CN109636974A - A kind of access control system based on IBEACON - Google Patents

A kind of access control system based on IBEACON Download PDF

Info

Publication number
CN109636974A
CN109636974A CN201811512483.8A CN201811512483A CN109636974A CN 109636974 A CN109636974 A CN 109636974A CN 201811512483 A CN201811512483 A CN 201811512483A CN 109636974 A CN109636974 A CN 109636974A
Authority
CN
China
Prior art keywords
door
control system
user
data
ibeacon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811512483.8A
Other languages
Chinese (zh)
Inventor
陈奇
梁思源
李倍旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hang Far Information Technology Co Ltd
Huanan Industrial Technology Research Institute of Zhejiang University
Original Assignee
Guangdong Hang Far Information Technology Co Ltd
Huanan Industrial Technology Research Institute of Zhejiang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hang Far Information Technology Co Ltd, Huanan Industrial Technology Research Institute of Zhejiang University filed Critical Guangdong Hang Far Information Technology Co Ltd
Priority to CN201811512483.8A priority Critical patent/CN109636974A/en
Publication of CN109636974A publication Critical patent/CN109636974A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of access control systems based on IBEACON.The system includes several IBEACON sensors, access controller, acquisition system, background control system and intelligent terminal, separately has big data collection analysis library;Acquisition system connection access controller and background control system, access controller can control multiple leaf door, and the switch data for acquiring door reports acquisition system, then handles information reporting background control system by acquisition system;The information that background control system processing acquisition system reports, issues control command to acquisition system, then by acquisition system and is handed down to access controller, reach the control effect of intelligent open and close door;Background control system connects user's intelligent terminal, receives user's request, and door opening function is shaken in realization.Modern IBEACON location technology is utilized in the method for the present invention, and user can use the door that carry-on intelligent terminal opens Administrative Area, and request is encrypted with Digital Signature Algorithm, by authentication and enabling Authority Verification, enhances safety when office and convenience.

Description

A kind of access control system based on IBEACON
Technical field
The invention belongs to Internet technical field, relate generally to a kind of to realize using intelligent terminal and IBEACON technology The convenient access control system opened the door, verify user identity and permission.
Background technique
Today's society has gradually moved towards intelligent, and access control system also spreads to big and small public place, passes through Disengaging identification method can be roughly divided into password identification, card recognition and bio-identification.
1, password identification mainly identifies that disengaging permission, this mode can only be controlled unidirectionally by examining the password of input System, advantage is easy to operate, the disadvantage is that safety coefficient is general there are password leakage problem, and key is used for a long time and is easy damage It is bad, higher cost.
2, card recognition, using magnetic card, perhaps radio-frequency card identifies disengaging permission by card reading or card reading encryption.Magnetic card The advantages of be it is at low cost, there is enabling to record, the disadvantage is that being not easy to realize double-direction control, magnetic card is easy demagnetization or abrasion, loss, very Cause to dally over one's work to forgetting to carry;The advantages of radio-frequency card is that equipment is not easy to wear, and safety is relatively high, has enabling to record, Can double-direction control, the disadvantage is that higher cost, and ID/IC card has been cracked, and there are security risks.
3, bio-identification is divided into fingerprint recognition, iris recognition and recognition of face etc..Its biggest advantage is that be difficult to replicate, As fingerprint, iris be all it is unique, safety is high, and without carrying extra equipment.The disadvantage is that cost is very high, need Special equipment, and discrimination is very high can't accomplish for current technology.Requirement and use environment to user It is very high, for example finger cannot scratch, and otherwise will lead to fingerprint recognition not, it is lower for the upper two methods of service efficiency, Apply in general to important office space.
And the modern society being had gradually developed in internet, demand of the people to access control system, which is more than, to be satisfied with Enter and leave, traditional RS485 gate inhibition's communication is also gradually eliminated, using TCP/IP network communication protocol gate inhibition's product gradually at For mainstream, open communications protocol is but also developer can develop corresponding APP, software etc. according to user demand.It is based on The intelligent access control system of IBEACON is exactly opened the door using intelligent terminal and access control system APP, and card and password identification are compared More convenient and at low cost, substantially currently all people can carry intelligent terminal;More convenient than bio-identification, user only needs to shake one It shakes the hand machine, request of opening the door is sent to background control system processing, and without carrying out other operations, and Content of communciation is by number label Name encryption, safety are also high.
Summary of the invention
It is an object of the invention to be directed to existing access control system, a set of more convenient and safety access control system is developed, Have the function of to position user's Position Approximate, verifying user identity, early warning etc. carried out to illegal invasion, improves safety;And it throws The modes such as traditional card recognition, bio-identification have been abandoned, using the combination of access control system APP+ intelligent terminal, have improved convenience Property.
The purpose of the present invention is achieved through the following technical solutions: a kind of access control system based on IBEACON, including Several IBEACON sensors, access controller, acquisition system, background control system and intelligent terminal;
The IBEACON sensor is mounted near door, for emitting IBEACON signal in a certain range;
The access controller by network communication receive order, can a secondary control multiple leaf door, control door switch and Closure, and carry out data interaction;
The acquisition system, for being connected with access controller, background control system by network communication, responsible acquisition, Storing data, and do corresponding data forwarding work;
The intelligent terminal is the portable smart machine of user, and for example the common smart machine such as mobile phone, plate, is used It is more convenient instead of traditional card or biological characteristic as the tool to open the door in installation access control system APP;
The access control system APP, using shaking door opening function after being logged in for user;
The background control system for receiving the request of access control system APP transmission, and carries out verification processing, issues life It enables, is the control centre of entire access control system.
Further, the UUID for including in the IBEACON signal of the IBEACON sensor emission, can be used as door ID carries out the mark of door.
Further, the access controller further comprises following submodule:
Information storage module: storage log information, controller parameter (IP, door quantity, sequence number etc.);
Communication module: it by classical network communication modes, receives order and issues processing, report the state of controller;
Control module: being connected with communication module and information storage module, according to the order that the communication module receives, into The control of row door or information inquiry, generate control result, return to the communication module.
Further, the acquisition system further comprises following submodule:
Network communication module: by the network communication mode that HTTP, TCP or UDP etc. are common, access controller, net are connected Network communication modes are determined by selected access controller;Background control system is connected by http protocol, carries out data interaction;
Command processing module: the command packet that background control system issues is received, parsing of unpacking is carried out, judges order Legitimacy, if legal, then transmitting order to lower levels gives the access controller;If it is illegal, then failure information is returned to control to the backstage System processed;
Gate inhibition's data processing module: the data that access controller reports are received, parsing of unpacking is carried out, judges the legal of content Property, if legal, then reported result is to background control system;If it is illegal, then it is handled as dirty information.
Further, the background control system further comprises:
Visualized operation interface: being mainly directed towards system manager, can be managed with the switch state of real-time exhibition region inside door Member can carry out corresponding control operation;
Authentication module: the authentication information in processing HTTPS request verifies the legitimacy of user;
User's table: the data such as account, password, position including user;
Gate inhibition's table: the data such as UUID of ID, IBEACON sensor including access controller;
Authority list: including user account, user to data such as all unlatching Permission Levels;
Log: the operation informations such as record enabling, shutdown, early warning;
Big data analysis library: storing a plurality of comparison information, is used for matching distance information fingerprint, avoids complicated distance meter It calculates.
Further, the access control system APP, needs user to log in, by HTTPS request that the account of oneself is close Code is sent to background control system and carries out authentication, could use APP's to shake door opening function.
Further, the access control system APP needs intelligent terminal to open Bluetooth function, searches for neighbouring door, that is, searches for The IBEACON signal of IBEACON sensor after user shakes intelligent terminal, sends to open the door and request to background control system Reason, if user is legal and possesses the enabling permission of this, has achieved the effect that shake enabling;Otherwise, it not opens the door.
It is further, described to shake door opening method, comprising the following steps:
(1) user opens Bluetooth function on intelligent terminal;
(2) access control system APP is logged in, terminal device is shaken;
(3) access control system APP is received shake action signal after, search near IBEACON sensor send IBEACON signal parses the signal, obtains the UUID and signal strength of IBEACON sensor;
(4) according to the IBEACON sensor signal intensity collected, determine user approximate location and with door around away from From by these arrays one group customized " range information fingerprint " of composition;
(5) identity information of user, range information fingerprint are utilized digital signature encryption algorithm for encryption by access control system APP Afterwards, it is sent to background control system and carries out checking treatment, judge whether user identity is legal, if possess the power for opening this Limit, it is final to obtain enabling result.
Further, confirm the method for the position of user, specifically includes the following steps:
(1) user is when shaking door opening function using APP, it is assumed that has n to fan door at one's side, n is greater than 0, near every fan door all One IBEACON sensor is installed, IBEACON sensor can broadcast the information of oneself in a certain range, and user's intelligence is eventually End can receive these information after opening Bluetooth function;
(2) dn that sets d1, d2, d3 ... be respectively receive the IBEACON sensor near every fan door signal strength (or Person directly calculates distance), id1, id2, id3 ... idn are the UUID of the IBEACON sensor near every fan door, can also generation Table is to the ID to answer the door, and by [(id1, d1), (id2, d2), (id3, d3) ... (idn, dn)], being defined as one group, " range information refers to Line " represents the range data of the door on present user and periphery, and signal strength is stronger, and the distance that represents is closer, then remoter on the contrary;
(3) big data collection analysis library is established, lane database stores multiple groups range information fingerprint, enumerates all distance letters Cease fingerprint a possibility that, and provide corresponding enabling optimal solution [(ida, da), (idb, db) ... (idm, dm)] (0≤a≤ N, 0≤b≤0≤m of n ...≤n);The principle that enabling optimal solution provides is nearby principle, is analyzed in range information fingerprint The strongest one or more pairs of range informations of signal strength will be put into together with data of its signal strength difference no more than certain value Xie Zhong;When access control system APP transmission range information fingerprint is to background control system, background control system is by range information fingerprint It is matched with the range information fingerprint in large database concept, finds out matching degree highest one, obtain corresponding enabling optimal solution; Background control system carries out enabling judgement according to enabling optimal solution;
(4) mainly include in enabling optimal solution IBEACON sensor UUID and the correspondingly received signal strength arrived Range information combination, to there may be the case where do following judgement:
If a) containing combination more than two in enabling optimal solution, representing user location may be in multiple tracks door Heart position can not determine that user is intended to open which fan door, failure of opening the door;Access control system APP should prompt user close to being opened Door, which reuses, shakes door opening function, re-starts processing;
If only including b) one group of data in enabling optimal solution, signal strength dm is judged, if dm is less than Given threshold, represents that the signal strength is extremely weak namely user is in non-enabling tolerance band, therefore not opens the door;If signal Intensity is more than or equal to given threshold, represents that the signal strength is normal namely user be in enabling tolerance band, has enabling Condition, can judge which IBEACON sensor proximity user is according to idm at this time, namely fan near door where;
(5) approximate location that can determine user is handled by above step and it is intended to the door opened.
Further, the method for judging user identity legitimacy and enabling permission, comprising the following steps:
(1) an account and initial password are distributed to each legitimate user, access control system is logged in by the account number cipher APP;
(2) when access control system APP sends data, by digital signature encryption algorithm, backstage will be sent to after data encryption Control system guarantees the integrality and authenticity of data;Data mainly include the account of user, range information fingerprint, timestamp Deng;
(3) data received are decrypted background control system, judge that whether complete data are true, if there is puppet The case where making request then issues warning signal;If data are completely true, it is further processed;
(4) acquisition time is stabbed, if being more than setting time threshold value with current period comparison, illustrates that the request is already expired When, it disregards;
(5) obtain user account, corresponding user searched from user's table, if search less than or account stop over With then not enabling;If finding, it is legal to represent user, carries out next step operation;
(6) the enabling optimal solution after range information fingerprint matching is obtained, optimal solution is judged, if having enabling item Part then searches corresponding door according to idm from gate inhibition's table, if can not find, represents the door not in control range, failure of opening the door; If finding, the judgement operation of next step permission is carried out;
(7) according to user account and idm, corresponding data are searched from authority list, judge whether user has this 's Permission is opened, if it is not, not opening the door;If so, then issuing door opening command;
(8) acquisition system receives door opening command, transmitting order to lower levels to access controller, access controller open the door successfully or Failure, acquisition system obtain result and return to background control system;
(9) background control system receives control result, returns to access control system APP, so far shakes door opening function reality It is existing.
The present invention provides a kind of using IBEACON technology and intelligent terminal, can identify user identity and verify user and weigh The access control system of limit utilizes intelligent terminal, digital signature different from traditional card recognition and bio-identification access control system Encryption, network communications technology realize a kind of access control system of more Portable safety.
Detailed description of the invention
Fig. 1 is the access control system module map of the embodiment of the present invention.
Specific embodiment
To keep technical solution and the advantage of the embodiment of the present invention clearer, below in conjunction with attached in the embodiment of the present invention Figure, provides detailed description to the technical solution of the embodiment of the present invention.For explaining only the invention, rather than to limit of the invention It is fixed.
Embodiment one
Fig. 1 is the access control system module map of the embodiment of the present invention.Present embodiments provide a kind of gate inhibition based on IBEACON System, as shown in Figure 1:
The access control system includes: IBEACON sensor and door, access controller, acquisition system, background control system, use Family intelligent terminal.IBEACON sensor and door are mounted on the same place, and the UUID of IBEACON sensor and the ID of door are opposite It answers;Access controller is connected with multiple leaf door, and access controller can control switch and the opening time of door;It access controller and adopts Collecting system is connected by TCP/IP mechanics of communication, and data transmitting is main to be throttled by binary word, needs to be assisted according to equipment interconnection View is parsed and is encoded, and access controller reports the data information of door to acquisition system, acquisition system transmitting order to lower levels to gate inhibition Controller is executed;Acquisition system is connected with background control system by http protocol, is used for acquisition system for access control The data information that device reports is packaged to be reported to background control system, and background control system transmitting order to lower levels is compiled to acquisition system Code is sent to access controller;Access control system APP is mounted on user's intelligent terminal, passes through HTTPS agreement and Background control system System is connected, and after user shakes intelligent terminal, access control system APP sends a request to background control system, at background control system Access control system APP is returned result to after having managed.
Wherein, IBEACON sensor can broadcast the signal of oneself in a certain range, and signal content includes itself UUID and signal strength indication, distance is remoter, and signal strength indication is smaller, otherwise bigger.The signal can be received by bluetooth.Because one A IBEACON sensor and Yishanmen bundle, we can use the UUID of IBEACON sensor as the ID of door.
Wherein, access controller further comprises:
Information storage module stores log information, controller parameter (IP, door quantity, sequence number etc.);Communication module leads to TCP/IP network communication mode is crossed, order is received and issues processing, report the state of controller;Control module, with communication module and Information storage module is connected, and according to the order that the communication module receives, carries out the control or information inquiry of door, generates control As a result, returning to the communication module.
Wherein, acquisition system further comprises:
Network communication module connects access controller by TCP/IP mode, connects Background control system by http protocol System carries out data interaction;Command processing module receives the command packet that background control module issues, carries out parsing of unpacking, sentence The legitimacy of disconnected order, if legal, then transmitting order to lower levels gives the access controller;If it is illegal, then failure information is returned to institute State background control module;Gate inhibition's data processing module receives the binary data that access controller reports, is parsed, judged The legitimacy of content, if legal, then reported result is to background control system;If it is illegal, then it is handled as dirty information.
Wherein, background control system further comprises:
Visualized operation interface, is mainly directed towards system manager, can be managed with the switch state of real-time exhibition region inside door Member can carry out corresponding control operation;Authentication module handles the authentication information in HTTPS request, verifies user Legitimacy;User's table, the data such as account, password, position including user;Gate inhibition's table, ID including access controller, The data such as the UUID of IBEACON sensor;Authority list, including user account, user to the number such as all unlatching Permission Levels According to;Log, the operation informations such as record enabling, shutdown, early warning;Big data analysis library stores a plurality of comparison information, for match away from From information fingerprint, complicated distance is avoided to calculate.
Wherein, access control system APP needs user to log in, and is sent to the account number cipher of oneself by HTTPS request Background control system carries out authentication, could use APP's to shake door opening function, the steps include:
(1) user opens Bluetooth function on intelligent terminal.
(2) access control system APP is logged in, terminal device is shaken.
(3) access control system APP is received shake action signal after, search near IBEACON sensor send letter Number, the signal is parsed, the UUID and signal strength of IBEACON sensor are obtained.
(4) according to the IBEACON sensor signal intensity collected, determine user approximate location and with door around away from From by these arrays one group customized " range information fingerprint " of composition.
(5) identity information of user, range information fingerprint are utilized digital signature encryption algorithm for encryption by access control system APP Afterwards, it is sent to background control system and carries out checking treatment, judge whether user identity is legal, if possess the power for opening this Limit, it is final to obtain enabling result.
The use of access control system mainly in various office spaces, it is necessary to have certain security protections, do not allow it is external enter The person of invading arbitrarily opens security protection door, therefore access control system needs to verify the identity of user and its enabling permission is verified. Simultaneously because user may be near multiple leaf door, therefore access control system will carry out a rough judgement to the position of user, To analyze user wants which fan door opened.
Specifically, the method for the position of confirmation user, key step are as follows:
(1) user is when shaking door opening function using APP, it is assumed that has n to fan door at one's side, n is greater than 0, near every fan door all One IBEACON sensor is installed, IBEACON sensor can broadcast the information of oneself in a certain range, and user's intelligence is eventually End can receive these information after opening Bluetooth function.
(2) IBEACON signal strength RSSI is calculated, according to formula
D=10^ ((abs (RSSI)-A)/(10*n)), wherein A is that signal when transmitting terminal and receiving end are separated by 1 meter is strong Degree, n be the environmental attenuation factor, calculate d be distance.
If d1, d2, d3 ..., dn is respectively at a distance from IBEACON sensor, and id1, id2, id3 ... idn are every fan The UUID of IBEACON sensor near door can also be represented to the ID to answer the door, will [(id1, d1), (id2, d2), (id3, D3) ... (idn, dn)] it is defined as one group " range information fingerprint ", represent the range data of the door on present user and periphery.? Can be with RSSI directly as distance parameter, signal strength is stronger, and the distance that represents is closer, then remoter on the contrary.
(3) big data collection analysis library is established, lane database houses multiple groups range information fingerprint, enumerates all distances A possibility that information fingerprint, and provide corresponding enabling optimal solution [(ida, da), (idb, db) ... (idm, dm)] (0≤a < =n, 0≤b≤0≤m of n ...≤n).The principle that enabling optimal solution provides is nearby principle, analyzes range information fingerprint In the smallest one or more pairs of range informations of distance, the data no more than certain value will be differed with its signal strength and will also be put into together Xie Zhong, value can be defined as 0.2 by we herein, represent the error for allowing 20cm.When access control system APP transmission range information When fingerprint is to background control system, background control system carries out the range information fingerprint in range information fingerprint and large database concept Matching, finds out matching degree highest one, obtains corresponding enabling optimal solution.Background control system according to enabling optimal solution, into Row, which opens the door, to be judged.
(4) mainly include in enabling optimal solution IBEACON sensor UUID and the correspondingly received signal strength arrived Combination, to there may be the case where do following judgement:
If 1) contain combination more than two in enabling optimal solution, representing user location may be in multiple tracks door Heart position can not determine that user is intended to open which fan door, failure of opening the door.Access control system APP should prompt user close to being opened Door, which reuses, shakes door opening function, re-starts processing.
If 2) only include one group of data in enabling optimal solution, the dm that adjusts the distance is judged, if dm is greater than centainly Value represents user and is in non-enabling tolerance band, therefore not opens the door;If dm is less than or equal to certain value, represents user and be in In enabling tolerance band, there is the condition opened the door, it is attached can to judge which IBEACON sensor user is according to idm at this time Closely, namely where it fans near door.
In daily life, we generally regard dm≤0.5 as enabling tolerance band condition, i.e. user will be near door Door opening function is shaken in use in 50cm, otherwise can be considered as invalid enabling range.
(5) it is handled by above step, we can determine the approximate location and its door for being intended to unlatching of user.
Specifically, the method for judging user identity legitimacy and enabling permission, key step are as follows:
(1) an account and initial password are distributed to each legitimate user, gate inhibition system can be logged in by the account number cipher Unite APP.
(2) when access control system APP sends data, by digital signature encryption algorithm, backstage will be sent to after data encryption Control system guarantees the integrality and authenticity of data.Data mainly include the account of user, range information fingerprint, timestamp Deng.
(3) data received are decrypted background control system, judge that whether complete data are true, if there is puppet The case where making request issues pre-warning signal;If data are completely true, it is further processed.
(4) acquisition time is stabbed, if being more than certain time with current period comparison, when illustrating that this is requested, no Give processing.
(5) obtain user account, corresponding user searched from user's table, if search less than or account stop over With then not enabling;If finding, it is legal to represent user, carries out next step operation.
(6) the enabling optimal solution after range information fingerprint matching is obtained, step carries out at judgement according to claim 8 Reason searches corresponding door according to idm if having door-opening condition from gate inhibition's table, if can not find, represents the door not in control model In enclosing, failure of opening the door;If finding, the judgement operation of next step permission is carried out;
(7) according to user account and idm, corresponding data are searched from authority list, judge whether user has this 's Permission is opened, if it is not, not opening the door;If so, then issuing door opening command.
(8) acquisition system receives door opening command, transmitting order to lower levels to access controller, access controller open the door successfully or Failure, acquisition system obtain result and return to background control system.
(9) background control system receives control result, returns to access control system APP, so far shakes door opening function reality It is existing.
Provided verbal description, attached drawing and claims can hold those skilled in the art very much according to the present invention Easily in the case where not departing from thought and range of condition of the invention defined by claims, a variety of variations and change can be made. All technical ideas according to the present invention and the substantive any modification carried out to above-described embodiment, equivalent variations, belong to this hair Bright claim is within the limits of the protection.

Claims (10)

1. a kind of access control system based on IBEACON, which is characterized in that including several IBEACON sensors, access controller, Acquisition system, background control system and intelligent terminal;
The IBEACON sensor is mounted near door, for emitting IBEACON signal in a certain range;
The access controller by network communication receive order, can a secondary control multiple leaf door, control the switch and closure of door, And carry out data interaction;
The acquisition system is responsible for acquisition, storage for being connected with access controller, background control system by network communication Data, and do corresponding data forwarding work;
The intelligent terminal is the portable smart machine of user, for installing access control system APP, instead of traditional card Or biological characteristic is as the tool to open the door;
The access control system APP, using shaking door opening function after being logged in for user;
The background control system for receiving the request of access control system APP transmission, and carries out verification processing, and transmitting order to lower levels is The control centre of entire access control system.
2. system according to claim 1, which is characterized in that in the IBEACON signal of the IBEACON sensor emission The UUID for including can be used as the ID of door to carry out the mark of door.
3. system according to claim 1, which is characterized in that the access controller further comprises following submodule:
Information storage module: storage log information, controller parameter;
Communication module: it by classical network communication modes, receives order and issues processing, report the state of controller;
Control module: being connected with communication module and information storage module, according to the order that the communication module receives, carries out door Control or information inquiry, generate control result, return to the communication module.
4. system according to claim 1, which is characterized in that the acquisition system further comprises following submodule:
Network communication module: by the network communication mode that HTTP, TCP or UDP etc. are common, access controller is connected, network is logical News mode is determined by selected access controller;Background control system is connected by http protocol, carries out data interaction;
Command processing module: the command packet that background control system issues is received, parsing of unpacking is carried out, judges the legal of order Property, if legal, then transmitting order to lower levels gives the access controller;If it is illegal, then failure information is returned to the Background control system System;
Gate inhibition's data processing module: receiving the data that access controller reports, carry out parsing of unpacking, judge the legitimacy of content, If legal, then reported result to background control system;If it is illegal, then it is handled as dirty information.
5. system according to claim 1, which is characterized in that the background control system further comprises:
Visualized operation interface: being mainly directed towards system manager, can with the switch state of real-time exhibition region inside door, administrator To carry out corresponding control operation;
Authentication module: the authentication information in processing HTTPS request verifies the legitimacy of user;
User's table: the data such as account, password, position including user;
Gate inhibition's table: the data such as UUID of ID, IBEACON sensor including access controller;
Authority list: including user account, user to data such as all unlatching Permission Levels;
Log: the operation informations such as record enabling, shutdown, early warning;
Big data analysis library: storing a plurality of comparison information, is used for matching distance information fingerprint, and complicated distance is avoided to calculate.
6. system according to claim 1, which is characterized in that the access control system APP needs user to log in, and leads to It crosses HTTPS request and the account number cipher of oneself is sent to background control system progress authentication, shaking for APP could be used Door opening function.
7. system according to claim 1, which is characterized in that the access control system APP needs intelligent terminal to open bluetooth Function searches for neighbouring door, i.e. the IBEACON signal of Searching I BEACON sensor, after user shakes intelligent terminal, sends Background control system processing is given in request of opening the door, if user is legal and possesses the enabling permission of this, has been reached and has been shaken out The effect of door;Otherwise, it not opens the door.
8. system according to claim 7, which is characterized in that described to shake door opening method, comprising the following steps:
(1) user opens Bluetooth function on intelligent terminal;
(2) access control system APP is logged in, terminal device is shaken;
(3) access control system APP is received shake action signal after, search near IBEACON sensor send IBEACON Signal parses the signal, obtains the UUID and signal strength of IBEACON sensor;
(4) according to the IBEACON sensor signal intensity collected, the approximate location of user is determined and at a distance from door around, These arrays are formed into one group customized " range information fingerprint ";
(5) access control system APP is by the identity information of user, range information fingerprint, after digital signature encryption algorithm for encryption, hair It gives background control system and carries out checking treatment, judge whether user identity is legal, if possess the permission for opening this, finally Obtain enabling result.
9. system according to claim 8, which is characterized in that the method for confirming the position of user specifically includes following step It is rapid:
(1) user is when shaking door opening function using APP, it is assumed that has n to fan door at one's side, n is greater than 0, and every fan door is nearby all installed There is an IBEACON sensor, IBEACON sensor can broadcast the information of oneself in a certain range, and user's intelligent terminal is opened These information can be received after opening Bluetooth function;
(2) dn that sets d1, d2, d3 ... be respectively receive the IBEACON sensor near every fan door signal strength it is (or straight Connect and calculate distance), id1, id2, id3 ... idn are the UUID of the IBEACON sensor near every fan door, can also be represented pair [(id1, d1), (id2, d2), (id3, d3) ... (idn, dn)] is defined as one group " range information fingerprint " by the ID to answer the door, The range data of the door on present user and periphery is represented, signal strength is stronger, and the distance that represents is closer, then remoter on the contrary;
(3) big data collection analysis library is established, lane database stores multiple groups range information fingerprint, enumerates all range informations and refer to A possibility that line, and provide corresponding enabling optimal solution [(ida, da), (idb, db) ... (idm, dm)] (0≤a≤n, 0 < 0≤m of=b≤n ...≤n);The principle that enabling optimal solution provides is nearby principle, analyzes signal in range information fingerprint The strongest one or more pairs of range informations of intensity will be put into solution together with data of its signal strength difference no more than certain value In;When access control system APP transmission range information fingerprint is to background control system, background control system by range information fingerprint with Range information fingerprint in large database concept is matched, and is found out matching degree highest one, is obtained corresponding enabling optimal solution;Afterwards Bench control system carries out enabling judgement according to enabling optimal solution;
(4) mainly include in enabling optimal solution IBEACON sensor UUID and the correspondingly received signal strength arrived distance Information combination, to there may be the case where do following judgement:
If a) containing combination more than two in enabling optimal solution, the centre bit that user location may be in multiple tracks door is represented It sets, can not determine that user is intended to open which fan door, failure of opening the door;Access control system APP should prompt the close door to be opened of user again Using door opening function is shaken, processing is re-started;
If only including b) one group of data in enabling optimal solution, signal strength dm is judged, if dm is less than setting Threshold value, represents that the signal strength is extremely weak namely user is in non-enabling tolerance band, therefore not opens the door;If signal strength It more than or equal to given threshold, represents that the signal strength is normal namely user is in enabling tolerance band, there is the item to open the door Part, can judge which IBEACON sensor proximity user is according to idm at this time, namely fan near door where;
(5) approximate location that can determine user is handled by above step and it is intended to the door opened.
10. system according to claim 8, which is characterized in that the method for judging user identity legitimacy and enabling permission, The following steps are included:
(1) an account and initial password are distributed to each legitimate user, access control system APP is logged in by the account number cipher;
(2) when access control system APP sends data, by digital signature encryption algorithm, Background control will be sent to after data encryption System guarantees the integrality and authenticity of data;Data mainly include the account of user, range information fingerprint, timestamp etc.;
(3) data received are decrypted background control system, judge that whether complete data are true, ask if there is forgery The case where asking then issues warning signal;If data are completely true, it is further processed;
(4) acquisition time is stabbed, if being more than setting time threshold value with current period comparison, illustrates that the request is out-of-date, no Give processing;
(5) obtain user account, corresponding user is searched from user's table, if search less than or the account it is deactivated, Then not open the door;If finding, it is legal to represent user, carries out next step operation;
(6) the enabling optimal solution after range information fingerprint matching is obtained, optimal solution is judged, if having door-opening condition, Corresponding door is searched from gate inhibition's table according to idm, if can not find, represents the door not in control range, failure of opening the door;If looking for It arrives, then carries out the judgement operation of next step permission;
(7) according to user account and idm, corresponding data are searched from authority list, judge whether user has the unlatching of this Permission, if it is not, not opening the door;If so, then issuing door opening command;
(8) acquisition system receives door opening command, and to access controller, access controller is opened the door successfully or lost transmitting order to lower levels It loses, acquisition system obtains result and returns to background control system;
(9) background control system receives control result, returns to access control system APP, so far shakes door opening function realization.
CN201811512483.8A 2018-12-11 2018-12-11 A kind of access control system based on IBEACON Pending CN109636974A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811512483.8A CN109636974A (en) 2018-12-11 2018-12-11 A kind of access control system based on IBEACON

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811512483.8A CN109636974A (en) 2018-12-11 2018-12-11 A kind of access control system based on IBEACON

Publications (1)

Publication Number Publication Date
CN109636974A true CN109636974A (en) 2019-04-16

Family

ID=66072748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811512483.8A Pending CN109636974A (en) 2018-12-11 2018-12-11 A kind of access control system based on IBEACON

Country Status (1)

Country Link
CN (1) CN109636974A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113012330A (en) * 2021-02-20 2021-06-22 南京云巅电子科技有限公司 Remote automatic access control and anti-following system based on Bluetooth AOA

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105261096A (en) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 Network smart lock system
US20170294061A1 (en) * 2016-04-12 2017-10-12 Chahoo Co., Ltd. Digital doorlock system
CN107293003A (en) * 2017-05-08 2017-10-24 上海共佰克智能科技有限公司 A kind of bluetooth method for unlocking
CN107393071A (en) * 2017-07-20 2017-11-24 特斯联(北京)科技有限公司 A kind of current apparatus control method answered based on bluetooth distance perspective and control system
CN107393103A (en) * 2017-09-06 2017-11-24 广州市游控派信息科技有限公司 A kind of intelligent access control system and its method for unlocking based on bluetooth
CN107610292A (en) * 2017-09-15 2018-01-19 广州市雅天网络科技有限公司 The method for unlocking of controllable distance intelligent door lock based on bluetooth
CN207882996U (en) * 2017-12-18 2018-09-18 北京欧维时代网络技术有限公司 A kind of multifunctional intellectual gate inhibition

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105261096A (en) * 2015-10-26 2016-01-20 东莞市点开网络科技有限公司 Network smart lock system
US20170294061A1 (en) * 2016-04-12 2017-10-12 Chahoo Co., Ltd. Digital doorlock system
CN107293003A (en) * 2017-05-08 2017-10-24 上海共佰克智能科技有限公司 A kind of bluetooth method for unlocking
CN107393071A (en) * 2017-07-20 2017-11-24 特斯联(北京)科技有限公司 A kind of current apparatus control method answered based on bluetooth distance perspective and control system
CN107393103A (en) * 2017-09-06 2017-11-24 广州市游控派信息科技有限公司 A kind of intelligent access control system and its method for unlocking based on bluetooth
CN107610292A (en) * 2017-09-15 2018-01-19 广州市雅天网络科技有限公司 The method for unlocking of controllable distance intelligent door lock based on bluetooth
CN207882996U (en) * 2017-12-18 2018-09-18 北京欧维时代网络技术有限公司 A kind of multifunctional intellectual gate inhibition

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭利敏 刘悦如: "iBeacon在图书馆的应用研究", 《上海高校图书情报工作研究》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113012330A (en) * 2021-02-20 2021-06-22 南京云巅电子科技有限公司 Remote automatic access control and anti-following system based on Bluetooth AOA

Similar Documents

Publication Publication Date Title
CN102158473B (en) Remote entry system
US8466773B2 (en) Method of authorization
CN104167029B (en) A kind of intelligent lock and its operating method
CN205427990U (en) Pronunciation access control system based on digital identifying code of developments
CN103366423B (en) Based on the light-operated gate control system of mobile fingerprint identification
CN103714599A (en) WLAN-based iris entrance guard system and communication method
CN101690144A (en) Wireless device monitoring methods, wireless device monitoring system and manufacture
CN102037706B (en) Method for the temporary personalization of a communication device
CN107734460A (en) A kind of method and terminal that bluetooth lock intelligent unlocking is realized based on mobile terminal
CN104580260B (en) A kind of safety method suitable for Intelligent terminal for Internet of things
CN102722924B (en) Light-operated access control system based on iris identification of mobile phone
CN111554020A (en) Internet of things access control system based on RFID and biological identification
CN106127906A (en) The unlocking method of a kind of door-control lock, Apparatus and system
CN108257274A (en) A kind of intelligent door lock and its communication means
CN107222373A (en) Control method, system, terminal, FIDO servers and the safety means of smart home
CN106127896A (en) A kind of Intelligent door lock control system and method
WO2004008683A3 (en) Automated network security system and method
CN212256412U (en) Internet of things access control system based on RFID and biological identification
CN108765621B (en) Safety inspection system and inspection method for movable operation and maintenance of civil air defense door
CN105261100A (en) Entrance guard unlocking method and system
CN107124463A (en) A kind of data-sharing systems applied to intelligent plant
CN101002213A (en) Network system, control method thereof and program
CN109002875A (en) Two dimensional code encryption method, two dimensional code Transmission system and storage medium
CN107545631A (en) The realization device that gate inhibition&#39;s method for unlocking, device and gate inhibition unlock
CN113205628B (en) Intelligent door lock control method and system based on biological feature recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190416

RJ01 Rejection of invention patent application after publication