CN109523672B - Access control method and device - Google Patents

Access control method and device Download PDF

Info

Publication number
CN109523672B
CN109523672B CN201811386026.9A CN201811386026A CN109523672B CN 109523672 B CN109523672 B CN 109523672B CN 201811386026 A CN201811386026 A CN 201811386026A CN 109523672 B CN109523672 B CN 109523672B
Authority
CN
China
Prior art keywords
preset
access control
mobile terminal
address
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811386026.9A
Other languages
Chinese (zh)
Other versions
CN109523672A (en
Inventor
钟桂鑫
旷彪
高应超
皮攀
许小阳
孟宪军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qding Interconnection Technology Co ltd
Original Assignee
Beijing Qding Interconnection Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qding Interconnection Technology Co ltd filed Critical Beijing Qding Interconnection Technology Co ltd
Priority to CN201811386026.9A priority Critical patent/CN109523672B/en
Publication of CN109523672A publication Critical patent/CN109523672A/en
Application granted granted Critical
Publication of CN109523672B publication Critical patent/CN109523672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an access control method and device, wherein the access control method comprises the following steps: detecting a mobile terminal within a preset range, and acquiring equipment information of the mobile terminal; judging whether a preset user information base comprises equipment information or not; when the preset user information base comprises the equipment information, establishing communication connection between the mobile terminal and the access control equipment, and acquiring a communication address of the mobile terminal; judging whether the communication address is matched with a preset address or not; and when the communication address is matched with the preset address, sending a door opening instruction for controlling the door opening of the access control equipment. The entrance guard control method can realize the non-perception entrance guard control and avoid the user from operating the entrance guard, thereby avoiding the fussy operation process and improving the convenience degree of opening the door of the entrance guard.

Description

Access control method and device
Technical Field
The invention relates to the field of security and protection, in particular to an access control method and device.
Background
At present, with the continuous development of security and protection technology, the access control technology is also more and more perfect along with the development, wherein, the access control technology has been developed into wireless control access control (such as bluetooth access control and the like) from the original traditional access control by swiping card, password access control, and thus, the current access control technology is continuously developing towards intellectualization. However, in practice, it is found that the existing access control technology still requires a user to perform operation control, wherein the bluetooth access control technical scheme includes that the user uses a mobile phone to send an instruction to a bluetooth module of the access control, so that the access control analyzes the instruction content after receiving the instruction, judges whether a user account included in the instruction content belongs to a white list, and sends a door opening instruction to an execution unit to execute a door opening action after the judgment is successful. Therefore, the existing Bluetooth access control technology still needs the steps, so that the user can correspondingly operate the access control, the complicated operation process is achieved, and the convenience degree of opening the door of the access control is reduced.
Disclosure of Invention
In view of the above problems, the present invention provides a method and a device for controlling an access control, which can implement a non-sensing access control and avoid a user operating the access control, thereby avoiding a cumbersome operation process and improving the convenience of opening the access control.
In order to achieve the purpose, the invention adopts the following technical scheme:
in a first aspect, the present invention provides an access control method, including:
detecting a mobile terminal within a preset range, and acquiring equipment information of the mobile terminal;
judging whether a preset user information base comprises the equipment information or not;
when the preset user information base comprises the equipment information, establishing communication connection between the mobile terminal and the access control equipment, and acquiring a communication address of the mobile terminal;
judging whether the communication address is matched with a preset address or not;
and when the communication address is matched with the preset address, sending a door opening instruction for controlling the door opening of the access control equipment.
As an optional implementation manner, the communication address includes a bluetooth media access control address, and the preset address includes a preset media access control address, where the step of determining whether the communication address and the preset address match includes:
the Bluetooth media access control address and the preset media access control address are authenticated and compared to obtain a comparison result;
judging whether the comparison result is a successful comparison result or not;
and triggering and executing the step of sending a door opening instruction for controlling the door opening of the access control equipment when the comparison result is a successful comparison result.
As an optional implementation manner, the preset user information base includes a first sub information base and a second sub information base, where the step of determining whether the preset user information base includes the device information includes:
judging whether the first sub information base comprises the equipment information or not;
when the first sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring a communication address of the mobile terminal;
when the first sub information base does not include the equipment information, judging whether the second sub information base includes the equipment information or not;
when the second sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring a communication address of the mobile terminal;
and when the second sub information base does not comprise the equipment information, triggering and executing the step of judging whether the first sub information base comprises the equipment information.
As an optional implementation manner, before the step of detecting a mobile terminal within a preset range and acquiring device information of the mobile terminal, the method further includes:
when pairing information sent by a preset pairing terminal is detected, the preset pairing terminal and the access control equipment are controlled to be paired;
when the preset pairing terminal and the access control equipment are successfully paired, acquiring equipment information of the preset pairing terminal, and storing the equipment information of the preset pairing terminal into the preset user information base;
and acquiring the communication address of the preset paired terminal, and determining the communication address of the preset paired terminal as the preset address.
As an optional implementation manner, the step of establishing a communication connection between the mobile terminal and the door control device includes:
and sending a connection request to the mobile terminal so that the mobile terminal opens a built-in communication device and establishes communication connection between the mobile terminal and the access control equipment when receiving the connection request.
In a second aspect, the present invention provides an access control device, including:
the mobile terminal comprises a detection module, a processing module and a display module, wherein the detection module is used for detecting the mobile terminal in a preset range and acquiring the equipment information of the mobile terminal;
the judging module is used for judging whether a preset user information base comprises the equipment information or not;
the first communication module is used for establishing communication connection between the mobile terminal and the access control equipment when the preset user information base comprises the equipment information, and acquiring a communication address of the mobile terminal;
the judging module is also used for judging whether the communication address is matched with a preset address;
and the second communication module is used for sending a door opening instruction for controlling the door opening of the access control equipment when the communication address is matched with the preset address.
As an optional implementation manner, the access control device further includes:
the control module is used for controlling the preset pairing terminal to be paired with the access control equipment when pairing information sent by the preset pairing terminal is detected;
the acquisition module is used for acquiring the equipment information of the preset paired terminal when the preset paired terminal and the access control equipment are successfully paired, and storing the equipment information of the preset paired terminal into the preset user information base;
the obtaining module is further configured to obtain a communication address of the preset paired terminal, and determine that the communication address of the preset paired terminal is the preset address.
As an optional implementation manner, the first communication module is specifically configured to send a connection request to the mobile terminal when the preset user information base includes the device information, so that when the mobile terminal receives the connection request, a built-in communication device is opened, a communication connection between the mobile terminal and the access control device is established, and a communication address of the mobile terminal is obtained.
In a third aspect, the present invention provides a computer device, comprising a memory for storing a computer program and a processor for executing the computer program to make the computer device execute the access control method according to the first aspect of the present invention.
In a fourth aspect, the invention provides a computer-readable storage medium storing a computer program for use in the computer apparatus of the third aspect of the invention.
According to the access control method and the access control device, equipment judgment can be performed on nearby mobile terminals through the access control equipment to obtain authenticated mobile terminals, then communication addresses in the mobile terminals are obtained, authentication operation is performed through matching of the communication addresses, and door opening operation is triggered after authentication is successful. Therefore, the implementation of the implementation mode can realize non-sensing access control and avoid the user from operating the access control equipment, thereby avoiding the previous complicated operation process and improving the convenience degree of opening the door of the access control.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, and it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of the present invention.
Fig. 1 is a schematic flowchart of an access control method according to a first embodiment of the present invention;
fig. 2 is a schematic flowchart of an access control method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an access control device according to a third embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Aiming at the problems in the prior art, the invention provides an access control method, an access control method and an access control device, which can judge nearby mobile terminals through access control equipment to obtain authenticated mobile terminals, then obtain communication addresses in the mobile terminals, perform authentication operation through the matching of the communication addresses, and trigger the operation of opening the door after the authentication is successful. Therefore, by implementing the implementation mode, the user can be prevented from operating the access control equipment, the previous complicated operation process is avoided, and the convenience degree of opening the door of the access control is improved. The following is described by way of example.
The above technical method can also be implemented by using related software or hardware, and further description is not repeated in this embodiment. The following describes a method and an apparatus for controlling an access control system by an embodiment.
Example 1
Please refer to fig. 1, which is a schematic flow chart of an access control method provided in this embodiment, the access control method includes the following steps:
s101, detecting the mobile terminal in a preset range, and acquiring equipment information of the mobile terminal.
In this embodiment, the execution subject may be an access control device, and the access control device should have a communication function and a storage function.
In this embodiment, the detection method is signal scanning.
In this embodiment, the preset range may be set manually, and the preset range is used to set the detection range.
In this embodiment, the preset range is a range in which the access control device automatically functions.
In this embodiment, the mobile terminal is a mobile terminal entering a preset range, and the mobile terminal may be a mobile phone, a tablet, or other various terminal devices, which is not limited in this embodiment.
In this embodiment, the mobile terminal has independent device identification information, where the device identification information is the device information, and the device information is used to determine the model of the mobile terminal.
For example, in step S101, the access control device detects a mobile phone signal within 50 meters of a square circle, and obtains a mobile phone identification code of the mobile phone when the mobile phone signal is detected.
In this embodiment, the device information may be pairing information, or may be a pairing record between the mobile terminal and the access control device, which is not limited in this embodiment. Therefore, the device information may be not only the model, version number, etc. of the device, but also pairing information, pairing records, etc. stored in the mobile terminal.
S102, judging whether the preset user information base comprises the equipment information or not, if so, executing the steps S103-S104; if not, the flow is ended.
In this embodiment, the preset user information base is a database stored in the door access device, and the preset user information base may also be a database set in another location (for example, in another server).
In this embodiment, the preset user information base is used to store the device information of the mobile terminal (the device information is the user registration information), and thus the preset user information base is a database that stores the device information registered by the user.
In this embodiment, the device information is device information detected by the access control device, where the step is used to determine whether the device information detected by the access control device belongs to a preset user information base, and if the device information detected by the access control device belongs to the preset user information base, determine that the device corresponding to the device information is a pre-stored device (pre-registered user device), and if the device information detected by the access control device does not belong to the pre-stored user information base, determine that the device corresponding to the device information is not a pre-stored device. By implementing the embodiment, the mobile terminal of the user can be authenticated for the first time, so that the identification degree of the registered user is improved.
S103, establishing communication connection between the mobile terminal and the access control equipment, and acquiring a communication address of the mobile terminal.
As an alternative implementation, the step of establishing a communication connection between the mobile terminal and the door control device may include:
the entrance guard equipment sends a communication connection instruction to the mobile terminal so that the mobile terminal receives the communication connection instruction and establishes communication connection between the mobile terminal and the entrance guard equipment according to the communication connection instruction.
By implementing the implementation mode, the access control equipment can actively send out a communication connection instruction (connection request signal) so as to enable the mobile terminal to establish communication connection with the access control equipment, and the mobile terminal is prevented from searching for nearby signals and establishing communication connection at any time, so that the time is saved, and the electricity consumption of the mobile terminal is avoided.
In this embodiment, the communication connection between the mobile terminal and the access control device may be a radio communication connection, a bluetooth communication connection, or a WIFI communication connection, and the form of the communication connection is not limited in this embodiment.
In this embodiment, the communication address of the mobile terminal and the mobile terminal device information are unrelated to each other, where the communication address of the mobile terminal is address information in a communication module for communication in the mobile terminal, and for example, the communication address may be a bluetooth MAC address. The device information of the mobile terminal is used for carefully considering the mobile terminal, for example, the device information may be a model or production time of the mobile terminal, and it should be noted that the device information may be sent through the communication module, but is not a specific parameter of the communication module itself. In comparison, the communication address is an address parameter of the communication module itself, and the address parameter is sent to the access control device through the communication module.
In this embodiment, both the communication address and the device information can be communicated through the communication module, but the communication address is the built-in information in a specific communication module, and the device information is the device information of the entire device including the specific communication module. Wherein the device information may include a plurality of communication modules.
For example, the communication module is a bluetooth communication module, the mobile terminal is a mobile phone, the device information is mobile phone model or version number information, and the communication address is a bluetooth MAC address, wherein the mobile phone further includes a WIFI communication module and the like.
S104, judging whether the communication address is matched with the preset address or not, and if so, executing a step S105; if not, the flow is ended.
In this embodiment, the preset address is also a communication address, the preset address is pre-stored in the access control device or other storage device, and the storage location of the preset address is not limited in this embodiment.
By implementing the implementation mode, if the communication address is the same as the preset address, the communication module is judged to be the same, the authentication is successful, and on the basis, the follow-up operation is carried out to complete the door opening control of the access control device.
In this embodiment, step S104 may be understood as a secondary determination of the mobile terminal, and the control of opening the door of the access control device is performed by this determination.
And S105, sending a door opening instruction for controlling the door opening of the access control equipment.
In this embodiment, the instruction of opening the door is used for controlling entrance guard's equipment to open the door.
In the access control method described in fig. 1, the access control device may perform device determination on a nearby mobile terminal to obtain an authenticated mobile terminal, obtain a communication address in the mobile terminal, perform authentication operation through matching of the communication address, and trigger an operation of opening a door after the authentication is successful. Therefore, the implementation of the access control method described in fig. 1 can realize the non-sensing access control and avoid the user operating the access control device, thereby avoiding the previous complicated operation process and improving the convenience of opening the door of the access control.
Example 2
Referring to fig. 2, fig. 2 is a schematic flowchart of an access control method according to the present embodiment. As shown in fig. 2, the access control method includes the following steps:
s201, when the pairing information sent by the preset pairing terminal is detected, the preset pairing terminal and the access control device are controlled to be paired.
In this embodiment, the preset pairing terminal is a mobile terminal for forming preset device information in the access control device, wherein the preset pairing terminal is applied to the process of pre-storing information of the access control device, and is different from a subsequent mobile terminal.
In this embodiment, the pairing information is communication information that is sent by a preset pairing terminal and used for pairing connection with the access control device. For example, the mobile terminal is a mobile phone, and the mobile phone sends a bluetooth pairing signal to the access control device, so that the access control device receives the bluetooth pairing signal and controls the mobile phone and the access control device to perform bluetooth pairing.
S202, when the preset pairing terminal and the access control device are successfully paired, acquiring the preset equipment information of the pairing terminal, and storing the preset equipment information of the pairing terminal into a preset user information base.
In this embodiment, the successful pairing of the preset pairing terminal and the access control device can be understood as that the preset pairing terminal and the access control device are paired with each other and connected with each other, so that the access control device can obtain the preset device information of the pairing terminal through the connection. The device information may be sent to the access control device by a preset pairing terminal.
In this embodiment, the preset device information of the paired terminal is one type of information, the device information of the mobile terminal is another type of information, and the two types of information belong to different types of information. Specifically, the preset device information of the paired terminal is suitable for being used as the preset information, the device information of the mobile terminal is detected and used for judging whether the device is a legal device, and the device information and the legal device have different purposes, so that the types of the devices are different.
S203, acquiring a preset communication address of the paired terminal, and determining that the preset communication address of the paired terminal is a preset address.
In this embodiment, the preset communication address of the paired terminal may be a bluetooth MAC address, which is not described in this embodiment.
In this embodiment, the preset address is a communication address stored in the storage device, and is used as data for matching the mobile terminal of the visiting user with pre-stored data.
For example, the bluetooth device of the mobile terminal is opened, the peripheral bluetooth devices are searched, and the corresponding access control bluetooth MAC address on the mobile terminal is selected for pairing; after the pairing is successful, the access control equipment receives the pairing information and stores the pairing information into the memory, wherein the pairing information comprises a Bluetooth MAC address of the mobile terminal. At this point, the pairing is completed, i.e., the user registration process is completed.
And S204, detecting the mobile terminal in the preset range, and acquiring the equipment information of the mobile terminal.
By implementing the embodiment, the device information of all the mobile terminals can be acquired in the designated area, and the subsequent steps are carried out according to the device information.
S205, judging whether the preset user information base comprises the equipment information of the mobile terminal, if so, executing the steps S206-S207; if not, the flow is ended.
By implementing the implementation mode, the device information of the mobile terminal can be preferentially judged, and whether the mobile terminal is a valid user can be judged.
As an optional implementation manner, the preset user information base includes a first sub information base and a second sub information base, where the step of determining whether the preset user information base includes the device information includes:
judging whether the first sub information base comprises equipment information or not;
when the first sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring the communication address of the mobile terminal;
when the first sub information base does not comprise the equipment information, judging whether the second sub information base comprises the equipment information or not;
when the second sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring the communication address of the mobile terminal;
and when the second sub information base does not comprise the equipment information, triggering and executing the step of judging whether the first sub information base comprises the equipment information or not.
By implementing the implementation mode, the preset user information base can be divided into a plurality of sub information bases, and the rotation type detection is adopted, so that the situation that the single detection amount is too large is avoided, and the efficiency and the smoothness degree are improved.
S206, establishing communication connection between the mobile terminal and the access control equipment, and acquiring a communication address of the mobile terminal.
By implementing the embodiment, the communication connection between the mobile terminal and the access control device can be automatically established, and the communication address (such as the Bluetooth MAC address) of the mobile terminal can be acquired through the communication connection.
As an optional implementation manner, the step of establishing a communication connection between the mobile terminal and the door control device includes:
and sending a connection request to the mobile terminal so that the mobile terminal opens the built-in communication device and establishes communication connection between the mobile terminal and the entrance guard equipment when receiving the connection request.
By implementing the implementation mode, the communication connection can be established through communication transmission, and the mobile terminal is prompted to send the own communication address to the access control device through the communication connection. Wherein, the communication connection can be a bluetooth communication connection.
S207, judging whether the communication address is matched with the preset address or not, and if so, executing a step S208; if not, the flow is ended.
In this embodiment, the step may be understood as performing an authentication operation on the communication address of the mobile terminal.
As an optional implementation manner, the communication address includes a bluetooth media access control address, and the preset address includes a preset media access control address, where the step of determining whether the communication address and the preset address match includes:
comparing the Bluetooth media access control address with a preset media access control address by authentication to obtain a comparison result;
judging whether the comparison result is a successful comparison result or not;
and triggering the executed step of sending a door opening instruction for controlling the door opening of the access control equipment when the comparison result is a successful comparison result.
In this embodiment, the bluetooth MAC address or the internet address may be understood as a bluetooth MAC address, which is not limited in this embodiment.
In this embodiment, the authentication operation may be a most basic matching operation, or an authentication operation for calculating a weight value through an algorithm, and is not limited in this embodiment.
By implementing the embodiment, high-speed and high-precision matching can be realized through Bluetooth.
And S208, sending a door opening instruction for controlling the door opening of the access control equipment.
For example, the access control device reads the user registration information stored in the memory, and initiates connection to the registered mobile terminals one by one, and if the registered mobile terminals are near the access control device, the access control device immediately establishes connection with the registered mobile terminals. After the connection is established, the entrance guard acquires the Bluetooth MAC address of the mobile terminal, the Bluetooth MAC address is authenticated and compared with the Bluetooth MAC address stored in the memory, if the comparison is successful, the entrance guard sends a door opening instruction to the execution unit, and the execution unit completes the door opening action.
It can be seen that, by implementing the access control method described in fig. 2, the authentication mobile terminal can be preset as a preset pairing terminal, and the communication address in the preset pairing terminal is obtained as the preset address, so that the access setting method and the access opening method are perfected, and a perfect access control method is formed. The perfect entrance guard control method can realize the non-perception entrance guard control and avoid the user from operating the entrance guard equipment, thereby avoiding the previous complicated operation process and improving the convenience degree of opening the door of the entrance guard.
Example 3
Fig. 3 is a schematic diagram of a system structure of an access control device according to the present embodiment.
As shown in fig. 3, the access control device includes:
the detection module 301 is configured to detect a mobile terminal within a preset range and acquire device information of the mobile terminal;
a judging module 302, configured to judge whether a preset user information base includes device information;
a first communication module 303, configured to establish a communication connection between the mobile terminal and the access control device when the preset user information base includes the device information, and obtain a communication address of the mobile terminal;
the judging module 302 is further configured to judge whether the communication address matches the preset address;
and the second communication module 304 is configured to send a door opening instruction for controlling the door opening of the access control device when the communication address matches the preset address.
As an optional implementation manner, the access control device further includes:
the control module 305 is configured to control the preset pairing terminal and the access control device to pair when pairing information sent by the preset pairing terminal is detected;
the obtaining module 306 is configured to obtain device information of a preset paired terminal when the preset paired terminal and the access control device are successfully paired, and store the device information of the preset paired terminal in a preset user information base;
the obtaining module 306 is further configured to obtain a preset communication address of the paired terminal, and determine that the preset communication address of the paired terminal is a preset address.
As an optional implementation manner, the first communication module 303 is specifically configured to send a connection request to the mobile terminal when the preset user information base includes the device information, so that when the mobile terminal receives the connection request, the mobile terminal opens a built-in communication device and establishes a communication connection between the mobile terminal and the door forbidden device, and acquires a communication address of the mobile terminal.
It can be seen that, implement the entrance guard control device that this embodiment described, can realize no perception access control, avoid the user to operate entrance guard's equipment to avoid loaded down with trivial details operation process in the past, improved the convenience degree that entrance guard opened the door.
In addition, the invention also provides another computer device which can comprise a smart phone, a tablet computer, a vehicle-mounted computer, an intelligent wearable device and the like. The computer device comprises a memory and a processor, wherein the memory can be used for storing a computer program, and the processor can be used for executing the computer program so as to enable the computer device to execute the method or the functions of each unit in the device.
The memory may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the computer device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The embodiment also provides a computer storage medium for storing a computer program used in the computer device.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module or unit in each embodiment of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The described functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention or a part of the technical solution that contributes to the prior art in essence can be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a smart phone, a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the method described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. An access control method, comprising:
detecting a mobile terminal in a preset access control detection range, and acquiring equipment information of the mobile terminal;
judging whether a preset user information base comprises the equipment information or not;
when the preset user information base comprises the equipment information, establishing communication connection between the mobile terminal and the access control equipment, and acquiring a communication address of the mobile terminal;
judging whether the communication address is matched with a preset comparison address or not;
when the communication address is matched with the preset comparison address, sending a door opening instruction for controlling the door opening of the access control equipment;
the preset user information base comprises a first sub information base and a second sub information base, and the first sub information base and the second sub information base do not have the same content, wherein the step of judging whether the preset user information base comprises the equipment information comprises the following steps:
judging whether the first sub information base comprises the equipment information or not;
when the first sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring a communication address of the mobile terminal;
when the first sub information base does not include the equipment information, judging whether the second sub information base includes the equipment information or not;
when the second sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring a communication address of the mobile terminal;
when the second sub information base does not include the equipment information, triggering and executing the step of judging whether the first sub information base includes the equipment information;
the step of establishing communication connection between the mobile terminal and the gate inhibition device comprises the following steps:
and sending a connection request to the mobile terminal, and controlling the mobile terminal to open a built-in communication device and establish communication connection between the mobile terminal and the access control equipment when receiving the connection request.
2. The door access control method according to claim 1, wherein the communication address comprises a bluetooth media access control address, the preset comparison address comprises a preset media access control address, and the step of determining whether the communication address is matched with the preset comparison address comprises:
the Bluetooth media access control address and the preset media access control address are authenticated and compared to obtain a comparison result;
judging whether the comparison result is a successful comparison result or not;
and triggering and executing the step of sending a door opening instruction for controlling the door opening of the access control equipment when the comparison result is a successful comparison result.
3. The access control method according to claim 1, wherein before the step of detecting the mobile terminal within a preset detection range and acquiring the device information of the mobile terminal, the method further comprises:
when pairing information sent by a preset pairing terminal is detected, the preset pairing terminal and the access control equipment are controlled to be paired;
when the preset pairing terminal and the access control equipment are successfully paired, acquiring equipment information of the preset pairing terminal, and storing the equipment information of the preset pairing terminal into the preset user information base;
and acquiring the communication address of the preset pairing terminal, and determining the communication address of the preset pairing terminal as the preset comparison address.
4. An access control device, comprising:
the mobile terminal comprises a detection module, a processing module and a display module, wherein the detection module is used for detecting the mobile terminal in a preset range and acquiring the equipment information of the mobile terminal;
the judging module is used for judging whether a preset user information base comprises the equipment information or not;
the first communication module is used for establishing communication connection between the mobile terminal and the access control equipment when the preset user information base comprises the equipment information, and acquiring a communication address of the mobile terminal;
the judging module is also used for judging whether the communication address is matched with a preset address;
the second communication module is used for sending a door opening instruction for controlling the door opening of the access control equipment when the communication address is matched with the preset address;
the preset user information base comprises a first sub information base and a second sub information base, and the first sub information base and the second sub information base do not have the same content, wherein the judging module is specifically configured to:
judging whether the first sub information base comprises the equipment information or not;
when the first sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring a communication address of the mobile terminal;
when the first sub information base does not include the equipment information, judging whether the second sub information base includes the equipment information or not;
when the second sub information base comprises the equipment information, triggering and executing the steps of establishing communication connection between the mobile terminal and the access control equipment and acquiring a communication address of the mobile terminal;
when the second sub information base does not include the equipment information, triggering and executing the step of judging whether the first sub information base includes the equipment information;
the first communication module is specifically configured to send a connection request to the mobile terminal when the preset user information base includes the device information, so that when the mobile terminal receives the connection request, a built-in communication device is opened, a communication connection between the mobile terminal and the access control device is established, and a communication address of the mobile terminal is acquired.
5. The access control device of claim 4, further comprising:
the control module is used for controlling the preset pairing terminal to be paired with the access control equipment when pairing information sent by the preset pairing terminal is detected;
the acquisition module is used for acquiring the equipment information of the preset paired terminal when the preset paired terminal and the access control equipment are successfully paired, and storing the equipment information of the preset paired terminal into the preset user information base;
the obtaining module is further configured to obtain a communication address of the preset paired terminal, and determine that the communication address of the preset paired terminal is the preset address.
6. A computer device comprising a memory for storing a computer program and a processor for executing the computer program to cause the computer device to perform an access control method according to any one of claims 1 to 3.
7. A computer-readable storage medium, characterized in that it stores a computer program for use in the computer device of claim 6.
CN201811386026.9A 2018-11-20 2018-11-20 Access control method and device Active CN109523672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811386026.9A CN109523672B (en) 2018-11-20 2018-11-20 Access control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811386026.9A CN109523672B (en) 2018-11-20 2018-11-20 Access control method and device

Publications (2)

Publication Number Publication Date
CN109523672A CN109523672A (en) 2019-03-26
CN109523672B true CN109523672B (en) 2021-09-21

Family

ID=65776442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811386026.9A Active CN109523672B (en) 2018-11-20 2018-11-20 Access control method and device

Country Status (1)

Country Link
CN (1) CN109523672B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599642B (en) * 2019-08-23 2022-03-22 珠海优特电力科技股份有限公司 Unlocking equipment, lock and lock control system
CN113593083A (en) * 2021-06-24 2021-11-02 云度新能源汽车有限公司 Vehicle unlocking method and system based on WiFi identification
CN113406910A (en) * 2021-06-29 2021-09-17 辽宁晨晖智慧能源有限公司 Control system, platform and method for power supply
CN113256854A (en) * 2021-07-06 2021-08-13 徐州源勤电子科技有限公司 User behavior encryption method and device based on computer big data
CN113808303B (en) * 2021-08-24 2023-04-07 珠海市安科电子有限公司 Composite encryption method, door lock system and storage medium
CN114567851A (en) * 2022-02-21 2022-05-31 锐迪科创微电子(北京)有限公司 Data transmission method, device, chip and module equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851169B (en) * 2015-05-25 2017-12-22 惠州Tcl移动通信有限公司 A kind of intelligent wireless lock and its solution lock control method
CN106593135A (en) * 2016-12-22 2017-04-26 歌尔科技有限公司 Lock system based on wireless communication and control method of lock system
CN108541324A (en) * 2016-12-27 2018-09-14 深圳易马达科技有限公司 A kind of unlocking method of electronic lock device, client and its electronic lock device
CN107705399A (en) * 2017-09-15 2018-02-16 南京右转信息科技有限公司 The control system and control method of a kind of intelligent entrance guard
CN107967733A (en) * 2017-11-20 2018-04-27 美的智慧家居科技有限公司 Door lock door opening method, door lock and computer-readable recording medium

Also Published As

Publication number Publication date
CN109523672A (en) 2019-03-26

Similar Documents

Publication Publication Date Title
CN109523672B (en) Access control method and device
US11038879B2 (en) Identity authentication method and apparatus, and user equipment
US11057948B2 (en) Method and apparatus for connecting to wireless access point
JP6580783B2 (en) Person re-identification system and method
KR20160077071A (en) Authentication for application
CN107437016B (en) Application control method and related product
CN108650671B (en) Method, device, mobile terminal, storage medium and system for establishing Bluetooth connection
CN110457882B (en) Identity recognition preprocessing and identity recognition method and system
CN104363585A (en) Wireless local area network access method
CN104363665A (en) Terminal
KR102545375B1 (en) Electronic device for performing authorization using accessory and method for the same
TWI734385B (en) Identity recognition preprocessing, identity recognition method and system
EP3428780B1 (en) Method for enabling biometric recognition pattern and related products
CN111757314A (en) Method for installing user configuration file and electronic device thereof
WO2021042799A1 (en) Identity recognition pre-processing method, identity recognition method, and devices
CN107517298B (en) Unlocking method and related product
CN107451451B (en) Unlocking control method and related product
CN105956553B (en) Unlocking method and mobile terminal
CN107463822B (en) Biometric pattern control method and related product
WO2016015401A1 (en) Initialization method and apparatus, mobile terminal and computer storage medium
CN107483716B (en) File control method and related product
CN107465810B (en) Data control method and related product
CN107423604B (en) Application control method and related product
CN107426421B (en) Biometric pattern opening method and related product
CN107463820B (en) Biometric pattern control method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant