CN109993859A - The method and system of access control is realized by mobile device - Google Patents
The method and system of access control is realized by mobile device Download PDFInfo
- Publication number
- CN109993859A CN109993859A CN201810413387.1A CN201810413387A CN109993859A CN 109993859 A CN109993859 A CN 109993859A CN 201810413387 A CN201810413387 A CN 201810413387A CN 109993859 A CN109993859 A CN 109993859A
- Authority
- CN
- China
- Prior art keywords
- access
- control module
- mobile device
- access control
- identities
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/30—Individual registration on entry or exit not involving the use of a pass
- G07C9/32—Individual registration on entry or exit not involving the use of a pass in combination with an identity check
- G07C9/37—Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses the method and systems that access control is realized by mobile device, comprising: sends the request of the access identities comprising at least one verifying details and the access control module (220) for sending access beacon signal to central server (250) by mobile device (210);Central server (250) determines whether user is approved the region that access is controlled by access control module (220);Central server (250) indicates control module (240) to trigger corresponding access control module (220), to allow to access the region;It is characterized in that, mobile device (210) determines the most strong calling-on signal sent by access control module (220), and obtain access identities.
Description
Technical field
The present invention relates to the method and systems for access control, and in particular to a kind of to realize access control by mobile device
The method and system of system.
Background technique
Access control system allow the people with current voucher access the specific region of building and refuse without it is current with
The people of card accesses.
Access control system, which is used, verifies user identifier using the hardware device for being set to safety zone.Such as personal knowledge
Other code transmitting station, biometric sensor (fingerprint sensor, access card or small articles).It is very troublesome to carry access card.User
It can be hindered except safety zone in the case where forgetting band access card.Also, since access control system can not identification card
The physical trait of user, unauthorized person also accessible safety zone.
Therefore, the present invention provides a kind of using mobile device carry out inflammation user identifier with access the method for specific region and
System.
Utility model content
The present invention provides a kind of methods for realizing access control by mobile device, comprising the following steps:
Mobile device is sent to central server and includes at least one verifying details and access beacon signal for emitting
The request of the access identities of access control module;
Whether central server confirmation user is approved to access the region controlled by the access control module;
Central server indicate control module come trigger corresponding access control module permit access specific region;
It is characterized in that, mobile device confirms the most strong calling-on signal sent by access control module and obtained corresponding
Access identities.
Further, the above method is further comprising the steps of:
Hierarchical access control module receives the access request signal from control module;
Hierarchical access control module confirms access permission level according to the access identities in the request signal received;
Hierarchical access control module shows classification status on the mobile apparatus.
Further, the access permission level of the access identities received is by the hierarchical access control module according to access
Security level defined in control module determines.
Further, the above method further comprises the steps of:
The image of the user of image collection module acquisition request access;
The image that image collection module will acquire is sent to control module to confirm whether the user of mobile device is approved to visit
Ask region.
Further, most strong calling-on signal by between the mobile device mobile device calculated and access control module away from
From determination.
Further, the method for checking signal is sent comprising steps of mobile device executes the first level verification, which tests
Card is gesture motion;Mobile device executes the second level verification, and second level verification is triggered after the first level verification.
Present invention likewise provides a kind of systems for realizing access control by mobile device, comprising:
Mobile device is configured as being sent to central server comprising at least one verifying details and believe for emitting access
Mark the request of the access identities of the access control module of signal;
Central server, is configured as whether confirmation user is approved to access the region controlled by the access control module,
And indicate control module trigger corresponding access control module permit access specific region;
It is characterized in that, mobile device confirms the most strong calling-on signal sent by access control module and obtained corresponding
Access identities.
Further, above system further include:
Hierarchical access control module is configured as receiving the access request signal from control module, according to what is received
Access identities in request signal confirm access permission level, and classification status is shown on the mobile apparatus.
Further, hierarchical access control module security level according to defined in access control module, which determines, receives
The access level permission of the access identities arrived.
Further, above system further include:
Image collection module, is configured as the image of the user of acquisition request access, and the image that will acquire is sent to control
Module is to confirm whether the user of mobile device is approved access region.
Further, mobile device determines most strong access by calculating the distance between mobile device and access control module
Signal.
Further, the method for checking signal is sent comprising steps of executing the first level verification using mobile device, this first
Level verification is gesture motion;The second level verification, second level verification quilt after the first level verification are executed using mobile device
Triggering.
Detailed description of the invention
Read the spy that will be helpful to better understand various aspects of the present invention about the description details of the component of numbering in the drawing
It seeks peace advantage:
Fig. 1 is flow chart the step of realizing access control by mobile device.
Fig. 2 is the block diagram that the system of access control is realized by mobile device.
Fig. 3 is the block diagram that hierarchical arrangement is accessed using the gate inhibition of shared authentication mode.
Specific embodiment
The present invention provides a kind of method and systems (200) to realize access control using classification verifying by mobile device
System, and confirm whether the user of mobile device is approved access region.
Fig. 1 is the flow chart that the classification verification method of access control is realized by mobile device (210).This method is by step
110 start: user sends request signal to central server by mobile device (210).The request signal includes at least one
Verify the access identities of details and access control module (220).In this step, user activates or triggers the packet in mobile device
The mobile phone application of module containing multi-level verification (211).Before sending request signal, user is executed by hierarchical access control module
Classification verifying, the specific steps are as follows: it detects the first level verification and sends and verified to central server (250), the first order
Verifying is the movement of people, can be any gesture.After the completion of first level verification, the second level verification is activated.Second level verification includes
A series of bio-identification verifyings, such as face recognition, voice recognition and fingerprint authentication.Mobile device (210) is controlled from the access
The most strong calling-on signal of detection in control equipment (220).Then, according to the highest signal acquisition access control ID detected.Then
The request signal including verification information and access control ID is sent to control module (240) and central service by mobile device
Device.
Step 120 and 130, control module (240) receive from mobile device (210), asking with access control ID
Seek signal.Hierarchical access control module (260) are sent by the received access control ID of institute, are tested with executing hierarchical access control
Card.Control module (240) receives institute's captured image or video data from image collection module (230).According to graded access control
The proofing state that molding block (260) determines, sends access control module (220) for calling-on signal.From central server (250)
It receives action signal and task is executed according to the action signal received.It is sent according to the state of execution to central server (250)
Confirmation signal.
The step of receiving action signal from central server (250) further include: central server (250) slave mobile device
(210) request signal is received.It determines whether or authorized user accesses the region.Then, movement is believed according to definitive result
Number it is sent to control module (240).Confirmation signal is shown on mobile device (210).
The step of executing hierarchical access control verifying by hierarchical access control module (260) further include: from control module
(240) access control ID is received.Access control ID carries out the configuration of hierarchical access control verifying based on the received.It is visited according to classification
Ask that the configuration of control determines proofing state.Proofing state is shown on mobile device (210).
Fig. 2 illustrates the block diagram of system.The system (200) includes mobile device (210), access control module (220), figure
As obtaining module (230), control module (240), central server (250) and hierarchical access control module (260).Between them
It can be used and wirelessly or non-wirelessly communicate to connect.The system (200) can be in one or more buildings, enterprise, house, factory, doctor
It is realized in institute, oil plant etc., which can also indoors and/or outdoor area is implemented.
The client that the mobile device can be user's wearing or carry.Such as can be phone (such as smart phone),
Tablet computer, personal digital equipment and/or wearable device (such as wrist strap, wrist-watch etc.).Mobile device (210) may include one
A or multiple communications that can be controlled between mobile device (210), access control module (220) and system (200) other modules
Software application (such as apple application).The user of mobile device (210), which starts and activates, to be tested in mobile device (210) including multistage
Demonstrate,prove the mobile application of module (211).In the first phase, the movement of multi-level verification module (211) the detection first order, which can
To be to shake hands or the gesture of any other type.First order checking signal is sent to central server (250) for verifying.Only
Have and just triggers the second level verification after demonstrating the first level verification.Second level verification can be various bio-identification verifyings, such as
Face recognition verifying, the verifying of voice signal and fingerprint authentication.The multi-level verification module (211) of mobile device (210) passes through shifting
Dynamic application program detection most accesses by force beacon signal from access control module (220), to obtain corresponding access control mould
The access control ID of block (210).According to detected most strong calling-on signal and comprising the request signal of checking signal, will acquire
Access control ID be sent to control module (240) and central server (250), so as to access the region.Calling-on signal
Intensity by multi-level verification module (211) according to the distance between mobile device (210) and access control module (220) determine.
Most strong calling-on signal is by multi-level verification module (211) according to the minimum between mobile device (210) and access control module (220)
Distance determines.
Access control module (220) can be connect with the region of equipment.The region can be a room, multiple rooms, machine
The wing, a building, multiple buildings, a device etc..In some embodiments, which can be by physical boundary (example
Such as wall, door) Lai Dingyi.System (200) may include beacon.The beacon, which can be, to carry out with mobile device (210)
The device of wireless communication.In some embodiments, the beacon can with the access control module (220) being attached on door or any other
Suitable access device is connected (for example, being set to end).Beacon can pass through Bluetooth technology, WiFi etc. and mobile device
(210) it communicates.In some embodiments, the beacon may include one or more raadable marks (for example, near-field communication
(NFC)) label.
Image collection module (230) can be located in the region used to capture images or record attempt to access that the region
User video any camera or video camera.The image or video that will acquire by wired or wireless communication are sent to control
Module (240).
Control module (240) can be communicated to connect by wiredly and/or wirelessly connecting with access control module (220).Respectively
Communication between a module can be carried out by wireless network.Mobile device (210) can be by wiredly and/or wirelessly connecting and controlling
Module (240) is communicated (for example, by way of data exchange).Control module (240) slave mobile device (210), which receives, to be come
From the request signal of mobile applications, and the image or video data that are obtained from image collection module (230).According to access
ID is controlled, control module (240) triggers hierarchical access control module (260), according to proofing state to the received access control of institute
ID executes hierarchical access control verifying.According to proofing state, calling-on signal is sent access control module by control module (240)
(220).Control module (240) receives the action signal sent from central server (250).According to the received action signal of institute,
Control module (240) execution task is to trigger access control module (220).The task definition, which can be, allows user to access the area
Domain, can also be with denied access.Control module (240) sends confirmation signal to central server (250) according to the state of execution.According to
Proofing state and access control ID, calling-on signal is sent access control module (220) by control module (240), and records phase
Answer the date and time of video information.
Central server (250) slave mobile device (210) receives request signal, and determines whether user is allowed access to this
Region.According to identified as a result, central server (250) is to control module (240) sending action signal, and from control module
(240) confirmation signal is received.Confirmation signal is displayed on user's mobile device (210).
Hierarchical access control module (260) receives access control ID from control module (240) to execute hierarchical access control
Verifying, as shown in Figure 3.Hierarchical access control module (260) is configured as assessment hierarchical access control verifying, and is visited according to classification
It asks that control configures and determines proofing state.Hierarchical access control module (260) is not if can determine that proofing state, by checking request
Signal returns to mobile applications.Confirmation uses gate inhibition's access level structure of shared authentication, real by each access control
The link information of body forms, on security level with higher priority to be configured to higher security level other;Low priority is matched
It is set to compared with low security level.As shown in figure 3, the door that the ID for being defined the 1st grade is 1 relative to the ID for being defined as the 2nd grade is 2
Door compare, have higher security level.Link information is present between the door 2 that the ID door for being 1 and ID are 2 to determine that ID is
Verifying rank needed for 2 door, the verifying for the door that wherein ID is 2 can directly utilize the verifying executed on the door that ID is 1 or
It is executed according to central server (250) additional configurations.
The present invention includes content contained in all authority requirement and preceding description.Although the preferred shape that the present invention describes
Formula has certain particularity, makes an explanation merely by example way, the case where not departing from the scope of the present invention
Under, can details and component to structure combination and arrangement be modified.
Claims (12)
1. the method that access control is realized by mobile device, this method comprises:
It is sent to central server (250) comprising at least one verifying details by mobile device (210) and for sending access
The request of the access identities of the access control module (220) of beacon signal;
Central server (250) determines whether user is approved the region that access is controlled by access control module (220);
Central server (250) indicates that control module (240) trigger corresponding access control module (220), is somebody's turn to do with allowing to access
Region;
It is characterized in that, mobile device (210) determines the most strong access beacon signal sent by access control module (220), and
Obtain corresponding access identities.
2. the method according to claim 1, wherein further include:
Hierarchical access control module (260) receives the access identities of access control module (220) from control module (240);
Hierarchical access control module (260) determine received access identities access permission level;And
Hierarchical access control module (260) shows determining proofing state on mobile device (210).
3. according to the method described in claim 2, it is characterized by: the hierarchical access control module (260) determination is received
Access identities access permission level when the security level according to defined in the access control module (220) configuration carry out.
4. the method according to claim 1, wherein further include:
The image of the user of image collection module (230) acquisition request access;And
The image that image collection module (230) will acquire is sent to control module (240), with determine mobile device user whether
It is approved to access the region.
5. the method according to claim 1, which is characterized in that by mobile device (210) calculate mobile device (210) and
The distance between access control module (220) determines five-star access signal.
6. the method according to claim 1, which is characterized in that wherein the step of transmission checking signal includes:
Mobile device executes the first level verification, which is verified as gesture motion;Mobile device executes the second level verification, described
Second level verification is triggered after the first level verification.
7. the system for realizing access control by mobile device, comprising:
Mobile device (210) is configured to send comprising at least one verifying details and send the access control of access beacon signal
The request of the access identities of molding block (220);
Central server (250), is configured to determine that whether user is approved the area that access is controlled by access control module (220)
Domain;And control module (240) is indicated to trigger corresponding access control module (220), to allow to access the region;
It is characterized in that, mobile device (210) determines the most strong calling-on signal sent by access control module (220), and obtain
Corresponding access identities.
8. system according to claim 7, which is characterized in that further include:
Hierarchical access control module (260) is configured as hierarchical access control module (260) from control module (240) and receives visit
Ask the access identities of control module (220);Determine received access identities access permission level;And in mobile device
(210) determining proofing state is shown on.
9. system according to claim 8, it is characterised in that: hierarchical access control module (260) determination is received
Access identities access permission level when the security level according to defined in the access control module (220) configuration carry out.
10. system according to claim 7, which is characterized in that further include:
Image capture apparatus (230) is configured as the image of the user of acquisition request access;Also, the image that will acquire is sent
To control module (240), to determine whether the user of mobile device is approved to access the region.
11. system according to claim 7, it is characterised in that: calculate mobile device (210) by mobile device (210)
The distance between access control module (220) determines five-star access signal.
12. system according to claim 7, it is characterised in that: execute first level verification and the by mobile device (210)
Second verification, the first order are verified as gesture motion;Second level verification is triggered after the first level verification.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2017705181 | 2017-12-29 | ||
MYPI2017705181 | 2017-12-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109993859A true CN109993859A (en) | 2019-07-09 |
Family
ID=67128981
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810413387.1A Pending CN109993859A (en) | 2017-12-29 | 2018-05-03 | The method and system of access control is realized by mobile device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109993859A (en) |
-
2018
- 2018-05-03 CN CN201810413387.1A patent/CN109993859A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11133929B1 (en) | System and method of biobehavioral derived credentials identification | |
US10187754B1 (en) | Time and location-based user tracking and presence confirmation | |
US7971156B2 (en) | Controlling resource access based on user gesturing in a 3D captured image stream of the user | |
US11995972B2 (en) | System for monitoring offender during correctional supervisory program | |
US11205312B2 (en) | Applying image analytics and machine learning to lock systems in hotels | |
US10129236B2 (en) | Determination apparatus, determination method, and non-transitory computer readable storage medium | |
US9972146B1 (en) | Security system with a wireless security device | |
US20140004826A1 (en) | System and method of speaker recognition | |
CN106028284B (en) | The method and smart machine of relative position between identification intelligent equipment | |
CN109544729B (en) | Gate control method and device, computer equipment and storage medium | |
US10366599B1 (en) | Communication devices for guards of controlled environments | |
CN105637522A (en) | World-driven access control using trusted certificates | |
US20240129708A1 (en) | Authenticated health credential access methods and apparatus | |
KR101855494B1 (en) | Door system and method using mobile device | |
US11562054B2 (en) | Authorized gesture control methods and apparatus | |
Moreno et al. | A new location-aware authorization mechanism for indoor environments | |
JP6869450B1 (en) | Authentication terminal and security system | |
US20230308881A1 (en) | System and method for encounter identity verification | |
US20240187407A1 (en) | Methods and apparatus for facilitating nfc transactions | |
CN109559110A (en) | Noninductive method of payment and system | |
JP7240104B2 (en) | Authentication device, authentication method, authentication program and authentication system | |
US11503468B2 (en) | System and method for continuously validating and authenticating a host and sensor pair | |
CN109993859A (en) | The method and system of access control is realized by mobile device | |
CA2792873A1 (en) | Biometric authentication system and method | |
CN112669501B (en) | Access control method, device and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190709 |