CN109993859A - The method and system of access control is realized by mobile device - Google Patents

The method and system of access control is realized by mobile device Download PDF

Info

Publication number
CN109993859A
CN109993859A CN201810413387.1A CN201810413387A CN109993859A CN 109993859 A CN109993859 A CN 109993859A CN 201810413387 A CN201810413387 A CN 201810413387A CN 109993859 A CN109993859 A CN 109993859A
Authority
CN
China
Prior art keywords
access
control module
mobile device
access control
identities
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810413387.1A
Other languages
Chinese (zh)
Inventor
吴明毅
池孟松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kla Technology Private Ltd
Original Assignee
Kla Technology Private Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kla Technology Private Ltd filed Critical Kla Technology Private Ltd
Publication of CN109993859A publication Critical patent/CN109993859A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses the method and systems that access control is realized by mobile device, comprising: sends the request of the access identities comprising at least one verifying details and the access control module (220) for sending access beacon signal to central server (250) by mobile device (210);Central server (250) determines whether user is approved the region that access is controlled by access control module (220);Central server (250) indicates control module (240) to trigger corresponding access control module (220), to allow to access the region;It is characterized in that, mobile device (210) determines the most strong calling-on signal sent by access control module (220), and obtain access identities.

Description

The method and system of access control is realized by mobile device
Technical field
The present invention relates to the method and systems for access control, and in particular to a kind of to realize access control by mobile device The method and system of system.
Background technique
Access control system allow the people with current voucher access the specific region of building and refuse without it is current with The people of card accesses.
Access control system, which is used, verifies user identifier using the hardware device for being set to safety zone.Such as personal knowledge Other code transmitting station, biometric sensor (fingerprint sensor, access card or small articles).It is very troublesome to carry access card.User It can be hindered except safety zone in the case where forgetting band access card.Also, since access control system can not identification card The physical trait of user, unauthorized person also accessible safety zone.
Therefore, the present invention provides a kind of using mobile device carry out inflammation user identifier with access the method for specific region and System.
Utility model content
The present invention provides a kind of methods for realizing access control by mobile device, comprising the following steps:
Mobile device is sent to central server and includes at least one verifying details and access beacon signal for emitting The request of the access identities of access control module;
Whether central server confirmation user is approved to access the region controlled by the access control module;
Central server indicate control module come trigger corresponding access control module permit access specific region;
It is characterized in that, mobile device confirms the most strong calling-on signal sent by access control module and obtained corresponding Access identities.
Further, the above method is further comprising the steps of:
Hierarchical access control module receives the access request signal from control module;
Hierarchical access control module confirms access permission level according to the access identities in the request signal received;
Hierarchical access control module shows classification status on the mobile apparatus.
Further, the access permission level of the access identities received is by the hierarchical access control module according to access Security level defined in control module determines.
Further, the above method further comprises the steps of:
The image of the user of image collection module acquisition request access;
The image that image collection module will acquire is sent to control module to confirm whether the user of mobile device is approved to visit Ask region.
Further, most strong calling-on signal by between the mobile device mobile device calculated and access control module away from From determination.
Further, the method for checking signal is sent comprising steps of mobile device executes the first level verification, which tests Card is gesture motion;Mobile device executes the second level verification, and second level verification is triggered after the first level verification.
Present invention likewise provides a kind of systems for realizing access control by mobile device, comprising:
Mobile device is configured as being sent to central server comprising at least one verifying details and believe for emitting access Mark the request of the access identities of the access control module of signal;
Central server, is configured as whether confirmation user is approved to access the region controlled by the access control module, And indicate control module trigger corresponding access control module permit access specific region;
It is characterized in that, mobile device confirms the most strong calling-on signal sent by access control module and obtained corresponding Access identities.
Further, above system further include:
Hierarchical access control module is configured as receiving the access request signal from control module, according to what is received Access identities in request signal confirm access permission level, and classification status is shown on the mobile apparatus.
Further, hierarchical access control module security level according to defined in access control module, which determines, receives The access level permission of the access identities arrived.
Further, above system further include:
Image collection module, is configured as the image of the user of acquisition request access, and the image that will acquire is sent to control Module is to confirm whether the user of mobile device is approved access region.
Further, mobile device determines most strong access by calculating the distance between mobile device and access control module Signal.
Further, the method for checking signal is sent comprising steps of executing the first level verification using mobile device, this first Level verification is gesture motion;The second level verification, second level verification quilt after the first level verification are executed using mobile device Triggering.
Detailed description of the invention
Read the spy that will be helpful to better understand various aspects of the present invention about the description details of the component of numbering in the drawing It seeks peace advantage:
Fig. 1 is flow chart the step of realizing access control by mobile device.
Fig. 2 is the block diagram that the system of access control is realized by mobile device.
Fig. 3 is the block diagram that hierarchical arrangement is accessed using the gate inhibition of shared authentication mode.
Specific embodiment
The present invention provides a kind of method and systems (200) to realize access control using classification verifying by mobile device System, and confirm whether the user of mobile device is approved access region.
Fig. 1 is the flow chart that the classification verification method of access control is realized by mobile device (210).This method is by step 110 start: user sends request signal to central server by mobile device (210).The request signal includes at least one Verify the access identities of details and access control module (220).In this step, user activates or triggers the packet in mobile device The mobile phone application of module containing multi-level verification (211).Before sending request signal, user is executed by hierarchical access control module Classification verifying, the specific steps are as follows: it detects the first level verification and sends and verified to central server (250), the first order Verifying is the movement of people, can be any gesture.After the completion of first level verification, the second level verification is activated.Second level verification includes A series of bio-identification verifyings, such as face recognition, voice recognition and fingerprint authentication.Mobile device (210) is controlled from the access The most strong calling-on signal of detection in control equipment (220).Then, according to the highest signal acquisition access control ID detected.Then The request signal including verification information and access control ID is sent to control module (240) and central service by mobile device Device.
Step 120 and 130, control module (240) receive from mobile device (210), asking with access control ID Seek signal.Hierarchical access control module (260) are sent by the received access control ID of institute, are tested with executing hierarchical access control Card.Control module (240) receives institute's captured image or video data from image collection module (230).According to graded access control The proofing state that molding block (260) determines, sends access control module (220) for calling-on signal.From central server (250) It receives action signal and task is executed according to the action signal received.It is sent according to the state of execution to central server (250) Confirmation signal.
The step of receiving action signal from central server (250) further include: central server (250) slave mobile device (210) request signal is received.It determines whether or authorized user accesses the region.Then, movement is believed according to definitive result Number it is sent to control module (240).Confirmation signal is shown on mobile device (210).
The step of executing hierarchical access control verifying by hierarchical access control module (260) further include: from control module (240) access control ID is received.Access control ID carries out the configuration of hierarchical access control verifying based on the received.It is visited according to classification Ask that the configuration of control determines proofing state.Proofing state is shown on mobile device (210).
Fig. 2 illustrates the block diagram of system.The system (200) includes mobile device (210), access control module (220), figure As obtaining module (230), control module (240), central server (250) and hierarchical access control module (260).Between them It can be used and wirelessly or non-wirelessly communicate to connect.The system (200) can be in one or more buildings, enterprise, house, factory, doctor It is realized in institute, oil plant etc., which can also indoors and/or outdoor area is implemented.
The client that the mobile device can be user's wearing or carry.Such as can be phone (such as smart phone), Tablet computer, personal digital equipment and/or wearable device (such as wrist strap, wrist-watch etc.).Mobile device (210) may include one A or multiple communications that can be controlled between mobile device (210), access control module (220) and system (200) other modules Software application (such as apple application).The user of mobile device (210), which starts and activates, to be tested in mobile device (210) including multistage Demonstrate,prove the mobile application of module (211).In the first phase, the movement of multi-level verification module (211) the detection first order, which can To be to shake hands or the gesture of any other type.First order checking signal is sent to central server (250) for verifying.Only Have and just triggers the second level verification after demonstrating the first level verification.Second level verification can be various bio-identification verifyings, such as Face recognition verifying, the verifying of voice signal and fingerprint authentication.The multi-level verification module (211) of mobile device (210) passes through shifting Dynamic application program detection most accesses by force beacon signal from access control module (220), to obtain corresponding access control mould The access control ID of block (210).According to detected most strong calling-on signal and comprising the request signal of checking signal, will acquire Access control ID be sent to control module (240) and central server (250), so as to access the region.Calling-on signal Intensity by multi-level verification module (211) according to the distance between mobile device (210) and access control module (220) determine. Most strong calling-on signal is by multi-level verification module (211) according to the minimum between mobile device (210) and access control module (220) Distance determines.
Access control module (220) can be connect with the region of equipment.The region can be a room, multiple rooms, machine The wing, a building, multiple buildings, a device etc..In some embodiments, which can be by physical boundary (example Such as wall, door) Lai Dingyi.System (200) may include beacon.The beacon, which can be, to carry out with mobile device (210) The device of wireless communication.In some embodiments, the beacon can with the access control module (220) being attached on door or any other Suitable access device is connected (for example, being set to end).Beacon can pass through Bluetooth technology, WiFi etc. and mobile device (210) it communicates.In some embodiments, the beacon may include one or more raadable marks (for example, near-field communication (NFC)) label.
Image collection module (230) can be located in the region used to capture images or record attempt to access that the region User video any camera or video camera.The image or video that will acquire by wired or wireless communication are sent to control Module (240).
Control module (240) can be communicated to connect by wiredly and/or wirelessly connecting with access control module (220).Respectively Communication between a module can be carried out by wireless network.Mobile device (210) can be by wiredly and/or wirelessly connecting and controlling Module (240) is communicated (for example, by way of data exchange).Control module (240) slave mobile device (210), which receives, to be come From the request signal of mobile applications, and the image or video data that are obtained from image collection module (230).According to access ID is controlled, control module (240) triggers hierarchical access control module (260), according to proofing state to the received access control of institute ID executes hierarchical access control verifying.According to proofing state, calling-on signal is sent access control module by control module (240) (220).Control module (240) receives the action signal sent from central server (250).According to the received action signal of institute, Control module (240) execution task is to trigger access control module (220).The task definition, which can be, allows user to access the area Domain, can also be with denied access.Control module (240) sends confirmation signal to central server (250) according to the state of execution.According to Proofing state and access control ID, calling-on signal is sent access control module (220) by control module (240), and records phase Answer the date and time of video information.
Central server (250) slave mobile device (210) receives request signal, and determines whether user is allowed access to this Region.According to identified as a result, central server (250) is to control module (240) sending action signal, and from control module (240) confirmation signal is received.Confirmation signal is displayed on user's mobile device (210).
Hierarchical access control module (260) receives access control ID from control module (240) to execute hierarchical access control Verifying, as shown in Figure 3.Hierarchical access control module (260) is configured as assessment hierarchical access control verifying, and is visited according to classification It asks that control configures and determines proofing state.Hierarchical access control module (260) is not if can determine that proofing state, by checking request Signal returns to mobile applications.Confirmation uses gate inhibition's access level structure of shared authentication, real by each access control The link information of body forms, on security level with higher priority to be configured to higher security level other;Low priority is matched It is set to compared with low security level.As shown in figure 3, the door that the ID for being defined the 1st grade is 1 relative to the ID for being defined as the 2nd grade is 2 Door compare, have higher security level.Link information is present between the door 2 that the ID door for being 1 and ID are 2 to determine that ID is Verifying rank needed for 2 door, the verifying for the door that wherein ID is 2 can directly utilize the verifying executed on the door that ID is 1 or It is executed according to central server (250) additional configurations.
The present invention includes content contained in all authority requirement and preceding description.Although the preferred shape that the present invention describes Formula has certain particularity, makes an explanation merely by example way, the case where not departing from the scope of the present invention Under, can details and component to structure combination and arrangement be modified.

Claims (12)

1. the method that access control is realized by mobile device, this method comprises:
It is sent to central server (250) comprising at least one verifying details by mobile device (210) and for sending access The request of the access identities of the access control module (220) of beacon signal;
Central server (250) determines whether user is approved the region that access is controlled by access control module (220);
Central server (250) indicates that control module (240) trigger corresponding access control module (220), is somebody's turn to do with allowing to access Region;
It is characterized in that, mobile device (210) determines the most strong access beacon signal sent by access control module (220), and Obtain corresponding access identities.
2. the method according to claim 1, wherein further include:
Hierarchical access control module (260) receives the access identities of access control module (220) from control module (240);
Hierarchical access control module (260) determine received access identities access permission level;And
Hierarchical access control module (260) shows determining proofing state on mobile device (210).
3. according to the method described in claim 2, it is characterized by: the hierarchical access control module (260) determination is received Access identities access permission level when the security level according to defined in the access control module (220) configuration carry out.
4. the method according to claim 1, wherein further include:
The image of the user of image collection module (230) acquisition request access;And
The image that image collection module (230) will acquire is sent to control module (240), with determine mobile device user whether It is approved to access the region.
5. the method according to claim 1, which is characterized in that by mobile device (210) calculate mobile device (210) and The distance between access control module (220) determines five-star access signal.
6. the method according to claim 1, which is characterized in that wherein the step of transmission checking signal includes:
Mobile device executes the first level verification, which is verified as gesture motion;Mobile device executes the second level verification, described Second level verification is triggered after the first level verification.
7. the system for realizing access control by mobile device, comprising:
Mobile device (210) is configured to send comprising at least one verifying details and send the access control of access beacon signal The request of the access identities of molding block (220);
Central server (250), is configured to determine that whether user is approved the area that access is controlled by access control module (220) Domain;And control module (240) is indicated to trigger corresponding access control module (220), to allow to access the region;
It is characterized in that, mobile device (210) determines the most strong calling-on signal sent by access control module (220), and obtain Corresponding access identities.
8. system according to claim 7, which is characterized in that further include:
Hierarchical access control module (260) is configured as hierarchical access control module (260) from control module (240) and receives visit Ask the access identities of control module (220);Determine received access identities access permission level;And in mobile device (210) determining proofing state is shown on.
9. system according to claim 8, it is characterised in that: hierarchical access control module (260) determination is received Access identities access permission level when the security level according to defined in the access control module (220) configuration carry out.
10. system according to claim 7, which is characterized in that further include:
Image capture apparatus (230) is configured as the image of the user of acquisition request access;Also, the image that will acquire is sent To control module (240), to determine whether the user of mobile device is approved to access the region.
11. system according to claim 7, it is characterised in that: calculate mobile device (210) by mobile device (210) The distance between access control module (220) determines five-star access signal.
12. system according to claim 7, it is characterised in that: execute first level verification and the by mobile device (210) Second verification, the first order are verified as gesture motion;Second level verification is triggered after the first level verification.
CN201810413387.1A 2017-12-29 2018-05-03 The method and system of access control is realized by mobile device Pending CN109993859A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI2017705181 2017-12-29
MYPI2017705181 2017-12-29

Publications (1)

Publication Number Publication Date
CN109993859A true CN109993859A (en) 2019-07-09

Family

ID=67128981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810413387.1A Pending CN109993859A (en) 2017-12-29 2018-05-03 The method and system of access control is realized by mobile device

Country Status (1)

Country Link
CN (1) CN109993859A (en)

Similar Documents

Publication Publication Date Title
US11133929B1 (en) System and method of biobehavioral derived credentials identification
US10187754B1 (en) Time and location-based user tracking and presence confirmation
US7971156B2 (en) Controlling resource access based on user gesturing in a 3D captured image stream of the user
US11995972B2 (en) System for monitoring offender during correctional supervisory program
US11205312B2 (en) Applying image analytics and machine learning to lock systems in hotels
US10129236B2 (en) Determination apparatus, determination method, and non-transitory computer readable storage medium
US9972146B1 (en) Security system with a wireless security device
US20140004826A1 (en) System and method of speaker recognition
CN106028284B (en) The method and smart machine of relative position between identification intelligent equipment
CN109544729B (en) Gate control method and device, computer equipment and storage medium
US10366599B1 (en) Communication devices for guards of controlled environments
CN105637522A (en) World-driven access control using trusted certificates
US20240129708A1 (en) Authenticated health credential access methods and apparatus
KR101855494B1 (en) Door system and method using mobile device
US11562054B2 (en) Authorized gesture control methods and apparatus
Moreno et al. A new location-aware authorization mechanism for indoor environments
JP6869450B1 (en) Authentication terminal and security system
US20230308881A1 (en) System and method for encounter identity verification
US20240187407A1 (en) Methods and apparatus for facilitating nfc transactions
CN109559110A (en) Noninductive method of payment and system
JP7240104B2 (en) Authentication device, authentication method, authentication program and authentication system
US11503468B2 (en) System and method for continuously validating and authenticating a host and sensor pair
CN109993859A (en) The method and system of access control is realized by mobile device
CA2792873A1 (en) Biometric authentication system and method
CN112669501B (en) Access control method, device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190709