel's congestion problems that conventional door access control system causes, and efficiently solve because personnel block up cause associated safety, flow control, evacuation, the problem such as fire-fighting.It addition, the present invention prevents the duplication of locator card also by the locator card information encrypted.Relative to traditional Quick Response Code barcode scanning mode, the antifalsification that improve system, it is particularly suitable for needing the place of accurate validation personnel identity.
About the device in above-described embodiment, the concrete mode that wherein modules performs to operate has been described in detail in about the embodiment of the method, and explanation will be not set forth in detail herein.
The above; being only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should described be as the criterion with scope of the claims.

Claims (15)

1. gate inhibition's recognition methods, it is characterised in that including:
Obtain the identity information prestored;
Determine the transmission duration sending wireless signal to each base station;
Calculate transmission speed and the long-pending distance obtaining between described each base station of described transmission duration of described wireless signal;
By described identity information and and described each base station between distance be sent to server.
2. gate inhibition's recognition methods according to claim 1, it is characterised in that after the transmission speed and the long-pending distance obtained between described each base station of described transmission duration of the described wireless signal of described calculating, described method also includes:
Judge whether that storage has predetermined encryption algorithm;
When storage has described predetermined encryption algorithm, utilize described predetermined encryption algorithm that described identity information is encrypted and add confidential information to generate, and by described add confidential information and and described each base station between distance be sent to server;
When not stored described predetermined encryption algorithm, trigger described by described identity information and and described each base station between distance be sent to the step of server.
3. gate inhibition's recognition methods according to claim 1, it is characterised in that the described step determining the transmission duration sending wireless signal to each base station includes:
When sending wireless signal to each base station, the time sending wireless signal to described each base station is defined as the very first time;
When receiving the wireless signal that described each base station sends, obtaining the second time existed in the wireless signal that described each base station sends, described second time is the time that described each base station receives wireless signal;
The difference calculating described second time and the described very first time obtains transmission duration.
4. gate inhibition's recognition methods according to claim 1, it is characterised in that the described step determining the transmission duration sending wireless signal to each base station includes:
When sending wireless signal to each base station, the time sending wireless signal to described each base station was defined as the 3rd time;
When receiving the wireless signal that described each base station sends, the time receiving the wireless signal that described each base station sends was defined as the 4th time;
Obtaining the 5th time and the 6th time that exist in the wireless signal that described each base station sends, described 5th time is the time that described each base station receives wireless signal, and described 6th time is the time that described each base station sends wireless signal;
According to described 3rd time, described 4th time, described 5th time and described 6th time, calculate the transmission duration sending wireless signal to each base station.
5. gate inhibition's recognition methods, it is characterised in that including:
Receive access card send identity information and and each base station between distance;
Obtain the positional information of described each base station;
Positional information according to described each base station and and described each base station between distance, calculate the positional information of described access card;
When described positional information is in default identification region and described identity information is correct, send the instruction allowed access into access control equipment.
6. gate inhibition's recognition methods according to claim 5, it is characterised in that described reception access card send identity information and and each base station between distance after, described method also includes:
Judge that whether described identity information is for adding confidential information;
When described identity information is not for adding confidential information, trigger the step of the positional information of the described each base station of described acquisition;
When described identity information is for adding confidential information, utilizes predetermined encryption algorithm to be decrypted described identity information to generate the identity information after deciphering, and trigger the step of the positional information of the described each base station of described acquisition.
7. gate inhibition's recognition methods according to claim 5, it is characterised in that after the described positional information calculating described access card, described method also includes:
It is in preset at described positional information and identifies in region and during described identity information mistake, send off-limits instruction to access control equipment.
8. an access card, it is characterised in that including:
Acquisition module, for obtaining the identity information prestored;
Determine module, for determining the transmission duration sending wireless signal to each base station;
Computing module, the long-pending distance obtaining between described each base station of transmission speed and described transmission duration for calculating described wireless signal;
Sending module, for by described identity information and and described each base station between distance be sent to server.
9. access card according to claim 8, it is characterised in that described device also includes:
Judge module, is used for judging whether that storage has predetermined encryption algorithm;
First performs module, for when storage has described predetermined encryption algorithm, utilizes described predetermined encryption algorithm that described identity information is encrypted and adds confidential information to generate, and by described add confidential information and and described each base station between distance be sent to server;
Second performs module, for when not stored described predetermined encryption algorithm, triggering described sending module.
10. access card according to claim 8, it is characterised in that described determine that module includes:
First determines submodule, for when sending wireless signal to each base station, being defined as the very first time time sending wireless signal to described each base station;
First obtains submodule, and for when receiving the wireless signal that described each base station sends, obtaining the second time existed in the wireless signal that described each base station sends, described second time is the time that described each base station receives wireless signal;
First calculating sub module, the difference being used for calculating described second time and the described very first time obtains transmission duration.
11. access card according to claim 8, it is characterised in that described determine that module includes:
Second determines submodule, for when sending wireless signal to each base station, being defined as the 3rd time the time sending wireless signal to described each base station;
3rd determines submodule, for when receiving the wireless signal that described each base station sends, being defined as the 4th time the time receiving the wireless signal that described each base station sends;
Second obtains submodule, for obtaining the 5th time and the 6th time existed in the wireless signal that described each base station sends, described 5th time is the time that described each base station receives wireless signal, and described 6th time is the time that described each base station sends wireless signal;
Second calculating sub module, for according to described 3rd time, described 4th time, described 5th time and described 6th time, calculating the transmission duration sending wireless signal to each base station.
12. a server, it is characterised in that including:
Receiver module, for receive access card send identity information and and each base station between distance;
Acquisition module, for obtaining the positional information of described each base station;
Computing module, for according to the positional information of described each base station and and described each base station between distance, calculate the positional information of described access card;
First sending module, for when described positional information is in default identification region and described identity information is correct, sending the instruction allowed access into access control equipment.
13. server according to claim 12, it is characterised in that described device also includes:
Judge module, is used for judging that whether described identity information is for adding confidential information;
First performs module, for when described identity information is not for adding confidential information, triggering described acquisition module;
Second performs module, for when described identity information is for adding confidential information, utilizing predetermined encryption algorithm to be decrypted described identity information to generate the identity information after deciphering, and trigger described acquisition module.
14. server according to claim 12, it is characterised in that described device also includes:
Second sending module, identifies in region and during described identity information mistake for being in preset at described positional information, sends off-limits instruction to access control equipment.
15. a gate identification system, it is characterised in that include access card, server, access control equipment and base station;
Described access card, for obtaining the identity information prestored, determine the transmission duration sending wireless signal to each base station, calculate the transmission speed of described wireless signal and the long-pending distance obtaining between described each base station of described transmission duration, by described identity information and and described each base station between distance be sent to server;
Described server, for receive access card send identity information and and each base station between distance, obtain the positional information of described each base station, positional information according to described each base station and and described each base station between distance, calculate the positional information of described access card, when described positional information is in default identification region and described identity information is correct, send the instruction allowed access into described access control equipment.
CN201610044098.XA 2016-01-22 2016-01-22 Access control recognition method, access control card, server and access control recognition system Pending CN105741387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610044098.XA CN105741387A (en) 2016-01-22 2016-01-22 Access control recognition method, access control card, server and access control recognition system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610044098.XA CN105741387A (en) 2016-01-22 2016-01-22 Access control recognition method, access control card, server and access control recognition system

Publications (1)

Publication Number Publication Date
CN105741387A true CN105741387A (en) 2016-07-06

Family

ID=56247440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610044098.XA Pending CN105741387A (en) 2016-01-22 2016-01-22 Access control recognition method, access control card, server and access control recognition system

Country Status (1)

Country Link
CN (1) CN105741387A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018039831A1 (en) * 2016-08-28 2018-03-08 刘建林 Gate opening method and system based on coordinates of mobile phone
CN111563988A (en) * 2020-04-27 2020-08-21 广东博智林机器人有限公司 Gate pass authentication method, system and computer storage medium
CN113033420A (en) * 2021-03-29 2021-06-25 北京物资学院 Non-image type access control system and method based on big data acquisition
CN115761964A (en) * 2022-10-28 2023-03-07 国家能源集团泰州发电有限公司 Method, device, equipment and system for detecting locator card

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1195818A (en) * 1996-12-13 1998-10-14 康帕克电脑公司 Securely generating computer system password by utilizing external encryption algorithm
CN101682903A (en) * 2007-06-01 2010-03-24 高通股份有限公司 Methods and apparatus for determining femto base station location
CN202650103U (en) * 2012-05-24 2013-01-02 杭州华韵天略电子科技有限公司 Remote induction access control system
CN103217662A (en) * 2011-12-02 2013-07-24 李尔公司 Apparatus and method for detecting a location of a wireless device
US20140109634A1 (en) * 2012-10-23 2014-04-24 Kwikset Corporation Electronic lock having software based automatic multi-wireless profile detection and setting
CN104063931A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Mobile internet access system based on wireless signal identification and implementation method
CN104063930A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Multi-access intelligent recognition system based on position and method
CN104849709A (en) * 2015-05-26 2015-08-19 北京楚捷科技有限公司 Method and device for inhibiting background interference in indoor wireless range finding

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1195818A (en) * 1996-12-13 1998-10-14 康帕克电脑公司 Securely generating computer system password by utilizing external encryption algorithm
CN101682903A (en) * 2007-06-01 2010-03-24 高通股份有限公司 Methods and apparatus for determining femto base station location
CN103217662A (en) * 2011-12-02 2013-07-24 李尔公司 Apparatus and method for detecting a location of a wireless device
CN202650103U (en) * 2012-05-24 2013-01-02 杭州华韵天略电子科技有限公司 Remote induction access control system
US20140109634A1 (en) * 2012-10-23 2014-04-24 Kwikset Corporation Electronic lock having software based automatic multi-wireless profile detection and setting
CN104063931A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Mobile internet access system based on wireless signal identification and implementation method
CN104063930A (en) * 2014-06-18 2014-09-24 大连智慧城科技有限公司 Multi-access intelligent recognition system based on position and method
CN104849709A (en) * 2015-05-26 2015-08-19 北京楚捷科技有限公司 Method and device for inhibiting background interference in indoor wireless range finding

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018039831A1 (en) * 2016-08-28 2018-03-08 刘建林 Gate opening method and system based on coordinates of mobile phone
CN111563988A (en) * 2020-04-27 2020-08-21 广东博智林机器人有限公司 Gate pass authentication method, system and computer storage medium
CN111563988B (en) * 2020-04-27 2022-04-19 广东博智林机器人有限公司 Gate pass authentication method, system and computer storage medium
CN113033420A (en) * 2021-03-29 2021-06-25 北京物资学院 Non-image type access control system and method based on big data acquisition
CN113033420B (en) * 2021-03-29 2024-03-26 北京物资学院 Non-image type access control system and method based on big data acquisition
CN115761964A (en) * 2022-10-28 2023-03-07 国家能源集团泰州发电有限公司 Method, device, equipment and system for detecting locator card

Similar Documents

Publication Publication Date Title
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
CN105741387A (en) Access control recognition method, access control card, server and access control recognition system
CN109272617B (en) Unlocking verification method, server, door lock, electronic device and storage medium
CN101523859A (en) System and method for authenticating remote server access
CN102136079A (en) Dynamic authentication method between reader and tag card and implementing device thereof
CN104468582A (en) User information certification authorization method and system
CN105471815A (en) Internet-of-things data security method and Internet-of-things data security device based on security authentication
JP2013015884A (en) Authentication system and authentication method
CN104079562A (en) Safety authentication method based on payment terminal and related device
CN106411505A (en) Bidirectional authentication method of mobile radio frequency identification and mobile radio frequency identification system
CN106789986A (en) Monitoring device authentication method and device
CN107154919A (en) A kind of safe login method and device
US20120290481A1 (en) Method for carrying out a transaction between a portable data carrier and a terminal
CN110738776A (en) method and system for opening Bluetooth forbidden devices, Bluetooth equipment and working method thereof
KR101891781B1 (en) Time and attendance management apparatus based on mac address verification and operating method thereof
CN104618356A (en) Identity verification method and device
JP2003512792A (en) Authentication of subscriber stations
CN111444496A (en) Application control method, device, equipment and storage medium
CN101667255B (en) Security authentication method, device and system for radio frequency identification
CN107342869B (en) Credible roll calling method and system based on intelligent terminal
CN104349318A (en) Automatic authentication method, apparatus and system of wireless local area network (WLAN)
KR101880708B1 (en) DATA TRANSFER SYSTEM OF DEVICE IN IoT HAVING IMPROVED SECURITY
CN108595974B (en) Quick verification system for electronic product code
WO2019205357A1 (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN106162644A (en) A kind of WiFi system preventing camouflage equipment and safe verification method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160706