CN105847276A - Access control method and device - Google Patents

Access control method and device Download PDF

Info

Publication number
CN105847276A
CN105847276A CN201610279757.8A CN201610279757A CN105847276A CN 105847276 A CN105847276 A CN 105847276A CN 201610279757 A CN201610279757 A CN 201610279757A CN 105847276 A CN105847276 A CN 105847276A
Authority
CN
China
Prior art keywords
key
server
door
terminal
condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610279757.8A
Other languages
Chinese (zh)
Inventor
卢子明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610279757.8A priority Critical patent/CN105847276A/en
Publication of CN105847276A publication Critical patent/CN105847276A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides an access control method and device. The method includes that a server receives a first key from a terminal when the distance between the terminal and a door; the server judges whether the first key is consistent with a second key or not, opening the door when the judgment result is that the first key is consistent with the second key and maintaining the close state of the door when the judgment result is that the first key is not consistent with the second key, wherein the second key is the key of the door and is saved in the server. By adopting the method and device provided by the invention, problems that door cards are high in manufacture cost, easy to miss or easy to forget to carry and poor in safety performance of an access control system in market in the prior art mainly employing door card swiping access control are solved. Since no special door card needs to carry, a cell phone of a user can act as the door card, so that user burden can be reduced and use convenience is achieved.

Description

Access control method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for controlling access to a door.
Background
At present, an access control technology based on a coded lock is widely adopted by enterprises, in the access control technology based on the coded lock, a password of the coded lock is written into a Radio Frequency Identification (RFID) card, and when a user brings the RFID card close to an induction area of the coded lock, the RFID card actively sends password data to the coded lock, so that the coded lock is unlocked. In the above access control scheme, the user needs to carry a dedicated RFID card (also referred to as a "door card") because the user needs to unlock the combination lock only by using the dedicated RFID card.
Among the existing access control systems, the most common access control systems all adopt card swiping access control systems. Compared with a fingerprint iris palm type biological identification access control system, the card swiping access control system has the advantages of low cost, convenience in management and the like; compared with a password access control system, the password access control system has the advantages of convenience in management, difficulty in leakage and the like.
However, the card swiping access control system has the following problems:
1) the use cost is high. The installation process of the card swiping access control system is very easy, the structure is relatively simple, so the fixed cost is not high, but the access control function of the card swiping access control system is realized by the access control card, the access control card belongs to an easily-consumed product and is easily damaged, the access control card per se is an expenditure if lost or damaged, and the use cost is higher if the access control card per se is lost or damaged and is an expenditure.
2) It is inconvenient to carry. The access control card used by the card swiping access control system needs to be carried by a person, and since the carrying of the card of a general user is very troublesome, a card is added, and the carrying difficulty of the user is increased.
3) Easy to copy. The process of copying the access control card is simple, and the copying process can be realized only by using some very common equipment, so that if the card is copied by others, potential safety hazards are brought to safety. In the existing access control card, there is also one which cannot be copied at present relatively, but the card is expensive in cost and is not suitable for popularization.
4) The operation is inconvenient. Although the access card is not required to be completely released and can be sensed by the system, the sensing distance is very short, so that the access card must be drawn out of a pocket and then swiped at a specified position every time the access card is used, and the inconvenience of using the access card is caused for a user.
Aiming at the problems that in the prior art, an access control system in the market mainly uses a card swiping access control mode to cause higher manufacturing cost of an access card, the access card is easy to lose or forget to carry, and the safety is poor, an effective solution is not provided.
Disclosure of Invention
The invention provides an access control method and device for an entrance guard, which at least solve the problems that in the prior art, an entrance guard system in the market mainly adopts a card swiping entrance guard, so that the manufacturing cost of an entrance card is high, the entrance card is easy to lose or forget to carry, and the safety is poor.
According to one aspect of the invention, an access control method is provided, wherein a server receives a first key from a terminal when the distance between the terminal and a door is less than a preset threshold value; the server judges whether the first key is consistent with the second key or not, opens the door under the condition that the judgment result is yes, and keeps the closed state of the door under the condition that the judgment result is no; wherein the second key is a key for opening the door and is stored in the server.
Optionally, before the server receives the first key from the terminal, the method includes: and the server sends the first key to the terminal.
Optionally, the server receiving the first key from the terminal includes: the server receiving the first key from the terminal through Near Field Communication (NFC); or, the server receives the first key from the terminal through infrared rays.
According to another aspect of the present invention, there is provided another access control method, including: the method comprises the steps that under the condition that the distance between a terminal and a door is smaller than a preset threshold value, the terminal sends a first secret key to a server; judging whether the first key is consistent with the second key through the server, opening the door under the condition that the judgment result is yes, and keeping the closed state of the door under the condition that the judgment result is no; wherein the second key is a key for opening the door and is stored in the server.
Optionally, before the terminal sends the first key to the server, the method includes: the terminal receives the first key from the server.
Optionally, the sending, by the terminal, the first key to the server includes: the terminal sends the first secret key to the server through Near Field Communication (NFC); or, the terminal sends the first key to the server through infrared ray.
According to one aspect of the present invention, there is provided an access control device for a server, comprising: the device comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a first secret key from a terminal under the condition that the distance between the terminal and a door is smaller than a preset threshold value; the judging module is used for judging whether the first secret key is consistent with the second secret key or not, opening the door under the condition that the judging result is yes, and keeping the closing state of the door under the condition that the judging result is no; wherein the second key is a key for opening the door and is stored in the server.
Optionally, the apparatus comprises: a sending module, configured to send a first key to the terminal before receiving the first key from the terminal.
Optionally, the receiving module includes: a first receiving unit configured to receive the first key from the terminal through near field communication NFC; or, a second receiving unit for receiving the first key from the terminal through infrared rays.
According to another aspect of the present invention, there is provided an access control apparatus for a terminal, including: the sending module is used for sending a first key to the server under the condition that the distance between the terminal and the door is smaller than a preset threshold value; judging whether the first key is consistent with the second key through the server, opening the door under the condition that the judgment result is yes, and keeping the closed state of the door under the condition that the judgment result is no; wherein the second key is a key for opening the door and is stored in the server.
Optionally, the apparatus further comprises: a receiving module, configured to receive the first key from the server before sending the first key to the server.
Optionally, the sending module includes: a first transmission unit configured to transmit the first key to the server through near field communication NFC; or, a second sending unit, configured to send the first key to the server through infrared.
According to the invention, the server receives the first key from the terminal under the condition that the distance between the terminal and the door is less than the preset threshold value; the server judges whether the first key is consistent with the second key or not, opens the door under the condition that the judgment result is yes, and keeps the closing state of the door under the condition that the judgment result is no; wherein, the second key is for opening the key of this door, saves in the server, has solved prior art, and access control system in market mainly uses the card swiping access control to lead to the higher, the door card loses easily or forgets to carry and the relatively poor problem of security as the door card cost of manufacture is higher, the door card is realized by user's cell-phone owing to need not carry special door card, consequently can alleviate user's burden, has made things convenient for user's use.
Drawings
Fig. 1 is a flowchart of an access control method according to an embodiment of the present invention;
fig. 2 is another flowchart of an access control method according to an embodiment of the present invention;
fig. 3 is a block diagram (1) of the access control device according to the embodiment of the present invention;
fig. 4 is a block diagram (2) of the access control device according to the embodiment of the present invention;
fig. 5 is a block diagram of a structure of a receiving module according to an embodiment of the present invention;
fig. 6 is a block diagram (7) of the access control device according to the embodiment of the present invention;
fig. 7 is a block diagram (8) of the access control device according to the embodiment of the present invention;
fig. 8 is a block diagram of a structure of a transmitting module according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings in conjunction with the following detailed description. It should be understood that the description is intended to be exemplary only, and is not intended to limit the scope of the present invention. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "first", "second", and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
In this embodiment, an access control method is provided, and fig. 1 is a flowchart of an access control method according to an embodiment of the present invention, as shown in fig. 1, the flowchart includes the following steps:
step S11, under the condition that the distance between the terminal and the door is less than the preset threshold, the server receives the first key from the terminal;
step S12, the server determines whether the first key and the second key match, opens the door if the determination result is yes, and maintains the closed state of the door if the determination result is no; wherein, the second key is the key for opening the door and is stored in the server.
The terminal may be a smart phone, a portable tablet computer (PAD), a Personal Digital Assistant (PDA), or other smart devices (electronic devices) having display, processing, and network connection functions.
With the development of scientific technology, the technology of mobile phones has been rapidly developed, and mobile phones have penetrated from the traditional mobile phone with only a single voice call function to various functional fields, and have become indispensable communication tools and internet access devices for people. An exemplary implementation of the object of the present invention is described below using a mobile phone as an example.
Through the steps, when the mobile phone is close to the door, the server receives the secret key sent by the mobile phone, the secret key is compared with the secret key stored in the secret key and used for opening the door, the door is opened under the condition that the comparison result is consistent, the closing state of the door is kept under the condition that the comparison result is inconsistent, and the problems that in the prior art, the door card manufacturing cost is high, the door card is easy to lose or forget to carry and the safety is poor due to the fact that an access control system on the market mainly uses a card swiping door access control as a main part, and the door card is realized by the mobile phone of a user due to the fact that a special door card does not need to be carried, therefore, the burden of the user can be relieved, the use of the user is facilitated, the cost is effectively reduced, and the convenience and the.
In an optional embodiment, before the server receives the first key from the terminal, the server transmits the first key to the terminal so that the terminal can obtain the key for opening the home door.
The communication between the handset and the server may be performed in a variety of ways, as will be illustrated below. For example, the mobile phone and the door mainly transmit a protocol access password through an NFC or infrared mode. In an optional embodiment, the server receives the first key from the terminal by means of near field communication NFC. In another alternative embodiment, the server receives the first key from the terminal by infrared.
Spatially, each private key corresponds to a gate; in time: one gate has a temporary private key (24h) or a permanent private key. The server side can update the private key at regular time and send update information to the mobile phone side. The principle of the server sending the update information is that the server side will store the IMEI numbers (international mobile equipment identities) of all valid mobile phones, but will only send the update information to the mobile phones with valid IMEI. In the using process, the server side firstly generates a private key for each door, and then sends the private key to the mobile phone of a person who has the authority to enter the space; when the access of the access control system is swiped, the mobile phone actively sends the private key to the server in an NFC or infrared mode only after approaching the door; the receiving end receives the private key and analyzes the private key. If the private key is consistent with the private key stored by the server, the access is allowed, the door is opened, otherwise, the access is not allowed, and the closed state of the door is kept. As shown in fig. 2, the flowchart includes the following steps:
step S21, when the mobile phone approaches the door, the private key is sent to the receiving end (equivalent to the server);
step S22, the receiving end receives the private key sent by the mobile phone and analyzes the private key;
in step S23, if the parsing result is that the received private key matches the stored private key, the door is opened to allow access.
Private key + + in fig. 2 refers to: if some users have more authority, the private keys need to be matched one by one during matching, and if the first one cannot be matched, the second one can automatically match until all the private keys are matched.
In a particular alternative embodiment, a company has a gate, office area, hosting conference room, etc. The private key corresponding to the gate is 123; private key for office is 456; and the private key 789 corresponding to the conference room is hosted. In principle, all the people can enter the gate, the mobile phone of all the people has the private key 123, and the private key on the mobile phone of some people who can enter the office but cannot enter the conference room is 123+ 456; the secret key on the mobile phone is 123+789 for some people who can enter the conference room but cannot enter the office area; if someone can enter all the areas, the mobile phone end stores the secret key of 123+456+ 789. When the access control is swiped, the private keys on the mobile phone can be compared with the private keys on the door in sequence, and if one private key can be matched with the private key on the door, the person has the permission to enter the area.
Example 2
In this embodiment, another access control method is provided, where the process includes: under the condition that the distance between the terminal and the door is smaller than a preset threshold value, the terminal sends a first secret key to the server; judging whether the first key is consistent with the second key through the server, opening the door under the condition that the judgment result is yes, and keeping the closed state of the door under the condition that the judgment result is no; wherein, the second key is the key for opening the door and is stored in the server.
The terminal may be a smart phone, a portable tablet computer (PAD), a Personal Digital Assistant (PDA), or other smart devices (electronic devices) having display, processing, and network connection functions.
With the development of scientific technology, the technology of mobile phones has been rapidly developed, and mobile phones have penetrated from the traditional mobile phone with only a single voice call function to various functional fields, and have become indispensable communication tools and internet access devices for people. An exemplary implementation of the object of the present invention is described below using a mobile phone as an example.
Through the steps, when the mobile phone is close to the door, the mobile phone sends the key to the server, the key is compared with the key stored in the server and used for opening the door through the server, the door is opened under the condition that the comparison result is consistent, the closing state of the door is kept under the condition that the comparison result is inconsistent, the problems that in the prior art, the door card manufacturing cost is high due to the fact that an access control system on the market mainly uses a card swiping access control as a main part, the door card is easy to lose or forget to carry, and the safety is poor are solved, and the door card is realized by the mobile phone of a user without carrying a special door card, so that the burden of the user can be relieved, the use of the user is facilitated, the cost is effectively reduced, and the convenience and the safety of management are improved.
In an optional embodiment, before the terminal sends the first key to the server, the terminal receives the first key from the server, so that the terminal can obtain the key for opening the home door.
The communication between the handset and the server may be performed in a variety of ways, as will be illustrated below. For example, the mobile phone and the door mainly transmit a protocol access password through an NFC or infrared mode. In an optional embodiment, the terminal sends the first key to the server by means of near field communication NFC. In another alternative embodiment, the terminal sends the first key to the server via infrared.
Example 3
In this embodiment, an access control device is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and details of which have been already described are omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 3 is a block diagram (1) of an access control device according to an embodiment of the present invention, applied to a server, and as shown in fig. 3, the access control device includes: the receiving module 31 judges the module 32.
The receiving module 31 is configured to receive a first key from the terminal when a distance between the terminal and the door is smaller than a predetermined threshold; a judging module 32, configured to judge whether the first key is consistent with the second key, open the door if the judgment result is yes, and maintain the closed state of the door if the judgment result is no; the second key is a key for opening the door and is stored in the server.
Through the device, when the cell-phone is close to the door, receiving module 31 receives the key that the cell-phone sent, judge module 32 with this key with store in wherein open the key of this door and carry out the comparison, under the unanimous condition of comparison result, open this door, under the inconsistent condition of comparison result, keep the closed condition of this door, in the prior art has been solved, access control system on the market mainly uses the entrance guard of punching the card to be higher for the door card cost of manufacture that leads to as the main, the door card loses easily or forgets to carry and the relatively poor problem of security, owing to need not carry special door card, the door card is realized by user's cell-phone, consequently can alleviate user's burden, user's use has been made things convenient for, and effectively reduce the cost, the convenience and the security of management have been improved.
Fig. 4 is a block diagram (2) of the access control device according to the embodiment of the present invention.
As shown in fig. 4, the apparatus further includes: a sending module 41, configured to send the first key to the terminal before receiving the first key from the terminal.
Fig. 5 is a block diagram of a structure of a receiving module according to an embodiment of the present invention.
As shown in fig. 5, the receiving module 31 includes: a first receiving unit 311 for receiving the first key from the terminal by the proximity wireless communication NFC; or, a second receiving unit 312 for receiving the first key from the terminal through infrared rays.
Further functional descriptions of the modules are the same as those of the corresponding embodiments, and are not repeated herein.
Example 4
In this embodiment, another access control device is further provided, and the device is used to implement the foregoing embodiments and preferred embodiments, and the description of the device is omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 6 is a block diagram (7) of a door access control device according to an embodiment of the present invention, which is applied to a terminal, and as shown in fig. 6, the device includes: a sending module 61, configured to send a first key to the server when a distance between the terminal and the door is smaller than a predetermined threshold; judging whether the first key is consistent with the second key through the server, opening the door under the condition that the judgment result is yes, and keeping the closed state of the door under the condition that the judgment result is no; wherein, the second key is the key for opening the door and is stored in the server.
Through the device, when the cell-phone is close to the door, sending module 61 sends the key to the server, compare this key with the key of opening this door of saving in the server through the server, under the unanimous condition of comparison result, open this door, under the inconsistent condition of comparison result, keep the closed condition of this door, prior art has been solved, access control system on the market mainly uses the card swiping access control to lead to the door card cost of manufacture higher as the main, the door card loses easily or forgets to carry and the relatively poor problem of security, owing to need not carry special door card, the door card is realized by user's cell-phone, consequently, user's burden can be alleviateed, user's use has been made things convenient for, and the cost is effectively reduced, the convenience and the security of management have been improved.
Fig. 7 is a block diagram (8) of the access control device according to the embodiment of the present invention.
As shown in fig. 7, the apparatus further includes: a receiving module 71, configured to receive the first key from the server before sending the first key to the server.
Fig. 8 is a block diagram of a transmitting module according to an embodiment of the present invention, and as shown in fig. 8, the transmitting module 61 includes: a first transmission unit 611 configured to transmit a first key to a server through near field communication NFC; alternatively, the second sending unit 612 is configured to send the first key to the server through infrared.
Further functional descriptions of the modules are the same as those of the corresponding embodiments, and are not repeated herein.
In summary, the access control method and device for the access control provided by the invention solve the problems that in the prior art, the access control system in the market mainly uses the card swiping access control, so that the manufacturing cost of the access card is high, the access card is easy to lose or forget to carry, and the safety is poor.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (12)

1. An access control method, comprising:
the method comprises the steps that a server receives a first secret key from a terminal under the condition that the distance between the terminal and a door is smaller than a preset threshold value;
the server judges whether the first key is consistent with the second key or not, opens the door under the condition that the judgment result is yes, and keeps the closed state of the door under the condition that the judgment result is no; wherein the second key is a key for opening the door and is stored in the server.
2. The method of claim 1, the server comprising, prior to receiving the first key from the terminal:
and the server sends the first key to the terminal.
3. The method of claim 1, the server receiving the first key from the terminal comprising:
the server receives the first key from the terminal through Near Field Communication (NFC); or,
the server receives the first key from the terminal through infrared rays.
4. An access control method, comprising:
the method comprises the steps that under the condition that the distance between a terminal and a door is smaller than a preset threshold value, the terminal sends a first secret key to a server; judging whether the first key is consistent with the second key through the server, opening the door under the condition that the judgment result is yes, and keeping the closed state of the door under the condition that the judgment result is no; wherein the second key is a key for opening the door and is stored in the server.
5. The method of claim 4, wherein the terminal prior to sending the first key to the server comprises:
the terminal receives the first key from the server.
6. The method of claim 4, the terminal sending the first key to the server comprising:
the terminal sends the first secret key to the server through Near Field Communication (NFC); or,
and the terminal sends the first key to the server through infrared rays.
7. An access control device applied to a server comprises:
the device comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving a first secret key from a terminal under the condition that the distance between the terminal and a door is smaller than a preset threshold value;
the judging module is used for judging whether the first secret key is consistent with the second secret key or not, opening the door under the condition that the judging result is yes, and keeping the closing state of the door under the condition that the judging result is no; wherein the second key is a key for opening the door and is stored in the server.
8. The apparatus of claim 7, the apparatus comprising:
a sending module, configured to send a first key to the terminal before receiving the first key from the terminal.
9. The apparatus of claim 7, the receiving means comprising:
a first receiving unit configured to receive the first key from the terminal through near field communication NFC; or,
a second receiving unit for receiving the first key from the terminal through infrared rays.
10. An access control device applied to a terminal comprises:
the sending module is used for sending a first key to the server under the condition that the distance between the terminal and the door is smaller than a preset threshold value; judging whether the first key is consistent with the second key through the server, opening the door under the condition that the judgment result is yes, and keeping the closed state of the door under the condition that the judgment result is no; wherein the second key is a key for opening the door and is stored in the server.
11. The apparatus of claim 10, the apparatus further comprising:
a receiving module, configured to receive the first key from the server before sending the first key to the server.
12. The apparatus of claim 10, the means for transmitting comprising:
a first transmission unit configured to transmit the first key to the server through near field communication NFC; or,
a second sending unit, configured to send the first key to the server through infrared.
CN201610279757.8A 2016-04-28 2016-04-28 Access control method and device Pending CN105847276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610279757.8A CN105847276A (en) 2016-04-28 2016-04-28 Access control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610279757.8A CN105847276A (en) 2016-04-28 2016-04-28 Access control method and device

Publications (1)

Publication Number Publication Date
CN105847276A true CN105847276A (en) 2016-08-10

Family

ID=56590425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610279757.8A Pending CN105847276A (en) 2016-04-28 2016-04-28 Access control method and device

Country Status (1)

Country Link
CN (1) CN105847276A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018039831A1 (en) * 2016-08-28 2018-03-08 刘建林 Gate opening method and system based on coordinates of mobile phone
CN109035509A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of intelligent door lock is opened and closed by block chain
CN109035510A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of controlling the access of express delivery smart lock by block chain
CN111402468A (en) * 2020-03-20 2020-07-10 深圳我家云网络科技有限公司 Electronic key generation method and device, computer equipment and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203376792U (en) * 2013-07-04 2014-01-01 纳米新能源(唐山)有限责任公司 Mobile terminal-based access control system and access control terminal
CN104484923A (en) * 2014-12-03 2015-04-01 朗曦科技(上海)有限公司 Access control system and method based on authentication and location awareness of intelligent mobile terminal
CN105243712A (en) * 2015-10-19 2016-01-13 四川长虹电器股份有限公司 Method for opening access control system within preset distance based on mobile device
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN105787576A (en) * 2016-03-03 2016-07-20 陈健强 Hotel reservation realization method and system based on intelligent glasses door lock

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN203376792U (en) * 2013-07-04 2014-01-01 纳米新能源(唐山)有限责任公司 Mobile terminal-based access control system and access control terminal
CN104484923A (en) * 2014-12-03 2015-04-01 朗曦科技(上海)有限公司 Access control system and method based on authentication and location awareness of intelligent mobile terminal
CN105243712A (en) * 2015-10-19 2016-01-13 四川长虹电器股份有限公司 Method for opening access control system within preset distance based on mobile device
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN105787576A (en) * 2016-03-03 2016-07-20 陈健强 Hotel reservation realization method and system based on intelligent glasses door lock

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018039831A1 (en) * 2016-08-28 2018-03-08 刘建林 Gate opening method and system based on coordinates of mobile phone
CN109035509A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of intelligent door lock is opened and closed by block chain
CN109035510A (en) * 2018-07-12 2018-12-18 佛山伊苏巨森科技有限公司 A method of controlling the access of express delivery smart lock by block chain
CN111402468A (en) * 2020-03-20 2020-07-10 深圳我家云网络科技有限公司 Electronic key generation method and device, computer equipment and computer storage medium

Similar Documents

Publication Publication Date Title
CN105303659B (en) A kind of gate inhibition's personal identification method and device based on ultrasonic wave
CN204833393U (en) Bluetooth and NFC integrated access control management system with image transmission
US9763086B2 (en) Owner access point to control the unlocking of an entry
CN104050742A (en) Intelligent door and control method and system thereof
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
CN104778773A (en) System and method for controlling entrance guard by mobile phone
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
KR101554959B1 (en) Entrance authentication system for visitors using a temporary key by combining primary keys and entrance method thereof
CN102831682B (en) System and method for remotely opening door based on mobile phone short message
CN103237030A (en) Biological recognition-based user authentication method and system
KR20170116888A (en) Digital doorlock system
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN106683242A (en) Intelligent lock system, intelligent lock and intelligent wearable equipment
CN105847276A (en) Access control method and device
CN207264475U (en) A kind of intelligent lock control system based on eID certifications
CN205080626U (en) Intelligence lock system based on thing networking
CN1997188A (en) A recognition method of the user identity and its handset
CN104484918A (en) NFC-based Android intelligent door lock opening method
CN104574616B (en) Intelligent electronic door lock control method and control device
KR20220103090A (en) Mobile digital lock technology
CN204833403U (en) Access control system based on bluetooth
CN205193906U (en) Cell -phone system of opening door based on cloud platform
KR101861057B1 (en) Digital door lock based on composite signal and the method for operating the same
KR20100116994A (en) Entry device, entry management server and entry management system
CN204375038U (en) A kind of intelligent electronic lock control device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160810

WD01 Invention patent application deemed withdrawn after publication