CN109636974A - A kind of access control system based on IBEACON - Google Patents
A kind of access control system based on IBEACON Download PDFInfo
- Publication number
- CN109636974A CN109636974A CN201811512483.8A CN201811512483A CN109636974A CN 109636974 A CN109636974 A CN 109636974A CN 201811512483 A CN201811512483 A CN 201811512483A CN 109636974 A CN109636974 A CN 109636974A
- Authority
- CN
- China
- Prior art keywords
- door
- control system
- user
- data
- ibeacon
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of access control systems based on IBEACON.The system includes several IBEACON sensors, access controller, acquisition system, background control system and intelligent terminal, separately has big data collection analysis library;Acquisition system connection access controller and background control system, access controller can control multiple leaf door, and the switch data for acquiring door reports acquisition system, then handles information reporting background control system by acquisition system;The information that background control system processing acquisition system reports, issues control command to acquisition system, then by acquisition system and is handed down to access controller, reach the control effect of intelligent open and close door;Background control system connects user's intelligent terminal, receives user's request, and door opening function is shaken in realization.Modern IBEACON location technology is utilized in the method for the present invention, and user can use the door that carry-on intelligent terminal opens Administrative Area, and request is encrypted with Digital Signature Algorithm, by authentication and enabling Authority Verification, enhances safety when office and convenience.
Description
Technical field
The invention belongs to Internet technical field, relate generally to a kind of to realize using intelligent terminal and IBEACON technology
The convenient access control system opened the door, verify user identity and permission.
Background technique
Today's society has gradually moved towards intelligent, and access control system also spreads to big and small public place, passes through
Disengaging identification method can be roughly divided into password identification, card recognition and bio-identification.
1, password identification mainly identifies that disengaging permission, this mode can only be controlled unidirectionally by examining the password of input
System, advantage is easy to operate, the disadvantage is that safety coefficient is general there are password leakage problem, and key is used for a long time and is easy damage
It is bad, higher cost.
2, card recognition, using magnetic card, perhaps radio-frequency card identifies disengaging permission by card reading or card reading encryption.Magnetic card
The advantages of be it is at low cost, there is enabling to record, the disadvantage is that being not easy to realize double-direction control, magnetic card is easy demagnetization or abrasion, loss, very
Cause to dally over one's work to forgetting to carry;The advantages of radio-frequency card is that equipment is not easy to wear, and safety is relatively high, has enabling to record,
Can double-direction control, the disadvantage is that higher cost, and ID/IC card has been cracked, and there are security risks.
3, bio-identification is divided into fingerprint recognition, iris recognition and recognition of face etc..Its biggest advantage is that be difficult to replicate,
As fingerprint, iris be all it is unique, safety is high, and without carrying extra equipment.The disadvantage is that cost is very high, need
Special equipment, and discrimination is very high can't accomplish for current technology.Requirement and use environment to user
It is very high, for example finger cannot scratch, and otherwise will lead to fingerprint recognition not, it is lower for the upper two methods of service efficiency,
Apply in general to important office space.
And the modern society being had gradually developed in internet, demand of the people to access control system, which is more than, to be satisfied with
Enter and leave, traditional RS485 gate inhibition's communication is also gradually eliminated, using TCP/IP network communication protocol gate inhibition's product gradually at
For mainstream, open communications protocol is but also developer can develop corresponding APP, software etc. according to user demand.It is based on
The intelligent access control system of IBEACON is exactly opened the door using intelligent terminal and access control system APP, and card and password identification are compared
More convenient and at low cost, substantially currently all people can carry intelligent terminal;More convenient than bio-identification, user only needs to shake one
It shakes the hand machine, request of opening the door is sent to background control system processing, and without carrying out other operations, and Content of communciation is by number label
Name encryption, safety are also high.
Summary of the invention
It is an object of the invention to be directed to existing access control system, a set of more convenient and safety access control system is developed,
Have the function of to position user's Position Approximate, verifying user identity, early warning etc. carried out to illegal invasion, improves safety;And it throws
The modes such as traditional card recognition, bio-identification have been abandoned, using the combination of access control system APP+ intelligent terminal, have improved convenience
Property.
The purpose of the present invention is achieved through the following technical solutions: a kind of access control system based on IBEACON, including
Several IBEACON sensors, access controller, acquisition system, background control system and intelligent terminal;
The IBEACON sensor is mounted near door, for emitting IBEACON signal in a certain range;
The access controller by network communication receive order, can a secondary control multiple leaf door, control door switch and
Closure, and carry out data interaction;
The acquisition system, for being connected with access controller, background control system by network communication, responsible acquisition,
Storing data, and do corresponding data forwarding work;
The intelligent terminal is the portable smart machine of user, and for example the common smart machine such as mobile phone, plate, is used
It is more convenient instead of traditional card or biological characteristic as the tool to open the door in installation access control system APP;
The access control system APP, using shaking door opening function after being logged in for user;
The background control system for receiving the request of access control system APP transmission, and carries out verification processing, issues life
It enables, is the control centre of entire access control system.
Further, the UUID for including in the IBEACON signal of the IBEACON sensor emission, can be used as door
ID carries out the mark of door.
Further, the access controller further comprises following submodule:
Information storage module: storage log information, controller parameter (IP, door quantity, sequence number etc.);
Communication module: it by classical network communication modes, receives order and issues processing, report the state of controller;
Control module: being connected with communication module and information storage module, according to the order that the communication module receives, into
The control of row door or information inquiry, generate control result, return to the communication module.
Further, the acquisition system further comprises following submodule:
Network communication module: by the network communication mode that HTTP, TCP or UDP etc. are common, access controller, net are connected
Network communication modes are determined by selected access controller;Background control system is connected by http protocol, carries out data interaction;
Command processing module: the command packet that background control system issues is received, parsing of unpacking is carried out, judges order
Legitimacy, if legal, then transmitting order to lower levels gives the access controller;If it is illegal, then failure information is returned to control to the backstage
System processed;
Gate inhibition's data processing module: the data that access controller reports are received, parsing of unpacking is carried out, judges the legal of content
Property, if legal, then reported result is to background control system;If it is illegal, then it is handled as dirty information.
Further, the background control system further comprises:
Visualized operation interface: being mainly directed towards system manager, can be managed with the switch state of real-time exhibition region inside door
Member can carry out corresponding control operation;
Authentication module: the authentication information in processing HTTPS request verifies the legitimacy of user;
User's table: the data such as account, password, position including user;
Gate inhibition's table: the data such as UUID of ID, IBEACON sensor including access controller;
Authority list: including user account, user to data such as all unlatching Permission Levels;
Log: the operation informations such as record enabling, shutdown, early warning;
Big data analysis library: storing a plurality of comparison information, is used for matching distance information fingerprint, avoids complicated distance meter
It calculates.
Further, the access control system APP, needs user to log in, by HTTPS request that the account of oneself is close
Code is sent to background control system and carries out authentication, could use APP's to shake door opening function.
Further, the access control system APP needs intelligent terminal to open Bluetooth function, searches for neighbouring door, that is, searches for
The IBEACON signal of IBEACON sensor after user shakes intelligent terminal, sends to open the door and request to background control system
Reason, if user is legal and possesses the enabling permission of this, has achieved the effect that shake enabling;Otherwise, it not opens the door.
It is further, described to shake door opening method, comprising the following steps:
(1) user opens Bluetooth function on intelligent terminal;
(2) access control system APP is logged in, terminal device is shaken;
(3) access control system APP is received shake action signal after, search near IBEACON sensor send
IBEACON signal parses the signal, obtains the UUID and signal strength of IBEACON sensor;
(4) according to the IBEACON sensor signal intensity collected, determine user approximate location and with door around away from
From by these arrays one group customized " range information fingerprint " of composition;
(5) identity information of user, range information fingerprint are utilized digital signature encryption algorithm for encryption by access control system APP
Afterwards, it is sent to background control system and carries out checking treatment, judge whether user identity is legal, if possess the power for opening this
Limit, it is final to obtain enabling result.
Further, confirm the method for the position of user, specifically includes the following steps:
(1) user is when shaking door opening function using APP, it is assumed that has n to fan door at one's side, n is greater than 0, near every fan door all
One IBEACON sensor is installed, IBEACON sensor can broadcast the information of oneself in a certain range, and user's intelligence is eventually
End can receive these information after opening Bluetooth function;
(2) dn that sets d1, d2, d3 ... be respectively receive the IBEACON sensor near every fan door signal strength (or
Person directly calculates distance), id1, id2, id3 ... idn are the UUID of the IBEACON sensor near every fan door, can also generation
Table is to the ID to answer the door, and by [(id1, d1), (id2, d2), (id3, d3) ... (idn, dn)], being defined as one group, " range information refers to
Line " represents the range data of the door on present user and periphery, and signal strength is stronger, and the distance that represents is closer, then remoter on the contrary;
(3) big data collection analysis library is established, lane database stores multiple groups range information fingerprint, enumerates all distance letters
Cease fingerprint a possibility that, and provide corresponding enabling optimal solution [(ida, da), (idb, db) ... (idm, dm)] (0≤a≤
N, 0≤b≤0≤m of n ...≤n);The principle that enabling optimal solution provides is nearby principle, is analyzed in range information fingerprint
The strongest one or more pairs of range informations of signal strength will be put into together with data of its signal strength difference no more than certain value
Xie Zhong;When access control system APP transmission range information fingerprint is to background control system, background control system is by range information fingerprint
It is matched with the range information fingerprint in large database concept, finds out matching degree highest one, obtain corresponding enabling optimal solution;
Background control system carries out enabling judgement according to enabling optimal solution;
(4) mainly include in enabling optimal solution IBEACON sensor UUID and the correspondingly received signal strength arrived
Range information combination, to there may be the case where do following judgement:
If a) containing combination more than two in enabling optimal solution, representing user location may be in multiple tracks door
Heart position can not determine that user is intended to open which fan door, failure of opening the door;Access control system APP should prompt user close to being opened
Door, which reuses, shakes door opening function, re-starts processing;
If only including b) one group of data in enabling optimal solution, signal strength dm is judged, if dm is less than
Given threshold, represents that the signal strength is extremely weak namely user is in non-enabling tolerance band, therefore not opens the door;If signal
Intensity is more than or equal to given threshold, represents that the signal strength is normal namely user be in enabling tolerance band, has enabling
Condition, can judge which IBEACON sensor proximity user is according to idm at this time, namely fan near door where;
(5) approximate location that can determine user is handled by above step and it is intended to the door opened.
Further, the method for judging user identity legitimacy and enabling permission, comprising the following steps:
(1) an account and initial password are distributed to each legitimate user, access control system is logged in by the account number cipher
APP;
(2) when access control system APP sends data, by digital signature encryption algorithm, backstage will be sent to after data encryption
Control system guarantees the integrality and authenticity of data;Data mainly include the account of user, range information fingerprint, timestamp
Deng;
(3) data received are decrypted background control system, judge that whether complete data are true, if there is puppet
The case where making request then issues warning signal;If data are completely true, it is further processed;
(4) acquisition time is stabbed, if being more than setting time threshold value with current period comparison, illustrates that the request is already expired
When, it disregards;
(5) obtain user account, corresponding user searched from user's table, if search less than or account stop over
With then not enabling;If finding, it is legal to represent user, carries out next step operation;
(6) the enabling optimal solution after range information fingerprint matching is obtained, optimal solution is judged, if having enabling item
Part then searches corresponding door according to idm from gate inhibition's table, if can not find, represents the door not in control range, failure of opening the door;
If finding, the judgement operation of next step permission is carried out;
(7) according to user account and idm, corresponding data are searched from authority list, judge whether user has this 's
Permission is opened, if it is not, not opening the door;If so, then issuing door opening command;
(8) acquisition system receives door opening command, transmitting order to lower levels to access controller, access controller open the door successfully or
Failure, acquisition system obtain result and return to background control system;
(9) background control system receives control result, returns to access control system APP, so far shakes door opening function reality
It is existing.
The present invention provides a kind of using IBEACON technology and intelligent terminal, can identify user identity and verify user and weigh
The access control system of limit utilizes intelligent terminal, digital signature different from traditional card recognition and bio-identification access control system
Encryption, network communications technology realize a kind of access control system of more Portable safety.
Detailed description of the invention
Fig. 1 is the access control system module map of the embodiment of the present invention.
Specific embodiment
To keep technical solution and the advantage of the embodiment of the present invention clearer, below in conjunction with attached in the embodiment of the present invention
Figure, provides detailed description to the technical solution of the embodiment of the present invention.For explaining only the invention, rather than to limit of the invention
It is fixed.
Embodiment one
Fig. 1 is the access control system module map of the embodiment of the present invention.Present embodiments provide a kind of gate inhibition based on IBEACON
System, as shown in Figure 1:
The access control system includes: IBEACON sensor and door, access controller, acquisition system, background control system, use
Family intelligent terminal.IBEACON sensor and door are mounted on the same place, and the UUID of IBEACON sensor and the ID of door are opposite
It answers;Access controller is connected with multiple leaf door, and access controller can control switch and the opening time of door;It access controller and adopts
Collecting system is connected by TCP/IP mechanics of communication, and data transmitting is main to be throttled by binary word, needs to be assisted according to equipment interconnection
View is parsed and is encoded, and access controller reports the data information of door to acquisition system, acquisition system transmitting order to lower levels to gate inhibition
Controller is executed;Acquisition system is connected with background control system by http protocol, is used for acquisition system for access control
The data information that device reports is packaged to be reported to background control system, and background control system transmitting order to lower levels is compiled to acquisition system
Code is sent to access controller;Access control system APP is mounted on user's intelligent terminal, passes through HTTPS agreement and Background control system
System is connected, and after user shakes intelligent terminal, access control system APP sends a request to background control system, at background control system
Access control system APP is returned result to after having managed.
Wherein, IBEACON sensor can broadcast the signal of oneself in a certain range, and signal content includes itself
UUID and signal strength indication, distance is remoter, and signal strength indication is smaller, otherwise bigger.The signal can be received by bluetooth.Because one
A IBEACON sensor and Yishanmen bundle, we can use the UUID of IBEACON sensor as the ID of door.
Wherein, access controller further comprises:
Information storage module stores log information, controller parameter (IP, door quantity, sequence number etc.);Communication module leads to
TCP/IP network communication mode is crossed, order is received and issues processing, report the state of controller;Control module, with communication module and
Information storage module is connected, and according to the order that the communication module receives, carries out the control or information inquiry of door, generates control
As a result, returning to the communication module.
Wherein, acquisition system further comprises:
Network communication module connects access controller by TCP/IP mode, connects Background control system by http protocol
System carries out data interaction;Command processing module receives the command packet that background control module issues, carries out parsing of unpacking, sentence
The legitimacy of disconnected order, if legal, then transmitting order to lower levels gives the access controller;If it is illegal, then failure information is returned to institute
State background control module;Gate inhibition's data processing module receives the binary data that access controller reports, is parsed, judged
The legitimacy of content, if legal, then reported result is to background control system;If it is illegal, then it is handled as dirty information.
Wherein, background control system further comprises:
Visualized operation interface, is mainly directed towards system manager, can be managed with the switch state of real-time exhibition region inside door
Member can carry out corresponding control operation;Authentication module handles the authentication information in HTTPS request, verifies user
Legitimacy;User's table, the data such as account, password, position including user;Gate inhibition's table, ID including access controller,
The data such as the UUID of IBEACON sensor;Authority list, including user account, user to the number such as all unlatching Permission Levels
According to;Log, the operation informations such as record enabling, shutdown, early warning;Big data analysis library stores a plurality of comparison information, for match away from
From information fingerprint, complicated distance is avoided to calculate.
Wherein, access control system APP needs user to log in, and is sent to the account number cipher of oneself by HTTPS request
Background control system carries out authentication, could use APP's to shake door opening function, the steps include:
(1) user opens Bluetooth function on intelligent terminal.
(2) access control system APP is logged in, terminal device is shaken.
(3) access control system APP is received shake action signal after, search near IBEACON sensor send letter
Number, the signal is parsed, the UUID and signal strength of IBEACON sensor are obtained.
(4) according to the IBEACON sensor signal intensity collected, determine user approximate location and with door around away from
From by these arrays one group customized " range information fingerprint " of composition.
(5) identity information of user, range information fingerprint are utilized digital signature encryption algorithm for encryption by access control system APP
Afterwards, it is sent to background control system and carries out checking treatment, judge whether user identity is legal, if possess the power for opening this
Limit, it is final to obtain enabling result.
The use of access control system mainly in various office spaces, it is necessary to have certain security protections, do not allow it is external enter
The person of invading arbitrarily opens security protection door, therefore access control system needs to verify the identity of user and its enabling permission is verified.
Simultaneously because user may be near multiple leaf door, therefore access control system will carry out a rough judgement to the position of user,
To analyze user wants which fan door opened.
Specifically, the method for the position of confirmation user, key step are as follows:
(1) user is when shaking door opening function using APP, it is assumed that has n to fan door at one's side, n is greater than 0, near every fan door all
One IBEACON sensor is installed, IBEACON sensor can broadcast the information of oneself in a certain range, and user's intelligence is eventually
End can receive these information after opening Bluetooth function.
(2) IBEACON signal strength RSSI is calculated, according to formula
D=10^ ((abs (RSSI)-A)/(10*n)), wherein A is that signal when transmitting terminal and receiving end are separated by 1 meter is strong
Degree, n be the environmental attenuation factor, calculate d be distance.
If d1, d2, d3 ..., dn is respectively at a distance from IBEACON sensor, and id1, id2, id3 ... idn are every fan
The UUID of IBEACON sensor near door can also be represented to the ID to answer the door, will [(id1, d1), (id2, d2), (id3,
D3) ... (idn, dn)] it is defined as one group " range information fingerprint ", represent the range data of the door on present user and periphery.?
Can be with RSSI directly as distance parameter, signal strength is stronger, and the distance that represents is closer, then remoter on the contrary.
(3) big data collection analysis library is established, lane database houses multiple groups range information fingerprint, enumerates all distances
A possibility that information fingerprint, and provide corresponding enabling optimal solution [(ida, da), (idb, db) ... (idm, dm)] (0≤a <
=n, 0≤b≤0≤m of n ...≤n).The principle that enabling optimal solution provides is nearby principle, analyzes range information fingerprint
In the smallest one or more pairs of range informations of distance, the data no more than certain value will be differed with its signal strength and will also be put into together
Xie Zhong, value can be defined as 0.2 by we herein, represent the error for allowing 20cm.When access control system APP transmission range information
When fingerprint is to background control system, background control system carries out the range information fingerprint in range information fingerprint and large database concept
Matching, finds out matching degree highest one, obtains corresponding enabling optimal solution.Background control system according to enabling optimal solution, into
Row, which opens the door, to be judged.
(4) mainly include in enabling optimal solution IBEACON sensor UUID and the correspondingly received signal strength arrived
Combination, to there may be the case where do following judgement:
If 1) contain combination more than two in enabling optimal solution, representing user location may be in multiple tracks door
Heart position can not determine that user is intended to open which fan door, failure of opening the door.Access control system APP should prompt user close to being opened
Door, which reuses, shakes door opening function, re-starts processing.
If 2) only include one group of data in enabling optimal solution, the dm that adjusts the distance is judged, if dm is greater than centainly
Value represents user and is in non-enabling tolerance band, therefore not opens the door;If dm is less than or equal to certain value, represents user and be in
In enabling tolerance band, there is the condition opened the door, it is attached can to judge which IBEACON sensor user is according to idm at this time
Closely, namely where it fans near door.
In daily life, we generally regard dm≤0.5 as enabling tolerance band condition, i.e. user will be near door
Door opening function is shaken in use in 50cm, otherwise can be considered as invalid enabling range.
(5) it is handled by above step, we can determine the approximate location and its door for being intended to unlatching of user.
Specifically, the method for judging user identity legitimacy and enabling permission, key step are as follows:
(1) an account and initial password are distributed to each legitimate user, gate inhibition system can be logged in by the account number cipher
Unite APP.
(2) when access control system APP sends data, by digital signature encryption algorithm, backstage will be sent to after data encryption
Control system guarantees the integrality and authenticity of data.Data mainly include the account of user, range information fingerprint, timestamp
Deng.
(3) data received are decrypted background control system, judge that whether complete data are true, if there is puppet
The case where making request issues pre-warning signal;If data are completely true, it is further processed.
(4) acquisition time is stabbed, if being more than certain time with current period comparison, when illustrating that this is requested, no
Give processing.
(5) obtain user account, corresponding user searched from user's table, if search less than or account stop over
With then not enabling;If finding, it is legal to represent user, carries out next step operation.
(6) the enabling optimal solution after range information fingerprint matching is obtained, step carries out at judgement according to claim 8
Reason searches corresponding door according to idm if having door-opening condition from gate inhibition's table, if can not find, represents the door not in control model
In enclosing, failure of opening the door;If finding, the judgement operation of next step permission is carried out;
(7) according to user account and idm, corresponding data are searched from authority list, judge whether user has this 's
Permission is opened, if it is not, not opening the door;If so, then issuing door opening command.
(8) acquisition system receives door opening command, transmitting order to lower levels to access controller, access controller open the door successfully or
Failure, acquisition system obtain result and return to background control system.
(9) background control system receives control result, returns to access control system APP, so far shakes door opening function reality
It is existing.
Provided verbal description, attached drawing and claims can hold those skilled in the art very much according to the present invention
Easily in the case where not departing from thought and range of condition of the invention defined by claims, a variety of variations and change can be made.
All technical ideas according to the present invention and the substantive any modification carried out to above-described embodiment, equivalent variations, belong to this hair
Bright claim is within the limits of the protection.
Claims (10)
1. a kind of access control system based on IBEACON, which is characterized in that including several IBEACON sensors, access controller,
Acquisition system, background control system and intelligent terminal;
The IBEACON sensor is mounted near door, for emitting IBEACON signal in a certain range;
The access controller by network communication receive order, can a secondary control multiple leaf door, control the switch and closure of door,
And carry out data interaction;
The acquisition system is responsible for acquisition, storage for being connected with access controller, background control system by network communication
Data, and do corresponding data forwarding work;
The intelligent terminal is the portable smart machine of user, for installing access control system APP, instead of traditional card
Or biological characteristic is as the tool to open the door;
The access control system APP, using shaking door opening function after being logged in for user;
The background control system for receiving the request of access control system APP transmission, and carries out verification processing, and transmitting order to lower levels is
The control centre of entire access control system.
2. system according to claim 1, which is characterized in that in the IBEACON signal of the IBEACON sensor emission
The UUID for including can be used as the ID of door to carry out the mark of door.
3. system according to claim 1, which is characterized in that the access controller further comprises following submodule:
Information storage module: storage log information, controller parameter;
Communication module: it by classical network communication modes, receives order and issues processing, report the state of controller;
Control module: being connected with communication module and information storage module, according to the order that the communication module receives, carries out door
Control or information inquiry, generate control result, return to the communication module.
4. system according to claim 1, which is characterized in that the acquisition system further comprises following submodule:
Network communication module: by the network communication mode that HTTP, TCP or UDP etc. are common, access controller is connected, network is logical
News mode is determined by selected access controller;Background control system is connected by http protocol, carries out data interaction;
Command processing module: the command packet that background control system issues is received, parsing of unpacking is carried out, judges the legal of order
Property, if legal, then transmitting order to lower levels gives the access controller;If it is illegal, then failure information is returned to the Background control system
System;
Gate inhibition's data processing module: receiving the data that access controller reports, carry out parsing of unpacking, judge the legitimacy of content,
If legal, then reported result to background control system;If it is illegal, then it is handled as dirty information.
5. system according to claim 1, which is characterized in that the background control system further comprises:
Visualized operation interface: being mainly directed towards system manager, can with the switch state of real-time exhibition region inside door, administrator
To carry out corresponding control operation;
Authentication module: the authentication information in processing HTTPS request verifies the legitimacy of user;
User's table: the data such as account, password, position including user;
Gate inhibition's table: the data such as UUID of ID, IBEACON sensor including access controller;
Authority list: including user account, user to data such as all unlatching Permission Levels;
Log: the operation informations such as record enabling, shutdown, early warning;
Big data analysis library: storing a plurality of comparison information, is used for matching distance information fingerprint, and complicated distance is avoided to calculate.
6. system according to claim 1, which is characterized in that the access control system APP needs user to log in, and leads to
It crosses HTTPS request and the account number cipher of oneself is sent to background control system progress authentication, shaking for APP could be used
Door opening function.
7. system according to claim 1, which is characterized in that the access control system APP needs intelligent terminal to open bluetooth
Function searches for neighbouring door, i.e. the IBEACON signal of Searching I BEACON sensor, after user shakes intelligent terminal, sends
Background control system processing is given in request of opening the door, if user is legal and possesses the enabling permission of this, has been reached and has been shaken out
The effect of door;Otherwise, it not opens the door.
8. system according to claim 7, which is characterized in that described to shake door opening method, comprising the following steps:
(1) user opens Bluetooth function on intelligent terminal;
(2) access control system APP is logged in, terminal device is shaken;
(3) access control system APP is received shake action signal after, search near IBEACON sensor send IBEACON
Signal parses the signal, obtains the UUID and signal strength of IBEACON sensor;
(4) according to the IBEACON sensor signal intensity collected, the approximate location of user is determined and at a distance from door around,
These arrays are formed into one group customized " range information fingerprint ";
(5) access control system APP is by the identity information of user, range information fingerprint, after digital signature encryption algorithm for encryption, hair
It gives background control system and carries out checking treatment, judge whether user identity is legal, if possess the permission for opening this, finally
Obtain enabling result.
9. system according to claim 8, which is characterized in that the method for confirming the position of user specifically includes following step
It is rapid:
(1) user is when shaking door opening function using APP, it is assumed that has n to fan door at one's side, n is greater than 0, and every fan door is nearby all installed
There is an IBEACON sensor, IBEACON sensor can broadcast the information of oneself in a certain range, and user's intelligent terminal is opened
These information can be received after opening Bluetooth function;
(2) dn that sets d1, d2, d3 ... be respectively receive the IBEACON sensor near every fan door signal strength it is (or straight
Connect and calculate distance), id1, id2, id3 ... idn are the UUID of the IBEACON sensor near every fan door, can also be represented pair
[(id1, d1), (id2, d2), (id3, d3) ... (idn, dn)] is defined as one group " range information fingerprint " by the ID to answer the door,
The range data of the door on present user and periphery is represented, signal strength is stronger, and the distance that represents is closer, then remoter on the contrary;
(3) big data collection analysis library is established, lane database stores multiple groups range information fingerprint, enumerates all range informations and refer to
A possibility that line, and provide corresponding enabling optimal solution [(ida, da), (idb, db) ... (idm, dm)] (0≤a≤n, 0 <
0≤m of=b≤n ...≤n);The principle that enabling optimal solution provides is nearby principle, analyzes signal in range information fingerprint
The strongest one or more pairs of range informations of intensity will be put into solution together with data of its signal strength difference no more than certain value
In;When access control system APP transmission range information fingerprint is to background control system, background control system by range information fingerprint with
Range information fingerprint in large database concept is matched, and is found out matching degree highest one, is obtained corresponding enabling optimal solution;Afterwards
Bench control system carries out enabling judgement according to enabling optimal solution;
(4) mainly include in enabling optimal solution IBEACON sensor UUID and the correspondingly received signal strength arrived distance
Information combination, to there may be the case where do following judgement:
If a) containing combination more than two in enabling optimal solution, the centre bit that user location may be in multiple tracks door is represented
It sets, can not determine that user is intended to open which fan door, failure of opening the door;Access control system APP should prompt the close door to be opened of user again
Using door opening function is shaken, processing is re-started;
If only including b) one group of data in enabling optimal solution, signal strength dm is judged, if dm is less than setting
Threshold value, represents that the signal strength is extremely weak namely user is in non-enabling tolerance band, therefore not opens the door;If signal strength
It more than or equal to given threshold, represents that the signal strength is normal namely user is in enabling tolerance band, there is the item to open the door
Part, can judge which IBEACON sensor proximity user is according to idm at this time, namely fan near door where;
(5) approximate location that can determine user is handled by above step and it is intended to the door opened.
10. system according to claim 8, which is characterized in that the method for judging user identity legitimacy and enabling permission,
The following steps are included:
(1) an account and initial password are distributed to each legitimate user, access control system APP is logged in by the account number cipher;
(2) when access control system APP sends data, by digital signature encryption algorithm, Background control will be sent to after data encryption
System guarantees the integrality and authenticity of data;Data mainly include the account of user, range information fingerprint, timestamp etc.;
(3) data received are decrypted background control system, judge that whether complete data are true, ask if there is forgery
The case where asking then issues warning signal;If data are completely true, it is further processed;
(4) acquisition time is stabbed, if being more than setting time threshold value with current period comparison, illustrates that the request is out-of-date, no
Give processing;
(5) obtain user account, corresponding user is searched from user's table, if search less than or the account it is deactivated,
Then not open the door;If finding, it is legal to represent user, carries out next step operation;
(6) the enabling optimal solution after range information fingerprint matching is obtained, optimal solution is judged, if having door-opening condition,
Corresponding door is searched from gate inhibition's table according to idm, if can not find, represents the door not in control range, failure of opening the door;If looking for
It arrives, then carries out the judgement operation of next step permission;
(7) according to user account and idm, corresponding data are searched from authority list, judge whether user has the unlatching of this
Permission, if it is not, not opening the door;If so, then issuing door opening command;
(8) acquisition system receives door opening command, and to access controller, access controller is opened the door successfully or lost transmitting order to lower levels
It loses, acquisition system obtains result and returns to background control system;
(9) background control system receives control result, returns to access control system APP, so far shakes door opening function realization.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811512483.8A CN109636974A (en) | 2018-12-11 | 2018-12-11 | A kind of access control system based on IBEACON |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811512483.8A CN109636974A (en) | 2018-12-11 | 2018-12-11 | A kind of access control system based on IBEACON |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109636974A true CN109636974A (en) | 2019-04-16 |
Family
ID=66072748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811512483.8A Pending CN109636974A (en) | 2018-12-11 | 2018-12-11 | A kind of access control system based on IBEACON |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109636974A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113012330A (en) * | 2021-02-20 | 2021-06-22 | 南京云巅电子科技有限公司 | Remote automatic access control and anti-following system based on Bluetooth AOA |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105261096A (en) * | 2015-10-26 | 2016-01-20 | 东莞市点开网络科技有限公司 | Network smart lock system |
US20170294061A1 (en) * | 2016-04-12 | 2017-10-12 | Chahoo Co., Ltd. | Digital doorlock system |
CN107293003A (en) * | 2017-05-08 | 2017-10-24 | 上海共佰克智能科技有限公司 | A kind of bluetooth method for unlocking |
CN107393071A (en) * | 2017-07-20 | 2017-11-24 | 特斯联(北京)科技有限公司 | A kind of current apparatus control method answered based on bluetooth distance perspective and control system |
CN107393103A (en) * | 2017-09-06 | 2017-11-24 | 广州市游控派信息科技有限公司 | A kind of intelligent access control system and its method for unlocking based on bluetooth |
CN107610292A (en) * | 2017-09-15 | 2018-01-19 | 广州市雅天网络科技有限公司 | The method for unlocking of controllable distance intelligent door lock based on bluetooth |
CN207882996U (en) * | 2017-12-18 | 2018-09-18 | 北京欧维时代网络技术有限公司 | A kind of multifunctional intellectual gate inhibition |
-
2018
- 2018-12-11 CN CN201811512483.8A patent/CN109636974A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105261096A (en) * | 2015-10-26 | 2016-01-20 | 东莞市点开网络科技有限公司 | Network smart lock system |
US20170294061A1 (en) * | 2016-04-12 | 2017-10-12 | Chahoo Co., Ltd. | Digital doorlock system |
CN107293003A (en) * | 2017-05-08 | 2017-10-24 | 上海共佰克智能科技有限公司 | A kind of bluetooth method for unlocking |
CN107393071A (en) * | 2017-07-20 | 2017-11-24 | 特斯联(北京)科技有限公司 | A kind of current apparatus control method answered based on bluetooth distance perspective and control system |
CN107393103A (en) * | 2017-09-06 | 2017-11-24 | 广州市游控派信息科技有限公司 | A kind of intelligent access control system and its method for unlocking based on bluetooth |
CN107610292A (en) * | 2017-09-15 | 2018-01-19 | 广州市雅天网络科技有限公司 | The method for unlocking of controllable distance intelligent door lock based on bluetooth |
CN207882996U (en) * | 2017-12-18 | 2018-09-18 | 北京欧维时代网络技术有限公司 | A kind of multifunctional intellectual gate inhibition |
Non-Patent Citations (1)
Title |
---|
郭利敏 刘悦如: "iBeacon在图书馆的应用研究", 《上海高校图书情报工作研究》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113012330A (en) * | 2021-02-20 | 2021-06-22 | 南京云巅电子科技有限公司 | Remote automatic access control and anti-following system based on Bluetooth AOA |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102158473B (en) | Remote entry system | |
US8466773B2 (en) | Method of authorization | |
CN104167029B (en) | A kind of intelligent lock and its operating method | |
CN205427990U (en) | Pronunciation access control system based on digital identifying code of developments | |
CN103366423B (en) | Based on the light-operated gate control system of mobile fingerprint identification | |
CN103714599A (en) | WLAN-based iris entrance guard system and communication method | |
CN101690144A (en) | Wireless device monitoring methods, wireless device monitoring system and manufacture | |
CN102037706B (en) | Method for the temporary personalization of a communication device | |
CN107734460A (en) | A kind of method and terminal that bluetooth lock intelligent unlocking is realized based on mobile terminal | |
CN104580260B (en) | A kind of safety method suitable for Intelligent terminal for Internet of things | |
CN102722924B (en) | Light-operated access control system based on iris identification of mobile phone | |
CN111554020A (en) | Internet of things access control system based on RFID and biological identification | |
CN106127906A (en) | The unlocking method of a kind of door-control lock, Apparatus and system | |
CN108257274A (en) | A kind of intelligent door lock and its communication means | |
CN107222373A (en) | Control method, system, terminal, FIDO servers and the safety means of smart home | |
CN106127896A (en) | A kind of Intelligent door lock control system and method | |
WO2004008683A3 (en) | Automated network security system and method | |
CN212256412U (en) | Internet of things access control system based on RFID and biological identification | |
CN108765621B (en) | Safety inspection system and inspection method for movable operation and maintenance of civil air defense door | |
CN105261100A (en) | Entrance guard unlocking method and system | |
CN107124463A (en) | A kind of data-sharing systems applied to intelligent plant | |
CN101002213A (en) | Network system, control method thereof and program | |
CN109002875A (en) | Two dimensional code encryption method, two dimensional code Transmission system and storage medium | |
CN107545631A (en) | The realization device that gate inhibition's method for unlocking, device and gate inhibition unlock | |
CN113205628B (en) | Intelligent door lock control method and system based on biological feature recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190416 |
|
RJ01 | Rejection of invention patent application after publication |