CN106097531A - A kind of reserving method being applied to gate control system and mobile terminal and gate control system - Google Patents

A kind of reserving method being applied to gate control system and mobile terminal and gate control system Download PDF

Info

Publication number
CN106097531A
CN106097531A CN201610657714.9A CN201610657714A CN106097531A CN 106097531 A CN106097531 A CN 106097531A CN 201610657714 A CN201610657714 A CN 201610657714A CN 106097531 A CN106097531 A CN 106097531A
Authority
CN
China
Prior art keywords
access control
control system
mobile terminal
reservation
verification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610657714.9A
Other languages
Chinese (zh)
Other versions
CN106097531B (en
Inventor
马辉申
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd filed Critical SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd
Priority to CN201610657714.9A priority Critical patent/CN106097531B/en
Publication of CN106097531A publication Critical patent/CN106097531A/en
Application granted granted Critical
Publication of CN106097531B publication Critical patent/CN106097531B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of reserving method being applied to gate control system and mobile terminal and gate control system.A kind of reserving method being applied to gate control system includes: mobile terminal receives the reserve requests sent by reserve terminal, and described reserve requests is confirmed, if agreeing to described reserve requests, the most described mobile terminal sends the first checking information to described reserve terminal, and described first checking information includes: first gate inhibition's key, effect duration;Described mobile terminal receives the video connection request that gate control system is set up after being proved to be successful described reserve terminal, and obtains the video shot by the IP Camera of described gate control system;After described mobile terminal confirms according to described video, send door open command to described gate control system.The embodiment of the invention also discloses a kind of mobile terminal and a kind of gate control system.The technical scheme of the embodiment of the present invention is advantageously implemented remote visible to enabling of making peace, and prevents harassing and wrecking to connect simultaneously, has ensured the house security of resident family.

Description

Reservation method applied to access control system, mobile terminal and access control system
Technical Field
The invention relates to the field of visual access control systems, in particular to an appointment method applied to an access control system, a mobile terminal and the access control system.
Background
With the improvement of living standard of people, the safety of residents in a community becomes one of the problems which are much concerned by people. At present, most of the resident terminals of the visible intercom access control system of the residents in the residential area are special equipment terminals, do not have a mobile function, and cannot remotely perform visible intercom and open the door.
Meanwhile, in practical application, the user is connected with the resident by selecting the corresponding resident number on the access control system. The resident often finds that some harassers and lawless persons can randomly select the house number to connect with the resident, and the daily life of the resident is influenced.
Disclosure of Invention
The embodiment of the invention provides an appointment method applied to an access control system, a mobile terminal and the access control system.
The first aspect of the embodiments of the present invention provides a reservation method applied to an access control system, including:
the mobile terminal receives a reservation request sent by a reservation terminal;
the mobile terminal confirms the reservation request, and if the reservation request sent by the reservation terminal is approved, the mobile terminal sends first verification information to the reservation terminal, wherein the first verification information comprises: a first access control secret key and an expiration date;
the mobile terminal receives a video connection request established by the access control system after the access control system successfully verifies the reservation terminal, and acquires a video shot by a network camera of the access control system;
and after confirming according to the video, the mobile terminal sends a door opening instruction to the access control system.
A second aspect of the embodiments of the present invention provides a reservation method applied to an access control system, including:
the access control system sends first verification information to the mobile terminal, wherein the first verification information comprises: a first access control secret key and an expiration date;
the access control system receives second verification information sent by the reservation terminal, wherein the second verification information comprises: a second gate inhibition key;
the access control system judges whether the first access control key and the second access control key are consistent;
if the first access control secret key and the second access control secret key are consistent, the first access control secret key and the second access control secret key are consistent
The access control system successfully verifies the reservation terminal and sends a video connection request to the mobile terminal;
and the access control system receives the door opening instruction sent by the mobile terminal and performs door opening operation.
A third aspect of embodiments of the present invention provides a mobile terminal, including:
a receiving module, which is used for receiving the reservation request sent by the reservation terminal;
the verification module is used for confirming the reservation request;
a sending module, configured to send first verification information to the reservation terminal, where the first verification information includes: a first access control secret key and an expiration date;
the communication module is used for receiving a video connection request established by the access control system;
the receiving module is further configured to: acquiring a video shot by a network camera of the access control system;
the sending module is further configured to: and sending a door opening instruction to the access control system.
A fourth aspect of the present invention provides an access control system, including:
a sending module, configured to send first verification information to a mobile terminal, where the first verification information includes: a first access control secret key and an expiration date;
a receiving module, configured to receive second verification information sent by a reservation terminal, where the second verification information includes: a second gate inhibition key;
the judging module is used for judging whether the first access control secret key is consistent with the second access control secret key or not;
the communication module is used for the access control system to successfully verify the reservation terminal and send a video connection request to the mobile terminal;
the receiving module is further configured to: receiving a door opening instruction of the mobile terminal;
and the control module is used for performing door opening operation.
The embodiment of the invention has the following beneficial effects:
it can be seen that, according to the embodiment of the present invention, a mobile terminal receives a reservation request sent by a reservation terminal, confirms the reservation request, and sends first verification information to the reservation terminal if the reservation request sent by the reservation terminal is approved, where the first verification information includes: a first access control secret key and an expiration date; receiving a video connection request established by the access control system after the access control system successfully verifies the reservation terminal, and acquiring a video shot by a network camera of the access control system; and after confirming according to the video, sending a door opening instruction to the access control system. Therefore, the connection between the access control system and the mobile terminal is established, and remote visual talkback and door opening are realized. Meanwhile, the harassment connection between the harasser and the lawless persons is prevented through the verification of the verification information when the connection with the mobile terminal is to be established, the life quality of the resident is improved, and the home safety of the resident is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a first embodiment of an access control system reservation method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a mobile terminal according to a first embodiment of the disclosure;
fig. 3a is a schematic structural diagram of a first embodiment of an access control system according to an embodiment of the present invention;
fig. 3b is a schematic structural diagram of a first embodiment of an access control system according to an embodiment of the present invention;
fig. 3c is a schematic structural diagram of a first embodiment of an access control system according to an embodiment of the present invention;
fig. 3d is another schematic structural diagram of the first embodiment of the access control system disclosed in the embodiment of the present invention;
fig. 4 is a schematic structural diagram of a second embodiment of an access control system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of the invention and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The terminal described in the embodiment of the present invention may include a smart Phone (such as an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a mobile internet device (MID, mobile internet Devices), or a wearable device, and the terminal is merely an example, and is not exhaustive and includes but is not limited to the terminal.
Fig. 1 is a schematic flow chart of a reservation method applied to an access control system according to a first embodiment of the present invention. The reservation method applied to the access control system described in the embodiment includes the following steps:
101. the reservation terminal sends a reservation request to the mobile terminal.
Wherein the reservation request includes a reservation time period.
102. The mobile terminal receives the reservation request including the reservation time period sent by the reservation terminal, and when the mobile terminal confirms the reservation request and agrees with the reservation request sent by the reservation terminal, the mobile terminal requests to send first verification information to an access control system, wherein the first verification information comprises: a first access control secret key and an expiration date.
Wherein the mobile terminal confirms the reservation request, including:
the mobile terminal confirms the identity information of the subscriber in the reservation request, wherein the identity information of the subscriber comprises: the head portrait picture of the reservation user and the number information of the reservation terminal.
103. And the access control system receives the request sent by the mobile terminal and generates a random first verification message through a server.
Preferably, the first access control key in the first authentication information is composed of six different numbers and letters.
104. And after the access control system generates the first verification information, sending the first verification information to the mobile terminal, and storing the first verification information in a server cache.
Wherein the first authentication information is valid only within a validity period.
105. And the mobile terminal receives the first verification information sent by the access control system and sends the first verification information to the reservation terminal.
106. The reservation terminal receives the first verification information sent by the mobile terminal, and in the validity period, the reservation terminal sends second verification information to the access control system, wherein the second verification information comprises: the second gate-forbidden key.
Optionally, the second verification information is sent by the reservation terminal, or the second verification information is input by a subscriber through the access control system.
107. And the access control system receives the second verification information and judges whether the first access control secret key and the second access control secret key are consistent or not.
Optionally, if the first access control key and the second access control key are consistent, step 109 is executed.
Optionally, if the first access control key and the second access control key are not consistent, step 108 is performed.
108. And when the first access control secret key is inconsistent with the second access control secret key, the access control system displays an instruction that second verification information needs to be sent for the second time.
Optionally, the instruction for sending the second verification information for the second time is sent to the reservation terminal, or is displayed to the reservation party through the access control system.
Optionally, after the reservation terminal receives the instruction of the access control system, third verification information is sent to the access control system.
Optionally, when the access control system determines that the third verification information is inconsistent with the first verification information, the access control system displays an instruction that the verification information needs to be sent three times.
109. When the first access control key is consistent with the second access control key, the access control system detects whether the distance between the access control system and the reservation terminal is smaller than a preset threshold value.
Preferably, the preset threshold is 1.5 m.
110. And when the distance between the access control system and the reservation terminal is smaller than a preset threshold value, the access control system sends video connection to the mobile terminal.
111. And the mobile terminal receives the video connection sent by the access control system and confirms according to the video.
The video is the video shot by the network camera acquired by the access control system, and the image is sent to the mobile terminal.
112. And after the mobile terminal confirms according to the video, the mobile terminal sends a door opening instruction to the access control system.
The door opening instruction may include: after confirming the user of the reservation terminal according to the video information, which is input by the mobile terminal, a specific question and an answer to the specific question are provided, wherein the specific question comprises but is not limited to: the name of the primary school teacher, the dormitory of the university and the like, so that the access control system can determine whether the video is fake or not according to the reply of the reservation terminal, and the safety of the access control system is improved.
113. And the access control system receives the door opening instruction sent by the mobile terminal and executes door opening operation.
It can be seen that, according to the embodiment of the present invention, a mobile terminal receives a reservation request sent by a reservation terminal, confirms the reservation request, and sends first verification information to the reservation terminal if the reservation request sent by the reservation terminal is approved, where the first verification information includes: a first access control secret key and an expiration date; receiving a video connection request established by the access control system after the access control system successfully verifies the reservation terminal, and acquiring a video shot by a network camera of the access control system; and after confirming according to the video, sending a door opening instruction to the access control system. Therefore, the remote visual intercom and door opening are realized through the access control system and the mobile terminal, harassment connection between harassers and lawbreakers is prevented, and the home safety of residents is guaranteed.
The following is a device for implementing the reservation method applied to the access control system described in fig. 1, and specifically includes the following steps:
fig. 2 is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention. The mobile terminal described in this embodiment includes: the receiving module 201, the verifying module 202, the sending module 203 and the communication module 204 are as follows:
a receiving module 201, configured to receive a reservation request sent by a reservation terminal;
a verification module 202, configured to confirm the reservation request;
a sending module 203, configured to send first verification information to the reservation terminal, where the first verification information includes: a first access control secret key and an expiration date;
the communication module 204 is used for receiving a video connection request established by the access control system;
the receiving module 201 is further configured to: acquiring a video shot by a network camera of the access control system;
the sending module 203 is further configured to: and sending a door opening instruction to the access control system.
Optionally, the verification module 202 is specifically configured to:
confirming identity information of a subscriber in the reservation request, wherein the identity information of the subscriber comprises: the head portrait picture of the reservation user and the number information of the reservation terminal.
Optionally, before the sending module 203 sends the first verification information to the reservation terminal, the sending module 203 is further configured to:
requesting to send first verification information to the access control system;
the receiving module 201 is further configured to:
and receiving the first verification information sent by the access control system.
It can be seen that, with the mobile terminal described in the embodiment of the present invention, the mobile terminal receives a reservation request sent by a reservation terminal, confirms the reservation request, and sends first verification information to the reservation terminal if the reservation request sent by the reservation terminal is granted, where the first verification information includes: a first access control secret key and an expiration date; receiving a video connection request established by the access control system after the access control system successfully verifies the reservation terminal, and acquiring a video shot by a network camera of the access control system; and after confirming according to the video, sending a door opening instruction to the access control system. Therefore, the remote visual intercom and door opening are realized through the access control system and the mobile terminal, harassment connection between harassers and lawbreakers is prevented, and the home safety of residents is guaranteed.
Referring to fig. 3a, a schematic structural diagram of an access control system according to a first embodiment of the present invention is shown. The access control system described in this embodiment includes: the sending module 301, the receiving module 302, the judging module 303, the communication module 304 and the control module 305 are specifically as follows:
a sending module 301, configured to send first authentication information to a mobile terminal, where the first authentication information includes: a first access control secret key and an expiration date;
a receiving module 302, configured to receive second verification information sent by the reservation terminal, where the second verification information includes: a second gate inhibition key;
the judging module 303 is configured to judge whether the first access control key and the second access control key are consistent;
the communication module 304 is used for the access control system to successfully verify the reservation terminal and send a video connection request to the mobile terminal;
the receiving module 302 is further configured to: receiving a door opening instruction of the mobile terminal;
and a control module 305 for performing door opening operation.
Optionally, the receiving module 302 is configured to receive second verification information, and specifically configured to:
receiving second verification information sent by the reservation terminal;
or,
and receiving second verification information input by a subscriber through the access control system.
Optionally, as shown in fig. 3b, the access control system depicted in fig. 3a may further include: the display module 306 is specifically as follows:
the sending module 301 is further configured to:
if the first access control secret key is inconsistent with the second access control secret key, the access control system sends an instruction for verifying the second verification information for the second time to the reservation terminal;
the display module 306 is configured to, if the first access control key is inconsistent with the second access control key, display, by the access control system, an instruction for providing the second verification information to the subscriber to verify the second verification information.
Optionally, as shown in fig. 3c, the access control system depicted in fig. 3a may further include: the detection module 307 is specifically as follows:
a detecting module 307, configured to detect whether a distance between the access control system and the reservation terminal is smaller than a preset threshold after the first access control key and the second access control key are consistent and before the video connection request is sent to the mobile terminal, and if so, execute the sending of the video connection request to the mobile terminal.
Optionally, as shown in fig. 3d, the access control system depicted in fig. 3a may further include: the video capture module 308 is as follows:
the video acquisition module 308 is configured to acquire a video shot by a network camera after the video connection request is sent to the mobile terminal and before the door access control system receives a door opening instruction sent by the mobile terminal and performs a door opening operation;
the sending module 301 is further configured to:
and sending the video shot by the network camera to the mobile terminal.
It can be seen that, with the access control system described in the embodiment of the present invention, first verification information is sent to a mobile terminal, and second verification information is received, whether the first access key and the second access key are consistent is determined, and if the first access key and the second access key are consistent, the access control system successfully verifies the reservation terminal, sends a video connection request to the mobile terminal, and receives a door opening instruction sent by the mobile terminal, so as to perform a door opening operation. Therefore, the remote visual intercom and door opening are realized through the access control system and the mobile terminal, harassment connection between harassers and lawbreakers is prevented, and the home safety of residents is guaranteed.
Fig. 4 is a schematic structural diagram of an access control system according to a second embodiment of the present invention. The terminal described in this embodiment includes: at least one input device 1000; at least one output device 2000; at least one processor 3000, e.g., a CPU; and a memory 4000, the input device 1000, the output device 2000, the processor 3000, and the memory 4000 being connected by a bus 5000.
The input device 1000 may be a touch panel, a physical button, or a mouse.
The output device 2000 may be a display screen.
The memory 4000 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 4000 is used for storing a set of program codes, and the input device 1000, the output device 2000 and the processor 3000 are used for calling the program codes stored in the memory 4000 to execute the following operations:
the processor 3000 is configured to:
sending first verification information to a mobile terminal, wherein the first verification information comprises: a first access control secret key and an expiration date;
receiving second verification information sent by a reservation terminal, wherein the second verification information comprises: a second gate inhibition key;
judging whether the first access control secret key and the second access control secret key are consistent;
if the first access control secret key and the second access control secret key are consistent, the first access control secret key and the second access control secret key are consistent
The reservation terminal is successfully verified, and a video connection request is sent to the mobile terminal;
and receiving a door opening instruction sent by the mobile terminal, and performing door opening operation.
Optionally, the processor 3000 receives second verification information sent by the reservation terminal, and includes:
receiving second verification information sent by the reservation terminal;
or,
and receiving second verification information input by a subscriber through the access control system.
Optionally, before the first access control key and the second access control key are consistent, the processor 3000 is further specifically configured to: if the first access control secret key is inconsistent with the second access control secret key, the first access control secret key and the second access control secret key are inconsistent
The access control system sends an instruction for carrying out secondary verification on the second verification information to the reservation terminal;
or,
and the access control system provides an instruction for verifying the second verification information for the second time to the subscriber through a display system.
Optionally, after the first access control key and the second access control key are consistent, and before the video connection request is sent to the mobile terminal, the processor 3000 is further specifically configured to:
and detecting whether the distance between the access control system and the reservation terminal is smaller than a preset threshold value, if so, executing the video connection request sent to the mobile terminal.
Optionally, after sending the video connection request to the mobile terminal, and before the access control system receives the door opening instruction sent by the mobile terminal and performs the door opening operation, the processor 3000 is further specifically configured to:
the access control system acquires the video shot by the network camera and sends the video to the mobile terminal.
The embodiment of the invention also provides a computer storage medium, wherein the computer storage medium can store a program, and the program comprises part or all of the steps of any one of the methods described in the above embodiments, which are applied to the access control system reservation method.
While the invention has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus (device), or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. A computer program stored/distributed on a suitable medium supplied together with or as part of other hardware, may also take other distributed forms, such as via the Internet or other wired or wireless telecommunication systems.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the invention has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the invention. Accordingly, the specification and figures are merely exemplary of the invention as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (16)

1. The reservation method applied to the access control system is characterized by comprising the following steps:
the mobile terminal receives a reservation request sent by a reservation terminal;
the mobile terminal confirms the reservation request, and if the reservation request sent by the reservation terminal is approved, the mobile terminal sends first verification information to the reservation terminal, wherein the first verification information comprises: a first access control secret key and an expiration date;
the mobile terminal receives a video connection request established by the access control system after the access control system successfully verifies the reservation terminal, and acquires a video shot by a network camera of the access control system;
and after confirming according to the video, the mobile terminal sends a door opening instruction to the access control system.
2. The method of claim 1, wherein the confirmation of the reservation request by the mobile terminal comprises:
the mobile terminal confirms the identity information of the subscriber in the reservation request, wherein the identity information of the subscriber comprises: the head portrait picture of the reservation user and the number information of the reservation terminal.
3. The method according to any one of claims 1 or 2, wherein before the mobile terminal transmits the first authentication information to the reservation terminal, the method further comprises: the mobile terminal requests the access control system to send first verification information, and the mobile terminal receives the first verification information sent by the access control system.
4. The reservation method applied to the access control system is characterized by comprising the following steps:
the access control system sends first verification information to the mobile terminal, wherein the first verification information comprises: a first access control secret key and an expiration date;
the access control system receives second verification information sent by the reservation terminal, wherein the second verification information comprises: a second gate inhibition key;
the access control system judges whether the first access control key and the second access control key are consistent;
if the first access control secret key and the second access control secret key are consistent, the first access control secret key and the second access control secret key are consistent
The access control system successfully verifies the reservation terminal and sends a video connection request to the mobile terminal;
and the access control system receives the door opening instruction sent by the mobile terminal and performs door opening operation.
5. The method of claim 4, wherein the receiving the second verification information sent by the subscribing terminal comprises:
receiving second verification information sent by the reservation terminal;
or,
and receiving second verification information input by a subscriber through the access control system.
6. The method of any of claims 4 or 5, wherein if the first access control key and the second access control key are consistent, the method further comprises: if the first access control secret key is inconsistent with the second access control secret key, the first access control secret key and the second access control secret key are inconsistent
The access control system sends an instruction for carrying out secondary verification on the second verification information to the reservation terminal;
or,
and the access control system provides an instruction for verifying the second verification information for the second time to the subscriber through a display system.
7. The method according to any of claims 4 or 5, wherein after the first access-control key and the second access-control key are consistent and before the sending of the video connection request to the mobile terminal, the method further comprises:
and detecting whether the distance between the access control system and the reservation terminal is smaller than a preset threshold value, if so, executing the video connection request sent to the mobile terminal.
8. The method according to any one of claims 4 or 5, wherein after the video connection request is sent to the mobile terminal and before the door opening instruction sent by the mobile terminal is received by the access control system and a door opening operation is performed, the method further comprises:
the access control system acquires the video shot by the network camera and sends the video to the mobile terminal.
9. A mobile terminal, comprising:
a receiving module, which is used for receiving the reservation request sent by the reservation terminal;
the verification module is used for confirming the reservation request;
a sending module, configured to send first verification information to the reservation terminal, where the first verification information includes: a first access control secret key and an expiration date;
the communication module is used for receiving a video connection request established by the access control system;
the receiving module is further configured to: acquiring a video shot by a network camera of the access control system;
the sending module is further configured to: and sending a door opening instruction to the access control system.
10. The mobile terminal of claim 9, wherein the authentication module is specifically configured to:
confirming identity information of a subscriber in the reservation request, wherein the identity information of the subscriber comprises: the head portrait picture of the reservation user and the number information of the reservation terminal.
11. The mobile terminal according to any one of claims 9 or 10, wherein before the sending module sends the first verification information to the subscribing terminal, the sending module is further configured to:
requesting to send first verification information to the access control system;
the receiving module is further configured to:
and receiving the first verification information sent by the access control system.
12. An access control system, comprising:
a sending module, configured to send first verification information to a mobile terminal, where the first verification information includes: a first access control secret key and an expiration date;
a receiving module, configured to receive second verification information sent by a reservation terminal, where the second verification information includes: a second gate inhibition key;
the judging module is used for judging whether the first access control secret key is consistent with the second access control secret key or not;
the communication module is used for the access control system to successfully verify the reservation terminal and send a video connection request to the mobile terminal;
the receiving module is further configured to: receiving a door opening instruction of the mobile terminal;
and the control module is used for performing door opening operation.
13. The access control system of claim 12, wherein the receiving module is configured to receive second verification information, and specifically configured to:
receiving second verification information sent by the reservation terminal;
or,
and receiving second verification information input by a subscriber through the access control system.
14. The door access system of any one of claims 12 or 13, wherein the sending module is further configured to:
if the first access control secret key is inconsistent with the second access control secret key, the access control system sends an instruction for verifying the second verification information for the second time to the reservation terminal;
the access control system still includes:
and the display module is used for displaying an instruction for providing secondary verification of the second verification information to the subscriber by the access control system if the first access control key is inconsistent with the second access control key.
15. The door access system of any one of claims 12 or 13, further comprising:
the detection module is configured to detect whether a distance between the access control system and the reservation terminal is smaller than a preset threshold value after the first access control key and the second access control key are consistent and before the video connection request is sent to the mobile terminal, and if so, execute the video connection request sent to the mobile terminal.
16. The door access system of any one of claims 12 or 13, further comprising:
the video acquisition module is used for acquiring videos shot by the network camera after sending the video connection request to the mobile terminal and before the access control system receives a door opening instruction sent by the mobile terminal and performs door opening operation;
the sending module is further configured to:
and sending the video shot by the network camera to the mobile terminal.
CN201610657714.9A 2016-08-10 2016-08-10 A kind of reserving method and mobile terminal and access control system applied to access control system Expired - Fee Related CN106097531B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610657714.9A CN106097531B (en) 2016-08-10 2016-08-10 A kind of reserving method and mobile terminal and access control system applied to access control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610657714.9A CN106097531B (en) 2016-08-10 2016-08-10 A kind of reserving method and mobile terminal and access control system applied to access control system

Publications (2)

Publication Number Publication Date
CN106097531A true CN106097531A (en) 2016-11-09
CN106097531B CN106097531B (en) 2019-08-13

Family

ID=57455674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610657714.9A Expired - Fee Related CN106097531B (en) 2016-08-10 2016-08-10 A kind of reserving method and mobile terminal and access control system applied to access control system

Country Status (1)

Country Link
CN (1) CN106097531B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107133680A (en) * 2017-05-15 2017-09-05 泰康保险集团股份有限公司 Reservation information processing method, user terminal and server
CN109785467A (en) * 2017-11-13 2019-05-21 广东工业大学 A kind of intelligent access control system of identity-based verifying

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100663090B1 (en) * 2005-11-24 2007-01-02 주식회사 에스원 Door control system and door control method thereof
CN101833804A (en) * 2010-04-30 2010-09-15 中山大学 Access control system with remote identity authentication
CN102449667A (en) * 2009-04-03 2012-05-09 因温特奥股份公司 Method and apparatus for access monitoring
CN105118127A (en) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 Visiting system and control method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100663090B1 (en) * 2005-11-24 2007-01-02 주식회사 에스원 Door control system and door control method thereof
CN102449667A (en) * 2009-04-03 2012-05-09 因温特奥股份公司 Method and apparatus for access monitoring
CN101833804A (en) * 2010-04-30 2010-09-15 中山大学 Access control system with remote identity authentication
CN105118127A (en) * 2015-09-17 2015-12-02 慧锐通智能科技股份有限公司 Visiting system and control method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107133680A (en) * 2017-05-15 2017-09-05 泰康保险集团股份有限公司 Reservation information processing method, user terminal and server
CN109785467A (en) * 2017-11-13 2019-05-21 广东工业大学 A kind of intelligent access control system of identity-based verifying

Also Published As

Publication number Publication date
CN106097531B (en) 2019-08-13

Similar Documents

Publication Publication Date Title
CN107430654B (en) Method and system for switching biometric authentication
CN105550554B (en) A kind of glance prevention method and mobile terminal
CN1846188B (en) Information hiding through time synchronization
US20150128257A1 (en) Method for unlocking terminal device and terminal device
US20200184088A1 (en) Computer-implemented method and computer program product for the access control of a terminal
CN102306286A (en) Identity recognition method, identity recognition system and identity recognition terminal
CN107786487B (en) Information authentication processing method, system and related equipment
KR101577036B1 (en) Access authentication system and method based ip camera
US9697346B2 (en) Method and apparatus for identifying and associating devices using visual recognition
EP3249570A1 (en) Method and device for providing prompt indicating loss of terminal
CN107341376B (en) Picture mistransmission preventing and peeping preventing method and electronic equipment
CN111314389A (en) Face authentication method, face authenticator and readable storage medium
CN110491007A (en) A kind of community-based caller management method, community server and storage medium
CN102609656A (en) USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification
CN111862432B (en) Entrance guard verification method, entrance guard device, server and system
CN107358763A (en) A kind of method, apparatus and system of ATM checking identity
CN106097531B (en) A kind of reserving method and mobile terminal and access control system applied to access control system
CN105871903A (en) Information security control method and system as well as mobile terminal
US20220114247A1 (en) Biometric Authenticated Content
CN110895844A (en) Interaction method and device of intelligent door equipment, computer equipment and storage medium
WO2018006318A1 (en) Method and system for using intelligent entrance guard on basis of mobile terminal
WO2018006332A1 (en) Intelligent entrance guard management method and system based on mobile terminal
CN106921617A (en) Common equipment reservation control method and device
CN105577378A (en) Identity authentication method, apparatus, and system
CN111274577A (en) Information protection method, device, system and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190813

CF01 Termination of patent right due to non-payment of annual fee