CN107633583B - Access control system and method supporting IOS equipment - Google Patents

Access control system and method supporting IOS equipment Download PDF

Info

Publication number
CN107633583B
CN107633583B CN201710893770.7A CN201710893770A CN107633583B CN 107633583 B CN107633583 B CN 107633583B CN 201710893770 A CN201710893770 A CN 201710893770A CN 107633583 B CN107633583 B CN 107633583B
Authority
CN
China
Prior art keywords
information
mobile terminal
access control
identification information
reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710893770.7A
Other languages
Chinese (zh)
Other versions
CN107633583A (en
Inventor
范志根
谭宁
周剑
刘光南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Pci Data Service Co ltd
Original Assignee
Guangzhou Pci Data Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Pci Data Service Co ltd filed Critical Guangzhou Pci Data Service Co ltd
Priority to CN201710893770.7A priority Critical patent/CN107633583B/en
Publication of CN107633583A publication Critical patent/CN107633583A/en
Application granted granted Critical
Publication of CN107633583B publication Critical patent/CN107633583B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention relates to an access control system and method supporting IOS equipment, and belongs to the technical field of access security. This access control system includes: entrance guard's equipment, entrance guard's equipment includes: the access control system comprises a reader-writer and an access controller, wherein the reader-writer is connected with the access controller. The reader-writer is used for acquiring identification information of the mobile terminal representing user identity information according to a preset rule and sending the identification information to the access controller, wherein the mobile terminal is provided with an IOS operating system. The access controller is used for judging whether the identification information has the door opening permission, and if so, the door is opened. The access control system acquires identification information representing user identity information of an intelligent mobile terminal with a Near Field Communication (NFC) function through a preset rule so as to replace the existing access control in the modes of a pass card, an access card and the like, thereby achieving the effects of safety, convenience and cost saving.

Description

Access control system and method supporting IOS equipment
Technical Field
The invention belongs to the technical field of entrance guard safety, and particularly relates to an entrance guard control system and method supporting IOS equipment.
Background
Entrance guard control systems have been used in many situations where it is desirable to control the entrance and exit of a user, such as hotels, gymnasiums, etc. The existing access control system generally realizes access control through simple fingerprint identification, pass cards and other modes. With the rapid development of the mobile internet in recent years, the popularity of smart phones has become higher and higher, and the smart phones are not limited to voice and short message functions, new mobile terminal products represented by smart phones are continuously emerging, and smart mobile terminals having Near Field Communication (NFC) functions are becoming hot topics. Therefore, how to design a brand-new access control system to replace the existing access control adopting the modes of access cards, access control cards and the like so as to achieve the effects of safety, convenience and cost saving becomes the focus of attention of people.
Disclosure of Invention
Accordingly, the present invention is directed to a system and a method for entrance guard control supporting IOS devices to effectively solve the above problems.
The embodiment of the invention is realized by the following steps:
the embodiment of the invention provides an entrance guard control system supporting IOS equipment, which comprises: entrance guard's equipment, entrance guard's equipment includes: the access control system comprises a reader-writer and an access controller, wherein the reader-writer is connected with the access controller. The reader-writer is used for acquiring identification information of the mobile terminal representing user identity information according to a preset rule and sending the identification information to the access controller, wherein the mobile terminal is provided with an IOS operating system. The access controller is used for judging whether the identification information has the door opening permission, and if so, the door is opened.
In a preferred embodiment of the present invention, the preset rule is: when a processing option data object list generated by the mobile terminal based on the application selected by the reader-writer is obtained, sending obtained processing option data to the mobile terminal based on the processing option data object list; judging whether unread records exist or not based on an application file locator which is generated and sent by the obtained mobile terminal based on the obtained processing option data, and if yes, designating one unread record from all unread records and sending the unread record to the mobile terminal; and judging whether a required label value exists or not based on the acquired record content corresponding to the specified unread record sent by the mobile terminal, and if so, acquiring identification information representing user identity information from the label value.
In a preferred embodiment of the present invention, the access control system further includes: the server, entrance guard's equipment still includes: the access control background system is connected with the server and the access control background system is respectively connected with the access control controller and the server; in the permission determining stage, the reader is further configured to send the obtained identification information representing the user identity information to the server; the server is used for registering the identification information sent by the reader-writer and sending the registration information to the access control background system; and the access control background system is used for sending the registration information to the access control device.
In a preferred embodiment of the present invention, the server is further configured to receive entrance guard record information sent by the entrance guard controller through the entrance guard background system, generate life work and rest information based on the entrance guard record information, and send the life work and rest information to the user terminal corresponding to the life work and rest information.
In a preferred embodiment of the present invention, the server is further configured to determine whether the occurrence frequency of a certain identification information having a door opening permission is greater than or equal to a first threshold value based on the entrance guard record information within a preset time period; and if so, generating life work and rest information based on the identification information with the door opening authority, and sending the life work and rest information to the user terminal corresponding to the life work and rest information.
The embodiment of the invention also provides an access control method supporting the IOS equipment, which is applied to an access control system, wherein the access control system comprises the following steps: entrance guard's equipment, entrance guard's equipment includes: a reader-writer and an access controller. The method comprises the following steps: the reader-writer obtains identification information representing user identity information of the mobile terminal according to a preset rule, and sends the identification information to the access controller, wherein the mobile terminal is provided with an IOS operating system; and the access controller judges whether the identification information has the door opening permission, and if so, the door is opened.
In a preferred embodiment of the present invention, the obtaining, by the reader/writer according to a preset rule, identification information of the mobile terminal representing the user identity information includes: when a processing option data object list generated by the mobile terminal based on the application selected by the reader-writer is obtained, sending obtained processing option data to the mobile terminal based on the processing option data object list, wherein the mobile terminal is a mobile terminal with an IOS (operating system); judging whether unread records exist or not based on an application file locator which is generated and sent by the obtained mobile terminal based on the obtained processing option data, and if yes, designating one unread record from all unread records and sending the unread record to the mobile terminal; and judging whether a required label value exists or not based on the acquired record content corresponding to the specified unread record sent by the mobile terminal, and if so, acquiring identification information representing user identity information from the label value.
In a preferred embodiment of the present invention, the access control system further includes: the server, entrance guard's equipment still includes: the access control background system, the method still includes: the server receives entrance guard record information sent by the entrance guard controller through the entrance guard background system, generates life work and rest information based on the entrance guard record information, and sends the life work and rest information to the user terminal corresponding to the life work and rest information.
In a preferred embodiment of the present invention, the generating of the daily work and rest information based on the entrance guard record information includes: judging whether the occurrence frequency of certain identification information with door opening authority is larger than or equal to a first threshold value or not based on the entrance guard record information in a preset time period; and if so, generating life work and rest information based on the identification information with the door opening authority, and sending the life work and rest information to the user terminal corresponding to the life work and rest information.
The embodiment of the invention also provides another method for supporting the access control of the IOS equipment, which is applied to an access control system, wherein the access control system comprises the following steps: entrance guard's equipment and server, entrance guard's equipment includes: the system comprises a reader-writer, an access controller and an access background system, and the method comprises the following steps: the reader-writer sends the obtained identification information representing the user identity information to the server; the server registers the identification information sent by the reader-writer and sends the registration information to the access control background system; and the access control background system sends the registration information to the access control controller.
Compared with the prior art, the access control system and the access control method supporting the IOS equipment provided by the embodiment of the invention have the advantages that the identification information representing the user identity information of the intelligent mobile terminal with the Near Field Communication (NFC) function is read through the preset rule, so that the existing access control in the modes of a pass card, an access card and the like is replaced, and the effects of safety, convenience and cost saving are achieved. Meanwhile, the identification information used for representing the user identity information can be obtained through the preset rule, and the problem that the identification information used for representing the user identity information cannot be obtained based on the NFC technology due to the fact that the existing mobile terminal with the IOS operating system is limited by the authority of the mobile terminal is solved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts. The above and other objects, features and advantages of the present invention will become more apparent from the accompanying drawings. Like reference numerals refer to like parts throughout the drawings. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
Fig. 1 shows an interaction diagram of an access control system supporting IOS devices according to a first embodiment of the present invention.
Fig. 2 is a flowchart illustrating a method for presetting rules according to an embodiment of the present invention.
Fig. 3 shows a flowchart of a method for supporting an access control method of an IOS device according to a second embodiment of the present invention.
Fig. 4 shows a flowchart of a method for supporting an access control method of an IOS device according to a third embodiment of the present invention.
Fig. 5 shows a flowchart of a method for acquiring step S404 in fig. 4 according to an embodiment of the present invention.
Fig. 6 shows a flowchart of a method for supporting an access control method of an IOS device according to a fourth embodiment of the present invention.
Icon: 100-an access control system; 110-access control equipment; 111-a reader/writer; 112-an access controller; 113-door control background system; 120-server.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it should be noted that the terms "first", "second", "third", and the like are used only for distinguishing the description, and are not intended to indicate or imply relative importance.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly specified or limited, the term "connected" is to be interpreted broadly, e.g. as a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
An embodiment of the present invention provides an access control system 100 supporting an IOS device, as shown in fig. 1. This access control system 100 includes: access control device 110 and server 120.
The access control device 110 is connected to the server 120, and preferably, the access control device 110 includes: reader 111, access controller 112, and access backend system 113. The reader-writer 111 is respectively connected with the access controller 112 and the server 120, the access controller 112 is connected with the access background system 113, and the access background system 113 is connected with the server 120.
The reader 111 is configured to obtain identification information of the mobile terminal representing user identity information according to a preset rule, and send the identification information to the access controller 112, where the mobile terminal has an operating system of an IOS. Further, when the mobile terminal with the Near Field Communication (NFC) function and the IOS operating system approaches the reader 111, the reader 111 can obtain identification information of the mobile terminal for representing user identity information according to a preset rule, and send the obtained identification information to the access controller 112 for door opening permission verification.
In addition, in the permission determining stage, that is, in the identity registration, the reader 111 is further configured to send the acquired identification information representing the user identity information to the server 120. That is, the reader 111 sends the identification information representing the user identity information of the mobile terminal of the pre-registered user to the server 120 for identity registration.
The mobile terminal with the IOS operating system may be a mobile terminal such as an iPhone, iPad, Apple Watch, and the like. Due to the current permission limitation of the IOS system, NFC of the IOS system is mainly applied to Apple Pay. Therefore, in this embodiment, an Apple Pay is used to bind a union Pay card, and an equipment card number of one of the union Pay cards bound with the Apple Pay is read by using an Apple Pay standard flow as a unique ID number of an NFC mobile phone based on an ios operating system, that is, the unique ID number can be used as identification information representing user identity information.
The mobile terminal can be a tablet computer, a smart phone, a smart watch and the like.
Referring to fig. 2, the preset rule is a method including steps S201 to S205, and the steps in the preset rule will be described in detail with reference to fig. 2.
Step S201: and when a processing option data object list generated by the mobile terminal based on the application selected by the reader-writer is obtained, sending the obtained processing option data to the mobile terminal based on the processing option data object list.
When a reader/writer obtains a Processing option Data Object List (PDOL) generated by the mobile terminal based on an application selected by the reader/writer during the approach of the mobile terminal having a Near Field Communication (NFC) function and an IOS operating system to the reader/writer, the reader/writer prepares to obtain GPO (Get Processing option) Data based on the PDOL and transmits the GPO Data to the mobile terminal.
Step S202: and judging whether unread records exist or not based on the application file locator generated and sent by the acquired mobile terminal based on the acquired processing option data.
When the reader/writer acquires an Application File Locator (AFL) generated and transmitted by the mobile terminal based on the GPO data, it determines whether there is an unread record based on the AFL, if so, the unread record exists, then step S203 is executed, and if not, the unread record does not exist, that is, all records are read, and then the process is ended.
Step S203: and designating one unread record from all unread records and sending the unread record to the mobile terminal.
When there are unread records, the reader/writer designates one unread record from all the unread records to send to the mobile terminal, for convenience of understanding, for example, there are A, B, C unread records, and then designates one record from the three records to send to the mobile terminal, for example, designate a record. Wherein A, B, C may be the name/directory of the represented file, etc.
Step S204: and judging whether a required label value exists or not based on the acquired record content corresponding to the specified unread record sent by the mobile terminal.
When the reader-writer acquires the corresponding record content sent by the mobile terminal based on the specified unread record, whether a required TAG value exists or not is judged based on the record content, and further whether the record content contains a TAG value with a TAG value of 57, namely TAG57 is judged. If yes, i.e. the record content contains TAG57, step S205 is executed, and if no, i.e. the record content part contains TAG57, step S202 is executed, i.e. one record is designated from the remaining unread records and sent to the mobile terminal, at this time, the unread record also includes B and C, e.g. designated B record is sent to the mobile terminal.
Step S205: and acquiring identification information representing the user identity information from the tag value.
When the reader obtains the TAG value (TAG57), the reader obtains the device card number from the TAG57 as the identification information representing the user identity information. Wherein the TAG57 comprises: and applying information such as a primary account number, a separator, an expiration date, a service code and the like. When obtaining the device card number, the device card number is further obtained from the tag value based on a preset algorithm. The number of the card number of the required device can be selected according to actual needs, and the extraction algorithm required by different numbers of the card number can be different. The preset algorithm is an encryption algorithm, a decryption algorithm, a compression algorithm or a verification algorithm and the like. For example, the encryption/decryption algorithm may be a DES algorithm, a 3DES algorithm, an SM9 algorithm, an MD5 algorithm, an RSA algorithm, an Elgamal algorithm, a knapsack algorithm, a Rabin algorithm, a D-H algorithm, an ECC algorithm, and the like. The compression algorithm may be an LZ77 algorithm and the check algorithm may be a CRC algorithm, a CPC parity algorithm, an S-XOR sum exclusive or check algorithm, or the like. Other algorithms, such as the PBOC _ 3DES _ MAC algorithm of the Unionpay Standard Specification, may also be used.
The number of digits of the required device card number may be set according to actual practical requirements, for example, when the device card number is applied to an access control system as identification information representing user identity information, the number of digits of the device card number may be set according to the length of the ID number supported by the access control system, that is, the number of digits.
The access controller 112 is configured to determine whether the identification information has a door opening permission, and if so, open the door. Further, when receiving the identification information sent by the reader/writer 111, the access controller 112 uses its own stored authority white list to determine whether the identification information has the authority to open the door, and if so, that is, when the data matching the identification information can be found in the authority white list, the access controller opens the door and generates the access record information. In addition, the access controller 112 further sends the generated access record information to the server 120 through the access background system 113 for synchronization. Wherein, this entrance guard's record information includes: and the information such as user name, door opening date, time and the like corresponding to the identification information.
The access control background system 113 is configured to implement communication between the access controller 112 and the server 120, and further, in the permission determination stage, that is, in the identity registration stage, the access control background system 113 is configured to send registration information sent by the server 120 to the access controller 112; and transmits the access record information generated when the access controller 112 opens the door to the server 120.
In the permission determining stage, that is, in the identity registration, the server 120 is configured to register the identification information sent by the reader 111, and send the registration information to the access control background system 113. Further, the server 120 receives the identification information of the pre-registered user (the unique ID number indicating the user identity, that is, the ID number of each user is different) sent by the reader 111 and binds with other information of the user, that is, a registration process, for example, the identification information of the user a obtained by the reader 111 is 1ahdf201, and the identification information of the user B is 2hggyi 32. The server 120 registers the name and the phone number of the user a with the identification information (1ahdf201), and sends the registration information to the access control background system 113.
The server 120 is further configured to receive the entrance guard record information sent by the entrance guard controller 112 via the entrance guard background system 113, generate life work and rest information based on the entrance guard record information, and send the life work and rest information to the user terminal corresponding to the life work and rest information. Further, the server 120 is configured to generate life work and rest information based on the entrance guard record information within a preset time period, and send the life work and rest information to a user terminal corresponding to the life work and rest information. For convenience of understanding, in this embodiment, only the time of one week is taken as an example, that is, the server 120 generates the daily work and rest information based on the entrance guard record information sent by the entrance guard controller 112 in this week, and sends the daily work and rest information to the user terminal corresponding to the daily work and rest information. The server 120 counts the time and the number of times of entrance/exit of the user in the entrance guard record information received in the week, and sends the counted data information to the corresponding user terminal, so that the user can clearly know the life and rest of the user. Wherein, the life work and rest information includes: the number of entries in and out of this week, and the time of each entry, for example, 5 entries in this week, 8 am on Monday 20, 18 pm on Monday 10, 7 am on Tuesday 50, 17 pm on Tuesday 50, and 6 am on Wednesday 10.
Preferably, when the server 120 generates the daily work and rest information based on the access record information sent by the access controller 112 in the week, it determines whether the occurrence frequency of certain identification information with the door opening authority is greater than or equal to a first threshold; and if so, generating life work and rest information based on the identification information with the door opening authority, and sending the life work and rest information to the user terminal corresponding to the life work and rest information. Further, when the server 120 acquires the access control record information within the preset time period, it is determined whether the number of occurrences of a certain identification information with a door opening permission in the access control record information is greater than or equal to a first threshold, and if so, that is, the number of occurrences of the identification information with the door opening permission is greater than or equal to the first threshold, life rest information is generated based on the identification information with the door opening permission. In this way, only the daily work and rest information of the user who frequently enters/exits the access control system 100 can be provided.
The first threshold may be set according to actual needs, and the value of the first threshold may be an integer greater than 1. For example, the life work and rest information of the user who enters/exits the access control system 100 for 5 times or more in one week is transmitted to the user, so that the task load of the server 120 is reduced, and the operation speed of the server 120 is increased.
The server 120 may be a web server, a database server, or the like, or may be an integrated server system of a web server, a database server, or the like.
Second embodiment
An embodiment of the present invention provides an access control method applied to the access control system 100, as shown in fig. 3. The following will specifically explain the steps of the access control method provided by the embodiment of the invention with reference to fig. 3.
Step S301: and the reader-writer acquires identification information representing user identity information of the mobile terminal according to a preset rule and sends the identification information to the access controller.
In a process that a mobile terminal with Near Field Communication (NFC) function and an IOS operating system approaches the reader, the reader obtains identification information representing user identity information of the mobile terminal according to a preset rule, and please refer to the explanation of fig. 2 for a specific process.
Step S302: and the access controller judges whether the identification information has the door opening permission.
When receiving the identification information sent by the reader-writer, the access controller judges whether the identification information has the door opening authority or not by using the authority white list stored by the access controller, and if so, the access controller searches the data matched with the identification information from the authority white list stored by the access controller, and executes step S303. If not, the process is ended.
Step S303: and (6) opening the door.
The entrance guard controller controls the entrance guard opening device to open the door.
Third embodiment
As another implementation manner, an embodiment of the present invention provides an access control method applied to the access control system 100, as shown in fig. 4. The following will specifically explain the steps of the access control method provided by the embodiment of the present invention with reference to fig. 4.
Step S401: and the reader-writer acquires identification information representing user identity information of the mobile terminal according to a preset rule and sends the identification information to the access controller.
In a process that a mobile terminal with Near Field Communication (NFC) function and an IOS operating system approaches the reader, the reader obtains identification information representing user identity information of the mobile terminal according to a preset rule, and please refer to the explanation of fig. 2 for a specific process.
Step S402: and the access controller judges whether the identification information has the door opening permission.
When receiving the identification information sent by the reader-writer, the access controller judges whether the identification information has the door opening authority by using the authority white list stored in the access controller, and if so, the access controller searches the data matched with the identification information from the authority white list stored in the access controller, and executes step S403. If not, the process is ended.
Step S403: and opening the door and sending the generated entrance guard record information to the server through the entrance guard background system.
Entrance guard controller control entrance guard opening device opens the door, and simultaneously, this entrance guard controller generates entrance guard's record information, and this entrance guard's record information warp entrance guard's backstage system sends for the server, wherein this entrance guard's record information includes: and the information such as user name, door opening date, time and the like corresponding to the identification information.
Step S404: the server generates life work and rest information based on the entrance guard record information and sends the life work and rest information to the user terminal corresponding to the life work and rest information.
The server receives entrance guard record information sent by the entrance guard controller through an entrance guard background system, life work and rest information is generated based on the entrance guard record information, and the life work and rest information is sent to the user terminal corresponding to the life work and rest information. Preferably, life work and rest information is generated based on the entrance guard record information in a preset time period, and the life work and rest information is sent to the user terminal corresponding to the life work and rest information.
And generating life work and rest information based on the entrance guard record information in a preset time period, as shown in fig. 4. This step will be described in detail below with reference to fig. 4.
Step S501: and judging whether the occurrence frequency of certain identification information with door opening permission is more than or equal to a first threshold value or not based on the entrance guard record information in a preset time period.
When the server generates life work and rest information based on the entrance guard record information sent by the entrance guard controller within the preset time period, the server determines whether the occurrence frequency of certain identification information with the door opening authority is greater than or equal to a first threshold, if so, that is, the occurrence frequency of the identification information with the door opening authority is greater than or equal to the first threshold, the step S502 is executed.
The first threshold may be set according to actual needs, and the value of the first threshold may be an integer greater than 1. For example, the life work and rest information of the user who enters/exits the access control system more than or equal to 5 times in one week is sent to the user, so that the task amount of the server is reduced, and the running speed of the server is improved.
Step S502: and generating life work and rest information based on the identification information with the door opening permission.
The server can count the time and the times of entering/exiting the entrance guard based on the identification information with the door opening authority, and send the counted data information to the corresponding user terminal so that the user can clearly know the life and rest of the user. Wherein, the life work and rest information includes: the number of entries and exits within a predetermined time period, and the time of each entry and exit, for example, 5 entries and exits in the week, 8 am on the Monday, 20 am on the Monday, 18 pm on the Monday, 10 am on the Tuesday, 7 am on the Tuesday, 50 pm on the Tuesday, 17 pm on the Tuesday, and 6 am on the Wednesday.
Fourth embodiment
As another implementation manner, an embodiment of the present invention provides an access control method applied to the access control system 100, as shown in fig. 6. The following will specifically explain the steps of the access control method provided by the embodiment of the invention with reference to fig. 6.
Step S601: and the reader-writer sends the acquired identification information representing the user identity information to the server.
When a mobile terminal with Near Field Communication (NFC) function and an IOS operation system approaches the reader-writer, the reader-writer obtains identification information of the mobile terminal representing user identity information according to a preset rule, and then sends the identification information to the server.
Step S602: and the server registers the identification information sent by the reader-writer and sends the registration information to the access control background system.
And when the server receives the identification information sent by the writer, the server performs real-name registration on the identification information and sends the registration information to the access control background system. Further, the server receives the identification information (a unique ID number indicating the identity of the user, that is, the ID number of each user is different) of the pre-registered user sent by the reader/writer, and binds the identification information with other information of the user, that is, a registration process, for example, the identification information of the user a obtained by the reader/writer is 1ahdf201, and the identification information of the user B is 2hggyi 32. The server registers the name and the telephone number of the user A and the identification information (1ahdf201), and sends the registration information to the access control background system.
Step S603: and the access control background system sends the registration information to the access control controller.
And the access control background system receives the registration information sent by the server and forwards the registration information to the access control controller so that the access control controller can carry out door opening permission matching on the identification information sent by the reader-writer.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. The utility model provides a support access control system of IOS equipment which characterized in that includes: entrance guard's equipment, entrance guard's equipment includes: the system comprises a reader-writer and an access controller, wherein the reader-writer is connected with the access controller;
the reader-writer is used for acquiring identification information of the mobile terminal representing user identity information according to a preset rule and sending the identification information to the access controller, wherein the mobile terminal is provided with an IOS operating system;
the entrance guard controller is used for judging whether the identification information has the door opening authority, if so, opening the door,
wherein, the preset rule is as follows:
when a processing option data object list generated by the mobile terminal based on the application selected by the reader-writer is obtained, sending obtained processing option data to the mobile terminal based on the processing option data object list;
judging whether unread records exist or not based on an application file locator which is generated and sent by the obtained mobile terminal based on the obtained processing option data, and if yes, designating one unread record from all unread records and sending the unread record to the mobile terminal;
and judging whether a label value with a label value of 57, namely TAG57, exists or not based on the acquired record content corresponding to the specified unread record sent by the mobile terminal, and if so, acquiring identification information representing user identity information from the label value.
2. The access control system of claim 1, further comprising: the server, entrance guard's equipment still includes: the access control background system is connected with the server and the access control background system is respectively connected with the access control controller and the server;
in the permission determining stage, the reader is further configured to send the obtained identification information representing the user identity information to the server;
the server is used for registering the identification information sent by the reader-writer and sending the registration information to the access control background system;
and the access control background system is used for sending the registration information to the access control device.
3. The door access control system of claim 2, wherein the server is further configured to receive door access record information sent by the door access controller via the door access background system, generate life work and rest information based on the door access record information, and send the life work and rest information to the user terminal corresponding to the life work and rest information.
4. The access control system of claim 3, wherein the server is further configured to determine whether the number of occurrences of an identification information with a door opening right is greater than or equal to a first threshold value based on the access record information within a preset time period;
and if so, generating life work and rest information based on the identification information with the door opening authority, and sending the life work and rest information to the user terminal corresponding to the life work and rest information.
5. The utility model provides a support IOS equipment's access control method which characterized in that, is applied to access control system, access control system includes: entrance guard's equipment, entrance guard's equipment includes: reader writer and entrance guard's controller, the method includes:
the reader-writer obtains identification information representing user identity information of the mobile terminal according to a preset rule, and sends the identification information to the access controller, wherein the mobile terminal is provided with an IOS operating system;
the access controller judges whether the identification information has the door opening permission, if so, the door is opened, wherein the reader-writer acquires the identification information representing the user identity information of the mobile terminal according to a preset rule, and the access controller comprises:
when a processing option data object list generated by the mobile terminal based on the application selected by the reader-writer is obtained, sending obtained processing option data to the mobile terminal based on the processing option data object list, wherein the mobile terminal is a mobile terminal with an IOS (operating system);
judging whether unread records exist or not based on an application file locator which is generated and sent by the obtained mobile terminal based on the obtained processing option data, and if yes, designating one unread record from all unread records and sending the unread record to the mobile terminal;
and judging whether a label value with a label value of 57, namely TAG57, exists or not based on the acquired record content corresponding to the specified unread record sent by the mobile terminal, and if so, acquiring identification information representing user identity information from the label value.
6. The method of claim 5, wherein the access control system further comprises: the server, entrance guard's equipment still includes: the access control background system, the method still includes:
the server receives entrance guard record information sent by the entrance guard controller through the entrance guard background system, generates life work and rest information based on the entrance guard record information, and sends the life work and rest information to the user terminal corresponding to the life work and rest information.
7. The method of claim 6, wherein generating daily work and rest information based on the entrance guard record information comprises:
judging whether the occurrence frequency of certain identification information with door opening authority is larger than or equal to a first threshold value or not based on the entrance guard record information in a preset time period;
and if so, generating life work and rest information based on the identification information with the door opening authority, and sending the life work and rest information to the user terminal corresponding to the life work and rest information.
8. The utility model provides a support IOS equipment's access control's method which characterized in that, is applied to access control system, access control system includes: entrance guard's equipment and server, entrance guard's equipment includes: the system comprises a reader-writer, an access controller and an access background system, and the method comprises the following steps:
the reader-writer sends the obtained identification information representing the user identity information to the server;
the server registers the identification information sent by the reader-writer and sends the registration information to the access control background system;
the access background system sends the registration information to the access controller, wherein,
the identification information is obtained by the reader according to a preset rule, and the preset rule is as follows:
when a processing option data object list generated by the mobile terminal based on the application selected by the reader-writer is obtained, sending obtained processing option data to the mobile terminal based on the processing option data object list;
judging whether unread records exist or not based on an application file locator which is generated and sent by the obtained mobile terminal based on the obtained processing option data, and if yes, designating one unread record from all unread records and sending the unread record to the mobile terminal;
and judging whether a label value with a label value of 57, namely TAG57, exists or not based on the acquired record content corresponding to the specified unread record sent by the mobile terminal, and if so, acquiring identification information representing user identity information from the label value.
CN201710893770.7A 2017-09-26 2017-09-26 Access control system and method supporting IOS equipment Active CN107633583B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710893770.7A CN107633583B (en) 2017-09-26 2017-09-26 Access control system and method supporting IOS equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710893770.7A CN107633583B (en) 2017-09-26 2017-09-26 Access control system and method supporting IOS equipment

Publications (2)

Publication Number Publication Date
CN107633583A CN107633583A (en) 2018-01-26
CN107633583B true CN107633583B (en) 2020-10-02

Family

ID=61102743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710893770.7A Active CN107633583B (en) 2017-09-26 2017-09-26 Access control system and method supporting IOS equipment

Country Status (1)

Country Link
CN (1) CN107633583B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108564687A (en) * 2018-03-16 2018-09-21 辽宁红沿河核电有限公司 A kind of air lock door electronization register system
CN111563986A (en) * 2019-01-29 2020-08-21 北京奇虎科技有限公司 Identity recognition method and system based on NFC mobile terminal
CN111612956A (en) * 2020-04-20 2020-09-01 南京英锐创电子科技有限公司 Personnel tracking system, personnel tracking method, personnel tracking device and computer equipment
CN116994364A (en) * 2023-08-29 2023-11-03 深圳市亲邻科技有限公司 Entrance guard card-free data loading interaction method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778705A (en) * 2014-02-19 2014-05-07 北京中泰方信科技有限公司 Realization method and system of NFC (near field communication) electronic lock and NFC electronic lock card reader
CN103793863A (en) * 2014-01-01 2014-05-14 广州东软科技有限公司 Campus management system
CN104157047A (en) * 2014-07-11 2014-11-19 深圳市先河系统技术有限公司 Building communication system and user terminal thereof
CN105551122A (en) * 2015-12-11 2016-05-04 北京无线电计量测试研究所 Gate system based on iris recognition
CN106529925A (en) * 2016-10-27 2017-03-22 飞天诚信科技股份有限公司 Bluetooth visual card and method of realizing electronic cash transactions

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2816532B1 (en) * 2013-06-20 2019-03-20 Honeywell International Inc. Systems and methods for enabling access control via mobile devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793863A (en) * 2014-01-01 2014-05-14 广州东软科技有限公司 Campus management system
CN103778705A (en) * 2014-02-19 2014-05-07 北京中泰方信科技有限公司 Realization method and system of NFC (near field communication) electronic lock and NFC electronic lock card reader
CN104157047A (en) * 2014-07-11 2014-11-19 深圳市先河系统技术有限公司 Building communication system and user terminal thereof
CN105551122A (en) * 2015-12-11 2016-05-04 北京无线电计量测试研究所 Gate system based on iris recognition
CN106529925A (en) * 2016-10-27 2017-03-22 飞天诚信科技股份有限公司 Bluetooth visual card and method of realizing electronic cash transactions

Also Published As

Publication number Publication date
CN107633583A (en) 2018-01-26

Similar Documents

Publication Publication Date Title
CN107633583B (en) Access control system and method supporting IOS equipment
US9547849B2 (en) Method and apparatus for providing real time mutable credit card information and for providing sleep mode functionality
US20090281947A1 (en) Method and system for mobile commerce
US10891599B2 (en) Use of state objects in near field communication (NFC) transactions
CN106464502B (en) Method and system for authentication of a communication device
CN109245902A (en) The guard method of instant messaging message authentication codes and device
CN101996445A (en) Method and system for remotely controlling intelligent card
CN104346560A (en) Security authentication method and security authentication device
EP3720044B1 (en) Electronic certificate transmission method, apparatus and device
CN101604404A (en) A kind of Updatable universal smart card and system and method thereof
CN117413278A (en) Powering bluetooth communication card-to-phone using NFC field from phone
KR101762615B1 (en) Identification system and user terminal using usage pattern analysis
KR101760502B1 (en) Payment system and method using dynamic track 2
CN112468409A (en) Access control method, device, computer equipment and storage medium
CN114268461B (en) User identity authentication method, device, server, terminal and storage medium
CN106385507B (en) Prompting method and device of social application program and terminal
CN108243402B (en) Method and device for reading and writing smart card
CN201590829U (en) Updateable universal smart card and system thereof
CN107172068A (en) Information sending control method, server, system, device and storage medium
CN101156146B (en) Method and device for securely sending bootstrap message in device management
CN114895775A (en) Service data processing method and device and intelligent counter
CN107516351B (en) Attendance checking confirmation method and device
EP2249300A1 (en) Method and system for providing universal access to a service amongst a plurality of services
CN115022004B (en) Data processing method, device and server
CN115102771B (en) Data processing method, terminal device, system, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant