CN105915544A - Intelligent entrance guard management method and intelligent entrance guard system - Google Patents
Intelligent entrance guard management method and intelligent entrance guard system Download PDFInfo
- Publication number
- CN105915544A CN105915544A CN201610408396.2A CN201610408396A CN105915544A CN 105915544 A CN105915544 A CN 105915544A CN 201610408396 A CN201610408396 A CN 201610408396A CN 105915544 A CN105915544 A CN 105915544A
- Authority
- CN
- China
- Prior art keywords
- password
- entrance guard
- log
- intelligent entrance
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/23—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/33—Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
The embodiment of the invention discloses an intelligent entrance guard management method. The intelligent entrance guard management method comprises the following steps that: a remote monitoring server allocates an authorization code to a resident in a residence community; an intelligent entrance guard receives a registration request input by a user, and sends the registration request to the remote monitoring server for verification, wherein the registration request includes authorization code information input by the user; the remote monitoring server verifies the authorization code, and instructs the intelligent entrance guard to accept the registration request after pass of the verification; the intelligent entrance guard prompts the user to input a first registration password and a second registration password, wherein the second registration password includes vibration passwords for knocking a first area of the intelligent entrance guard for a first time and knocking a second area of the intelligent entrance guard for a second time; and if the user does not carry any entrance guard card, the intelligent entrance guard receives the first registration password and the second registration password input by the user, and allows the user to enter after pass of the verification. The embodiment of the invention also discloses an intelligent entrance guard system. Through adoption of the intelligent entrance guard management method and the intelligent entrance guard system, the security and convenience of the intelligent entrance guard can be improved, and the user can enable the entrance guard conveniently when not carrying the entrance guard card.
Description
Technical field
The present invention relates to Internet of Things field, particularly relate to a kind of intelligent entrance guard management method and intelligent access control system.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development in " information-based " epoch
Stage.Its English name is: " Internet of things (IoT) ".As its name suggests, Internet of Things is exactly thing thing
The Internet being connected.This has two-layer to look like: one, and core and the basis of Internet of Things remain the Internet, are
Extension on Internet basic and the network of extension;Its two, its user side extend and extend to any thing
Between product and article, carrying out information exchange and communicate, namely thing thing ceases mutually.Internet of Things by Intellisense,
Identification technology communicates with general fit calculation etc. cognition technology, is widely used in the fusion of network, is the most therefore claimed
Third wave for the development of world information industry after computer, the Internet.Internet of Things is the Internet
Application extension, Internet of Things is network, not equal to Internet of Things is business and application.Therefore, application wound
Being newly the core of Internet of Things development, the innovation 2.0 with Consumer's Experience as core is the soul of Internet of Things development.
Utilize the communication technology such as localized network or the Internet sensor, controller, machine, personnel and thing etc.
It is linked togather by the way of new, forms people and be connected with thing with thing, thing, it is achieved informationization, remotely manage control
System and intelligentized network.Internet of Things is the extension of the Internet, and it includes on the Internet and the Internet all of
Resource, the compatible all of application in the Internet, but all of element in Internet of Things (all of equipment, resource and
Communication etc.) it is all personalized and privatization.
Internet of Things is of many uses, throughout intelligent transportation, environmental conservation, government work, public safety, safety
Household, intelligent fire, industry monitoring, environmental monitoring, street lighting management and control, Landscape Lighting management and control, building
Illumination management and control, plaza lighting management and control, old man's nursing, personal health, flower culture, water system monitoring, food
Trace to the source, enemy's situation investigation and multiple fields such as information gathering.Wherein, in terms of intelligent entrance guard, it allows tool
The personnel of standby authority could enter, and is one of effective measures ensureing the neighbours living person and property safety.Mesh
Front conventional intelligent access control system, each owner has an access card, and owner is by the brush at gate inhibition
Scan in card machine and get final product opening gate.But, sometimes resident family may leave behind or lose door
Prohibit card, at this time, it may be necessary to a kind of method of safe and reliable opening gate.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, it is provided that a kind of intelligent entrance guard management method and intelligence
Can gate control system.So that solve when user does not carries access card cannot the problem of opening gate.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect provides a kind of intelligent entrance guard management
Method, including:
Remote monitoring server is that neighbours living distributes authorization code;
Intelligent entrance guard receives the registration request of user's input sending to remote monitoring server and verifies, institute
State the authorization code information comprising user's input in registration request,;
Authorization code is verified by remote monitoring server, is verified and notifies that described intelligent entrance guard accepts afterwards
Described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described
First log-in password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, institute
State in the second log-in password includes Preset Time and tap first time, intelligent entrance guard first area number and tap Intelligent door
Prohibit the vibration password of second number of second area;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out
Checking;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration
Password;
After described second log-in password is verified, it is allowed to user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Remote monitoring server, for distributing authorization code for neighbours living;
Intelligent entrance guard, tests for receiving the registration request of user's input sending to remote monitoring server
Card, comprises the authorization code information of user's input in described registration request,;
Described remote monitoring server is additionally operable to verify authorization code, is verified and notifies described intelligence afterwards
Gate inhibition can accept described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password,
Described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first log-in password
Afterwards, prompting user inputs the second log-in password, and described second log-in password taps intelligence in including Preset Time
Can first time, gate inhibition first area number and the vibration password of percussion second number of intelligent entrance guard second area;If using
Access card is not carried at family, receives the first log-in password of user's input and verifies;When described first registers
Password authentification is by afterwards, and described intelligent entrance guard prompting user inputs the second log-in password;When described second note
Volume password authentification is by afterwards, it is allowed to user enters.
Implement the embodiment of the present invention, have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user is by intelligence
Gate inhibition and remote monitoring server are registered after confirming user identity, it is ensured that the correctness of user identity;
Then typing the first log-in password and the second log-in password;User can open by the way of checking password
Gate inhibition, owing to adding the second log-in password, therefore relative to the mode of single password, safety is higher,
And second the input mode of log-in password be that zones of different is tapped respectively different number of times, crypticity and entertaining
Property relatively strong, and tap zones of different and can promote complexity and the degree of safety of the second log-in password further, use
Family input is the most convenient, is beneficial to promote Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement
In example or description of the prior art, the required accompanying drawing used is briefly described, it should be apparent that, describe below
In accompanying drawing be only some embodiments of the present invention, for those of ordinary skill in the art, do not paying
On the premise of going out creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the embodiment of the present invention a kind of intelligent entrance guard management method;
Fig. 2 is the composition schematic diagram of a kind of intelligent access control system of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, be fully described by, it is clear that described embodiment be only a part of embodiment of the present invention rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation
The every other embodiment obtained under property work premise, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, for the schematic flow sheet of the embodiment of the present invention a kind of intelligent entrance guard management method, in this reality
Execute in example, said method comprising the steps of:
S101, remote monitoring server is that neighbours living distributes authorization code.
Remote monitoring server needs to confirm the identity of neighbours living, it is ensured that authorization code is only assigned to this community
After family, and authorization code use, inefficacy can not be reused.
S102, intelligent entrance guard receives the registration request of user's input sending to remote monitoring server and tests
Card, comprises the authorization code information of user's input in described registration request.
S103, authorization code is verified by remote monitoring server, is verified and notifies described Intelligent door afterwards
Prohibit and accept described registration request.
S104, after registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password.
Alternatively, described biometrics password includes finger-print cipher, iris password or speech cipher.
S105, after described intelligent entrance guard has collected the first log-in password, it is close that prompting user inputs the second registration
Code, described second log-in password taps intelligent entrance guard first area number of times and taps intelligence in including Preset Time
The vibration password of gate inhibition's second area number of times.
Single numerical ciphers or biometrics password or gesture cipher safety are relatively low, and existing intelligent entrance guard uses
Above-mentioned single password is very easy to the situation occurring password to be obtained by unauthorized person, the property safety of normal resident family
It is difficult to preferably be protected, therefore, in the present embodiment, introduces the second log-in password in order to improve password
Safety.And described second log-in password include Preset Time in tap intelligent entrance guard first area for the first time
Number and the vibration password of percussion second number of intelligent entrance guard second area.Such as, first area taps 3 times,
It is inferior that second area taps 4.First Preset Time and the second Preset Time can equal can not also wait, the
Number and second number can be identical, it is also possible to different, after the first Preset Time arrives, and intelligent entrance guard
Can be by the auditory tone cues user of " ticking ".Will hit against intelligent entrance guard as the second log-in password, simulate
The conventional traditional approach entered of knocking at the door, adds the interest of password authentification;And tap must be at the first note
Availability is just possessed, therefore when the first log-in password is not verified, it is not necessary to process after volume password authentification
The percussion detected, can avoid processing user misoperation or unconscious operation.Although be provided with two close
Code, but user input very convenient simply, only need to be at typing the first log-in password such as voice, gesture, number
Tap intelligent entrance guard, the most single password after word or fingerprint etc., both improve intelligent entrance guard
Safety, turn avoid the trouble that Complicated Flow brings, and user's experience is preferable.And second log-in password
For tapping the vibration password of two region number of times, first area is different with second area, first number and second
Number of times can be identical, it is also possible to different, by such setting so that the complexity of the second log-in password and
Degree of safety promotes further, and user performs to operate the most very convenient.
S106, if user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input
And verify.
Certainly, even if user carries access card, it is possible to use the mode described in the present embodiment opens door
Prohibit.Such as, user carries the most things and causes inconvenient when access card drawn out by pocket, can use
First log-in password of voice, then taps intelligent entrance guard with wrist, elbow or other positions.
S107, after described first log-in password is verified, described intelligent entrance guard prompting user inputs the
Two log-in passwords.
It should be noted that in the present embodiment, the first log-in password can point out user to input after being verified
Second log-in password, for non-neighbours living, it may be difficult to expects that the mode inputting the second log-in password is
Tapping intelligent entrance guard, therefore, safety and disguise are higher.It addition, after the first log-in password is verified
User can not also be pointed out to input the second log-in password, and only prompting user's the first log-in password is verified, by
User inputs the second log-in password in the Preset Time after passing through, such that it is able to promote the second registration further
The disguise of password.
S108, after described second log-in password is verified, it is allowed to user enters.
In the present embodiment, by intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system,
User is registered after confirming user identity by intelligent entrance guard and remote monitoring server, it is ensured that Yong Hushen
The correctness of part;Then typing the first log-in password and the second log-in password;User can be close by checking
The mode opening gate of code, owing to adding the second log-in password, therefore relative to the mode of single password,
Safety is higher, and the input mode of the second log-in password is that zones of different taps different number of times respectively,
Crypticity and interest are relatively strong, and percussion zones of different can promote the complexity of the second log-in password further
And degree of safety, user's input is the most convenient, is beneficial to promote Consumer's Experience.
In view of the second log-in password for tap, in order to prevent illegal user from malicious from attempting, can arrange 3 times defeated
After entering unsuccessfully, temporary transient refusal processes the request of this user.If this user is neighbours living really, it can lead to
Cross the manager of contact remote monitoring server end by remote opening gate inhibition after monitored picture confirmation identity.
Alternatively, preserve the first log-in password except intelligent entrance guard this locality and the second log-in password carries out verifying it
Outward, it is also possible to verified by remote monitoring server.Although remote monitoring server carries out checking may
Efficiency can be slightly slow, but can promote safety further, especially breaks down cannot verify at intelligent entrance guard
Time, verified by remote monitoring server, the stability of system work can be promoted further.
When using remote monitoring server to verify, can be by intelligent entrance guard by the first log-in password and the
Two log-in passwords are sent directly to remote monitoring server and preserve.Certainly, in order to promote second further
The safety of log-in password and disguise, it is also possible to send out again after the second log-in password is carried out suitable process
Deliver to remote monitoring server.Idiographic flow is described as follows:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein,
Described preset rules is accepted to send afterwards to described at the registration request of user by described remote monitoring server
Intelligent entrance guard is to notify user;
It is to calculate first number and second number respectively that number of taps is multiplied by 2 herein.
Described first log-in password is sent to described long-range monitoring clothes with the second log-in password being multiplied by after 2
Business device preserves;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described long-range monitoring to take
Business device carries out password authentification;
Certainly, may be otherwise and do not point out, user oneself select remote monitoring server checking.
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first registration
Password sends to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
By the way, the second log-in password is processed, so, when gate inhibition is normal, user
Only need to tap the number of times in the second log-in password when registration and normal use, when intelligent entrance guard damages by far
During range monitoring server authentication, the second log-in password there occurs change, and this change can promote intelligence further
The safety of energy gate inhibition.
Alternatively, when intelligent entrance guard damages or needs to carry out system update, needs to change intelligent entrance guard, institute
State intelligent entrance guard to send described first log-in password and described second log-in password to described remote monitoring service
Device preserves;
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server
Intelligent entrance guard to replacing.
So that it is guaranteed that the integrity of user data and safety before and after Geng Huaning.
Owing to present community old people gets more and more, the first log-in password can be biometrics password, it is not necessary to worry
User forgets, but the second log-in password it is easy to forget that.Following flow process now can be used to carry out opening gate.
If user forgets described second log-in password, the first registration that user is inputted by the most described intelligent entrance guard is close
After code is proved to be successful, receive the call request of user;
Described call request is sent to described remote monitoring server, or by described call request with note
The mode of breath or phone sends the mobile phone to described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server, remotely supervise
Control server receives the remote control open command of described manager, opens described intelligent entrance guard.
Refer to Fig. 2, for the composition schematic diagram of a kind of intelligent access control system of the embodiment of the present invention, at the present embodiment
In, described system includes: remote monitoring server 200 and at least one intelligent entrance guard 100.Intelligent entrance guard
100 include the photographic head for providing monitored picture for remote monitoring server 200, are used for inputting numerical ciphers
Button or touch screen (touch screen can also be used for input gesture password), close for inputting the biology of biometrics password
Code identifies that module enters fingerprint recognition module, iris identification module or speech recognition module, for sensing vibrations
Sensor, and for verifying the authentication module of password.Remote monitoring server 200 includes display and use
Server in storage data.
Specifically, remote monitoring server 200, for distributing authorization code for neighbours living;
Intelligent entrance guard 100, is carried out for receiving the registration request of user's input sending to remote monitoring server
Checking, comprises the authorization code information of user's input in described registration request,;
Described remote monitoring server 200 is additionally operable to verify authorization code, is verified and notifies institute afterwards
State intelligent entrance guard 100 and accept described registration request;
After registration request is accepted, described intelligent entrance guard 100 is additionally operable to point out user to input the first registration
Password, described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first note
After volume password, prompting user inputs the second log-in password, in described second log-in password includes Preset Time
Tap first time, intelligent entrance guard first area number and tap the vibration password of second number of intelligent entrance guard second area;
If user does not carries access card, receive the first log-in password of user's input and verify;When described first
After log-in password is verified, described intelligent entrance guard 100 points out user to input the second log-in password;Work as institute
State after the second log-in password is verified, it is allowed to user enters.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described default rule
Then accepted to send afterwards to described Intelligent door at the registration request of user by described remote monitoring server 200
Prohibit 100 to notify user;Described first log-in password is sent extremely with the second log-in password being multiplied by after 2
Described remote monitoring server 200 preserves;If described Intelligent door 100 is prohibited damage and be cannot be carried out password authentification,
Then prompting user selects described remote monitoring server 200 to carry out password authentification;Receive the long-range of user's input
Monitoring server checking request, sends described first log-in password with the second log-in password being multiplied by after 2
To described remote monitoring server 200;
Described remote monitoring server 200 is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens
Open.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Described first log-in password and described second log-in password are sent to described remote monitoring server 200
Preserve;
Described remote monitoring server 200 is additionally operable to:
When described intelligent entrance guard 100 is replaced, the password that described remote monitoring server 200 will preserve
Data send the intelligent entrance guard to replacing.
Alternatively, if user forget described second log-in password, the most described intelligent entrance guard 100 be additionally operable to
After first log-in password of family input is proved to be successful, receive the call request of user;By described call request
Send to described remote monitoring server 200, or described call request is sent out in the way of short message or phone
Deliver to the mobile phone of described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server 200, institute
State remote monitoring server 200 and be additionally operable to receive the remote control open command of described manager, open described intelligence
Gate inhibition.
Wherein, described biometrics password includes finger-print cipher, iris password or speech cipher.
It should be noted that each embodiment in this specification all uses the mode gone forward one by one to describe, Mei Geshi
Execute that example stresses is all the difference with other embodiments, identical similar portion between each embodiment
Divide and see mutually.For device embodiment, due to itself and embodiment of the method basic simlarity, so
Describe is fairly simple, and relevant part sees the part of embodiment of the method and illustrates.
By the description of above-described embodiment, the invention have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user is by intelligence
Gate inhibition and remote monitoring server are registered after confirming user identity, it is ensured that the correctness of user identity;
Then typing the first log-in password and the second log-in password;User can open by the way of checking password
Gate inhibition, owing to adding the second log-in password, therefore relative to the mode of single password, safety is higher,
And second the input mode of log-in password be that zones of different is tapped respectively different number of times, crypticity and entertaining
Property relatively strong, and tap zones of different and can promote complexity and the degree of safety of the second log-in password further, use
Family input is the most convenient, is beneficial to promote Consumer's Experience.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method,
Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating
In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.
Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory,
It is called for short ROM) or random store-memory body (Random Access Memory is called for short RAM) etc..
Above disclosed be only present pre-ferred embodiments, certainly can not with this limit the present invention it
Interest field, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.
Claims (10)
1. an a kind of intelligent entrance guard management method, it is characterised in that including:
Remote monitoring server is that neighbours living distributes authorization code;
Intelligent entrance guard receives the registration request of user's input sending to remote monitoring server and verifies, institute
State the authorization code information comprising user's input in registration request;
Authorization code is verified by remote monitoring server, is verified and notifies that described intelligent entrance guard accepts afterwards
Described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described
First log-in password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, institute
State in the second log-in password includes Preset Time and tap first time, intelligent entrance guard first area number and tap Intelligent door
Prohibit the vibration password of second number of second area;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out
Checking;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration
Password;
After described second log-in password is verified, it is allowed to user enters.
2. device as claimed in claim 1, it is characterised in that also include:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein,
Described preset rules is accepted to send afterwards to described at the registration request of user by described remote monitoring server
Intelligent entrance guard is to notify user.
Described first log-in password is sent to described long-range monitoring clothes with the second log-in password being multiplied by after 2
Business device preserves;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described long-range monitoring to take
Business device carries out password authentification;
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first registration
Password sends to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
3. method as claimed in claim 1 or 2, it is characterised in that also include:
Described first log-in password and described second log-in password are sent to described long-range prison by described intelligent entrance guard
Control server preserves;
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server
Intelligent entrance guard to replacing.
4. the method as described in claim 1-3, it is characterised in that if user forgets that described second registration is close
Code, after the first log-in password that user is inputted by the most described intelligent entrance guard is proved to be successful, receives exhaling of user
Cry request;
Described call request is sent to described remote monitoring server, or by described call request with note
The mode of breath or phone sends the mobile phone to described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server, remotely supervise
Control server receives the remote control open command of described manager, opens described intelligent entrance guard.
5. the method as described in any one of claim 1-4, it is characterised in that described biometrics password includes referring to
Stricture of vagina password, iris password or speech cipher.
6. an intelligent access control system, it is characterised in that including:
Remote monitoring server, for distributing authorization code for neighbours living;
Intelligent entrance guard, tests for receiving the registration request of user's input sending to remote monitoring server
Card, comprises the authorization code information of user's input in described registration request,;
Described remote monitoring server is additionally operable to verify authorization code, is verified and notifies described intelligence afterwards
Gate inhibition can accept described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password,
Described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first log-in password
Afterwards, prompting user inputs the second log-in password, and described second log-in password taps intelligence in including Preset Time
Can first time, gate inhibition first area number and the vibration password of percussion second number of intelligent entrance guard second area;If using
Access card is not carried at family, receives the first log-in password of user's input and verifies;When described first registers
Password authentification is by afterwards, and described intelligent entrance guard prompting user inputs the second log-in password;When described second note
Volume password authentification is by afterwards, it is allowed to user enters.
7. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described default rule
Then by described remote monitoring server the registration request of user accepted to send afterwards to described intelligent entrance guard with
Notify user;By the most described remotely with the second log-in password transmission being multiplied by after 2 for described first log-in password
Monitoring server preserves;If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects institute
State remote monitoring server and carry out password authentification;Receive the remote monitoring server checking request of user's input,
Described first log-in password is sent to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens.
8. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Described first log-in password and described second log-in password are sent to the preservation of described remote monitoring server;
Described remote monitoring server is additionally operable to:
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server
Intelligent entrance guard to replacing.
9. system as claimed in claim 6, it is characterised in that if user forgets described second log-in password,
After the most described intelligent entrance guard is additionally operable to be proved to be successful the first log-in password of user's input, receive user's
Call request;Described call request is sent to described remote monitoring server, or by described call request
The mobile phone to described manager is sent in the way of short message or phone;
After described manager confirms user identity by the monitored picture of remote monitoring server, described far
Range monitoring server is additionally operable to receive the remote control open command of described manager, opens described intelligent entrance guard.
10. the system as described in any one of claim 6-9, it is characterised in that described biometrics password includes referring to
Stricture of vagina password, iris password or speech cipher.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610408396.2A CN105915544A (en) | 2016-06-12 | 2016-06-12 | Intelligent entrance guard management method and intelligent entrance guard system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610408396.2A CN105915544A (en) | 2016-06-12 | 2016-06-12 | Intelligent entrance guard management method and intelligent entrance guard system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105915544A true CN105915544A (en) | 2016-08-31 |
Family
ID=56750637
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610408396.2A Pending CN105915544A (en) | 2016-06-12 | 2016-06-12 | Intelligent entrance guard management method and intelligent entrance guard system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105915544A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600767A (en) * | 2016-11-29 | 2017-04-26 | 深圳智乐信息科技有限公司 | Verification method and system based on identification card |
CN106683238A (en) * | 2016-11-29 | 2017-05-17 | 深圳智乐信息科技有限公司 | Method and system for responding |
CN106713278A (en) * | 2016-11-29 | 2017-05-24 | 深圳智乐信息科技有限公司 | Alarm method and system |
CN106815907A (en) * | 2016-11-29 | 2017-06-09 | 深圳智乐信息科技有限公司 | A kind of method and intelligent access control system based on picture password management intelligent entrance guard |
CN107046556A (en) * | 2016-11-29 | 2017-08-15 | 深圳智乐信息科技有限公司 | A kind of method and system of checking |
WO2018006327A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Access grant acquisition method and system for intelligent access control |
WO2018006342A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Optical communication-based response method and system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414905A (en) * | 2007-10-17 | 2009-04-22 | 谢丹 | Various selectivity cipher safety authentication system and method |
CN101963017A (en) * | 2010-10-09 | 2011-02-02 | 西安信唯信息科技有限公司 | Convenient key-free password door lock method |
CN103140880A (en) * | 2011-03-24 | 2013-06-05 | 瑞科卢都有限公司 | Standalone biometric authorization control device and method |
WO2014026479A1 (en) * | 2012-08-17 | 2014-02-20 | Leung Wai Shun | Control method for intelligent access manager and intelligent access manager thereof |
CN104299296A (en) * | 2014-08-15 | 2015-01-21 | 广东科学技术职业学院 | Door lock control system and control method |
CN104916014A (en) * | 2015-05-20 | 2015-09-16 | 厦门城力机电设备有限公司 | Opening method and system |
JP5809319B1 (en) * | 2014-04-21 | 2015-11-10 | 株式会社東海理化電機製作所 | Door lock control system |
-
2016
- 2016-06-12 CN CN201610408396.2A patent/CN105915544A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101414905A (en) * | 2007-10-17 | 2009-04-22 | 谢丹 | Various selectivity cipher safety authentication system and method |
CN101963017A (en) * | 2010-10-09 | 2011-02-02 | 西安信唯信息科技有限公司 | Convenient key-free password door lock method |
CN103140880A (en) * | 2011-03-24 | 2013-06-05 | 瑞科卢都有限公司 | Standalone biometric authorization control device and method |
WO2014026479A1 (en) * | 2012-08-17 | 2014-02-20 | Leung Wai Shun | Control method for intelligent access manager and intelligent access manager thereof |
JP5809319B1 (en) * | 2014-04-21 | 2015-11-10 | 株式会社東海理化電機製作所 | Door lock control system |
CN104299296A (en) * | 2014-08-15 | 2015-01-21 | 广东科学技术职业学院 | Door lock control system and control method |
CN104916014A (en) * | 2015-05-20 | 2015-09-16 | 厦门城力机电设备有限公司 | Opening method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018006327A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Access grant acquisition method and system for intelligent access control |
WO2018006342A1 (en) * | 2016-07-07 | 2018-01-11 | 深圳企管加企业服务有限公司 | Optical communication-based response method and system |
CN106600767A (en) * | 2016-11-29 | 2017-04-26 | 深圳智乐信息科技有限公司 | Verification method and system based on identification card |
CN106683238A (en) * | 2016-11-29 | 2017-05-17 | 深圳智乐信息科技有限公司 | Method and system for responding |
CN106713278A (en) * | 2016-11-29 | 2017-05-24 | 深圳智乐信息科技有限公司 | Alarm method and system |
CN106815907A (en) * | 2016-11-29 | 2017-06-09 | 深圳智乐信息科技有限公司 | A kind of method and intelligent access control system based on picture password management intelligent entrance guard |
CN107046556A (en) * | 2016-11-29 | 2017-08-15 | 深圳智乐信息科技有限公司 | A kind of method and system of checking |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11101993B1 (en) | Authentication and authorization through derived behavioral credentials using secured paired communication devices | |
CN105847303A (en) | Verification method and system of intelligent access control unit | |
CN105915544A (en) | Intelligent entrance guard management method and intelligent entrance guard system | |
CN105847451B (en) | A kind of method and system controlling intelligent entrance guard using mobile terminal | |
CN105872104A (en) | Method and system for managing intelligent entrance guard by combining mobile terminal | |
CN103907328B (en) | A kind of user authen method of site resource | |
CN105869255B (en) | A kind of intelligent entrance guard control method and system based on mobile terminal | |
KR101570601B1 (en) | An access control method using the mobile device | |
CN106030599A (en) | Continuous authentication with a mobile device | |
US12056975B1 (en) | System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score | |
CN110211267A (en) | Indoor openings control method, the configuration method of permission, device and storage medium | |
KR101345018B1 (en) | Teminal and security certification system therewith | |
CN106097500B (en) | A kind of method and system for responding user and entering | |
US9977924B2 (en) | Method and device for providing notification indicating loss of terminal | |
CN102546938A (en) | Cell phone capable of realizing safety protection by means of intelligently capturing human face images by aid of front-facing camera | |
CN111131202A (en) | Identity authentication method and system based on multiple information authentication | |
KR102188775B1 (en) | Method and system for remotely controlling client terminals using face recognition and face recognition terminal | |
Shrestha et al. | Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics | |
CN106293075A (en) | A kind of control system based on wearable device and control method | |
CN105703909A (en) | Authentication method and electronic equipment | |
Yohan et al. | Dynamic multi-factor authentication for smartphone | |
WO2018000234A1 (en) | Method and system for controlling smart door access on basis of dual fingerprints | |
CN106127006A (en) | The user management method of a kind of mobile terminal and system | |
JP2013120454A (en) | Information processing system, information processing method, information processing device, control method or control program for the information processing device | |
KR102295480B1 (en) | User authentication system and method for authenticating access to an industrial control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160831 |
|
WD01 | Invention patent application deemed withdrawn after publication |