CN110021096B - System, server, method and storage medium for controlling access - Google Patents

System, server, method and storage medium for controlling access Download PDF

Info

Publication number
CN110021096B
CN110021096B CN201811271485.2A CN201811271485A CN110021096B CN 110021096 B CN110021096 B CN 110021096B CN 201811271485 A CN201811271485 A CN 201811271485A CN 110021096 B CN110021096 B CN 110021096B
Authority
CN
China
Prior art keywords
address
user
corresponding relation
server
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811271485.2A
Other languages
Chinese (zh)
Other versions
CN110021096A (en
Inventor
周韦华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Ajar Linkage Technology Ltd
Original Assignee
Shenzhen City Ajar Linkage Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Ajar Linkage Technology Ltd filed Critical Shenzhen City Ajar Linkage Technology Ltd
Priority to CN201811271485.2A priority Critical patent/CN110021096B/en
Publication of CN110021096A publication Critical patent/CN110021096A/en
Application granted granted Critical
Publication of CN110021096B publication Critical patent/CN110021096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a system, a server, a method and a storage medium for controlling access control, wherein the server is used for receiving an access control identifier and a first user identifier; sending a request for returning the first corresponding relation to another server; storing the second corresponding relation; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; searching a user address corresponding to the first user identification according to the first corresponding relation; searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier. When the owner identification and the entrance guard identification need to be modified, the modification workload is smaller, and the system, the server, the method and the storage medium for controlling the entrance guard are more beneficial to popularization and application in a large number of cells.

Description

System, server, method and storage medium for controlling access
Technical Field
The present invention relates to the field of access control, and in particular, to a system, a server, a method, and a storage medium for controlling access.
Background
There are currently some systems for controlling access. In these systems, a corresponding relationship between each owner and an access identifier in a cell is usually set in a server, when a certain owner scans an access two-dimensional code by using a mobile terminal, the mobile terminal sends the owner identifier and the access identifier of the current owner to the server, the access identifier corresponding to the owner can be searched according to the corresponding relationship, and if the found access identifier is the same as the access identifier sent by the mobile terminal, the owner identifier is judged to have the access right, so that the control door is opened.
Usually, there are hundreds of householders in a cell, if a plurality of cells are to be controlled, the number of the householders is larger, and a large number of operations are required when the corresponding relationship between the householder identifier and the entrance guard identifier needs to be increased or modified, which brings a great obstacle to the popularization of the linkage system. For example, when such a system is added to a cell in which a gate is installed, the method in the prior art needs to set a correspondence between each householder identifier and the gate identifier in the server, which results in a large number of operations.
Disclosure of Invention
To overcome the above problems of the prior art, the present invention provides a system, server, method, and storage medium for controlling access.
A system for controlling access, comprising: the system comprises a mobile terminal, a first server, a second server and a third server; the mobile terminal is used for sending a first user identification and a second user identification to the first server; the first server is used for forwarding the first user identification and the second user identification to the second server; the second server is configured to send a first request for returning a first corresponding relationship to the third server, and establish a third corresponding relationship, where the first request includes the first user identifier, the first corresponding relationship is used to indicate a corresponding relationship between the first user identifier and a user address, and the third corresponding relationship is used to indicate a corresponding relationship between the first user identifier and the second user identifier; the second server is also used for storing a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; the mobile terminal is further used for reading an entrance guard identification by scanning an entrance guard two-dimensional code and sending the entrance guard identification and the second user identification to the first server; the first server is used for forwarding the access control identification and the second user identification to the second server; the second server is configured to send a second request for returning the first corresponding relationship to the third server, where the second request includes the second user identifier; the third server is used for sending a notification that the first corresponding relation corresponding to the second user identification does not exist to the second server according to the second request; the second server is further configured to: searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification: searching a user address corresponding to the first user identification according to the first corresponding relation: searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The mobile terminal is configured to send the first user identifier and the second user identifier to the first server specifically as follows: the mobile terminal is used for sending a first user identification and a second user identification to the first server by identifying a first two-dimensional code, wherein the first two-dimensional code comprises the first user identification.
The invention also provides a method for controlling the entrance guard, which comprises the following steps: the mobile terminal sends a first user identification and a second user identification to the first server; the first server forwards the first user identification and the second user identification to the second server; the second server sends a first request for returning a first corresponding relation to the third server, and establishes a third corresponding relation, wherein the first request comprises the first user identifier, the first corresponding relation is used for representing the corresponding relation between the first user identifier and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identifier and the second user identifier; the second server also stores a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; the mobile terminal reads an entrance guard identification by scanning an entrance guard two-dimensional code and sends the entrance guard identification and the second user identification to the first server; the first server forwards the access control identification and the second user identification to the second server; the second server sends a second request for returning the first corresponding relation to the third server, wherein the second request comprises the second user identification; the third server sends a notification that the first corresponding relation corresponding to the second user identification does not exist to the second server according to the second request; the second server searches the first user identification corresponding to the second user identification from the third corresponding relation according to the notification: the second server searches a user address corresponding to the first user identifier according to the first corresponding relation: the second server searches an access control address corresponding to the access control identification according to the second corresponding relation; and the second server judges whether the access control address belongs to the subset of the user address, and if so, sends an unlocking command to the door controller corresponding to the access control identifier.
The sending, by the mobile terminal, the first user identifier and the second user identifier to the first server specifically includes: the mobile terminal sends a first user identification and a second user identification to the first server by identifying a first two-dimensional code, wherein the first two-dimensional code comprises the first user identification.
The invention also provides a system for controlling access control, comprising: the system comprises a mobile terminal, a first server, a second server and a third server; the mobile terminal reads an entrance guard identification by scanning an entrance guard two-dimensional code and sends the entrance guard identification and the first user identification to the first server; the first server is used for forwarding the access control identification and the first user identification to the second server; the second server is configured to send a request for returning a first corresponding relationship to the third server, where the request includes the first user identifier; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address; the second server is also used for storing a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; the second server is further configured to: searching a user address corresponding to the first user identification according to the first corresponding relation; searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The invention also provides a server for controlling the entrance guard, which is used for: receiving an entrance guard identification and a first user identification; sending a request for returning a first corresponding relation to another server, wherein the request contains the first user identification; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address; storing the second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; searching a user address corresponding to the first user identification according to the first corresponding relation; searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The invention also provides a method for controlling the entrance guard, which comprises the following steps: receiving an entrance guard identification and a first user identification; sending a request for returning a first corresponding relation to another server, wherein the request contains the first user identification; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address; storing the second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; searching a user address corresponding to the first user identification according to the first corresponding relation; searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The present invention also provides a storage medium storing code, the code executed by a processor as: receiving an entrance guard identification and a first user identification; sending a request for returning a first corresponding relation to another server, wherein the request contains the first user identification; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address; storing the second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; searching a user address corresponding to the first user identification according to the first corresponding relation; searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The invention also provides a server for controlling the entrance guard, which is used for: receiving a first user identification and a second user identification; establishing a third corresponding relation according to the first user identification and the second user identification, and sending a first request for returning the first corresponding relation to another server, wherein the first request comprises the first user identification, the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identification and the second user identification; storing the second corresponding relation; the second corresponding relation is used for representing the corresponding relation between the entrance guard identification and the entrance guard address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; receiving an entrance guard identification and a second user identification; sending a second request for returning the first corresponding relation to the other server, wherein the second request comprises the second user identification; receiving a notification returned by the other server, wherein the notification is used for indicating that no first corresponding relation corresponding to the second user identification exists; searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification: searching a user address corresponding to the first user identification according to the first corresponding relation: searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The invention also provides a method for controlling the entrance guard, which comprises the following steps: receiving a first user identification and a second user identification; establishing a third corresponding relation according to the first user identification and the second user identification, and sending a first request for returning the first corresponding relation to another server, wherein the first request comprises the first user identification, the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identification and the second user identification; storing the second corresponding relation; the second corresponding relation is used for representing the corresponding relation between the entrance guard identification and the entrance guard address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; receiving an entrance guard identification and a second user identification; sending a second request for returning the first corresponding relation to the other server, wherein the second request comprises the second user identification; receiving a notification returned by the other server, wherein the notification is used for indicating that no first corresponding relation corresponding to the second user identification exists; searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification: searching a user address corresponding to the first user identification according to the first corresponding relation: searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
The present invention also provides a storage medium storing code, the code executed by a processor as: receiving a first user identification and a second user identification; establishing a third corresponding relation according to the first user identification and the second user identification, and sending a first request for returning the first corresponding relation to another server, wherein the first request comprises the first user identification, the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identification and the second user identification; storing the second corresponding relation; the second corresponding relation is used for representing the corresponding relation between the entrance guard identification and the entrance guard address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address; receiving an entrance guard identification and a second user identification; sending a second request for returning the first corresponding relation to the other server, wherein the second request comprises the second user identification; receiving a notification returned by the other server, wherein the notification is used for indicating that no first corresponding relation corresponding to the second user identification exists; searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification: searching a user address corresponding to the first user identification according to the first corresponding relation: searching an access control address corresponding to the access control identification according to the second corresponding relation; and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
Has the advantages that:
in the scheme, the first corresponding relation represents the corresponding relation between a first user identification and a user address, the second corresponding relation represents the corresponding relation between an access control identification and an access control address, the user address corresponding to the first user identification is searched according to the first corresponding relation, the access control address corresponding to the access control identification is searched according to the second corresponding relation, whether the access control address belongs to a subset of the user address or not is judged, and if the access control address belongs to the subset of the user address, an unlocking command is sent to a door controller corresponding to the access control identification, so that the modification workload is smaller when the main user identification and the access control identification need to be modified, and the system, the server, the method and the storage medium for controlling the access control are more favorably popularized and applied in a large number of cells.
Drawings
FIG. 1 is a schematic view of one embodiment of a system for controlling access according to the present invention;
FIG. 2 is a flow chart of one embodiment of a method of controlling access according to the present invention;
FIG. 3 is a schematic view of another embodiment of a system for controlling access according to the present invention;
fig. 4 is a flowchart of another embodiment of a method for controlling a door access according to the present invention.
Detailed Description
The preferred embodiments of the present invention will now be described in detail with reference to the accompanying drawings.
Fig. 1 is a schematic view of an embodiment of a system for controlling a door according to the present invention, which includes a first server 100, a second server 200, a third server 300, a mobile terminal 400, a door controller 500, a two-dimensional door access code, an electromagnetic lock, and a door.
The entrance guard two-dimensional code comprises information of entrance guard identification. The mobile terminal 400 is configured to scan and analyze the access control two-dimensional code to obtain an access control identifier corresponding to the access control two-dimensional code, and then send the current user identifier corresponding to the mobile terminal 400 and the access control identifier to the first server 100. In one embodiment, the mobile terminal 400 installs an application (e.g., WeChat), and after the user logs in the application, the user invokes a camera of the mobile terminal 400 to scan and analyze the two-dimensional door access code, so as to obtain a door access identifier, and then the application sends the door access identifier and the user identifier to the first server 100 (i.e., an application server corresponding to the application).
After receiving the access identifier and the user identifier sent by the mobile terminal 400, the first server 100 forwards the access identifier and the user identifier to the second server 200. In one embodiment, the operator of the second server 200 is different from the operator of the first server 100, and the users of the application are very large (e.g., WeChat, with nearly every smartphone having WeChat installed), so the system can be deployed quickly based on the large number of mobile terminals 400 that have the application installed.
Before deploying the present system, the third server 300 has stored a large amount of comprehensive and accurate first correspondence relation regarding the user address information, the first correspondence relation representing a correspondence relation between a user identifier and a user address, the user address comprising a plurality of address hierarchies, including: cell identification, building area identification, user floor, house number, these address hierarchies can be regarded as the hierarchy gradually decreases. Table 1 is one example of the first correspondence.
TABLE 1
User identification Cell identity Building mark Building area mark User floor House number
U10000 Star cell 2 A 3 2
U10010 Star cell 2 B 4 3
In the first corresponding relation, the user identifications corresponding to different users are different; the cell identification, the building area identification, the user floor and the user house number respectively identify the cell where the user address is located, the building in the cell, which area of the building, the floor where the user address is located and the room number of the user address. The building region identification is optional, for example, each floor of some buildings has a relatively large area and may be divided into a plurality of building regions, as shown in table 1, the address of the user 1 is 2 a regions (units), and the address of the user 2 is 2B regions (units).
The first corresponding relationship of the third server 300 may be collected from various ways, for example, when the user pays the property fee, the water fee, the electricity fee, the gas fee, and the like based on the current large-scale popular application program (e.g., WeChat), the user information and the property information need to be filled, after the first server 100 allocates a unique user identifier for each user, the user identifier and the corresponding property information are sent to the third server 300, and the third server 300 may establish a large amount of comprehensive and accurate first corresponding relationship based on the data, where the first corresponding relationship may cover almost all properties of each cell. The second server 200 judges whether the access control address sent by the mobile terminal 400 corresponds to the user identifier by using the first corresponding relation of the third server 300, and does not need the user to manually input own user information and house property information to establish the first corresponding relation, so that the process of opening the door by using the mobile terminal 400 is greatly simplified, the user experience is improved, the acceptance of the user is higher, and the popularization is easier.
The second server 200 sends a request (the request contains the user identifier) to the third server 300 to request the third server 300 to return the first corresponding relationship associated with the user identifier. For example, if the second server 200 sends a request including the user identifier U10000 to the third server 300, the third server 300 returns the following first correspondence relationship to the second server 200:
user identification Cell identity Building mark Building area mark User floor House number
U10000 Star cell 2 A 3 2
If the related information of the user identifier U10000 is not stored in the third server 300, the third server 300 returns a corresponding notification message to notify the second server 200. The second server 200 may cache after receiving the first correspondence. In some embodiments, the second server 200, if it already stores a sufficient and accurate first correspondence, does not need to obtain it at this point from the third server 300.
Establishing a second corresponding relationship and a third corresponding relationship, wherein the third corresponding relationship may be stored in the second server 200, or may be stored in the third server 300 (a request including the second user identifier is sent to the third server 300, and the third server 300 returns the third corresponding relationship), and the second corresponding relationship is stored in the second server 200; the second correspondence represents a correspondence between the access control identifier and the access control address, and table 2 illustrates an embodiment of the second correspondence; the third corresponding relationship is applicable to a case where a person (e.g., a visitor, a tenant) other than the owner (a house owner) controls the door access using the mobile terminal 400, the third corresponding relationship is used to represent a corresponding relationship between the first user identifier and the second user identifier, and table 3 is an example of the third corresponding relationship. The entrance guard address at least comprises an address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address.
TABLE 2
Name of gate inhibition Entrance guard's sign Cell identity Building mark
East door of star district D10000 Star cell
Star district 2-span unit door D10010 Star cell 2-ridge
Star district underground parking lot gate D10011 Star cell
TABLE 3
First user identification (householder identification) Second user identification (visitor identification)
U10000 G10000、G10001、G10002
U10010
In the access control addresses in the second corresponding relationship, the cell identifier and the building identifier represent the cell and the building where the access control is located, and as shown in table 2, the access control D10000 is the east gate of the star cell, so that the access control address only needs to include the cell identifier (the building identifier is empty); for another example, the access control D10010 is a star cell 2 cell gate, and therefore, its access control address needs to include a cell identifier and a building identifier.
The third corresponding relationship represents the relationship between the second subscriber identity (e.g. the visitor identity) and the first subscriber identity (e.g. the owner), as shown in table 3, the user U10000 has visitors G10001, G10002, the user U10000 has a corresponding relationship with these visitors, and the user U10010 has no visitor. It is understood that the first corresponding relationship and the third corresponding relationship may be stored in the second server 200 by using a data table, for example, after the second server 200 downloads table 1 from the third server 300, a data table is stored in the second server 200 to represent table 1 and table 3, such as adding a list of guest identifications (second user identifications) in table 1.
Fig. 2 is a flowchart of an embodiment of a method for controlling an access control system according to the present invention, which is suitable for a situation when a user uses a mobile terminal 400 to control an access control system, and the method includes the following steps.
S100, the mobile terminal 400 scans and analyzes the entrance guard two-dimensional code to obtain an entrance guard identifier corresponding to the entrance guard two-dimensional code, and then sends the user identifier and the entrance guard identifier corresponding to the mobile terminal 400 to the first server 100. For example, after the mobile terminal 400 is equipped with the WeChat, the user logs in the WeChat, the camera of the mobile terminal 400 is called to scan and analyze the two-dimensional door access code, so as to obtain the door access identifier, and then the WeChat sends the door access identifier D10000 and the user identifier U10000 to the WeChat server. The user identification can be a proprietary OPENID under the WeChat public number, and the user identification and the micro signal have a corresponding relation (the OPENID of the same micro signal under different WeChat public numbers is different), but the public can not know the corresponding micro signal through the OPENID, so that the risk of user micro signal leakage is reduced.
S101, after receiving the access control identifier and the user identifier sent by the mobile terminal 400, the first server 100 forwards the access control identifier and the user identifier to the second server 200. For example, the WeChat Server forwards the OPENID and the entrance guard identification to the second server 200.
S102, the second server 200 sends a request (the request includes a user identifier) to the third server 300, so as to request the third server 300 to return the first corresponding relationship associated with the user identifier and perform caching, and then obtains a user address including multiple address hierarchies corresponding to the user identifier in the first corresponding relationship. For example, the second server 200 obtains the corresponding user address according to the user identifier U10000 in table 1:
cell identity Building mark Building area mark User floor House number
Star cell 2 A 3 2
If the third server 300 does not exist in the first relationship associated with the user identifier U10000, that is, does not exist in the user address corresponding to the user identifier U10000, the third server returns a notification that the first relationship does not exist to the mobile terminal 400.
And S103, the second server 200 searches for the access control address corresponding to the access control identifier in the second corresponding relation. For example, the second server 200 searches for the access control address corresponding to the access control identifier D10000 in table 2:
cell identity Building mark
Star cell
S104, the second server 200 determines whether the access control address obtained in step S103 belongs to the subset of the user address obtained in step S102, and if so, executes step S105.
For example, the user address corresponding to the user identifier U10000 is "starry cell", "2 (building identifier)" "a (building area identifier)" "3 (user floor)" "2 (house number)", the access control address corresponding to the access control identifier D10000 is "starry cell", the access control address belongs to the subset of the user addresses, which indicates that the user identifier has the access control authority, and therefore step S105 is executed.
And S105, the second server 200 sends an unlocking command to the door controller 500 corresponding to the access control identifier.
The second server 200 may be connected to the door controller 500 through wireless communication, and the door controller 500 controls the electromagnetic lock to be opened after receiving the unlocking command, so that the user may access the door.
Compared with the scheme that the corresponding relation between the user identification and the entrance guard identification is set in the table 1 to indicate the authority of which doors the user has, the scheme indicates the corresponding relation between the entrance guard identification and the entrance guard address by setting the second corresponding relation, so that the modification workload is smaller when the entrance guard identification and the entrance guard address need to be modified, and the specific reason is as follows. For example, the system is not installed in the original starry cell, that is, the two-dimensional door access code cannot be scanned by the mobile terminal to control the door access, if such a function needs to be added, and an association table (as shown in table 4) is established between each user identifier and the door access identifier, then an operation of associating each user identifier with the corresponding door access identifier needs to be performed, which may result in a large workload of establishing the association table, for example, if there are 3000 homeowners (corresponding to 3000 user identifiers) in a cell, and there are 3 doors in a cell, 3000 times of association increasing operations need to be performed, and 3 door access identifiers need to be written in each operation. As shown in table 3, in this scheme, only the third corresponding relations with the same number as the bangs need to be established, and the operation workload is much smaller than that for establishing the corresponding relations in table 4.
TABLE 4
Figure BDA0001846087900000141
Fig. 3 is a block diagram of an embodiment of a system for controlling a door according to the present invention, which includes a first server 100, a second server 200, a third server 300, a mobile terminal 400 of a visitor or a tenant, a mobile terminal 600 of a resident, a door controller 500, a two-dimensional door access code, an electromagnetic lock, and a door.
Fig. 4 is a flowchart of another embodiment of a method for controlling an access control system according to the present invention, which is applied to a case when a visitor or a tenant accesses the access control system using a mobile terminal 400, and includes the following steps.
S200, the mobile terminal 600 of the user owner generates a two-dimensional code, where the two-dimensional code includes a first user identifier U10000 of the user owner.
S201, the visitor' S mobile terminal 400 recognizes the two-dimensional code to obtain a first user identifier U10000 of the user owner, and triggers the mobile terminal 400 to send the first user identifier and a second user identifier G10000 corresponding to the mobile terminal 400 currently to the first server.
The user may send the two-dimensional code to the mobile terminal 400 of the visitor through the mobile terminal 600, for example, when the user needs to invite the visitor to the home for the visitor, the user sends the two-dimensional code to the mobile terminal 400 of the visitor by using a WeChat installed in the mobile terminal 600, and the two-dimensional code includes a first user identifier (e.g., OPENID) of the user. When the owner is together with the visitor, the mobile terminal 400 of the visitor may also directly scan the two-dimensional code on the mobile terminal 600 to obtain the first subscriber identity, and trigger the mobile terminal 400 to send the first subscriber identity and the second subscriber identity G10000 to the first server.
S202, after receiving the first user identifier U10000 and the second user identifier G10000, the first server 100 forwards the first user identifier U10000 and the second user identifier G10000 to the second server 200.
S203, the second server 200 sends a first request for returning the first corresponding relationship to the third server 300, and establishes a third corresponding relationship, where the first request includes the first subscriber identity U10000, the first corresponding relationship is used to indicate a corresponding relationship between the first subscriber identity U10000 and a subscriber address, and the third corresponding relationship is used to indicate a corresponding relationship between the first subscriber identity U10000 and the second subscriber identity G10000. Thus, the second server may then store the first correspondence as shown in table 1 with respect to the first subscriber identity U10000:
user identification Cell identity Building mark Building area mark User floor House number
U10000 Star cell 2 A 3 2
In addition, a third correspondence, as represented in table 5 below, may also be established:
TABLE 5
First user identification (householder identification) Second userIdentification (visitor identification)
U10000 G10000
The second server also stores a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address. The second correspondence relationship is shown in table 2 above.
S204, when the visitor visits the cell of the owner, the mobile terminal 400 of the visitor reads the entrance guard identification by scanning the entrance guard two-dimensional code, and triggers the mobile terminal 400 to send the entrance guard identification and the second user identification G10000 to the first server 100.
For example, after the mobile terminal 400 is equipped with the WeChat, the user logs in the WeChat, and then calls the camera of the mobile terminal 400 to scan and analyze the two-dimensional door access code, so as to obtain the door access identifier, and then the WeChat sends the door access identifier D10000 and the second user identifier G10000 to the WeChat server.
S205, after receiving the access control identifier and the second user identifier G10000 sent by the mobile terminal 400, the first server 100 forwards the access control identifier and the second user identifier G10000 to the second server 200. For example, the WeChat Server forwards the OPENID and the entrance guard identification to the second server 200.
S206, the second server 200 sends a second request (the second request includes the second subscriber identity G10000) to the third server 300, so as to request the third server 300 to return the first corresponding relationship associated with the second subscriber identity G10000.
If the second subscriber identity G10000 does not have a real estate in the cell, the third server 300 does not store the second subscriber identity G10000, so the third server 300 will notify the second server 200 that there is no subscriber address directly associated with the second subscriber identity G10000.
S207, after receiving the notification from the third server 300, the second server 200 searches the first user identifier U10000 corresponding to the second user identifier G10000 in the second server 200 according to the third corresponding relationship. For example, the second server 200 looks up the first subscriber identity U10000 corresponding to the second subscriber identity G10000 in table 5 which is established and stored locally.
S208, the second server 200 obtains the user address containing multiple address hierarchies corresponding to the first user identifier U10000 in the first corresponding relationship. For example, the second server 200 obtains the corresponding user address according to the user identifier U10000 in table 1:
cell identity Building mark Building area mark User floor House number
Star cell 2 A 3 2
And S209, the second server 200 searches the access control address corresponding to the access control identification in the second corresponding relation. For example, the second server 200 searches for the access control address corresponding to the access control identifier D10000 in table 2:
cell identity Building mark Entrance guard floor
Star cell 1
S210, the second server 200 determines whether the access control address obtained in step S209 belongs to the subset of the user address obtained in step S208, and if so, executes step S211.
S211, the second server 200 sends an unlocking command to the door controller 500 corresponding to the access control identifier, so as to open the corresponding door.
Similarly, compared with the situation that the corresponding relation between the user identification and the entrance guard identification is set in the table 1 to indicate the authority of which doors the user has, the scheme indicates the corresponding relation between the entrance guard identification and the entrance guard address through the second corresponding relation, and the modification workload is smaller when the entrance guard identification and the entrance guard address need to be modified.
It can be seen from the embodiments corresponding to fig. 2 and fig. 4 that, when the mobile terminal scans the access control two-dimensional code 700 and sends the user identifier corresponding to the mobile terminal to the first server 100, the second server 200 cannot determine whether the user identifier is the owner or the visitor, the second server 200 first forwards the user identifier to the third server to determine whether the user identifier corresponds to the owner of the cell, and if not, further determines whether the user identifier corresponds to the visitor in the second server according to the third corresponding relationship, so that the owner who accesses the access control more frequently uses the mobile terminal to scan the door, the time spent on accessing the visitor with a lower access control frequency is shorter, and the time spent on accessing the visitor with a lower access control frequency is longer, thereby improving the user experience as a whole. On the contrary, if the second server 200 receives the user identifier, it is determined whether the user identifier corresponds to the visitor according to the third corresponding relationship, and if not, the user identifier is sent to the third server 300, so that the time spent by the owner of the user who accesses the door control more frequently to open the door by scanning the mobile terminal is longer, the time spent by the visitor who accesses the door control with lower frequency is shorter, and the user experience is deteriorated as a whole.
It should be understood that the above embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same, and those skilled in the art can modify the technical solutions described in the above embodiments, or make equivalent substitutions for some technical features; and all such modifications and alterations are intended to fall within the scope of the appended claims.

Claims (11)

1. A system for controlling access control, comprising: the system comprises a mobile terminal, a first server, a second server and a third server;
the mobile terminal is used for sending a first user identification and a second user identification to the first server;
the first server is used for forwarding the first user identification and the second user identification to the second server;
the second server is configured to send a first request for returning a first corresponding relationship to the third server, and establish a third corresponding relationship, where the first request includes the first user identifier, the first corresponding relationship is used to indicate a corresponding relationship between the first user identifier and a user address, and the third corresponding relationship is used to indicate a corresponding relationship between the first user identifier and the second user identifier;
the second server is also used for storing a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
the mobile terminal is further used for reading an entrance guard identification by scanning an entrance guard two-dimensional code and sending the entrance guard identification and the second user identification to the first server;
the first server is used for forwarding the access control identification and the second user identification to the second server;
the second server is configured to send a second request for returning the first corresponding relationship to the third server, where the second request includes the second user identifier;
the third server is used for sending a notification that the first corresponding relation corresponding to the second user identification does not exist to the second server according to the second request;
the second server is further configured to:
searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification:
searching a user address corresponding to the first user identification according to the first corresponding relation:
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
2. The system of claim 1, wherein,
the mobile terminal is configured to send the first user identifier and the second user identifier to the first server specifically as follows:
the mobile terminal is used for sending a first user identification and a second user identification to the first server by identifying a first two-dimensional code, wherein the first two-dimensional code comprises the first user identification.
3. A method for controlling entrance guard is characterized by comprising the following steps:
the mobile terminal sends a first user identification and a second user identification to a first server;
the first server forwards the first user identification and the second user identification to a second server;
the second server sends a first request for returning a first corresponding relation to a third server, and establishes a third corresponding relation, wherein the first request comprises the first user identifier, the first corresponding relation is used for representing the corresponding relation between the first user identifier and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identifier and the second user identifier;
the second server also stores a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
the mobile terminal reads an entrance guard identification by scanning an entrance guard two-dimensional code and sends the entrance guard identification and the second user identification to the first server;
the first server forwards the access control identification and the second user identification to the second server;
the second server sends a second request for returning the first corresponding relation to the third server, wherein the second request comprises the second user identification;
the third server sends a notification that the first corresponding relation corresponding to the second user identification does not exist to the second server according to the second request;
the second server searches the first user identification corresponding to the second user identification from the third corresponding relation according to the notification:
the second server searches a user address corresponding to the first user identifier according to the first corresponding relation:
the second server searches an access control address corresponding to the access control identification according to the second corresponding relation;
and the second server judges whether the access control address belongs to the subset of the user address, and if so, sends an unlocking command to the door controller corresponding to the access control identifier.
4. The method of claim 3, wherein:
the sending, by the mobile terminal, the first user identifier and the second user identifier to the first server specifically includes:
the mobile terminal sends a first user identification and a second user identification to the first server by identifying a first two-dimensional code, wherein the first two-dimensional code comprises the first user identification.
5. A system for controlling access control, comprising: the system comprises a mobile terminal, a first server, a second server and a third server;
the mobile terminal reads an entrance guard identification by scanning an entrance guard two-dimensional code and sends the entrance guard identification and the first user identification to the first server;
the first server is used for forwarding the access control identification and the first user identification to the second server;
the second server is configured to send a request for returning a first corresponding relationship to the third server, where the request includes the first user identifier; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address;
the second server is also used for storing a second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
the second server is further configured to:
searching a user address corresponding to the first user identification according to the first corresponding relation;
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
6. The utility model provides a server of control entrance guard, characterized by is used for:
receiving an entrance guard identification and a first user identification;
sending a request for returning a first corresponding relation to another server, wherein the request contains the first user identification; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address;
storing the second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
searching a user address corresponding to the first user identification according to the first corresponding relation;
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
7. A method for controlling entrance guard is characterized by comprising the following steps:
receiving an entrance guard identification and a first user identification;
sending a request for returning a first corresponding relation to another server, wherein the request contains the first user identification; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address;
storing the second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
searching a user address corresponding to the first user identification according to the first corresponding relation;
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
8. A storage medium storing code, the code executable by a processor to perform the steps of:
receiving an entrance guard identification and a first user identification;
sending a request for returning a first corresponding relation to another server, wherein the request contains the first user identification; the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address;
storing the second corresponding relation; the second corresponding relation represents the corresponding relation between the access control identification and the access control address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
searching a user address corresponding to the first user identification according to the first corresponding relation;
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
9. The utility model provides a server of control entrance guard, characterized by is used for:
receiving a first user identification and a second user identification;
establishing a third corresponding relation according to the first user identification and the second user identification, and sending a first request for returning the first corresponding relation to another server, wherein the first request comprises the first user identification, the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identification and the second user identification;
storing the second corresponding relation; the second corresponding relation is used for representing the corresponding relation between the entrance guard identification and the entrance guard address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
receiving an entrance guard identification and a second user identification;
sending a second request for returning the first corresponding relation to the other server, wherein the second request comprises the second user identification;
receiving a notification returned by the other server, wherein the notification is used for indicating that no first corresponding relation corresponding to the second user identification exists;
searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification:
searching a user address corresponding to the first user identification according to the first corresponding relation:
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
10. A method for controlling entrance guard is characterized by comprising the following steps:
receiving a first user identification and a second user identification;
establishing a third corresponding relation according to the first user identification and the second user identification, and sending a first request for returning the first corresponding relation to another server, wherein the first request comprises the first user identification, the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identification and the second user identification;
storing the second corresponding relation; the second corresponding relation is used for representing the corresponding relation between the entrance guard identification and the entrance guard address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
receiving an entrance guard identification and a second user identification;
sending a second request for returning the first corresponding relation to the other server, wherein the second request comprises the second user identification;
receiving a notification returned by the other server, wherein the notification is used for indicating that no first corresponding relation corresponding to the second user identification exists;
searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification:
searching a user address corresponding to the first user identification according to the first corresponding relation:
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
11. A storage medium storing code, the code executable by a processor to perform the steps of:
receiving a first user identification and a second user identification;
establishing a third corresponding relation according to the first user identification and the second user identification, and sending a first request for returning the first corresponding relation to another server, wherein the first request comprises the first user identification, the first corresponding relation is used for representing the corresponding relation between the first user identification and the user address, and the third corresponding relation is used for representing the corresponding relation between the first user identification and the second user identification;
storing the second corresponding relation; the second corresponding relation is used for representing the corresponding relation between the entrance guard identification and the entrance guard address; the user address comprises a plurality of address hierarchies, the entrance guard address at least comprises one address hierarchy, and the number of the address hierarchies of the entrance guard address is smaller than that of the user address;
receiving an entrance guard identification and a second user identification;
sending a second request for returning the first corresponding relation to the other server, wherein the second request comprises the second user identification;
receiving a notification returned by the other server, wherein the notification is used for indicating that no first corresponding relation corresponding to the second user identification exists;
searching a first user identification corresponding to the second user identification from the third corresponding relation according to the notification:
searching a user address corresponding to the first user identification according to the first corresponding relation:
searching an access control address corresponding to the access control identification according to the second corresponding relation;
and judging whether the access control address belongs to the subset of the user address, and if so, sending an unlocking command to a door controller corresponding to the access control identifier.
CN201811271485.2A 2018-10-29 2018-10-29 System, server, method and storage medium for controlling access Active CN110021096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811271485.2A CN110021096B (en) 2018-10-29 2018-10-29 System, server, method and storage medium for controlling access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811271485.2A CN110021096B (en) 2018-10-29 2018-10-29 System, server, method and storage medium for controlling access

Publications (2)

Publication Number Publication Date
CN110021096A CN110021096A (en) 2019-07-16
CN110021096B true CN110021096B (en) 2021-07-09

Family

ID=67188525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811271485.2A Active CN110021096B (en) 2018-10-29 2018-10-29 System, server, method and storage medium for controlling access

Country Status (1)

Country Link
CN (1) CN110021096B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395377A (en) * 2019-08-19 2021-02-23 中国电信股份有限公司 Address recognition method, device and storage medium
CN111192393B (en) * 2019-09-19 2022-04-22 腾讯科技(深圳)有限公司 Network door opening method and device and computer equipment
CN111210551A (en) * 2020-01-13 2020-05-29 中国建设银行股份有限公司 Access control system, access control information issuing method, device, server and storage medium
CN111881162A (en) * 2020-06-16 2020-11-03 深圳酷派技术有限公司 NFC access control card control method and device, storage medium and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205281618U (en) * 2015-12-11 2016-06-01 北京梦想加科技有限公司 Intelligence two -dimensional code system of opening door
CN106340103A (en) * 2016-08-30 2017-01-18 厦门狄耐克电子科技有限公司 Community access control method and community access control system
CN107221050A (en) * 2016-11-25 2017-09-29 天地融科技股份有限公司 A kind of entrance guard controlling method and system
CN107507305A (en) * 2017-07-21 2017-12-22 厦门狄耐克智能科技股份有限公司 A kind of access control system of residential community and door opening method based on wechat
CN107945315A (en) * 2016-10-13 2018-04-20 深圳市康悦合科技开发有限公司 Entrance guard controlling method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205281618U (en) * 2015-12-11 2016-06-01 北京梦想加科技有限公司 Intelligence two -dimensional code system of opening door
CN106340103A (en) * 2016-08-30 2017-01-18 厦门狄耐克电子科技有限公司 Community access control method and community access control system
CN107945315A (en) * 2016-10-13 2018-04-20 深圳市康悦合科技开发有限公司 Entrance guard controlling method and system
CN107221050A (en) * 2016-11-25 2017-09-29 天地融科技股份有限公司 A kind of entrance guard controlling method and system
CN107507305A (en) * 2017-07-21 2017-12-22 厦门狄耐克智能科技股份有限公司 A kind of access control system of residential community and door opening method based on wechat

Also Published As

Publication number Publication date
CN110021096A (en) 2019-07-16

Similar Documents

Publication Publication Date Title
CN110021096B (en) System, server, method and storage medium for controlling access
CN110021090B (en) System, server and method for controlling linkage of entrance guard and elevator
CN107911421B (en) Method, apparatus, and computer storage medium for configuring cross-network communications in a blockchain
CN110021093B (en) Door access control method based on openid
CN102833817B (en) Network access method and system based on home gateway and home gateway
CN110690996A (en) Configuration method, system and device of intelligent household terminal equipment and terminal equipment
CN110021086B (en) Openid-based temporary authorization access control method
CN104837215A (en) Wireless access point connecting method and device
KR20120064916A (en) Method and apparatus for controlling home network access using phone numbers, and system thereof
CN110021087B (en) Method for quickly binding rooms based on WeChat door opening
CN104303454A (en) Method and apparatus for authenticating access authority for specific resource in wireless communication system
CN106651676A (en) Community business management method and apparatus
CN111243155B (en) Method, device and system for issuing household characteristic information
CN106101995A (en) Location-authentication method and system
CN110475229B (en) Method and device for accessing service data, computer equipment and storage medium
CN113225350B (en) Network resource management method, device, medium and electronic equipment
CN112168090B (en) Sweeper, control method thereof and control method of door control device
CN112153122A (en) Information processing method and device
CN109636952A (en) Access control system and its management method
CN110021088B (en) Page control door opening system and method of distributed authorization architecture
CN106296948A (en) Gate control system based on GPS location and door opening method
CN105991727A (en) Content pushing method and apparatus
CN113762804B (en) Method and system for managing user-changing relationship of power grid enterprise
CN112687045B (en) Intelligent building entrance guard intercom system
CN113436373A (en) Remote unlocking system and method based on APP audio and video call

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant