CN105847303A - Verification method and system of intelligent access control unit - Google Patents

Verification method and system of intelligent access control unit Download PDF

Info

Publication number
CN105847303A
CN105847303A CN201610409958.5A CN201610409958A CN105847303A CN 105847303 A CN105847303 A CN 105847303A CN 201610409958 A CN201610409958 A CN 201610409958A CN 105847303 A CN105847303 A CN 105847303A
Authority
CN
China
Prior art keywords
password
log
entrance guard
user
intelligent entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610409958.5A
Other languages
Chinese (zh)
Inventor
熊益冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WINSTRONG TECHNOLOGY Co Ltd
Original Assignee
WINSTRONG TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WINSTRONG TECHNOLOGY Co Ltd filed Critical WINSTRONG TECHNOLOGY Co Ltd
Priority to CN201610409958.5A priority Critical patent/CN105847303A/en
Publication of CN105847303A publication Critical patent/CN105847303A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a verification method of an intelligent access control unit. The method includes the following steps that: a remote monitoring server acquires user identity information of a resident of a community, and transmits the user identity information to the intelligent access control unit; the intelligent access control unit receives the registration request of a user, and matches information carried by the registration request with the user identity information; if the information carried by the registration request is successfully matched with the user identity information, the registration request is accepted; after the registration request is accepted, the intelligent access control unit prompts the user to input a first registration password and a second registration password, wherein the second registration password contains a vibration password formed by a first number of times of knocking the intelligent access control unit in a first preset time and a second number of times of knocking the intelligent access control unit in a second preset time; and if the user does not carry an access control card, the intelligent access control unit receives the first registration password and the second registration password which are inputted by the user, and allows the user to enter the community after the first registration password and the second registration password pass verification. The invention also discloses a system. By adopting the method and the system of the invention, the security and convenience of the intelligent access control unit can be improved, and the user who does not carry the access control card can be facilitated to open the access control unit.

Description

The verification method of a kind of intelligent entrance guard and system
Technical field
The present invention relates to, particularly relate to verification method and the system of a kind of intelligent entrance guard.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development in " information-based " epoch Stage.Its English name is: " Internet of things (IoT) ".As its name suggests, Internet of Things is exactly thing thing The Internet being connected.This has two-layer to look like: one, and core and the basis of Internet of Things remain the Internet, are Extension on Internet basic and the network of extension;Its two, its user side extend and extend to any thing Between product and article, carrying out information exchange and communicate, namely thing thing ceases mutually.Internet of Things by Intellisense, Identification technology communicates with general fit calculation etc. cognition technology, is widely used in the fusion of network, is the most therefore claimed Third wave for the development of world information industry after computer, the Internet.Internet of Things is the Internet Application extension, Internet of Things is network, not equal to Internet of Things is business and application.Therefore, application wound Being newly the core of Internet of Things development, the innovation 2.0 with Consumer's Experience as core is the soul of Internet of Things development.
Utilize the communication technology such as localized network or the Internet sensor, controller, machine, personnel and thing etc. It is linked togather by the way of new, forms people and be connected with thing with thing, thing, it is achieved informationization, remotely manage control System and intelligentized network.Internet of Things is the extension of the Internet, and it includes on the Internet and the Internet all of Resource, the compatible all of application in the Internet, but all of element in Internet of Things (all of equipment, resource and Communication etc.) it is all personalized and privatization.
Internet of Things is of many uses, throughout intelligent transportation, environmental conservation, government work, public safety, safety Household, intelligent fire, industry monitoring, environmental monitoring, street lighting management and control, Landscape Lighting management and control, building Illumination management and control, plaza lighting management and control, old man's nursing, personal health, flower culture, water system monitoring, food Trace to the source, enemy's situation investigation and multiple fields such as information gathering.Wherein, in terms of intelligent entrance guard, it allows tool The personnel of standby authority could enter, and is one of effective measures ensureing the neighbours living person and property safety.Mesh Front conventional intelligent access control system, each owner has an access card, and owner is by the brush at gate inhibition Scan in card machine and get final product opening gate.But, sometimes resident family may leave behind or lose door Prohibit card, at this time, it may be necessary to a kind of method of safe and reliable opening gate.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, it is provided that the verification method of a kind of intelligent entrance guard and System.So that solve when user does not carries access card cannot the problem of opening gate.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect provides testing of a kind of intelligent entrance guard Card method, including:
Remote monitoring server gathers the subscriber identity information of neighbours living, and is sent extremely by subscriber identity information Intelligent entrance guard;
Intelligent entrance guard receives the registration request of user, by the information carried in registration request and subscriber identity information Mate;
If the match is successful, then accept described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described First log-in password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, institute State in the second log-in password includes the first Preset Time and tap in first number of intelligent entrance guard and the second Preset Time Tap the vibration password of second number of intelligent entrance guard;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out Checking;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration Password;
After described second log-in password is verified, it is allowed to user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Remote monitoring server, for gathering the subscriber identity information of neighbours living, and by subscriber identity information Send to intelligent entrance guard;
Described intelligent entrance guard, for receiving the registration request of user, by the information carried in registration request and use Family identity information mates;
If the match is successful, then accept described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password, Described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first log-in password Afterwards, prompting user inputs the second log-in password, and described second log-in password strikes in including the first Preset Time The vibration password of second number of intelligent entrance guard is tapped in hitting first number of intelligent entrance guard and the second Preset Time;If User does not carries access card, receives the first log-in password of user's input and verifies;When described first note Volume password authentification is by afterwards, and described intelligent entrance guard prompting user inputs the second log-in password;When described second After log-in password is verified, it is allowed to user enters.
Implement the embodiment of the present invention, have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user is by intelligence Gate inhibition and remote monitoring server are registered after confirming user identity, it is ensured that the correctness of user identity; Then typing the first log-in password and the second log-in password;User can open by the way of checking password Gate inhibition, owing to adding the second log-in password, therefore relative to the mode of single password, safety is higher, And second the input mode of log-in password be to tap different number of times, crypticity and interest respectively in different Preset Time Taste is relatively strong, and safety is also higher than the percussion in the single time, and user's input is the most convenient, is beneficial to promote Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement In example or description of the prior art, the required accompanying drawing used is briefly described, it should be apparent that, describe below In accompanying drawing be only some embodiments of the present invention, for those of ordinary skill in the art, do not paying On the premise of going out creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the verification method of a kind of intelligent entrance guard of the embodiment of the present invention;
Fig. 2 is the composition schematic diagram of a kind of system of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, be fully described by, it is clear that described embodiment be only a part of embodiment of the present invention rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation The every other embodiment obtained under property work premise, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, for the schematic flow sheet of the verification method of a kind of intelligent entrance guard of the embodiment of the present invention, at this In embodiment, said method comprising the steps of:
S101, remote monitoring server gathers the subscriber identity information of neighbours living, and by subscriber identity information Send to intelligent entrance guard.
Alternatively, subscriber identity information includes user biological characteristic information, ID card information, photo, mobile phone At least one in number, personal set password, in order to ensure the correctness of user identity, can multiple believe Breath is used in combination, in order to the information for neighbours living of input system.
S102, intelligent entrance guard receives the registration request of user, information and the user's body that will carry in registration request Part information is mated.
S103, if the match is successful, then accepts described registration request.
S104, after registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password.
Alternatively, described biometrics password includes finger-print cipher, iris password or speech cipher.
S105, after described intelligent entrance guard has collected the first log-in password, it is close that prompting user inputs the second registration Code, described second log-in password taps first number of intelligent entrance guard and second and presets in including the first Preset Time The vibration password of second number of intelligent entrance guard is tapped in time.
Single numerical ciphers or biometrics password or gesture cipher safety are relatively low, and existing intelligent entrance guard uses Above-mentioned single password is very easy to the situation occurring password to be obtained by unauthorized person, the property safety of normal resident family It is difficult to preferably be protected, therefore, in the present embodiment, introduces the second log-in password in order to improve password Safety.And described second log-in password include the first Preset Time in tap first number of intelligent entrance guard and Tapping the vibration password of second number of intelligent entrance guard in second Preset Time, such as, first was struck in 5 seconds Hitting 3 times, second to tap 4 in 3 seconds inferior.First Preset Time and the second Preset Time can equal also Can not wait, first number and second number can be identical, it is also possible to different, when the first Preset Time arrives After, intelligent entrance guard can be by the auditory tone cues user of " ticking ".Will hit against intelligent entrance guard as the second registration Password, simulates the traditional approach entered of knocking at the door of routine, adds the interest of password authentification;And tap Availability must be just possessed after the first log-in password checking, therefore not verified at the first log-in password Time, it is not necessary to process the percussion detected, can avoid processing user misoperation or unconscious operation.Although Be provided with two passwords, but user input very convenient simply, only need to be at typing the first log-in password such as language Tap intelligent entrance guard, the most single password after sound, gesture, numeral or fingerprint etc., both improved The safety of intelligent entrance guard, turn avoid the trouble that Complicated Flow brings, and user's experience is preferable.And It not the single percussion in the time, complexity and the degree of safety of the second log-in password can be improved.
S106, if user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input And verify.
Certainly, even if user carries access card, it is possible to use the mode described in the present embodiment opens door Prohibit.Such as, user carries the most things and causes inconvenient when access card drawn out by pocket, can use First log-in password of voice, then taps intelligent entrance guard with wrist, elbow or other positions.
S107, after described first log-in password is verified, described intelligent entrance guard prompting user inputs the Two log-in passwords.
It should be noted that in the present embodiment, the first log-in password can point out user to input after being verified Second log-in password, for non-neighbours living, it may be difficult to expects that the mode inputting the second log-in password is Tapping intelligent entrance guard, therefore, safety and disguise are higher.It addition, after the first log-in password is verified User can not also be pointed out to input the second log-in password, and only prompting user's the first log-in password is verified, by User inputs the second log-in password in the Preset Time after passing through, such that it is able to promote the second registration further The disguise of password.
S108, after described second log-in password is verified, it is allowed to user enters.
In the present embodiment, by intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, User is registered after confirming user identity by intelligent entrance guard and remote monitoring server, it is ensured that Yong Hushen The correctness of part;Then typing the first log-in password and the second log-in password;User can be close by checking The mode opening gate of code, owing to adding the second log-in password, therefore relative to the mode of single password, Safety is higher, and the input mode of the second log-in password is the number of times of percussion difference respectively in different Preset Time, Crypticity and interest are relatively strong, and safety is also higher than the percussion in the single time, and user's input is the most convenient, It is beneficial to promote Consumer's Experience.
In view of the second log-in password for tap, in order to prevent illegal user from malicious from attempting, can arrange 3 times defeated After entering unsuccessfully, temporary transient refusal processes the request of this user.If this user is neighbours living really, it can lead to Cross the manager of contact remote monitoring server end by remote opening gate inhibition after monitored picture confirmation identity.
Alternatively, preserve the first log-in password except intelligent entrance guard this locality and the second log-in password carries out verifying it Outward, it is also possible to verified by remote monitoring server.Although remote monitoring server carries out checking may Efficiency can be slightly slow, but can promote safety further, especially breaks down cannot verify at intelligent entrance guard Time, verified by remote monitoring server, the stability of system work can be promoted further.
When using remote monitoring server to verify, can be by intelligent entrance guard by the first log-in password and the Two log-in passwords are sent directly to remote monitoring server and preserve.Certainly, in order to promote second further The safety of log-in password and disguise, it is also possible to send out again after the second log-in password is carried out suitable process Deliver to remote monitoring server.Idiographic flow is described as follows:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein, Described preset rules is accepted to send afterwards to described at the registration request of user by described remote monitoring server Intelligent entrance guard is to notify user;
Described first log-in password is sent to described long-range monitoring clothes with the second log-in password being multiplied by after 2 Business device preserves;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described long-range monitoring to take Business device carries out password authentification;
Certainly, may be otherwise and do not point out, user oneself select remote monitoring server checking.
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first registration Password sends to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
By the way, the second log-in password is processed, so, when gate inhibition is normal, user Only need to tap the number of times in the second log-in password when registration and normal use, when intelligent entrance guard damages by far During range monitoring server authentication, the second log-in password there occurs change, and this change can promote intelligence further The safety of energy gate inhibition.
Alternatively, when intelligent entrance guard damages or needs to carry out system update, needs to change intelligent entrance guard, institute State intelligent entrance guard to send described first log-in password and described second log-in password to described remote monitoring service Device preserves;
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server Intelligent entrance guard to replacing.
So that it is guaranteed that the integrity of user data and safety before and after Geng Huaning.
Owing to present community old people gets more and more, the first log-in password can be biometrics password, it is not necessary to worry User forgets, but the second log-in password it is easy to forget that.Following flow process now can be used to carry out opening gate.
If user forgets described second log-in password, the first registration that user is inputted by the most described intelligent entrance guard is close After code is proved to be successful, receive the call request of user;
Described call request is sent to described remote monitoring server, or by described call request with note The mode of breath or phone sends the mobile phone to described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server, remotely supervise Control server receives the remote control open command of described manager, opens described intelligent entrance guard.
Refer to Fig. 2, for the composition schematic diagram of a kind of system of the embodiment of the present invention, in the present embodiment, described System includes: remote monitoring server 200 and at least one intelligent entrance guard 100.Intelligent entrance guard 100 includes using In providing the photographic head of monitored picture for remote monitoring server 200, for input numerical ciphers button or Touch screen (touch screen can also be used for input gesture password), for inputting the biometrics password identification mould of biometrics password Group enters fingerprint recognition module, iris identification module or speech recognition module, for sensing the sensor of vibrations, And for verifying the authentication module of password.Remote monitoring server 200 includes display and for storing number According to server.
Specifically, remote monitoring server 200, for gathering the subscriber identity information of neighbours living, and will use Family identity information sends to intelligent entrance guard 100;
Described intelligent entrance guard 100, for receiving the registration request of user, by the information carried in registration request with Subscriber identity information mates;
If the match is successful, then accept described registration request;
After registration request is accepted, described intelligent entrance guard 100 is additionally operable to point out user to input the first registration Password, described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first note After volume password, prompting user inputs the second log-in password, and described second log-in password includes first when presetting Intelligent entrance guard number of times is tapped in interior the first vibration password tapping intelligent entrance guard number of times and the second Preset Time Second vibration password;If user does not carries access card, receive the first log-in password of user's input and test Card;After described first log-in password is verified, described intelligent entrance guard 100 points out user to input second Log-in password;After described second log-in password is verified, it is allowed to user enters.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described default rule Then accepted to send afterwards to described Intelligent door at the registration request of user by described remote monitoring server 200 Prohibit 100 to notify user;Described first log-in password is sent extremely with the second log-in password being multiplied by after 2 Described remote monitoring server 200 preserves;If described Intelligent door 100 is prohibited damage and be cannot be carried out password authentification, Then prompting user selects described remote monitoring server 200 to carry out password authentification;Receive the long-range of user's input Monitoring server checking request, sends described first log-in password with the second log-in password being multiplied by after 2 To described remote monitoring server 200;
Described remote monitoring server 200 is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens Open.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Described first log-in password and described second log-in password are sent to described remote monitoring server 200 Preserve;
Described remote monitoring server 200 is additionally operable to:
When described intelligent entrance guard 100 is replaced, the password that described remote monitoring server 200 will preserve Data send the intelligent entrance guard to replacing.
Alternatively, if user forget described second log-in password, the most described intelligent entrance guard 100 be additionally operable to After first log-in password of family input is proved to be successful, receive the call request of user;By described call request Send to described remote monitoring server 200, or described call request is sent out in the way of short message or phone Deliver to the mobile phone of described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server 200, institute State remote monitoring server 200 and be additionally operable to receive the remote control open command of described manager, open described intelligence Gate inhibition.
Wherein, described biometrics password includes finger-print cipher, iris password or speech cipher.
It should be noted that each embodiment in this specification all uses the mode gone forward one by one to describe, Mei Geshi Execute that example stresses is all the difference with other embodiments, identical similar portion between each embodiment Divide and see mutually.For device embodiment, due to itself and embodiment of the method basic simlarity, so Describe is fairly simple, and relevant part sees the part of embodiment of the method and illustrates.
By the description of above-described embodiment, the invention have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user is by intelligence Gate inhibition and remote monitoring server are registered after confirming user identity, it is ensured that the correctness of user identity; Then typing the first log-in password and the second log-in password;User can open by the way of checking password Gate inhibition, owing to adding the second log-in password, therefore relative to the mode of single password, safety is higher, And second the input mode of log-in password be to tap different number of times, crypticity and interest respectively in different Preset Time Taste is relatively strong, and safety is also higher than the percussion in the single time, and user's input is the most convenient, is beneficial to promote Consumer's Experience.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method. Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, It is called for short ROM) or random store-memory body (Random Access Memory is called for short RAM) etc..
Above disclosed be only present pre-ferred embodiments, certainly can not with this limit the present invention it Interest field, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.

Claims (10)

1. the verification method of an intelligent entrance guard, it is characterised in that it is characterized in that, including:
Remote monitoring server gathers the subscriber identity information of neighbours living, and is sent extremely by subscriber identity information Intelligent entrance guard;
Described intelligent entrance guard receives the registration request of user, by the information carried in registration request and user Identity information mates;
If the match is successful, then accept described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described First log-in password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, institute State in the second log-in password includes the first Preset Time and tap in first number of intelligent entrance guard and the second Preset Time Tap the vibration password of second number of intelligent entrance guard;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out Checking;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration Password;
After described second log-in password is verified, it is allowed to user enters.
2. device as claimed in claim 1, it is characterised in that also include:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein, Described preset rules is accepted to send afterwards to described at the registration request of user by described remote monitoring server Intelligent entrance guard is to notify user;
Described first log-in password is sent to described long-range monitoring clothes with the second log-in password being multiplied by after 2 Business device preserves;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described long-range monitoring to take Business device carries out password authentification;
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first registration Password sends to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
3. the method as described in claim 1-2, it is characterised in that also include:
Described first log-in password and described second log-in password are sent to described long-range prison by described intelligent entrance guard Control server preserves;
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server Intelligent entrance guard to replacing.
4. the method as described in any one of claim 1-3, it is characterised in that if user forgets described second Log-in password, after the first log-in password that user is inputted by the most described intelligent entrance guard is proved to be successful, receives and uses The call request at family;
Described call request is sent to described remote monitoring server, or by described call request with note The mode of breath or phone sends the mobile phone to described manager;
After described manager confirms user identity by the monitored picture of remote server, remotely monitor clothes Business device receives the remote control open command of described manager, opens described intelligent entrance guard.
5. the method as described in any one of claim 1-4, it is characterised in that described biometrics password includes referring to Stricture of vagina password, iris password or speech cipher.
6. a system, it is characterised in that including:
Remote monitoring server, for gathering the subscriber identity information of neighbours living, and by subscriber identity information Send to intelligent entrance guard;
Described intelligent entrance guard, for receiving the registration request of user, by the information carried in registration request and use Family identity information mates;
If the match is successful, then accept described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password, Described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first log-in password Afterwards, prompting user inputs the second log-in password, and described second log-in password strikes in including the first Preset Time The vibration password of second number of intelligent entrance guard is tapped in hitting first number of intelligent entrance guard and the second Preset Time;If User does not carries access card, receives the first log-in password of user's input and verifies;When described first note Volume password authentification is by afterwards, and described intelligent entrance guard prompting user inputs the second log-in password;When described second After log-in password is verified, it is allowed to user enters.
7. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described default rule Then by described remote monitoring server the registration request of user accepted to send afterwards to described intelligent entrance guard with Notify user;By the most described remotely with the second log-in password transmission being multiplied by after 2 for described first log-in password Monitoring server preserves;If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects institute State remote monitoring server and carry out password authentification;Receive the remote monitoring server checking request of user's input, Described first log-in password is sent to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens.
8. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Described first log-in password and described second log-in password are sent to the preservation of described remote monitoring server;
Described remote monitoring server is additionally operable to:
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server Intelligent entrance guard to replacing.
9. system as claimed in claim 6, it is characterised in that if user forgets described second log-in password, After the most described intelligent entrance guard is additionally operable to be proved to be successful the first log-in password of user's input, receive user's Call request;Described call request is sent to described remote monitoring server, or by described call request The mobile phone to described manager is sent in the way of short message or phone;
After described manager confirms user identity by the monitored picture of remote monitoring server, described far Range monitoring server is additionally operable to receive the remote control open command of described manager, opens described intelligent entrance guard.
10. the system as described in any one of claim 6-9, it is characterised in that described biometrics password includes referring to Stricture of vagina password, iris password or speech cipher.
CN201610409958.5A 2016-06-12 2016-06-12 Verification method and system of intelligent access control unit Pending CN105847303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610409958.5A CN105847303A (en) 2016-06-12 2016-06-12 Verification method and system of intelligent access control unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610409958.5A CN105847303A (en) 2016-06-12 2016-06-12 Verification method and system of intelligent access control unit

Publications (1)

Publication Number Publication Date
CN105847303A true CN105847303A (en) 2016-08-10

Family

ID=56575778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610409958.5A Pending CN105847303A (en) 2016-06-12 2016-06-12 Verification method and system of intelligent access control unit

Country Status (1)

Country Link
CN (1) CN105847303A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600767A (en) * 2016-11-29 2017-04-26 深圳智乐信息科技有限公司 Verification method and system based on identification card
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN106991744A (en) * 2017-04-10 2017-07-28 深圳市和泰业成建设工程有限责任公司 Method for verifying authority, door control terminal and gate control system
CN107046556A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 A kind of method and system of checking
CN107046524A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN107545631A (en) * 2017-07-24 2018-01-05 新华三技术有限公司 The realization device that gate inhibition's method for unlocking, device and gate inhibition unlock
WO2018006327A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Access grant acquisition method and system for intelligent access control
CN108418829A (en) * 2018-03-22 2018-08-17 平安科技(深圳)有限公司 Account Sign-On authentication method, apparatus, computer equipment and storage medium
CN110930546A (en) * 2018-08-31 2020-03-27 阿里巴巴集团控股有限公司 Information processing method, device and system, storage medium and processor
CN111669408A (en) * 2017-03-30 2020-09-15 阿里巴巴集团控股有限公司 Identity registration and authentication method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030126039A1 (en) * 2001-12-27 2003-07-03 Brother Kogyo Kabushiki Kaisha Network and terminal devices
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN102542908A (en) * 2012-02-27 2012-07-04 深圳市赛格导航科技股份有限公司 Password verification method and device based on vibration
CN105072611A (en) * 2015-07-08 2015-11-18 广东欧珀移动通信有限公司 Verification method and terminal
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030126039A1 (en) * 2001-12-27 2003-07-03 Brother Kogyo Kabushiki Kaisha Network and terminal devices
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN102542908A (en) * 2012-02-27 2012-07-04 深圳市赛格导航科技股份有限公司 Password verification method and device based on vibration
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system
CN105072611A (en) * 2015-07-08 2015-11-18 广东欧珀移动通信有限公司 Verification method and terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018006327A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Access grant acquisition method and system for intelligent access control
CN106600767A (en) * 2016-11-29 2017-04-26 深圳智乐信息科技有限公司 Verification method and system based on identification card
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN107046556A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 A kind of method and system of checking
CN107046524A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN111669408A (en) * 2017-03-30 2020-09-15 阿里巴巴集团控股有限公司 Identity registration and authentication method and device
CN106991744A (en) * 2017-04-10 2017-07-28 深圳市和泰业成建设工程有限责任公司 Method for verifying authority, door control terminal and gate control system
CN107545631A (en) * 2017-07-24 2018-01-05 新华三技术有限公司 The realization device that gate inhibition's method for unlocking, device and gate inhibition unlock
CN108418829A (en) * 2018-03-22 2018-08-17 平安科技(深圳)有限公司 Account Sign-On authentication method, apparatus, computer equipment and storage medium
CN110930546A (en) * 2018-08-31 2020-03-27 阿里巴巴集团控股有限公司 Information processing method, device and system, storage medium and processor
CN110930546B (en) * 2018-08-31 2022-06-14 阿里巴巴集团控股有限公司 Information processing method, device and system, storage medium and processor

Similar Documents

Publication Publication Date Title
CN105847303A (en) Verification method and system of intelligent access control unit
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
CN105847451A (en) Method and system for controlling intelligent access control unit by using mobile terminal
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
CN106506442B (en) A kind of smart home multi-user identification and its Rights Management System
CN105872104A (en) Method and system for managing intelligent entrance guard by combining mobile terminal
CN105869255A (en) Intelligent access control method and system based on mobile terminal
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN110211267A (en) Indoor openings control method, the configuration method of permission, device and storage medium
CN104065823A (en) User mode control method and user mode control system based on iris recognition technology for mobile terminal
CN206522020U (en) A kind of intelligent door lock and system
US20170004296A1 (en) Biometric authentication method and biometric authentication system
US11367323B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
US9977924B2 (en) Method and device for providing notification indicating loss of terminal
CN105893823A (en) Security protection method and device, and intelligent terminal
CN106097500B (en) A kind of method and system for responding user and entering
CN105913513A (en) Control method and system for door lock system
CN106096377A (en) Application unlocking method, device and the mobile terminal of a kind of mobile terminal
CN109409044A (en) A kind of verifying interface display method and terminal
CN103806789A (en) Intelligent safety box with iris recognition function
CN205140028U (en) Gate inhibition system
CN106293075A (en) A kind of control system based on wearable device and control method
US10686935B1 (en) Fraud detection for controlled-environment facility communications system
CN203947945U (en) A kind of intelligent safe that possesses iris identifying function
CN105703909A (en) Authentication method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160810

RJ01 Rejection of invention patent application after publication