CN105915544A - Intelligent entrance guard management method and intelligent entrance guard system - Google Patents

Intelligent entrance guard management method and intelligent entrance guard system Download PDF

Info

Publication number
CN105915544A
CN105915544A CN201610408396.2A CN201610408396A CN105915544A CN 105915544 A CN105915544 A CN 105915544A CN 201610408396 A CN201610408396 A CN 201610408396A CN 105915544 A CN105915544 A CN 105915544A
Authority
CN
China
Prior art keywords
password
entrance guard
log
intelligent entrance
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610408396.2A
Other languages
Chinese (zh)
Inventor
熊益冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WINSTRONG TECHNOLOGY Co Ltd
Original Assignee
WINSTRONG TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WINSTRONG TECHNOLOGY Co Ltd filed Critical WINSTRONG TECHNOLOGY Co Ltd
Priority to CN201610408396.2A priority Critical patent/CN105915544A/en
Publication of CN105915544A publication Critical patent/CN105915544A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/23Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The embodiment of the invention discloses an intelligent entrance guard management method. The intelligent entrance guard management method comprises the following steps that: a remote monitoring server allocates an authorization code to a resident in a residence community; an intelligent entrance guard receives a registration request input by a user, and sends the registration request to the remote monitoring server for verification, wherein the registration request includes authorization code information input by the user; the remote monitoring server verifies the authorization code, and instructs the intelligent entrance guard to accept the registration request after pass of the verification; the intelligent entrance guard prompts the user to input a first registration password and a second registration password, wherein the second registration password includes vibration passwords for knocking a first area of the intelligent entrance guard for a first time and knocking a second area of the intelligent entrance guard for a second time; and if the user does not carry any entrance guard card, the intelligent entrance guard receives the first registration password and the second registration password input by the user, and allows the user to enter after pass of the verification. The embodiment of the invention also discloses an intelligent entrance guard system. Through adoption of the intelligent entrance guard management method and the intelligent entrance guard system, the security and convenience of the intelligent entrance guard can be improved, and the user can enable the entrance guard conveniently when not carrying the entrance guard card.

Description

A kind of intelligent entrance guard management method and intelligent access control system
Technical field
The present invention relates to Internet of Things field, particularly relate to a kind of intelligent entrance guard management method and intelligent access control system.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development in " information-based " epoch Stage.Its English name is: " Internet of things (IoT) ".As its name suggests, Internet of Things is exactly thing thing The Internet being connected.This has two-layer to look like: one, and core and the basis of Internet of Things remain the Internet, are Extension on Internet basic and the network of extension;Its two, its user side extend and extend to any thing Between product and article, carrying out information exchange and communicate, namely thing thing ceases mutually.Internet of Things by Intellisense, Identification technology communicates with general fit calculation etc. cognition technology, is widely used in the fusion of network, is the most therefore claimed Third wave for the development of world information industry after computer, the Internet.Internet of Things is the Internet Application extension, Internet of Things is network, not equal to Internet of Things is business and application.Therefore, application wound Being newly the core of Internet of Things development, the innovation 2.0 with Consumer's Experience as core is the soul of Internet of Things development.
Utilize the communication technology such as localized network or the Internet sensor, controller, machine, personnel and thing etc. It is linked togather by the way of new, forms people and be connected with thing with thing, thing, it is achieved informationization, remotely manage control System and intelligentized network.Internet of Things is the extension of the Internet, and it includes on the Internet and the Internet all of Resource, the compatible all of application in the Internet, but all of element in Internet of Things (all of equipment, resource and Communication etc.) it is all personalized and privatization.
Internet of Things is of many uses, throughout intelligent transportation, environmental conservation, government work, public safety, safety Household, intelligent fire, industry monitoring, environmental monitoring, street lighting management and control, Landscape Lighting management and control, building Illumination management and control, plaza lighting management and control, old man's nursing, personal health, flower culture, water system monitoring, food Trace to the source, enemy's situation investigation and multiple fields such as information gathering.Wherein, in terms of intelligent entrance guard, it allows tool The personnel of standby authority could enter, and is one of effective measures ensureing the neighbours living person and property safety.Mesh Front conventional intelligent access control system, each owner has an access card, and owner is by the brush at gate inhibition Scan in card machine and get final product opening gate.But, sometimes resident family may leave behind or lose door Prohibit card, at this time, it may be necessary to a kind of method of safe and reliable opening gate.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, it is provided that a kind of intelligent entrance guard management method and intelligence Can gate control system.So that solve when user does not carries access card cannot the problem of opening gate.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect provides a kind of intelligent entrance guard management Method, including:
Remote monitoring server is that neighbours living distributes authorization code;
Intelligent entrance guard receives the registration request of user's input sending to remote monitoring server and verifies, institute State the authorization code information comprising user's input in registration request,;
Authorization code is verified by remote monitoring server, is verified and notifies that described intelligent entrance guard accepts afterwards Described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described First log-in password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, institute State in the second log-in password includes Preset Time and tap first time, intelligent entrance guard first area number and tap Intelligent door Prohibit the vibration password of second number of second area;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out Checking;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration Password;
After described second log-in password is verified, it is allowed to user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Remote monitoring server, for distributing authorization code for neighbours living;
Intelligent entrance guard, tests for receiving the registration request of user's input sending to remote monitoring server Card, comprises the authorization code information of user's input in described registration request,;
Described remote monitoring server is additionally operable to verify authorization code, is verified and notifies described intelligence afterwards Gate inhibition can accept described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password, Described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first log-in password Afterwards, prompting user inputs the second log-in password, and described second log-in password taps intelligence in including Preset Time Can first time, gate inhibition first area number and the vibration password of percussion second number of intelligent entrance guard second area;If using Access card is not carried at family, receives the first log-in password of user's input and verifies;When described first registers Password authentification is by afterwards, and described intelligent entrance guard prompting user inputs the second log-in password;When described second note Volume password authentification is by afterwards, it is allowed to user enters.
Implement the embodiment of the present invention, have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user is by intelligence Gate inhibition and remote monitoring server are registered after confirming user identity, it is ensured that the correctness of user identity; Then typing the first log-in password and the second log-in password;User can open by the way of checking password Gate inhibition, owing to adding the second log-in password, therefore relative to the mode of single password, safety is higher, And second the input mode of log-in password be that zones of different is tapped respectively different number of times, crypticity and entertaining Property relatively strong, and tap zones of different and can promote complexity and the degree of safety of the second log-in password further, use Family input is the most convenient, is beneficial to promote Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to enforcement In example or description of the prior art, the required accompanying drawing used is briefly described, it should be apparent that, describe below In accompanying drawing be only some embodiments of the present invention, for those of ordinary skill in the art, do not paying On the premise of going out creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the embodiment of the present invention a kind of intelligent entrance guard management method;
Fig. 2 is the composition schematic diagram of a kind of intelligent access control system of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, be fully described by, it is clear that described embodiment be only a part of embodiment of the present invention rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation The every other embodiment obtained under property work premise, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, for the schematic flow sheet of the embodiment of the present invention a kind of intelligent entrance guard management method, in this reality Execute in example, said method comprising the steps of:
S101, remote monitoring server is that neighbours living distributes authorization code.
Remote monitoring server needs to confirm the identity of neighbours living, it is ensured that authorization code is only assigned to this community After family, and authorization code use, inefficacy can not be reused.
S102, intelligent entrance guard receives the registration request of user's input sending to remote monitoring server and tests Card, comprises the authorization code information of user's input in described registration request.
S103, authorization code is verified by remote monitoring server, is verified and notifies described Intelligent door afterwards Prohibit and accept described registration request.
S104, after registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password.
Alternatively, described biometrics password includes finger-print cipher, iris password or speech cipher.
S105, after described intelligent entrance guard has collected the first log-in password, it is close that prompting user inputs the second registration Code, described second log-in password taps intelligent entrance guard first area number of times and taps intelligence in including Preset Time The vibration password of gate inhibition's second area number of times.
Single numerical ciphers or biometrics password or gesture cipher safety are relatively low, and existing intelligent entrance guard uses Above-mentioned single password is very easy to the situation occurring password to be obtained by unauthorized person, the property safety of normal resident family It is difficult to preferably be protected, therefore, in the present embodiment, introduces the second log-in password in order to improve password Safety.And described second log-in password include Preset Time in tap intelligent entrance guard first area for the first time Number and the vibration password of percussion second number of intelligent entrance guard second area.Such as, first area taps 3 times, It is inferior that second area taps 4.First Preset Time and the second Preset Time can equal can not also wait, the Number and second number can be identical, it is also possible to different, after the first Preset Time arrives, and intelligent entrance guard Can be by the auditory tone cues user of " ticking ".Will hit against intelligent entrance guard as the second log-in password, simulate The conventional traditional approach entered of knocking at the door, adds the interest of password authentification;And tap must be at the first note Availability is just possessed, therefore when the first log-in password is not verified, it is not necessary to process after volume password authentification The percussion detected, can avoid processing user misoperation or unconscious operation.Although be provided with two close Code, but user input very convenient simply, only need to be at typing the first log-in password such as voice, gesture, number Tap intelligent entrance guard, the most single password after word or fingerprint etc., both improve intelligent entrance guard Safety, turn avoid the trouble that Complicated Flow brings, and user's experience is preferable.And second log-in password For tapping the vibration password of two region number of times, first area is different with second area, first number and second Number of times can be identical, it is also possible to different, by such setting so that the complexity of the second log-in password and Degree of safety promotes further, and user performs to operate the most very convenient.
S106, if user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input And verify.
Certainly, even if user carries access card, it is possible to use the mode described in the present embodiment opens door Prohibit.Such as, user carries the most things and causes inconvenient when access card drawn out by pocket, can use First log-in password of voice, then taps intelligent entrance guard with wrist, elbow or other positions.
S107, after described first log-in password is verified, described intelligent entrance guard prompting user inputs the Two log-in passwords.
It should be noted that in the present embodiment, the first log-in password can point out user to input after being verified Second log-in password, for non-neighbours living, it may be difficult to expects that the mode inputting the second log-in password is Tapping intelligent entrance guard, therefore, safety and disguise are higher.It addition, after the first log-in password is verified User can not also be pointed out to input the second log-in password, and only prompting user's the first log-in password is verified, by User inputs the second log-in password in the Preset Time after passing through, such that it is able to promote the second registration further The disguise of password.
S108, after described second log-in password is verified, it is allowed to user enters.
In the present embodiment, by intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, User is registered after confirming user identity by intelligent entrance guard and remote monitoring server, it is ensured that Yong Hushen The correctness of part;Then typing the first log-in password and the second log-in password;User can be close by checking The mode opening gate of code, owing to adding the second log-in password, therefore relative to the mode of single password, Safety is higher, and the input mode of the second log-in password is that zones of different taps different number of times respectively, Crypticity and interest are relatively strong, and percussion zones of different can promote the complexity of the second log-in password further And degree of safety, user's input is the most convenient, is beneficial to promote Consumer's Experience.
In view of the second log-in password for tap, in order to prevent illegal user from malicious from attempting, can arrange 3 times defeated After entering unsuccessfully, temporary transient refusal processes the request of this user.If this user is neighbours living really, it can lead to Cross the manager of contact remote monitoring server end by remote opening gate inhibition after monitored picture confirmation identity.
Alternatively, preserve the first log-in password except intelligent entrance guard this locality and the second log-in password carries out verifying it Outward, it is also possible to verified by remote monitoring server.Although remote monitoring server carries out checking may Efficiency can be slightly slow, but can promote safety further, especially breaks down cannot verify at intelligent entrance guard Time, verified by remote monitoring server, the stability of system work can be promoted further.
When using remote monitoring server to verify, can be by intelligent entrance guard by the first log-in password and the Two log-in passwords are sent directly to remote monitoring server and preserve.Certainly, in order to promote second further The safety of log-in password and disguise, it is also possible to send out again after the second log-in password is carried out suitable process Deliver to remote monitoring server.Idiographic flow is described as follows:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein, Described preset rules is accepted to send afterwards to described at the registration request of user by described remote monitoring server Intelligent entrance guard is to notify user;
It is to calculate first number and second number respectively that number of taps is multiplied by 2 herein.
Described first log-in password is sent to described long-range monitoring clothes with the second log-in password being multiplied by after 2 Business device preserves;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described long-range monitoring to take Business device carries out password authentification;
Certainly, may be otherwise and do not point out, user oneself select remote monitoring server checking.
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first registration Password sends to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
By the way, the second log-in password is processed, so, when gate inhibition is normal, user Only need to tap the number of times in the second log-in password when registration and normal use, when intelligent entrance guard damages by far During range monitoring server authentication, the second log-in password there occurs change, and this change can promote intelligence further The safety of energy gate inhibition.
Alternatively, when intelligent entrance guard damages or needs to carry out system update, needs to change intelligent entrance guard, institute State intelligent entrance guard to send described first log-in password and described second log-in password to described remote monitoring service Device preserves;
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server Intelligent entrance guard to replacing.
So that it is guaranteed that the integrity of user data and safety before and after Geng Huaning.
Owing to present community old people gets more and more, the first log-in password can be biometrics password, it is not necessary to worry User forgets, but the second log-in password it is easy to forget that.Following flow process now can be used to carry out opening gate.
If user forgets described second log-in password, the first registration that user is inputted by the most described intelligent entrance guard is close After code is proved to be successful, receive the call request of user;
Described call request is sent to described remote monitoring server, or by described call request with note The mode of breath or phone sends the mobile phone to described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server, remotely supervise Control server receives the remote control open command of described manager, opens described intelligent entrance guard.
Refer to Fig. 2, for the composition schematic diagram of a kind of intelligent access control system of the embodiment of the present invention, at the present embodiment In, described system includes: remote monitoring server 200 and at least one intelligent entrance guard 100.Intelligent entrance guard 100 include the photographic head for providing monitored picture for remote monitoring server 200, are used for inputting numerical ciphers Button or touch screen (touch screen can also be used for input gesture password), close for inputting the biology of biometrics password Code identifies that module enters fingerprint recognition module, iris identification module or speech recognition module, for sensing vibrations Sensor, and for verifying the authentication module of password.Remote monitoring server 200 includes display and use Server in storage data.
Specifically, remote monitoring server 200, for distributing authorization code for neighbours living;
Intelligent entrance guard 100, is carried out for receiving the registration request of user's input sending to remote monitoring server Checking, comprises the authorization code information of user's input in described registration request,;
Described remote monitoring server 200 is additionally operable to verify authorization code, is verified and notifies institute afterwards State intelligent entrance guard 100 and accept described registration request;
After registration request is accepted, described intelligent entrance guard 100 is additionally operable to point out user to input the first registration Password, described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first note After volume password, prompting user inputs the second log-in password, in described second log-in password includes Preset Time Tap first time, intelligent entrance guard first area number and tap the vibration password of second number of intelligent entrance guard second area; If user does not carries access card, receive the first log-in password of user's input and verify;When described first After log-in password is verified, described intelligent entrance guard 100 points out user to input the second log-in password;Work as institute State after the second log-in password is verified, it is allowed to user enters.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described default rule Then accepted to send afterwards to described Intelligent door at the registration request of user by described remote monitoring server 200 Prohibit 100 to notify user;Described first log-in password is sent extremely with the second log-in password being multiplied by after 2 Described remote monitoring server 200 preserves;If described Intelligent door 100 is prohibited damage and be cannot be carried out password authentification, Then prompting user selects described remote monitoring server 200 to carry out password authentification;Receive the long-range of user's input Monitoring server checking request, sends described first log-in password with the second log-in password being multiplied by after 2 To described remote monitoring server 200;
Described remote monitoring server 200 is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens Open.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Described first log-in password and described second log-in password are sent to described remote monitoring server 200 Preserve;
Described remote monitoring server 200 is additionally operable to:
When described intelligent entrance guard 100 is replaced, the password that described remote monitoring server 200 will preserve Data send the intelligent entrance guard to replacing.
Alternatively, if user forget described second log-in password, the most described intelligent entrance guard 100 be additionally operable to After first log-in password of family input is proved to be successful, receive the call request of user;By described call request Send to described remote monitoring server 200, or described call request is sent out in the way of short message or phone Deliver to the mobile phone of described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server 200, institute State remote monitoring server 200 and be additionally operable to receive the remote control open command of described manager, open described intelligence Gate inhibition.
Wherein, described biometrics password includes finger-print cipher, iris password or speech cipher.
It should be noted that each embodiment in this specification all uses the mode gone forward one by one to describe, Mei Geshi Execute that example stresses is all the difference with other embodiments, identical similar portion between each embodiment Divide and see mutually.For device embodiment, due to itself and embodiment of the method basic simlarity, so Describe is fairly simple, and relevant part sees the part of embodiment of the method and illustrates.
By the description of above-described embodiment, the invention have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user is by intelligence Gate inhibition and remote monitoring server are registered after confirming user identity, it is ensured that the correctness of user identity; Then typing the first log-in password and the second log-in password;User can open by the way of checking password Gate inhibition, owing to adding the second log-in password, therefore relative to the mode of single password, safety is higher, And second the input mode of log-in password be that zones of different is tapped respectively different number of times, crypticity and entertaining Property relatively strong, and tap zones of different and can promote complexity and the degree of safety of the second log-in password further, use Family input is the most convenient, is beneficial to promote Consumer's Experience.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method. Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, It is called for short ROM) or random store-memory body (Random Access Memory is called for short RAM) etc..
Above disclosed be only present pre-ferred embodiments, certainly can not with this limit the present invention it Interest field, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.

Claims (10)

1. an a kind of intelligent entrance guard management method, it is characterised in that including:
Remote monitoring server is that neighbours living distributes authorization code;
Intelligent entrance guard receives the registration request of user's input sending to remote monitoring server and verifies, institute State the authorization code information comprising user's input in registration request;
Authorization code is verified by remote monitoring server, is verified and notifies that described intelligent entrance guard accepts afterwards Described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described First log-in password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, institute State in the second log-in password includes Preset Time and tap first time, intelligent entrance guard first area number and tap Intelligent door Prohibit the vibration password of second number of second area;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out Checking;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration Password;
After described second log-in password is verified, it is allowed to user enters.
2. device as claimed in claim 1, it is characterised in that also include:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein, Described preset rules is accepted to send afterwards to described at the registration request of user by described remote monitoring server Intelligent entrance guard is to notify user.
Described first log-in password is sent to described long-range monitoring clothes with the second log-in password being multiplied by after 2 Business device preserves;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described long-range monitoring to take Business device carries out password authentification;
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first registration Password sends to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
3. method as claimed in claim 1 or 2, it is characterised in that also include:
Described first log-in password and described second log-in password are sent to described long-range prison by described intelligent entrance guard Control server preserves;
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server Intelligent entrance guard to replacing.
4. the method as described in claim 1-3, it is characterised in that if user forgets that described second registration is close Code, after the first log-in password that user is inputted by the most described intelligent entrance guard is proved to be successful, receives exhaling of user Cry request;
Described call request is sent to described remote monitoring server, or by described call request with note The mode of breath or phone sends the mobile phone to described manager;
After described manager confirms user identity by the monitored picture of remote monitoring server, remotely supervise Control server receives the remote control open command of described manager, opens described intelligent entrance guard.
5. the method as described in any one of claim 1-4, it is characterised in that described biometrics password includes referring to Stricture of vagina password, iris password or speech cipher.
6. an intelligent access control system, it is characterised in that including:
Remote monitoring server, for distributing authorization code for neighbours living;
Intelligent entrance guard, tests for receiving the registration request of user's input sending to remote monitoring server Card, comprises the authorization code information of user's input in described registration request,;
Described remote monitoring server is additionally operable to verify authorization code, is verified and notifies described intelligence afterwards Gate inhibition can accept described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password, Described first log-in password includes numerical ciphers, biometrics password or gesture password;Collect the first log-in password Afterwards, prompting user inputs the second log-in password, and described second log-in password taps intelligence in including Preset Time Can first time, gate inhibition first area number and the vibration password of percussion second number of intelligent entrance guard second area;If using Access card is not carried at family, receives the first log-in password of user's input and verifies;When described first registers Password authentification is by afterwards, and described intelligent entrance guard prompting user inputs the second log-in password;When described second note Volume password authentification is by afterwards, it is allowed to user enters.
7. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described default rule Then by described remote monitoring server the registration request of user accepted to send afterwards to described intelligent entrance guard with Notify user;By the most described remotely with the second log-in password transmission being multiplied by after 2 for described first log-in password Monitoring server preserves;If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects institute State remote monitoring server and carry out password authentification;Receive the remote monitoring server checking request of user's input, Described first log-in password is sent to described remote monitoring server with the second log-in password being multiplied by after 2;
Described remote monitoring server is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens.
8. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Described first log-in password and described second log-in password are sent to the preservation of described remote monitoring server;
Described remote monitoring server is additionally operable to:
When described intelligent entrance guard is replaced, the code data preserved is sent by described remote monitoring server Intelligent entrance guard to replacing.
9. system as claimed in claim 6, it is characterised in that if user forgets described second log-in password, After the most described intelligent entrance guard is additionally operable to be proved to be successful the first log-in password of user's input, receive user's Call request;Described call request is sent to described remote monitoring server, or by described call request The mobile phone to described manager is sent in the way of short message or phone;
After described manager confirms user identity by the monitored picture of remote monitoring server, described far Range monitoring server is additionally operable to receive the remote control open command of described manager, opens described intelligent entrance guard.
10. the system as described in any one of claim 6-9, it is characterised in that described biometrics password includes referring to Stricture of vagina password, iris password or speech cipher.
CN201610408396.2A 2016-06-12 2016-06-12 Intelligent entrance guard management method and intelligent entrance guard system Pending CN105915544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610408396.2A CN105915544A (en) 2016-06-12 2016-06-12 Intelligent entrance guard management method and intelligent entrance guard system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610408396.2A CN105915544A (en) 2016-06-12 2016-06-12 Intelligent entrance guard management method and intelligent entrance guard system

Publications (1)

Publication Number Publication Date
CN105915544A true CN105915544A (en) 2016-08-31

Family

ID=56750637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610408396.2A Pending CN105915544A (en) 2016-06-12 2016-06-12 Intelligent entrance guard management method and intelligent entrance guard system

Country Status (1)

Country Link
CN (1) CN105915544A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600767A (en) * 2016-11-29 2017-04-26 深圳智乐信息科技有限公司 Verification method and system based on identification card
CN106683238A (en) * 2016-11-29 2017-05-17 深圳智乐信息科技有限公司 Method and system for responding
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN106815907A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN107046556A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 A kind of method and system of checking
WO2018006327A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Access grant acquisition method and system for intelligent access control
WO2018006342A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Optical communication-based response method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN101963017A (en) * 2010-10-09 2011-02-02 西安信唯信息科技有限公司 Convenient key-free password door lock method
CN103140880A (en) * 2011-03-24 2013-06-05 瑞科卢都有限公司 Standalone biometric authorization control device and method
WO2014026479A1 (en) * 2012-08-17 2014-02-20 Leung Wai Shun Control method for intelligent access manager and intelligent access manager thereof
CN104299296A (en) * 2014-08-15 2015-01-21 广东科学技术职业学院 Door lock control system and control method
CN104916014A (en) * 2015-05-20 2015-09-16 厦门城力机电设备有限公司 Opening method and system
JP5809319B1 (en) * 2014-04-21 2015-11-10 株式会社東海理化電機製作所 Door lock control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN101963017A (en) * 2010-10-09 2011-02-02 西安信唯信息科技有限公司 Convenient key-free password door lock method
CN103140880A (en) * 2011-03-24 2013-06-05 瑞科卢都有限公司 Standalone biometric authorization control device and method
WO2014026479A1 (en) * 2012-08-17 2014-02-20 Leung Wai Shun Control method for intelligent access manager and intelligent access manager thereof
JP5809319B1 (en) * 2014-04-21 2015-11-10 株式会社東海理化電機製作所 Door lock control system
CN104299296A (en) * 2014-08-15 2015-01-21 广东科学技术职业学院 Door lock control system and control method
CN104916014A (en) * 2015-05-20 2015-09-16 厦门城力机电设备有限公司 Opening method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018006327A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Access grant acquisition method and system for intelligent access control
WO2018006342A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Optical communication-based response method and system
CN106600767A (en) * 2016-11-29 2017-04-26 深圳智乐信息科技有限公司 Verification method and system based on identification card
CN106683238A (en) * 2016-11-29 2017-05-17 深圳智乐信息科技有限公司 Method and system for responding
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN106815907A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN107046556A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 A kind of method and system of checking

Similar Documents

Publication Publication Date Title
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
CN105847303A (en) Verification method and system of intelligent access control unit
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
CN105847451B (en) A kind of method and system controlling intelligent entrance guard using mobile terminal
CN105872104A (en) Method and system for managing intelligent entrance guard by combining mobile terminal
CN103907328B (en) A kind of user authen method of site resource
CN105869255B (en) A kind of intelligent entrance guard control method and system based on mobile terminal
KR101570601B1 (en) An access control method using the mobile device
CN106030599A (en) Continuous authentication with a mobile device
US12056975B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
CN110211267A (en) Indoor openings control method, the configuration method of permission, device and storage medium
KR101345018B1 (en) Teminal and security certification system therewith
CN106097500B (en) A kind of method and system for responding user and entering
US9977924B2 (en) Method and device for providing notification indicating loss of terminal
CN102546938A (en) Cell phone capable of realizing safety protection by means of intelligently capturing human face images by aid of front-facing camera
CN111131202A (en) Identity authentication method and system based on multiple information authentication
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
Shrestha et al. Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics
CN106293075A (en) A kind of control system based on wearable device and control method
CN105703909A (en) Authentication method and electronic equipment
Yohan et al. Dynamic multi-factor authentication for smartphone
WO2018000234A1 (en) Method and system for controlling smart door access on basis of dual fingerprints
CN106127006A (en) The user management method of a kind of mobile terminal and system
JP2013120454A (en) Information processing system, information processing method, information processing device, control method or control program for the information processing device
KR102295480B1 (en) User authentication system and method for authenticating access to an industrial control system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160831

WD01 Invention patent application deemed withdrawn after publication