CN106097500A - A kind of method and system responding user's entrance - Google Patents

A kind of method and system responding user's entrance Download PDF

Info

Publication number
CN106097500A
CN106097500A CN201610406694.8A CN201610406694A CN106097500A CN 106097500 A CN106097500 A CN 106097500A CN 201610406694 A CN201610406694 A CN 201610406694A CN 106097500 A CN106097500 A CN 106097500A
Authority
CN
China
Prior art keywords
password
log
user
entrance guard
intelligent entrance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610406694.8A
Other languages
Chinese (zh)
Other versions
CN106097500B (en
Inventor
熊益冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangxi beluga Information Technology Co.,Ltd.
Original Assignee
WINSTRONG TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WINSTRONG TECHNOLOGY Co Ltd filed Critical WINSTRONG TECHNOLOGY Co Ltd
Priority to CN201610406694.8A priority Critical patent/CN106097500B/en
Publication of CN106097500A publication Critical patent/CN106097500A/en
Application granted granted Critical
Publication of CN106097500B publication Critical patent/CN106097500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/33Individual registration on entry or exit not involving the use of a pass in combination with an identity check by means of a password
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/38Individual registration on entry or exit not involving the use of a pass with central registration

Abstract

The embodiment of the invention discloses a kind of method responding user's entrance, including: intelligent entrance guard receives the registration request of user, and described registration request is sent to remote monitoring server;After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password and the second log-in password, and the second log-in password taps the vibration password of intelligent entrance guard number of times in including Preset Time;If user does not carries access card, described intelligent entrance guard receives the first log-in password and second log-in password of user's input, allows user to enter after being verified.The embodiment of the invention also discloses a kind of system.Use the present invention, safety and the convenience of intelligent entrance guard can be improved, opening gate when facilitating user not carry access card.

Description

A kind of method and system responding user's entrance
Technical field
The present invention relates to, particularly relate to a kind of method and system responding user's entrance.
Background technology
Internet of Things is the important component part of generation information technology, is also the important development stage in " information-based " epoch. Its English name is: " Internet of things (IoT) ".As its name suggests, Internet of Things is exactly the Internet that thing thing is connected.This Having two-layer to look like: one, core and the basis of Internet of Things remain the Internet, are the extension on Internet basic and extension Network;Its two, its user side extend and extend between any article and article, carry out information exchange and communicate, namely Thing thing ceases mutually.Internet of Things passes through Intellisense, the technology that identifies communicates cognition technology with general fit calculation etc., is widely used in network In fusion, the most therefore it is referred to as the third wave of world information industry development after computer, the Internet.Internet of Things is mutual The application extension of networking, Internet of Things is network, not equal to Internet of Things is business and application.Therefore, application innovation is thing The core of networking development, the innovation 2.0 with Consumer's Experience as core is the soul of Internet of Things development.
Utilize the communication technology such as localized network or the Internet sensor, controller, machine, personnel and thing etc. by new Mode is linked togather, and forms people and is connected with thing with thing, thing, it is achieved information-based, remote management and control and intelligentized network.Internet of Things Net is the extension of the Internet, and it includes all of resource on the Internet and the Internet, the compatible all of application in the Internet, but Internet of Things In net, all of element (all of equipment, resource and communication etc.) is all personalized and privatization.
Internet of Things is of many uses, throughout intelligent transportation, environmental conservation, government work, public safety, safety home, intelligence Fire-fighting, industry monitoring, environmental monitoring, street lighting management and control, Landscape Lighting management and control, building lighting management and control, plaza lighting management and control, old Multiple fields such as people's nursing, personal health, flower culture, water system monitoring, foodstuff traceability, enemy's situation investigation and information gathering.Wherein, In terms of intelligent entrance guard, it allows the personnel possessing authority to enter, and is to ensure the neighbours living person and property safety One of effective measures.The most conventional intelligent access control system, each owner has an access card, and owner is by gate inhibition The POS on scan and get final product opening gate.But, sometimes resident family may leave behind or lose access card, this Time, a kind of method needing safe and reliable opening gate.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, it is provided that a kind of method and system responding user's entrance. So that solve when user does not carries access card cannot the problem of opening gate.
In order to solve above-mentioned technical problem, embodiment of the present invention first aspect provides a kind of side responding user's entrance Method, including:
Intelligent entrance guard receives the registration request of user, and described registration request is sent to remote monitoring server;
Remote monitoring server display monitoring picture, prompting manager processes described registration request, and described monitored picture is used Prove that user is that user's facial image of resident family and/or user identity certificate image are so that described manager confirms user in gathering Identity;
When described manager selects to process described registration request, point out described manager to input administrator password and be managed Member's authentication, manager's authentication accepts by allowing described manager afterwards or refuses described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, described first note Volume password includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, and described second Log-in password taps the vibration password of intelligent entrance guard number of times in including Preset Time;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and verifies;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second log-in password;
After described second log-in password is verified, it is allowed to user enters.
Embodiment of the present invention second aspect provides a kind of system, including:
Intelligent entrance guard, for receiving the registration request of user, and is sent to remote monitoring server by described registration request, For gathering, described monitored picture proves that user is user's facial image of resident family and/or user identity certificate image so that described Manager confirms user identity;
Described remote monitoring server, for display monitoring picture, prompting manager processes described registration request;When described When manager selects to process described registration request, described manager is pointed out to input the administrator password person's of being managed authentication, pipe Reason person's authentication accepts by allowing described manager afterwards or refuses described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password, described First log-in password includes numerical ciphers, biometrics password or gesture password;After having collected the first log-in password, prompting user is defeated Entering the second log-in password, described second log-in password taps the vibration password of intelligent entrance guard number of times in including Preset Time;If using Access card is not carried at family, receives the first log-in password of user's input and verifies;When described first log-in password checking is logical After crossing, described intelligent entrance guard prompting user inputs the second log-in password;After described second log-in password is verified, permit Family allowable enters.
Implement the embodiment of the present invention, have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after confirming user identity, it is ensured that the correctness of user identity;Then typing first is registered Password and the second log-in password;User can by checking password by the way of opening gate, close owing to adding the second registration Code, therefore relative to the mode of single password, safety is higher, and the input mode of the second log-in password is for tapping, crypticity Relatively strong with interest, user's input is the most convenient, is beneficial to promote Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet responding the method that user enters of the embodiment of the present invention;
Fig. 2 is the composition schematic diagram of a kind of system of the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
Refer to Fig. 1, respond the schematic flow sheet of method that user enters, at the present embodiment for the embodiment of the present invention is a kind of In, said method comprising the steps of:
S101, intelligent entrance guard receives the registration request of user, and described registration request is sent to remote monitoring server.
S102, remote monitoring server display monitoring picture, prompting manager processes described registration request.
Wherein, described monitored picture is for gathering user's facial image and/or the user identity card proving that user is resident family Part image is so that described manager confirms user identity.User identity can be carried out artificial true by monitored picture by manager Recognize, it is also possible to the resident family's money content of monitored picture preserved on remote monitoring server with resident family by remote monitoring server Expect to carry out Auto-matching to confirm user identity such as photo, identity document information etc..
S103, when described manager selects to process described registration request, points out described manager to input administrator password and enters Row manager's authentication, manager's authentication accepts by allowing described manager afterwards or refuses described registration request.
Wherein, manager could process the registration request of user after needing to carry out authentication, can avoid juridical-person The normal registration request of member arbitrarily refusal resident family or owner, it is also possible to avoid unauthorized person arbitrarily to agree to non-resident or non-owner Illegal registration request, it is ensured that the safety of resident family and interests.
S104, after registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password.
Alternatively, described biometrics password includes finger-print cipher, iris password or speech cipher.
S105, after described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, described Second log-in password taps the vibration password of intelligent entrance guard number of times in including Preset Time.
Single numerical ciphers or biometrics password or gesture cipher safety are relatively low, and existing intelligent entrance guard uses above-mentioned list One password is very easy to the situation occurring password to be obtained by unauthorized person, and the property safety of normal resident family is difficult to preferably be protected Protect, therefore, in the present embodiment, introduce the second log-in password in order to improve the safety of password.And second log-in password be pre- If tapping the vibration password of intelligent entrance guard number of times in the time, such as, 3 are tapped in 5 seconds inferior.Will hit against intelligent entrance guard as Two log-in passwords, simulate the traditional approach entered of knocking at the door of routine, add the interest of password authentification;And tap must be Availability is just possessed, therefore when the first log-in password is not verified, it is not necessary to process detection after first log-in password checking The percussion arrived, can avoid processing user misoperation or unconscious operation.Although being provided with two passwords, but user's input Very convenient simply, only need to tap intelligent entrance guard after typing the first log-in password such as voice, gesture, numeral or fingerprint etc. , the most single password, both improve the safety of intelligent entrance guard, turn avoid the trouble that Complicated Flow brings, user Experience is preferable.
S106, if user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and carries out Checking.
Certainly, even if user carries access card, it is possible to use the mode described in the present embodiment carrys out opening gate.Example As, user carries the most things and causes inconvenient when access card drawn out by pocket, and the first registration that can use voice is close Code, then taps intelligent entrance guard with wrist, elbow or other positions.
S107, after described first log-in password is verified, described intelligent entrance guard prompting user inputs the second registration Password.
It should be noted that in the present embodiment, the first log-in password can point out user to input the second note after being verified Volume password, for non-neighbours living, it may be difficult to expects that the mode inputting the second log-in password is to tap intelligent entrance guard, because of This, safety and disguise are higher.It addition, the first log-in password can not also point out user to input the second registration after being verified Password, only prompting user's the first log-in password is verified, and by inputting in user's Preset Time after passing through, the second registration is close Code, such that it is able to promote the disguise of the second log-in password further.
S108, after described second log-in password is verified, it is allowed to user enters.
In the present embodiment, by intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user Registered after confirming user identity by intelligent entrance guard and remote monitoring server, it is ensured that the correctness of user identity;So Rear typing the first log-in password and the second log-in password;User can by checking password by the way of opening gate, owing to adding Having entered the second log-in password, therefore relative to the mode of single password, safety is higher, and the input mode of the second log-in password For tapping, crypticity and interest are relatively strong, and user's input is the most convenient, is beneficial to promote Consumer's Experience.
In view of the second log-in password is for tapping, in order to prevent illegal user from malicious from attempting, 3 times can be arranged and input unsuccessfully After, temporary transient refusal processes the request of this user.If this user is neighbours living really, it can be by contact remote monitoring service The manager of device end is by remote opening gate inhibition after monitored picture confirmation identity.
Alternatively, in addition to intelligent entrance guard this locality preserves the first log-in password and the second log-in password is verified, also Can be verified by remote monitoring server.Although remote monitoring server carries out verifying that possible efficiency can be slightly slow, but Safety can be promoted further, especially when intelligent entrance guard breaks down and cannot verify, carried out by remote monitoring server Checking, can promote the stability of system work further.
When using remote monitoring server to verify, can be by intelligent entrance guard by the first log-in password and the second registration Password is sent directly to remote monitoring server and preserves.Certainly, in order to promote the safety of the second log-in password further And disguise, it is also possible to retransmit to remote monitoring server after the second log-in password is carried out suitable process.Concrete stream Journey is described as follows:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein, described Preset rules is accepted to send afterwards to described intelligent entrance guard with logical at the registration request of user by described remote monitoring server Know user;
Described first log-in password is sent to described remote monitoring server guarantor with the second log-in password being multiplied by after 2 Deposit;
If described intelligent entrance guard damages and cannot be carried out password authentification, then prompting user selects described remote monitoring server to enter Row password authentification;
Certainly, may be otherwise and do not point out, user oneself select remote monitoring server checking.
Described intelligent entrance guard receive user input remote monitoring server checking request, will described first log-in password with It is multiplied by the second log-in password after 2 to send to described remote monitoring server;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
By the way, the second log-in password is processed, so, when gate inhibition is normal, user registration and just Only need to tap the number of times in the second log-in password when often using, verified by remote monitoring server when intelligent entrance guard damages Time, the second log-in password there occurs change, and this change can promote the safety of intelligent entrance guard further.
Alternatively, when intelligent entrance guard damages or needs to carry out system update, needs to change intelligent entrance guard, described Intelligent door Prohibit and described first log-in password and described second log-in password are sent to the preservation of described remote monitoring server;
When described intelligent entrance guard is replaced, the code data preserved is sent to changing by described remote monitoring server After intelligent entrance guard.
So that it is guaranteed that the integrity of user data and safety before and after Geng Huaning.
Owing to present community old people gets more and more, the first log-in password can be biometrics password, it is not necessary to worry that user forgets Note, but the second log-in password it is easy to forget that.Following flow process now can be used to carry out opening gate.
If user forgets described second log-in password, the first log-in password checking that user is inputted by the most described intelligent entrance guard After success, receive the call request of user;
Described call request is sent to described remote monitoring server, or by described call request with short message or electricity The mode of words sends the mobile phone to described manager;
After described manager confirms user identity by monitored picture, remote monitoring server receives described manager Remote control open command, open described intelligent entrance guard.
Refer to Fig. 2, for the composition schematic diagram of a kind of system of the embodiment of the present invention, in the present embodiment, described system bag Include: remote monitoring server 200 and at least one intelligent entrance guard 100.Intelligent entrance guard 100 includes for for remote monitoring server 200 photographic head providing monitored pictures, for inputting the button of numerical ciphers or touch screen, (touch screen can also be used for inputting gesture Password), enter fingerprint recognition module, iris identification module or speech recognition for the biometrics password identification module inputting biometrics password Module, for sensing the sensor of vibrations, and for verifying the authentication module of password.Remote monitoring server 200 includes showing Show device and for storing the server of data.
Specifically, intelligent entrance guard 100, for receiving the registration request of user, and described registration request is sent to remotely Monitoring server;
Described remote monitoring server 200, for display monitoring picture, prompting manager processes described registration request, institute State monitored picture and prove that user is user's facial image of resident family and/or user identity certificate image so that described pipe for gathering Reason person confirms user identity;When described manager selects to process described registration request, described manager is pointed out to input management close The code person's of being managed authentication, manager's authentication please by allowing described manager to accept afterwards or refusing described registration Ask;
After registration request is accepted, described intelligent entrance guard 100 is additionally operable to point out user to input the first log-in password, institute State the first log-in password and include numerical ciphers, biometrics password or gesture password;After having collected the first log-in password, point out user Inputting the second log-in password, described second log-in password taps the vibration password of intelligent entrance guard number of times in including Preset Time;If User does not carries access card, receives the first log-in password of user's input and verifies;When described first log-in password checking By afterwards, described intelligent entrance guard 100 points out user to input the second log-in password;When described second log-in password is verified it After, it is allowed to user enters.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
According to preset rules, the number of taps in described second log-in password is multiplied by 2, and wherein, described preset rules is by institute State remote monitoring server 200 and accepted to send afterwards to described intelligent entrance guard 100 to notify user at the registration request of user; With the second log-in password being multiplied by after 2, described first log-in password is sent extremely described remote monitoring server 200 preserve;If Described Intelligent door 100 is prohibited damage and be cannot be carried out password authentification, then prompting user selects described remote monitoring server 200 to carry out close Code checking;Receive the remote monitoring server checking request of user's input, by described first log-in password be multiplied by the after 2 Two log-in passwords send to described remote monitoring server 200;
Described remote monitoring server 200 is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens.
Alternatively, described intelligent entrance guard 100 is additionally operable to:
Described first log-in password and described second log-in password are sent extremely described remote monitoring server 200 preserve;
Described remote monitoring server 200 is additionally operable to:
When described intelligent entrance guard 100 is replaced, the code data preserved is sent by described remote monitoring server 200 Intelligent entrance guard to replacing.
Alternatively, if user forgets that described second log-in password, the most described intelligent entrance guard 100 are additionally operable to user's input After first log-in password is proved to be successful, receive the call request of user;Described call request is sent to described long-range monitoring Server 200, or described call request is sent in the way of short message or phone the mobile phone to described manager;
After described manager confirms user identity by monitored picture, described remote monitoring server 200 is additionally operable to Receive the remote control open command of described manager, open described intelligent entrance guard.
Wherein, described biometrics password includes finger-print cipher, iris password or speech cipher.
It should be noted that each embodiment in this specification all uses the mode gone forward one by one to describe, each embodiment weight Point explanation is all the difference with other embodiments, and between each embodiment, identical similar part sees mutually. For device embodiment, due to itself and embodiment of the method basic simlarity, so describe is fairly simple, relevant part sees The part of embodiment of the method illustrates.
By the description of above-described embodiment, the invention have the advantages that
By intelligent entrance guard and remote monitoring server are connected and composed intelligent access control system, user by intelligent entrance guard and Remote monitoring server is registered after confirming user identity, it is ensured that the correctness of user identity;Then typing first is registered Password and the second log-in password;User can by checking password by the way of opening gate, close owing to adding the second registration Code, therefore relative to the mode of single password, safety is higher, and the input mode of the second log-in password is for tapping, crypticity Relatively strong with interest, user's input is the most convenient, is beneficial to promote Consumer's Experience.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible Instructing relevant hardware by computer program to complete, described program can be stored in a computer read/write memory medium In, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only store-memory body (Read-Only Memory is called for short ROM) or random store-memory body (Random Access Memory, is called for short RAM) etc..
The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.

Claims (10)

1. a kind of method responding user's entrance, it is characterised in that including:
Intelligent entrance guard receives the registration request of user, and described registration request is sent to remote monitoring server;
Remote monitoring server display monitoring picture, prompting manager processes described registration request, and described monitored picture is used for adopting Integrate and prove that user's user's facial image and/or user identity certificate image as resident family is so that described manager confirms user's body Part;
When described manager selects to process described registration request, described manager is pointed out to input the administrator password person's of being managed body Part checking, manager's authentication accepts by allowing described manager afterwards or refuses described registration request;
After registration request is accepted, described intelligent entrance guard prompting user inputs the first log-in password, and described first registration is close Code includes numerical ciphers, biometrics password or gesture password;
After described intelligent entrance guard has collected the first log-in password, prompting user inputs the second log-in password, described second registration Password taps the vibration password of intelligent entrance guard number of times in including Preset Time;
If user does not carries access card, described intelligent entrance guard receives the first log-in password of user's input and verifies;
After described first log-in password is verified, described intelligent entrance guard prompting user inputs the second log-in password;
After described second log-in password is verified, it is allowed to user enters.
2. the method for claim 1, it is characterised in that also include:
Number of taps in described second log-in password is multiplied by 2 according to preset rules by described intelligent entrance guard, wherein, described default Rule is accepted to send afterwards to described intelligent entrance guard to notify to use at the registration request of user by described remote monitoring server Family.
Described first log-in password is sent to the preservation of described remote monitoring server with the second log-in password being multiplied by after 2;
If described intelligent entrance guard damages cannot be carried out password authentification, then user is pointed out to select described remote monitoring server to carry out close Code checking;
Described intelligent entrance guard receives the remote monitoring server checking request of user's input, by described first log-in password and being multiplied by The second log-in password after 2 sends to described remote monitoring server;
Described remote monitoring server, after password authentification is passed through, controls described intelligent entrance guard and opens.
3. the method for claim 1, it is characterised in that also include:
Described first log-in password and described second log-in password are sent to described remote monitoring server by described intelligent entrance guard Preserve;
When described intelligent entrance guard is replaced, the code data preserved is sent to replacing by described remote monitoring server Intelligent entrance guard.
4. the method for claim 1, it is characterised in that if user forgets described second log-in password, the most described intelligence After the first log-in password that user is inputted by gate inhibition is proved to be successful, receive the call request of user;
Described call request is sent to described remote monitoring server, or by described call request with short message or phone Mode sends the mobile phone to described manager;
After described manager confirms user identity by monitored picture, remote monitoring server receives the distant of described manager Control open command, opens described intelligent entrance guard.
5. the method as described in any one of claim 1-4, it is characterised in that described biometrics password includes finger-print cipher, iris Password or speech cipher.
6. a system, it is characterised in that including:
Intelligent entrance guard, for receiving the registration request of user, and is sent to remote monitoring server by described registration request;
Described remote monitoring server, for display monitoring picture, prompting manager processes described registration request, described monitoring picture For gathering, face proves that user be user's facial image of resident family and/or user identity certificate image so that described manager confirmation User identity;When described manager selects to process described registration request, point out described manager to input administrator password and manage Reason person's authentication, manager's authentication accepts by allowing described manager afterwards or refuses described registration request;
After registration request is accepted, described intelligent entrance guard is additionally operable to point out user to input the first log-in password, and described first Log-in password includes numerical ciphers, biometrics password or gesture password;After having collected the first log-in password, prompting user inputs the Two log-in passwords, described second log-in password taps the vibration password of intelligent entrance guard number of times in including Preset Time;If user is not Carry access card, receive the first log-in password of user's input and verify;When described first log-in password is verified it After, described intelligent entrance guard prompting user inputs the second log-in password;After described second log-in password is verified, it is allowed to use Family enters.
7. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Number of taps in described second log-in password is multiplied by 2 according to preset rules, wherein, described preset rules by described far Range monitoring server is accepted to send afterwards to described intelligent entrance guard to notify user at the registration request of user;By described first Log-in password sends to the preservation of described remote monitoring server with the second log-in password being multiplied by after 2;If described intelligent entrance guard Damage cannot be carried out password authentification, then prompting user selects described remote monitoring server to carry out password authentification;Receive user defeated The remote monitoring server checking request entered, sends described first log-in password extremely with the second log-in password being multiplied by after 2 Described remote monitoring server;
Described remote monitoring server is additionally operable to after password authentification is passed through, and controls described intelligent entrance guard and opens.
8. system as claimed in claim 6, it is characterised in that described intelligent entrance guard is additionally operable to:
Described first log-in password and described second log-in password are sent to the preservation of described remote monitoring server;
Described remote monitoring server is additionally operable to:
When described intelligent entrance guard is replaced, the code data preserved is sent to replacing by described remote monitoring server Intelligent entrance guard.
9. system as claimed in claim 6, it is characterised in that if user forgets described second log-in password, the most described intelligence After gate inhibition is additionally operable to be proved to be successful the first log-in password of user's input, receive the call request of user;By described calling Request sends to described remote monitoring server, or described call request is sent to described in the way of short message or phone The mobile phone of manager;
After described manager confirms user identity by monitored picture, it is described that described remote monitoring server is additionally operable to reception The remote control open command of manager, opens described intelligent entrance guard.
10. the system as described in any one of claim 6-9, it is characterised in that described biometrics password includes finger-print cipher, iris Password or speech cipher.
CN201610406694.8A 2016-06-12 2016-06-12 A kind of method and system for responding user and entering Active CN106097500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610406694.8A CN106097500B (en) 2016-06-12 2016-06-12 A kind of method and system for responding user and entering

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610406694.8A CN106097500B (en) 2016-06-12 2016-06-12 A kind of method and system for responding user and entering

Publications (2)

Publication Number Publication Date
CN106097500A true CN106097500A (en) 2016-11-09
CN106097500B CN106097500B (en) 2018-07-06

Family

ID=57228577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610406694.8A Active CN106097500B (en) 2016-06-12 2016-06-12 A kind of method and system for responding user and entering

Country Status (1)

Country Link
CN (1) CN106097500B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN106991749A (en) * 2017-05-27 2017-07-28 刘洪文 Being used for based on biological characteristic shares unlocking and the payment system of equipment
WO2018006349A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entry based on picture password
WO2018006325A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entrance

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1326381A2 (en) * 2001-12-27 2003-07-09 Brother Kogyo Kabushiki Kaisha Network and terminal devices
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features
CN102542908A (en) * 2012-02-27 2012-07-04 深圳市赛格导航科技股份有限公司 Password verification method and device based on vibration
CN105072611A (en) * 2015-07-08 2015-11-18 广东欧珀移动通信有限公司 Verification method and terminal
CN105225304A (en) * 2014-05-30 2016-01-06 由田新技股份有限公司 Access control device and registration system and method thereof
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1326381A2 (en) * 2001-12-27 2003-07-09 Brother Kogyo Kabushiki Kaisha Network and terminal devices
CN101414905A (en) * 2007-10-17 2009-04-22 谢丹 Various selectivity cipher safety authentication system and method
CN201838011U (en) * 2010-05-26 2011-05-18 中国科学院自动化研究所 Identity authentication equipment based on second-generation ID cards and multimode biological features
CN102542908A (en) * 2012-02-27 2012-07-04 深圳市赛格导航科技股份有限公司 Password verification method and device based on vibration
CN105225304A (en) * 2014-05-30 2016-01-06 由田新技股份有限公司 Access control device and registration system and method thereof
CN105447931A (en) * 2015-03-09 2016-03-30 北京天诚盛业科技有限公司 Remote access control authorization method, device and system
CN105072611A (en) * 2015-07-08 2015-11-18 广东欧珀移动通信有限公司 Verification method and terminal

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018006349A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entry based on picture password
WO2018006325A1 (en) * 2016-07-07 2018-01-11 深圳企管加企业服务有限公司 Method and system for verifying user entrance
CN106713278A (en) * 2016-11-29 2017-05-24 深圳智乐信息科技有限公司 Alarm method and system
CN106991749A (en) * 2017-05-27 2017-07-28 刘洪文 Being used for based on biological characteristic shares unlocking and the payment system of equipment

Also Published As

Publication number Publication date
CN106097500B (en) 2018-07-06

Similar Documents

Publication Publication Date Title
CN105869255B (en) A kind of intelligent entrance guard control method and system based on mobile terminal
CN105847451B (en) A kind of method and system controlling intelligent entrance guard using mobile terminal
US11101993B1 (en) Authentication and authorization through derived behavioral credentials using secured paired communication devices
CN105847303A (en) Verification method and system of intelligent access control unit
CN105915544A (en) Intelligent entrance guard management method and intelligent entrance guard system
CN103907328B (en) A kind of user authen method of site resource
CN209265530U (en) A kind of community visitor intelligence register system
CN105550554B (en) A kind of glance prevention method and mobile terminal
CN105872104A (en) Method and system for managing intelligent entrance guard by combining mobile terminal
US20170180361A1 (en) Mobile device-based authentication with enhanced security measures providing feedback on a real time basis
CN106097500B (en) A kind of method and system for responding user and entering
CN105956484B (en) A kind of safety interacting method and system of intelligent terminal
KR101118679B1 (en) Method for controlling access using near field communication
CN103295341A (en) POS (point-of-sales) safety certification device, POS safety certification system and POS device safety certification method
CN104899490A (en) Terminal positioning method and user terminal
US11367323B1 (en) System and method for secure pair and unpair processing using a dynamic level of assurance (LOA) score
CN203350880U (en) POS safety certification device and system
CN106650361A (en) Unblocking method and device
CN107256367A (en) A kind of information processing method and device, terminal device and computer-readable recording medium
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
KR101345018B1 (en) Teminal and security certification system therewith
US20150350908A1 (en) Access Device and System for an Electronic Device
CN105703909A (en) Authentication method and electronic equipment
CN106295423A (en) A kind of method for exhibiting data and client
Yohan et al. Dynamic multi-factor authentication for smartphone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200827

Address after: 430000 705, 706a, building 1, Huigu spacetime, No.206, laowuhuang highway, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee after: Wuhan Tuozhijia Information Technology Co.,Ltd.

Address before: 518000, Guangdong, Shenzhen province Baoan District source road Internet industry base A District 7613

Patentee before: SHENZHEN WINSTRONG INFORMATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right

Effective date of registration: 20201118

Address after: 241000 No.37 Hengshan Road, economic and Technological Development Zone, Wuhu City, Anhui Province

Patentee after: Dong Jinhuan

Address before: 430000 705, 706a, building 1, Huigu spacetime, No.206, laowuhuang highway, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee before: Wuhan Tuozhijia Information Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201202

Address after: 233000 Room 102 north, No.11, No.2 building, liukm Huayuan commercial building, Changqing Township, Yuhui District, Bengbu City, Anhui Province

Patentee after: Anhui Licha Information Technology Co., Ltd

Address before: 241000 No.37 Hengshan Road, economic and Technological Development Zone, Wuhu City, Anhui Province

Patentee before: Dong Jinhuan

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210207

Address after: 530022 room 1801, 18th floor, platinum Palace International, 127 Minzu Avenue, Qingxiu District, Nanning City, Guangxi Zhuang Autonomous Region

Patentee after: Guangxi beluga Information Technology Co.,Ltd.

Address before: 233000 Room 102 north, No.11, No.2 building, liukm Huayuan commercial building, Changqing Township, Yuhui District, Bengbu City, Anhui Province

Patentee before: Anhui Licha Information Technology Co., Ltd

TR01 Transfer of patent right