CN109712288A - A kind of method of access control, user equipment and access control equipment - Google Patents
A kind of method of access control, user equipment and access control equipment Download PDFInfo
- Publication number
- CN109712288A CN109712288A CN201811604939.3A CN201811604939A CN109712288A CN 109712288 A CN109712288 A CN 109712288A CN 201811604939 A CN201811604939 A CN 201811604939A CN 109712288 A CN109712288 A CN 109712288A
- Authority
- CN
- China
- Prior art keywords
- access control
- user
- information
- equipment
- control equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The embodiment of the present application discloses a kind of method of access control, this method comprises: user equipment receives the characteristic information for the target user that access control equipment is sent, characteristic information is used for the identity of marked targeted customer;User equipment compares characteristic information and presetting mark information, to determine comparison result;User equipment sends comparison result to access control equipment, so that access control equipment judges whether to open the door.The embodiment of the present application also provides corresponding user equipment and access control equipment.Technical scheme can provide security guarantee to user information, and user information is avoided arbitrarily to be tampered.
Description
Technical field
This application involves fields of communication technology, and in particular to a kind of method of access control, user equipment and gate inhibition set
It is standby.
Background technique
With the continuous development of electronic technology, applicating technology product is also more and more extensive.Present many cells or building are all
Management to community user is realized using access control system, ensure that definitely safety.
The prior art is that the data such as user information are all first stored in property center in advance, if user want by gate inhibition into
Enter cell or building, it is necessary to call the comparing in property central server to be authorized by access control system.
However, since user information is stored in property central server, so that the permission at property center too greatly can
User information can arbitrarily be changed, user information is caused to cannot get reliable security guarantee.
Summary of the invention
The embodiment of the present application provides method, user equipment and the access control equipment of a kind of access control, can be to user
Information provides security guarantee, and user information is avoided arbitrarily to be tampered.
In view of this, the embodiment of the present application provides following scheme:
The application first aspect provides a kind of method of access control, and this method may include: that user equipment receives gate inhibition
The characteristic information for the target user that equipment is sent, characteristic information are used for the identity of marked targeted customer;User equipment believes feature
Breath is compared with presetting mark information, to determine comparison result;User equipment sends comparison result to access control equipment, so that gate inhibition
Equipment judges whether to open the door.
Optionally, with reference to first aspect, in the first possible implementation, user equipment receives access control equipment and sends
Target user characteristic information, may include: user equipment receive access control equipment send enabling request message, open the door request
Message carries the characteristic information of target user.
Optionally, with reference to first aspect, first aspect the first possible implementation, second of possible realization side
In formula, characteristic information may include finger print information, palm print information, vena metacarpea information, refer to venous information, iris information, vocal print letter
At least one of breath, ID card information and card information, user equipment compares characteristic information and presetting mark information, can wrap
Include: user equipment compares at least one of characteristic information with corresponding presetting mark information.
The application second aspect provides a kind of method of access control, and this method may include: that access control equipment obtains target
The characteristic information of user, characteristic information are used for the identity of marked targeted customer;Access control equipment sends characteristic information to user equipment;
Access control equipment receives the comparison result that user equipment is sent, and comparison result is that user equipment is believed according to characteristic information and preset identifications
What breath compared;Access control equipment judges whether to open the door according to comparison result.
Optionally, in conjunction with second aspect, in the first possible implementation, access control equipment may include the first gate inhibition
Equipment and the second access control equipment pass through enabling of the block chain technology to target user between the first access control equipment and the second access control equipment
History information is encrypted, so that the enabling history information in the first access control equipment or the second access control equipment is repaired
The identity initial data of target user is inquired when changing.
Optionally, in conjunction with second aspect, in the second possible implementation, access control equipment sends special to user equipment
Reference breath may include: access control equipment to user equipment transmission enabling request message, and enabling request message carries target user
Characteristic information.
The application third aspect provides a kind of user equipment, which may include: receiving unit, for receiving door
Prohibit the characteristic information for the target user that equipment is sent, characteristic information is used for the identity of marked targeted customer;Comparing unit, being used for will
Characteristic information is compared with presetting mark information, to determine comparison result;Transmission unit compares knot for sending to access control equipment
Fruit, so that access control equipment judges whether to open the door to target user.
The application fourth aspect provides a kind of access control equipment, which may include: acquiring unit, for obtaining mesh
The characteristic information of user is marked, characteristic information is used for the identity of marked targeted customer;Transmission unit, it is special for being sent to user equipment
Reference breath;Receiving unit, the comparison result sent for receiving the user equipment, comparison result is user equipment according to feature
What information and presetting mark information compared;Judging unit, for judging whether to open the door to target user according to comparison result.
The 5th aspect of the application provides a kind of computer equipment, which may include: processor and memory;
The memory is for storing program instruction, and when computer equipment operation, which executes the journey of memory storage
Sequence instruction, so that the computer equipment is executed such as above-mentioned first aspect, first aspect any one possible implementation or second
The method of the access control of the possible implementation of any one in aspect, second aspect.
The 6th aspect of the application provides a kind of computer readable storage medium, is stored in the computer readable storage medium
Instruction, when run on a computer, allowing computer to execute above-mentioned first aspect, first aspect, any one may
The method of the access control of any one possible implementation in implementation or second aspect, second aspect.
Wherein, technology brought by any implementation in terms of the third aspect, fourth aspect, the 5th, in the 6th aspect
Effect can be found in first aspect, technical effect brought by different implementations in second aspect, and details are not described herein again.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
Since the information of user has been pre-stored in user equipment, by a user device by the feature of target user
Information is compared to determine comparison result with presetting mark information, so that access control equipment judges whether according to the comparison result
Enabling authorization is carried out to target user, effectively security guarantee can be provided to user information, user information is avoided arbitrarily to be usurped
Change.
Detailed description of the invention
Fig. 1 is one embodiment schematic diagram of the method for access control provided by the embodiments of the present application;
Fig. 2 is another embodiment schematic diagram of the method for access control provided by the embodiments of the present application;
Fig. 3 is one embodiment schematic diagram of user equipment provided by the embodiments of the present application;
Fig. 4 is one embodiment schematic diagram of access control equipment provided by the embodiments of the present application;
Fig. 5 is one schematic diagram of hardware configuration of the communication device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides method, user equipment and the access control equipment of a kind of access control, can be to user
Information provides security guarantee, and user information is avoided arbitrarily to be tampered.
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that the described embodiments are only a part but not all of the embodiments of the present application.Based on this
Embodiment in application, every other reality obtained by those of ordinary skill in the art without making creative efforts
Example is applied, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so as to embodiments herein described herein such as can in addition to
The sequence other than those of diagram or description is implemented herein.In addition, term " includes " and " having " and their any change
Shape, it is intended that cover and non-exclusive include.Those of ordinary skill in the art it is found that with figure Computational frame differentiation and newly answer
With the appearance of scene, technical solution provided in an embodiment of the present invention is equally applicable for similar technical problem.
Fig. 1 is one embodiment schematic diagram of the method for access control provided by the embodiments of the present application.
As shown in Figure 1, one embodiment of the method for access control provided by the embodiments of the present application may include:
101, access control equipment obtains the characteristic information of target user.
In the present embodiment, access control equipment may include door access machine, building door access machine either guard for entrance gate machine etc. for being
The equipment for preventing the stranger from entering cell or company and being arranged.Fingerprint recognition is usually built-in in these access control equipments
Device, video camera, Application on Voiceprint Recognition device etc..Therefore, if there is target user to want through the gate inhibition at this time, target user can be in door
Prohibit any selection one such as Fingerprint Identification Unit, video camera or Application on Voiceprint Recognition device built-in in equipment and inputs the relevant spy of these devices
Reference breath, such as: selection Fingerprint Identification Unit, then target user can press the finger print information of oneself on Fingerprint Identification Unit.In this way,
The available characteristic information to the target user of access control equipment.
It should be noted that characteristic information may include the information of a variety of identity for marked targeted customer.In addition to upper
It states outside described finger print information, can also include palm print information, vena metacarpea information, refer to venous information, iris information, vocal print letter
These information on target user's human body such as breath, these information others be difficult to get;In addition, it can include target is used
ID card information, the card information at family etc. these can be easy the information got.In practical applications, characteristic information can also wrap
It includes and is more similar to above-mentioned described information, specifically herein without limitation.
102, access control equipment sends characteristic information to user equipment.
In the present embodiment, if gate inhibition sets after target user inputs the relevant characteristic information of oneself on access control equipment
The standby characteristic information that can get the target user, therefore, access control equipment can send the target user to user equipment
Characteristic information.
103, user equipment compares characteristic information and presetting mark information, to determine comparison result.
In the present embodiment, after the characteristic information that access control equipment sends the target user to user equipment, user equipment is then
It can receive the characteristic information of the target user.Due to being that the information of user is stored in resident end, i.e. user in the application
In equipment, therefore after user equipment receives the characteristic information of target user, it is also necessary to will further receive target use
Matching is compared in the characteristic information at family and the identification information for the user being pre-stored, and the information of usually only the two is complete
When matching consistent, it can think that the characteristic information of the target user is stored in user equipment, so in user equipment
It can determine whether out a comparison result after comparing matching, and this comparison result can be used to indicate whether the target user can lead to
Cross gate inhibition.
104, user equipment sends comparison result to access control equipment.
In the present embodiment, target user wants then to have to access control equipment by gate inhibition and judge to show the target
Whether user can be by the gate inhibition, and this judgement is the characteristic information and preset mark according to user equipment according to target identities
Know what the comparison result sent after information comparison carried out.
105, access control equipment judges whether to open the door according to comparison result.
In the present embodiment, comparison result can be divided into two kinds.First, the characteristic information and presetting mark information of target user
Comparison matches;Second, the characteristic information of target user and presetting mark information do not compare.If access control equipment receives use
What family equipment was sent is the first comparison result, then can open the door to target user, target user is allowed to pass through gate inhibition;Conversely,
If what access control equipment received user equipment transmission is second of comparison result, will not open the door to target user, and
And the unmatched prompt of characteristic information can be made to target user.
In the embodiment of the present application, since the information of user has been pre-stored in user equipment, by a user device
The characteristic information of target user is compared with presetting mark information to determine comparison result, so that access control equipment is according to this
Comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, avoid
User information is arbitrarily tampered.
For above-mentioned described characteristic information, there are many different types, and the embodiment of the present application is only by taking voiceprint as an example
It is illustrated, please refers to Fig. 2 and understood, Fig. 2 is another implementation of the method for access control provided by the embodiments of the present application
It illustrates and is intended to.
As shown in Fig. 2, another embodiment of the method for access control provided by the embodiments of the present application may include:
201, access control equipment obtains the voiceprint of target user.
In the present embodiment, if target user selects voiceprint by the gate inhibition, target user can set against gate inhibition
Built-in Application on Voiceprint Recognition device issues the sound of oneself in standby, so that Application on Voiceprint Recognition device can recognize that the voiceprint, and issues
There are many modes of sound, such as: groaning a Duan Ge, says a word etc., specifically herein without limitation.In this way, access control equipment just may be used
To get the voiceprint of the target user.
202, access control equipment sends enabling request message to user equipment, which carries target user's
Voiceprint.
In the present embodiment, if access control equipment is just after target user issues oneself relevant sound on access control equipment
The available voiceprint to the target user, therefore, access control equipment can pass through this sending method of enabling request message
To user equipment send message, due to carry the voiceprint of target user in the enabling request message, with this come to
User equipment sends the voiceprint of the target user.
203, user equipment compares voiceprint with corresponding voiceprint, to determine comparison result.
In the present embodiment, after the voiceprint that access control equipment sends the target user to user equipment, user equipment is then
It can receive the voiceprint of the target user.Since the voiceprint of user is stored in resident end in advance, that is, use
In the equipment of family, therefore after user equipment receives the voiceprint of target user, it is also necessary to will further receive target
The voiceprint of user and the corresponding identification information being pre-stored, i.e., corresponding preset voiceprint are compared
Match, when the information exact matching of usually only the two is consistent, can think that the voiceprint of the target user is stored in use
In the equipment of family, so can determine whether out a comparison result after user equipment compares matching, and this comparison result can be used
To indicate whether the target user can pass through gate inhibition.
204, user equipment sends comparison result to access control equipment.
In the present embodiment, target user wants then to have to access control equipment by gate inhibition and judge to show the target
User whether can by the gate inhibition, and this judgement be according to user equipment according to the voiceprints of target identities with it is corresponding
What the comparison result that preset voiceprint is sent after comparing carried out.
205, access control equipment judges whether to open the door according to comparison result.
In the present embodiment, comparison result can be divided into two kinds.First, the voiceprint of target user is believed with corresponding vocal print
Breath is compared and is matched;Second, the voiceprint of target user is not compared with corresponding voiceprint.If access control equipment receives
What it is to user equipment transmission is the first comparison result, then can open the door to target user, target user is allowed to pass through gate inhibition;Instead
It, if access control equipment receive user equipment transmission be second of comparison result, will not open the door to target user,
And the unmatched prompt of voiceprint can be made to target user.
In the embodiment of the present application, since the voiceprint of user has been pre-stored in user equipment, by being set in user
The standby middle voiceprint by target user is compared with corresponding voiceprint to determine comparison result so that access control equipment according to
The comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, keep away
Exempt from user information to be arbitrarily tampered.
For access control equipment described in above-mentioned Fig. 1 and Fig. 2, which may include the first access control equipment and second
Access control equipment, usual first access control equipment can be the first building door access machine, and the second access control equipment can be the second building door
Taboo machine;First access control equipment and the second access control equipment storage be user enabling history information, such as: access record, into
Information, verification information etc. are recorded out;(peer-to-peer:P2P) can be communicated between the two by peer to peer network and is gone
A kind of technological means that centralization stores and to data encryption, i.e. the block chain technology enabling previous to user record information
It is encrypted, so that the above-mentioned described enabling history note stored in the first access control equipment either the second access control equipment
Record information is when being modified, due to either the second access control equipment failure of the first access control equipment can not inquire it is original
When record information of opening the door, after the enabling history information of these encryptions is decrypted, so that it may learn the body of target user
The initial data of part, with this to determine whether authorization of opening the door.
It is above-mentioned that mainly scheme provided by the embodiments of the present application is described from interactive angle.It can be understood that being
Realization above-mentioned function contains and executes the corresponding hardware configuration of each function and/or software module.Those skilled in the art answer
This is readily appreciated that, module described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm steps, the application energy
The combining form with hardware or hardware and computer software is reached to realize.Some function is driven actually with hardware or computer software
The mode of dynamic hardware executes, the specific application and design constraint depending on technical solution.Professional technician can be right
Each specific application is to use different methods to achieve the described function, but this realization is it is not considered that exceed the application
Range.
The embodiment of the present application can carry out the division of functional module according to above method example to device, for example, can be right
The each functional module of each function division is answered, two or more functions can also be integrated in a processing module.
Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs
Illustrate, is schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical to realize
When there may be another division manner.
Fig. 3 is one embodiment schematic diagram of user equipment provided by the embodiments of the present application.
As shown in figure 3, user equipment 30 provided by the embodiments of the present application includes receiving unit 301, comparing unit 302, hair
Send unit 303;
Receiving unit 301, the characteristic information of the target user for receiving access control equipment transmission, characteristic information is for identifying
The identity of target user;
Comparing unit 302, for comparing characteristic information and presetting mark information, to determine comparison result;
Transmission unit 303, for sending comparison result to access control equipment, so that access control equipment judges whether to use to target
It opens the door at family.
In the embodiment of the present application, since the characteristic information of user has been pre-stored in user equipment, by being set in user
The standby middle characteristic information by target user and presetting mark information compare to determine comparison result, so that access control equipment is according to this
Comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, avoid
User information is arbitrarily tampered.
Fig. 4 is one embodiment schematic diagram of access control equipment provided by the embodiments of the present application.
As shown in figure 4, access control equipment 40 provided by the embodiments of the present application includes acquiring unit 401, transmission unit 402, connects
Receive unit 403, judging unit 404;
Acquiring unit 401, for obtaining the characteristic information of target user, characteristic information is used for the body of marked targeted customer
Part;
Transmission unit 402, for sending characteristic information to user equipment;
Receiving unit 403, for receiving the comparison result of user equipment transmission, comparison result is user equipment according to feature
What information and presetting mark information compared;
Judging unit 404, for judging whether to open the door to target user according to comparison result.
In the embodiment of the present application, since the voiceprint of user has been pre-stored in user equipment, by being set in user
The standby middle voiceprint by target user is compared with corresponding voiceprint to determine comparison result so that access control equipment according to
The comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, keep away
Exempt from user information to be arbitrarily tampered.
Above from the angle of modular functionality entity in the embodiment of the present application user equipment and access control equipment carry out
Description, below from the angle of hardware handles in the embodiment of the present application user equipment and access control equipment be described.Fig. 5 is
One schematic diagram of hardware configuration of communication device in the embodiment of the present application.As shown in figure 5, the communication device may include:
The communication device includes at least one processor 501, communication line 507, memory 503 and at least one communication
Interface 504.
Processor 501 can be a general central processor (central processing unit, CPU), micro process
Device, application-specific integrated circuit (application-specific integrated circuit, server I C) or one
Or it is multiple for controlling the integrated circuit of application scheme program execution.
Communication line 507 may include an access, and information is transmitted between said modules.
Communication interface 504, using the device of any transceiver one kind, for other devices or communication, such as
Ethernet, wireless access network (radio access network, RAN), WLAN (wireless local area
Networks, WLAN) etc..
Memory 503 can be read-only memory (read-only memory, ROM) or can store static information and instruction
Other kinds of static memory, random access memory (random access memory, RAM) or letter can be stored
The other kinds of dynamic storage device of breath and instruction, memory, which can be, to be individually present, and communication line 507 and processor are passed through
It is connected.Memory can also be integrated with processor.
Wherein, memory 503 be used for store execution application scheme computer executed instructions, and by processor 501
Control executes.Processor 501 is for executing the computer executed instructions stored in memory 503, to realize that the application is above-mentioned
The method for the access control that embodiment provides.
Optionally, the computer executed instructions in the embodiment of the present application can also be referred to as application code, the application
Embodiment is not especially limited this.
In the concrete realization, as one embodiment, communication device may include multiple processors, such as the place in Fig. 5
Manage device 501 and processor 502.Each of these processors can be monokaryon (single-CPU) processor, can also
To be multicore (multi-CPU) processor.Here processor can refer to one or more devices, circuit, and/or be used for
Handle the processing core of data (such as computer program instructions).
In the concrete realization, as one embodiment, communication device can also include output device 505 and input unit
506.Output device 505 and processor 501 communicate, and can show information in many ways.Input unit 506 and processor
501 communications, can receive the input of user in many ways.For example, input unit 506 can be mouse, touch panel device or
Sensing device etc..
Above-mentioned communication device can be a fexible unit either dedicated unit.In the concrete realization, it communicates
Device can be desktop computer, portable computer, nas server, wireless terminal device, embedded equipment or have similar knot in Fig. 5
The device of structure.The embodiment of the present application does not limit the type of communication device.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.
It is apparent to those skilled in the art that for convenience and simplicity of description, the user of foregoing description
The specific work process of equipment, access control equipment and unit, can refer to corresponding processes in the foregoing method embodiment, herein not
It repeats again.
In several embodiments provided herein, it should be understood that disclosed user equipment, access control equipment and side
Method may be implemented in other ways.For example, the embodiment of user equipment described above, access control equipment is only to show
Meaning property, for example, the division of the unit, only a kind of logical function partition can have other division in actual implementation
Mode, such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored, or
It does not execute.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be by some
The indirect coupling or communication connection of interface, module or unit can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey
The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before
Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of method of access control characterized by comprising
User equipment receives the characteristic information for the target user that access control equipment is sent, and the characteristic information is for identifying the target
The identity of user;
The user equipment compares the characteristic information with presetting mark information, to determine comparison result;
The user equipment sends the comparison result to the access control equipment, so that the access control equipment judges whether out
Door.
2. the method according to claim 1, wherein user equipment receives the target user's that access control equipment is sent
Characteristic information, comprising:
The user equipment receives the enabling request message that the access control equipment is sent, and the enabling request message carries target
The characteristic information of user.
3. method according to claim 1 or 2, which is characterized in that the characteristic information includes finger print information, palmmprint letter
Breath, vena metacarpea information at least one of refer to venous information, iris information, voiceprint, ID card information and card information, institute
It states user equipment and compares the characteristic information with presetting mark information, comprising:
The user equipment compares at least one of described characteristic information with corresponding presetting mark information.
4. a kind of method of access control characterized by comprising
Access control equipment obtains the characteristic information of target user, and the characteristic information is used to identify the identity of the target user;
The access control equipment sends the characteristic information to user equipment;
The access control equipment receives the comparison result that the user equipment is sent, the comparison result be the user equipment according to
What the characteristic information and presetting mark information compared;
The access control equipment judges whether to open the door according to the comparison result.
5. according to the method described in claim 4, it is characterized in that, the access control equipment may include the first access control equipment and
Two access control equipments, by block chain technology to the target user's between first access control equipment and second access control equipment
Enabling history information is encrypted, so that the enabling in first access control equipment or second access control equipment
History information inquires the identity initial data of the target user when being modified.
6. according to the method described in claim 4, it is characterized in that, the access control equipment sends the feature letter to user equipment
Breath, comprising:
The access control equipment sends enabling request message to the user equipment, and the enabling request message carries target user
Characteristic information.
7. a kind of user equipment characterized by comprising
Receiving unit, the characteristic information of the target user for receiving access control equipment transmission, the characteristic information is for identifying institute
State the identity of target user;
Comparing unit, for comparing the characteristic information with presetting mark information, to determine comparison result;
Transmission unit, for sending the comparison result to the access control equipment so that the access control equipment judge whether to
The target user opens the door.
8. a kind of access control equipment characterized by comprising
Acquiring unit, for obtaining the characteristic information of target user, the characteristic information is used to identify the body of the target user
Part;
Transmission unit, for sending the characteristic information to user equipment;
Receiving unit, the comparison result sent for receiving the user equipment, the comparison result is the user equipment root
It is compared according to the characteristic information and presetting mark information;
Judging unit, for judging whether to open the door to the target user according to the comparison result.
9. a kind of computer equipment, which is characterized in that the computer equipment includes: input/output (I/O) interface, processor
And memory,
Program instruction is stored in the memory;
The processor is executed as described in any in claim 1-3 or 4-6 for executing the program instruction stored in memory
Method.
10. a kind of computer readable storage medium, including instruction, which is characterized in that when described instruction is transported on a computing device
When row, so that the computer equipment executes the method as described in any one of claim 1-3 or 4-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811604939.3A CN109712288A (en) | 2018-12-26 | 2018-12-26 | A kind of method of access control, user equipment and access control equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811604939.3A CN109712288A (en) | 2018-12-26 | 2018-12-26 | A kind of method of access control, user equipment and access control equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109712288A true CN109712288A (en) | 2019-05-03 |
Family
ID=66258257
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811604939.3A Pending CN109712288A (en) | 2018-12-26 | 2018-12-26 | A kind of method of access control, user equipment and access control equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109712288A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310401A (en) * | 2019-06-28 | 2019-10-08 | 北京海益同展信息科技有限公司 | Control method and device, control system and readable storage medium storing program for executing applied to gate |
CN111212188A (en) * | 2020-01-08 | 2020-05-29 | 广东小天才科技有限公司 | User dynamic monitoring method and device and telephone watch |
CN111415442A (en) * | 2020-03-16 | 2020-07-14 | 恒玄科技(上海)股份有限公司 | Access control method, electronic device and storage medium |
CN111951450A (en) * | 2020-08-20 | 2020-11-17 | 北京云中融信网络科技有限公司 | Access control method and device of intelligent security door, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105261089A (en) * | 2015-09-15 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Intelligent antitheft method, apparatus and system |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN106683250A (en) * | 2017-01-03 | 2017-05-17 | 沈阳速站科技有限责任公司 | Entrance guard device and system |
CN108694765A (en) * | 2018-05-11 | 2018-10-23 | 京东方科技集团股份有限公司 | A kind of visitor's recognition methods and device, access control system |
CN108734830A (en) * | 2018-04-24 | 2018-11-02 | 深圳市商汤科技有限公司 | Entrance guard controlling method and system |
CN108830994A (en) * | 2018-06-23 | 2018-11-16 | 辽宁工程技术大学 | A kind of high security hotel check-in system based on cloud commercial affairs block chain |
-
2018
- 2018-12-26 CN CN201811604939.3A patent/CN109712288A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105261089A (en) * | 2015-09-15 | 2016-01-20 | 上海斐讯数据通信技术有限公司 | Intelligent antitheft method, apparatus and system |
CN105610578A (en) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | Block chain information archiving and privacy protection method |
CN106683250A (en) * | 2017-01-03 | 2017-05-17 | 沈阳速站科技有限责任公司 | Entrance guard device and system |
CN108734830A (en) * | 2018-04-24 | 2018-11-02 | 深圳市商汤科技有限公司 | Entrance guard controlling method and system |
CN108694765A (en) * | 2018-05-11 | 2018-10-23 | 京东方科技集团股份有限公司 | A kind of visitor's recognition methods and device, access control system |
CN108830994A (en) * | 2018-06-23 | 2018-11-16 | 辽宁工程技术大学 | A kind of high security hotel check-in system based on cloud commercial affairs block chain |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310401A (en) * | 2019-06-28 | 2019-10-08 | 北京海益同展信息科技有限公司 | Control method and device, control system and readable storage medium storing program for executing applied to gate |
CN111212188A (en) * | 2020-01-08 | 2020-05-29 | 广东小天才科技有限公司 | User dynamic monitoring method and device and telephone watch |
CN111212188B (en) * | 2020-01-08 | 2022-02-15 | 广东小天才科技有限公司 | User dynamic monitoring method and device and telephone watch |
CN111415442A (en) * | 2020-03-16 | 2020-07-14 | 恒玄科技(上海)股份有限公司 | Access control method, electronic device and storage medium |
CN111951450A (en) * | 2020-08-20 | 2020-11-17 | 北京云中融信网络科技有限公司 | Access control method and device of intelligent security door, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109712288A (en) | A kind of method of access control, user equipment and access control equipment | |
CN105321240B (en) | The control method and device and Intelligent door control system of intelligent door lock | |
EP2515497B1 (en) | Method for performing authentication in a distributed authentication system and authentication system | |
AU2012261635B2 (en) | Methods and Systems for Increasing the Security of Network- Based Transactions | |
EP3537324A1 (en) | Technologies for secure storage and use of biometric authentication information | |
US20130205373A1 (en) | Adapting authentication flow based on workflow events | |
US10885525B1 (en) | Method and system for employing biometric data to authorize cloud-based transactions | |
EP3655874B1 (en) | Method and electronic device for authenticating a user | |
US20130179944A1 (en) | Personal area network (PAN) ID-authenticating systems, apparatus, method | |
CN105701692A (en) | Electronic transaction writing-off method, electronic transaction writing-off client, electronic transaction writing-off server and electronic transaction writing-off system | |
CN106650372B (en) | The activating method and device of administrator right | |
KR101941966B1 (en) | Apparatus, method and program for access control based on pattern recognition | |
CN105868610A (en) | Method and system for realizing user authentication through biological characteristic information | |
CN109598232A (en) | A kind of integrated bio identification technology control method and its device | |
Xue et al. | An access control system for intelligent buildings | |
JP7323552B2 (en) | robot identification manager | |
CN108282768A (en) | Bluetooth equipment shares control and requesting method and electronic equipment | |
Chen et al. | An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network | |
Opoku | An automated biometric attendance management system with dual authentication mechanism based on Bluetooth and NFC technologies | |
CN114581091A (en) | Identity authentication method and device, computer equipment and storage medium | |
EP3304391B1 (en) | Controlling access to resource functions at a control point of the resource via a user device | |
CN107070864A (en) | Safe verification method and system based on fingerprint | |
US20130166902A1 (en) | Simplified smartcard personalization method, and corresponding device | |
CN112334897A (en) | Method and electronic equipment for authenticating user | |
CN106254226A (en) | A kind of information synchronization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 1301, No.132, Fengqi Road, phase III, software park, Xiamen City, Fujian Province Applicant after: Xiamen Entropy Technology Co., Ltd Address before: 361000, Xiamen three software park, Fujian Province, 8 North Street, room 2001 Applicant before: XIAMEN ZKTECO BIOMETRIC IDENTIFICATION TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190503 |
|
RJ01 | Rejection of invention patent application after publication |