CN109712288A - A kind of method of access control, user equipment and access control equipment - Google Patents

A kind of method of access control, user equipment and access control equipment Download PDF

Info

Publication number
CN109712288A
CN109712288A CN201811604939.3A CN201811604939A CN109712288A CN 109712288 A CN109712288 A CN 109712288A CN 201811604939 A CN201811604939 A CN 201811604939A CN 109712288 A CN109712288 A CN 109712288A
Authority
CN
China
Prior art keywords
access control
user
information
equipment
control equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811604939.3A
Other languages
Chinese (zh)
Inventor
李仙平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Central Intelligent Information Technology Co Ltd
Original Assignee
Xiamen Central Intelligent Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Central Intelligent Information Technology Co Ltd filed Critical Xiamen Central Intelligent Information Technology Co Ltd
Priority to CN201811604939.3A priority Critical patent/CN109712288A/en
Publication of CN109712288A publication Critical patent/CN109712288A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the present application discloses a kind of method of access control, this method comprises: user equipment receives the characteristic information for the target user that access control equipment is sent, characteristic information is used for the identity of marked targeted customer;User equipment compares characteristic information and presetting mark information, to determine comparison result;User equipment sends comparison result to access control equipment, so that access control equipment judges whether to open the door.The embodiment of the present application also provides corresponding user equipment and access control equipment.Technical scheme can provide security guarantee to user information, and user information is avoided arbitrarily to be tampered.

Description

A kind of method of access control, user equipment and access control equipment
Technical field
This application involves fields of communication technology, and in particular to a kind of method of access control, user equipment and gate inhibition set It is standby.
Background technique
With the continuous development of electronic technology, applicating technology product is also more and more extensive.Present many cells or building are all Management to community user is realized using access control system, ensure that definitely safety.
The prior art is that the data such as user information are all first stored in property center in advance, if user want by gate inhibition into Enter cell or building, it is necessary to call the comparing in property central server to be authorized by access control system.
However, since user information is stored in property central server, so that the permission at property center too greatly can User information can arbitrarily be changed, user information is caused to cannot get reliable security guarantee.
Summary of the invention
The embodiment of the present application provides method, user equipment and the access control equipment of a kind of access control, can be to user Information provides security guarantee, and user information is avoided arbitrarily to be tampered.
In view of this, the embodiment of the present application provides following scheme:
The application first aspect provides a kind of method of access control, and this method may include: that user equipment receives gate inhibition The characteristic information for the target user that equipment is sent, characteristic information are used for the identity of marked targeted customer;User equipment believes feature Breath is compared with presetting mark information, to determine comparison result;User equipment sends comparison result to access control equipment, so that gate inhibition Equipment judges whether to open the door.
Optionally, with reference to first aspect, in the first possible implementation, user equipment receives access control equipment and sends Target user characteristic information, may include: user equipment receive access control equipment send enabling request message, open the door request Message carries the characteristic information of target user.
Optionally, with reference to first aspect, first aspect the first possible implementation, second of possible realization side In formula, characteristic information may include finger print information, palm print information, vena metacarpea information, refer to venous information, iris information, vocal print letter At least one of breath, ID card information and card information, user equipment compares characteristic information and presetting mark information, can wrap Include: user equipment compares at least one of characteristic information with corresponding presetting mark information.
The application second aspect provides a kind of method of access control, and this method may include: that access control equipment obtains target The characteristic information of user, characteristic information are used for the identity of marked targeted customer;Access control equipment sends characteristic information to user equipment; Access control equipment receives the comparison result that user equipment is sent, and comparison result is that user equipment is believed according to characteristic information and preset identifications What breath compared;Access control equipment judges whether to open the door according to comparison result.
Optionally, in conjunction with second aspect, in the first possible implementation, access control equipment may include the first gate inhibition Equipment and the second access control equipment pass through enabling of the block chain technology to target user between the first access control equipment and the second access control equipment History information is encrypted, so that the enabling history information in the first access control equipment or the second access control equipment is repaired The identity initial data of target user is inquired when changing.
Optionally, in conjunction with second aspect, in the second possible implementation, access control equipment sends special to user equipment Reference breath may include: access control equipment to user equipment transmission enabling request message, and enabling request message carries target user Characteristic information.
The application third aspect provides a kind of user equipment, which may include: receiving unit, for receiving door Prohibit the characteristic information for the target user that equipment is sent, characteristic information is used for the identity of marked targeted customer;Comparing unit, being used for will Characteristic information is compared with presetting mark information, to determine comparison result;Transmission unit compares knot for sending to access control equipment Fruit, so that access control equipment judges whether to open the door to target user.
The application fourth aspect provides a kind of access control equipment, which may include: acquiring unit, for obtaining mesh The characteristic information of user is marked, characteristic information is used for the identity of marked targeted customer;Transmission unit, it is special for being sent to user equipment Reference breath;Receiving unit, the comparison result sent for receiving the user equipment, comparison result is user equipment according to feature What information and presetting mark information compared;Judging unit, for judging whether to open the door to target user according to comparison result.
The 5th aspect of the application provides a kind of computer equipment, which may include: processor and memory; The memory is for storing program instruction, and when computer equipment operation, which executes the journey of memory storage Sequence instruction, so that the computer equipment is executed such as above-mentioned first aspect, first aspect any one possible implementation or second The method of the access control of the possible implementation of any one in aspect, second aspect.
The 6th aspect of the application provides a kind of computer readable storage medium, is stored in the computer readable storage medium Instruction, when run on a computer, allowing computer to execute above-mentioned first aspect, first aspect, any one may The method of the access control of any one possible implementation in implementation or second aspect, second aspect.
Wherein, technology brought by any implementation in terms of the third aspect, fourth aspect, the 5th, in the 6th aspect Effect can be found in first aspect, technical effect brought by different implementations in second aspect, and details are not described herein again.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
Since the information of user has been pre-stored in user equipment, by a user device by the feature of target user Information is compared to determine comparison result with presetting mark information, so that access control equipment judges whether according to the comparison result Enabling authorization is carried out to target user, effectively security guarantee can be provided to user information, user information is avoided arbitrarily to be usurped Change.
Detailed description of the invention
Fig. 1 is one embodiment schematic diagram of the method for access control provided by the embodiments of the present application;
Fig. 2 is another embodiment schematic diagram of the method for access control provided by the embodiments of the present application;
Fig. 3 is one embodiment schematic diagram of user equipment provided by the embodiments of the present application;
Fig. 4 is one embodiment schematic diagram of access control equipment provided by the embodiments of the present application;
Fig. 5 is one schematic diagram of hardware configuration of the communication device in the embodiment of the present application.
Specific embodiment
The embodiment of the present application provides method, user equipment and the access control equipment of a kind of access control, can be to user Information provides security guarantee, and user information is avoided arbitrarily to be tampered.
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that the described embodiments are only a part but not all of the embodiments of the present application.Based on this Embodiment in application, every other reality obtained by those of ordinary skill in the art without making creative efforts Example is applied, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so as to embodiments herein described herein such as can in addition to The sequence other than those of diagram or description is implemented herein.In addition, term " includes " and " having " and their any change Shape, it is intended that cover and non-exclusive include.Those of ordinary skill in the art it is found that with figure Computational frame differentiation and newly answer With the appearance of scene, technical solution provided in an embodiment of the present invention is equally applicable for similar technical problem.
Fig. 1 is one embodiment schematic diagram of the method for access control provided by the embodiments of the present application.
As shown in Figure 1, one embodiment of the method for access control provided by the embodiments of the present application may include:
101, access control equipment obtains the characteristic information of target user.
In the present embodiment, access control equipment may include door access machine, building door access machine either guard for entrance gate machine etc. for being The equipment for preventing the stranger from entering cell or company and being arranged.Fingerprint recognition is usually built-in in these access control equipments Device, video camera, Application on Voiceprint Recognition device etc..Therefore, if there is target user to want through the gate inhibition at this time, target user can be in door Prohibit any selection one such as Fingerprint Identification Unit, video camera or Application on Voiceprint Recognition device built-in in equipment and inputs the relevant spy of these devices Reference breath, such as: selection Fingerprint Identification Unit, then target user can press the finger print information of oneself on Fingerprint Identification Unit.In this way, The available characteristic information to the target user of access control equipment.
It should be noted that characteristic information may include the information of a variety of identity for marked targeted customer.In addition to upper It states outside described finger print information, can also include palm print information, vena metacarpea information, refer to venous information, iris information, vocal print letter These information on target user's human body such as breath, these information others be difficult to get;In addition, it can include target is used ID card information, the card information at family etc. these can be easy the information got.In practical applications, characteristic information can also wrap It includes and is more similar to above-mentioned described information, specifically herein without limitation.
102, access control equipment sends characteristic information to user equipment.
In the present embodiment, if gate inhibition sets after target user inputs the relevant characteristic information of oneself on access control equipment The standby characteristic information that can get the target user, therefore, access control equipment can send the target user to user equipment Characteristic information.
103, user equipment compares characteristic information and presetting mark information, to determine comparison result.
In the present embodiment, after the characteristic information that access control equipment sends the target user to user equipment, user equipment is then It can receive the characteristic information of the target user.Due to being that the information of user is stored in resident end, i.e. user in the application In equipment, therefore after user equipment receives the characteristic information of target user, it is also necessary to will further receive target use Matching is compared in the characteristic information at family and the identification information for the user being pre-stored, and the information of usually only the two is complete When matching consistent, it can think that the characteristic information of the target user is stored in user equipment, so in user equipment It can determine whether out a comparison result after comparing matching, and this comparison result can be used to indicate whether the target user can lead to Cross gate inhibition.
104, user equipment sends comparison result to access control equipment.
In the present embodiment, target user wants then to have to access control equipment by gate inhibition and judge to show the target Whether user can be by the gate inhibition, and this judgement is the characteristic information and preset mark according to user equipment according to target identities Know what the comparison result sent after information comparison carried out.
105, access control equipment judges whether to open the door according to comparison result.
In the present embodiment, comparison result can be divided into two kinds.First, the characteristic information and presetting mark information of target user Comparison matches;Second, the characteristic information of target user and presetting mark information do not compare.If access control equipment receives use What family equipment was sent is the first comparison result, then can open the door to target user, target user is allowed to pass through gate inhibition;Conversely, If what access control equipment received user equipment transmission is second of comparison result, will not open the door to target user, and And the unmatched prompt of characteristic information can be made to target user.
In the embodiment of the present application, since the information of user has been pre-stored in user equipment, by a user device The characteristic information of target user is compared with presetting mark information to determine comparison result, so that access control equipment is according to this Comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, avoid User information is arbitrarily tampered.
For above-mentioned described characteristic information, there are many different types, and the embodiment of the present application is only by taking voiceprint as an example It is illustrated, please refers to Fig. 2 and understood, Fig. 2 is another implementation of the method for access control provided by the embodiments of the present application It illustrates and is intended to.
As shown in Fig. 2, another embodiment of the method for access control provided by the embodiments of the present application may include:
201, access control equipment obtains the voiceprint of target user.
In the present embodiment, if target user selects voiceprint by the gate inhibition, target user can set against gate inhibition Built-in Application on Voiceprint Recognition device issues the sound of oneself in standby, so that Application on Voiceprint Recognition device can recognize that the voiceprint, and issues There are many modes of sound, such as: groaning a Duan Ge, says a word etc., specifically herein without limitation.In this way, access control equipment just may be used To get the voiceprint of the target user.
202, access control equipment sends enabling request message to user equipment, which carries target user's Voiceprint.
In the present embodiment, if access control equipment is just after target user issues oneself relevant sound on access control equipment The available voiceprint to the target user, therefore, access control equipment can pass through this sending method of enabling request message To user equipment send message, due to carry the voiceprint of target user in the enabling request message, with this come to User equipment sends the voiceprint of the target user.
203, user equipment compares voiceprint with corresponding voiceprint, to determine comparison result.
In the present embodiment, after the voiceprint that access control equipment sends the target user to user equipment, user equipment is then It can receive the voiceprint of the target user.Since the voiceprint of user is stored in resident end in advance, that is, use In the equipment of family, therefore after user equipment receives the voiceprint of target user, it is also necessary to will further receive target The voiceprint of user and the corresponding identification information being pre-stored, i.e., corresponding preset voiceprint are compared Match, when the information exact matching of usually only the two is consistent, can think that the voiceprint of the target user is stored in use In the equipment of family, so can determine whether out a comparison result after user equipment compares matching, and this comparison result can be used To indicate whether the target user can pass through gate inhibition.
204, user equipment sends comparison result to access control equipment.
In the present embodiment, target user wants then to have to access control equipment by gate inhibition and judge to show the target User whether can by the gate inhibition, and this judgement be according to user equipment according to the voiceprints of target identities with it is corresponding What the comparison result that preset voiceprint is sent after comparing carried out.
205, access control equipment judges whether to open the door according to comparison result.
In the present embodiment, comparison result can be divided into two kinds.First, the voiceprint of target user is believed with corresponding vocal print Breath is compared and is matched;Second, the voiceprint of target user is not compared with corresponding voiceprint.If access control equipment receives What it is to user equipment transmission is the first comparison result, then can open the door to target user, target user is allowed to pass through gate inhibition;Instead It, if access control equipment receive user equipment transmission be second of comparison result, will not open the door to target user, And the unmatched prompt of voiceprint can be made to target user.
In the embodiment of the present application, since the voiceprint of user has been pre-stored in user equipment, by being set in user The standby middle voiceprint by target user is compared with corresponding voiceprint to determine comparison result so that access control equipment according to The comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, keep away Exempt from user information to be arbitrarily tampered.
For access control equipment described in above-mentioned Fig. 1 and Fig. 2, which may include the first access control equipment and second Access control equipment, usual first access control equipment can be the first building door access machine, and the second access control equipment can be the second building door Taboo machine;First access control equipment and the second access control equipment storage be user enabling history information, such as: access record, into Information, verification information etc. are recorded out;(peer-to-peer:P2P) can be communicated between the two by peer to peer network and is gone A kind of technological means that centralization stores and to data encryption, i.e. the block chain technology enabling previous to user record information It is encrypted, so that the above-mentioned described enabling history note stored in the first access control equipment either the second access control equipment Record information is when being modified, due to either the second access control equipment failure of the first access control equipment can not inquire it is original When record information of opening the door, after the enabling history information of these encryptions is decrypted, so that it may learn the body of target user The initial data of part, with this to determine whether authorization of opening the door.
It is above-mentioned that mainly scheme provided by the embodiments of the present application is described from interactive angle.It can be understood that being Realization above-mentioned function contains and executes the corresponding hardware configuration of each function and/or software module.Those skilled in the art answer This is readily appreciated that, module described in conjunction with the examples disclosed in the embodiments of the present disclosure and algorithm steps, the application energy The combining form with hardware or hardware and computer software is reached to realize.Some function is driven actually with hardware or computer software The mode of dynamic hardware executes, the specific application and design constraint depending on technical solution.Professional technician can be right Each specific application is to use different methods to achieve the described function, but this realization is it is not considered that exceed the application Range.
The embodiment of the present application can carry out the division of functional module according to above method example to device, for example, can be right The each functional module of each function division is answered, two or more functions can also be integrated in a processing module. Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs Illustrate, is schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical to realize When there may be another division manner.
Fig. 3 is one embodiment schematic diagram of user equipment provided by the embodiments of the present application.
As shown in figure 3, user equipment 30 provided by the embodiments of the present application includes receiving unit 301, comparing unit 302, hair Send unit 303;
Receiving unit 301, the characteristic information of the target user for receiving access control equipment transmission, characteristic information is for identifying The identity of target user;
Comparing unit 302, for comparing characteristic information and presetting mark information, to determine comparison result;
Transmission unit 303, for sending comparison result to access control equipment, so that access control equipment judges whether to use to target It opens the door at family.
In the embodiment of the present application, since the characteristic information of user has been pre-stored in user equipment, by being set in user The standby middle characteristic information by target user and presetting mark information compare to determine comparison result, so that access control equipment is according to this Comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, avoid User information is arbitrarily tampered.
Fig. 4 is one embodiment schematic diagram of access control equipment provided by the embodiments of the present application.
As shown in figure 4, access control equipment 40 provided by the embodiments of the present application includes acquiring unit 401, transmission unit 402, connects Receive unit 403, judging unit 404;
Acquiring unit 401, for obtaining the characteristic information of target user, characteristic information is used for the body of marked targeted customer Part;
Transmission unit 402, for sending characteristic information to user equipment;
Receiving unit 403, for receiving the comparison result of user equipment transmission, comparison result is user equipment according to feature What information and presetting mark information compared;
Judging unit 404, for judging whether to open the door to target user according to comparison result.
In the embodiment of the present application, since the voiceprint of user has been pre-stored in user equipment, by being set in user The standby middle voiceprint by target user is compared with corresponding voiceprint to determine comparison result so that access control equipment according to The comparison result judges whether to carry out enabling authorization to target user, effectively can provide security guarantee to user information, keep away Exempt from user information to be arbitrarily tampered.
Above from the angle of modular functionality entity in the embodiment of the present application user equipment and access control equipment carry out Description, below from the angle of hardware handles in the embodiment of the present application user equipment and access control equipment be described.Fig. 5 is One schematic diagram of hardware configuration of communication device in the embodiment of the present application.As shown in figure 5, the communication device may include:
The communication device includes at least one processor 501, communication line 507, memory 503 and at least one communication Interface 504.
Processor 501 can be a general central processor (central processing unit, CPU), micro process Device, application-specific integrated circuit (application-specific integrated circuit, server I C) or one Or it is multiple for controlling the integrated circuit of application scheme program execution.
Communication line 507 may include an access, and information is transmitted between said modules.
Communication interface 504, using the device of any transceiver one kind, for other devices or communication, such as Ethernet, wireless access network (radio access network, RAN), WLAN (wireless local area Networks, WLAN) etc..
Memory 503 can be read-only memory (read-only memory, ROM) or can store static information and instruction Other kinds of static memory, random access memory (random access memory, RAM) or letter can be stored The other kinds of dynamic storage device of breath and instruction, memory, which can be, to be individually present, and communication line 507 and processor are passed through It is connected.Memory can also be integrated with processor.
Wherein, memory 503 be used for store execution application scheme computer executed instructions, and by processor 501 Control executes.Processor 501 is for executing the computer executed instructions stored in memory 503, to realize that the application is above-mentioned The method for the access control that embodiment provides.
Optionally, the computer executed instructions in the embodiment of the present application can also be referred to as application code, the application Embodiment is not especially limited this.
In the concrete realization, as one embodiment, communication device may include multiple processors, such as the place in Fig. 5 Manage device 501 and processor 502.Each of these processors can be monokaryon (single-CPU) processor, can also To be multicore (multi-CPU) processor.Here processor can refer to one or more devices, circuit, and/or be used for Handle the processing core of data (such as computer program instructions).
In the concrete realization, as one embodiment, communication device can also include output device 505 and input unit 506.Output device 505 and processor 501 communicate, and can show information in many ways.Input unit 506 and processor 501 communications, can receive the input of user in many ways.For example, input unit 506 can be mouse, touch panel device or Sensing device etc..
Above-mentioned communication device can be a fexible unit either dedicated unit.In the concrete realization, it communicates Device can be desktop computer, portable computer, nas server, wireless terminal device, embedded equipment or have similar knot in Fig. 5 The device of structure.The embodiment of the present application does not limit the type of communication device.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real It is existing.When implemented in software, it can entirely or partly realize in the form of a computer program product.
It is apparent to those skilled in the art that for convenience and simplicity of description, the user of foregoing description The specific work process of equipment, access control equipment and unit, can refer to corresponding processes in the foregoing method embodiment, herein not It repeats again.
In several embodiments provided herein, it should be understood that disclosed user equipment, access control equipment and side Method may be implemented in other ways.For example, the embodiment of user equipment described above, access control equipment is only to show Meaning property, for example, the division of the unit, only a kind of logical function partition can have other division in actual implementation Mode, such as multiple units or components can be combined or can be integrated into another system, or some features can be ignored, or It does not execute.Another point, shown or discussed mutual coupling, direct-coupling or communication connection can be by some The indirect coupling or communication connection of interface, module or unit can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic or disk etc. are various can store journey The medium of sequence code.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of method of access control characterized by comprising
User equipment receives the characteristic information for the target user that access control equipment is sent, and the characteristic information is for identifying the target The identity of user;
The user equipment compares the characteristic information with presetting mark information, to determine comparison result;
The user equipment sends the comparison result to the access control equipment, so that the access control equipment judges whether out Door.
2. the method according to claim 1, wherein user equipment receives the target user's that access control equipment is sent Characteristic information, comprising:
The user equipment receives the enabling request message that the access control equipment is sent, and the enabling request message carries target The characteristic information of user.
3. method according to claim 1 or 2, which is characterized in that the characteristic information includes finger print information, palmmprint letter Breath, vena metacarpea information at least one of refer to venous information, iris information, voiceprint, ID card information and card information, institute It states user equipment and compares the characteristic information with presetting mark information, comprising:
The user equipment compares at least one of described characteristic information with corresponding presetting mark information.
4. a kind of method of access control characterized by comprising
Access control equipment obtains the characteristic information of target user, and the characteristic information is used to identify the identity of the target user;
The access control equipment sends the characteristic information to user equipment;
The access control equipment receives the comparison result that the user equipment is sent, the comparison result be the user equipment according to What the characteristic information and presetting mark information compared;
The access control equipment judges whether to open the door according to the comparison result.
5. according to the method described in claim 4, it is characterized in that, the access control equipment may include the first access control equipment and Two access control equipments, by block chain technology to the target user's between first access control equipment and second access control equipment Enabling history information is encrypted, so that the enabling in first access control equipment or second access control equipment History information inquires the identity initial data of the target user when being modified.
6. according to the method described in claim 4, it is characterized in that, the access control equipment sends the feature letter to user equipment Breath, comprising:
The access control equipment sends enabling request message to the user equipment, and the enabling request message carries target user Characteristic information.
7. a kind of user equipment characterized by comprising
Receiving unit, the characteristic information of the target user for receiving access control equipment transmission, the characteristic information is for identifying institute State the identity of target user;
Comparing unit, for comparing the characteristic information with presetting mark information, to determine comparison result;
Transmission unit, for sending the comparison result to the access control equipment so that the access control equipment judge whether to The target user opens the door.
8. a kind of access control equipment characterized by comprising
Acquiring unit, for obtaining the characteristic information of target user, the characteristic information is used to identify the body of the target user Part;
Transmission unit, for sending the characteristic information to user equipment;
Receiving unit, the comparison result sent for receiving the user equipment, the comparison result is the user equipment root It is compared according to the characteristic information and presetting mark information;
Judging unit, for judging whether to open the door to the target user according to the comparison result.
9. a kind of computer equipment, which is characterized in that the computer equipment includes: input/output (I/O) interface, processor And memory,
Program instruction is stored in the memory;
The processor is executed as described in any in claim 1-3 or 4-6 for executing the program instruction stored in memory Method.
10. a kind of computer readable storage medium, including instruction, which is characterized in that when described instruction is transported on a computing device When row, so that the computer equipment executes the method as described in any one of claim 1-3 or 4-6.
CN201811604939.3A 2018-12-26 2018-12-26 A kind of method of access control, user equipment and access control equipment Pending CN109712288A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811604939.3A CN109712288A (en) 2018-12-26 2018-12-26 A kind of method of access control, user equipment and access control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811604939.3A CN109712288A (en) 2018-12-26 2018-12-26 A kind of method of access control, user equipment and access control equipment

Publications (1)

Publication Number Publication Date
CN109712288A true CN109712288A (en) 2019-05-03

Family

ID=66258257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811604939.3A Pending CN109712288A (en) 2018-12-26 2018-12-26 A kind of method of access control, user equipment and access control equipment

Country Status (1)

Country Link
CN (1) CN109712288A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310401A (en) * 2019-06-28 2019-10-08 北京海益同展信息科技有限公司 Control method and device, control system and readable storage medium storing program for executing applied to gate
CN111212188A (en) * 2020-01-08 2020-05-29 广东小天才科技有限公司 User dynamic monitoring method and device and telephone watch
CN111415442A (en) * 2020-03-16 2020-07-14 恒玄科技(上海)股份有限公司 Access control method, electronic device and storage medium
CN111951450A (en) * 2020-08-20 2020-11-17 北京云中融信网络科技有限公司 Access control method and device of intelligent security door, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105261089A (en) * 2015-09-15 2016-01-20 上海斐讯数据通信技术有限公司 Intelligent antitheft method, apparatus and system
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN106683250A (en) * 2017-01-03 2017-05-17 沈阳速站科技有限责任公司 Entrance guard device and system
CN108694765A (en) * 2018-05-11 2018-10-23 京东方科技集团股份有限公司 A kind of visitor's recognition methods and device, access control system
CN108734830A (en) * 2018-04-24 2018-11-02 深圳市商汤科技有限公司 Entrance guard controlling method and system
CN108830994A (en) * 2018-06-23 2018-11-16 辽宁工程技术大学 A kind of high security hotel check-in system based on cloud commercial affairs block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105261089A (en) * 2015-09-15 2016-01-20 上海斐讯数据通信技术有限公司 Intelligent antitheft method, apparatus and system
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN106683250A (en) * 2017-01-03 2017-05-17 沈阳速站科技有限责任公司 Entrance guard device and system
CN108734830A (en) * 2018-04-24 2018-11-02 深圳市商汤科技有限公司 Entrance guard controlling method and system
CN108694765A (en) * 2018-05-11 2018-10-23 京东方科技集团股份有限公司 A kind of visitor's recognition methods and device, access control system
CN108830994A (en) * 2018-06-23 2018-11-16 辽宁工程技术大学 A kind of high security hotel check-in system based on cloud commercial affairs block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310401A (en) * 2019-06-28 2019-10-08 北京海益同展信息科技有限公司 Control method and device, control system and readable storage medium storing program for executing applied to gate
CN111212188A (en) * 2020-01-08 2020-05-29 广东小天才科技有限公司 User dynamic monitoring method and device and telephone watch
CN111212188B (en) * 2020-01-08 2022-02-15 广东小天才科技有限公司 User dynamic monitoring method and device and telephone watch
CN111415442A (en) * 2020-03-16 2020-07-14 恒玄科技(上海)股份有限公司 Access control method, electronic device and storage medium
CN111951450A (en) * 2020-08-20 2020-11-17 北京云中融信网络科技有限公司 Access control method and device of intelligent security door, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109712288A (en) A kind of method of access control, user equipment and access control equipment
CN105321240B (en) The control method and device and Intelligent door control system of intelligent door lock
EP2515497B1 (en) Method for performing authentication in a distributed authentication system and authentication system
AU2012261635B2 (en) Methods and Systems for Increasing the Security of Network- Based Transactions
EP3537324A1 (en) Technologies for secure storage and use of biometric authentication information
US20130205373A1 (en) Adapting authentication flow based on workflow events
US10885525B1 (en) Method and system for employing biometric data to authorize cloud-based transactions
EP3655874B1 (en) Method and electronic device for authenticating a user
US20130179944A1 (en) Personal area network (PAN) ID-authenticating systems, apparatus, method
CN105701692A (en) Electronic transaction writing-off method, electronic transaction writing-off client, electronic transaction writing-off server and electronic transaction writing-off system
CN106650372B (en) The activating method and device of administrator right
KR101941966B1 (en) Apparatus, method and program for access control based on pattern recognition
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
CN109598232A (en) A kind of integrated bio identification technology control method and its device
Xue et al. An access control system for intelligent buildings
JP7323552B2 (en) robot identification manager
CN108282768A (en) Bluetooth equipment shares control and requesting method and electronic equipment
Chen et al. An online cognitive authentication and trust evaluation application programming interface for cognitive security gateway based on distributed massive Internet of Things network
Opoku An automated biometric attendance management system with dual authentication mechanism based on Bluetooth and NFC technologies
CN114581091A (en) Identity authentication method and device, computer equipment and storage medium
EP3304391B1 (en) Controlling access to resource functions at a control point of the resource via a user device
CN107070864A (en) Safe verification method and system based on fingerprint
US20130166902A1 (en) Simplified smartcard personalization method, and corresponding device
CN112334897A (en) Method and electronic equipment for authenticating user
CN106254226A (en) A kind of information synchronization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 1301, No.132, Fengqi Road, phase III, software park, Xiamen City, Fujian Province

Applicant after: Xiamen Entropy Technology Co., Ltd

Address before: 361000, Xiamen three software park, Fujian Province, 8 North Street, room 2001

Applicant before: XIAMEN ZKTECO BIOMETRIC IDENTIFICATION TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190503

RJ01 Rejection of invention patent application after publication