CN110164001A - Access control method, device and terminal device - Google Patents

Access control method, device and terminal device Download PDF

Info

Publication number
CN110164001A
CN110164001A CN201910273217.2A CN201910273217A CN110164001A CN 110164001 A CN110164001 A CN 110164001A CN 201910273217 A CN201910273217 A CN 201910273217A CN 110164001 A CN110164001 A CN 110164001A
Authority
CN
China
Prior art keywords
access control
visitor
information
wireless signal
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910273217.2A
Other languages
Chinese (zh)
Inventor
彭双全
唐永警
唐永坚
许志斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Think Software Technology Co Ltd
Original Assignee
Shenzhen Think Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Think Software Technology Co Ltd filed Critical Shenzhen Think Software Technology Co Ltd
Priority to CN201910273217.2A priority Critical patent/CN110164001A/en
Publication of CN110164001A publication Critical patent/CN110164001A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention is suitable for gate inhibition's technical field, provides access control method, device and terminal device, comprising: the identity information of visitor is identified, if the identity information of the visitor generates trigger signal by identification verifying;Second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues;The second wireless singal is sent to the access control system, the access control system is controlled and executes door opening action.The embodiment of the present invention can realize merging for intelligent identification technology and access control system under the premise of controlling hardware cost.

Description

Access control method, device and terminal device
Technical field
The invention belongs to gate inhibition's technical field more particularly to a kind of access control methods, device and terminal device.
Background technique
With the development of intelligent identification technology, more and more intelligent identification technologies are used in access control system, such as Face recognition technology.The access control system for possessing intelligent identification technology usually requires system for customization, or needs in original door The intelligent recognition function for being just able to achieve access control system is modified on the hardware configuration of access control system.
However, the access control system for either re-replacing customization is still transformed in original access control system, all need Expend certain hardware cost and time cost (replacement or transformation of access control system need the regular hour).
Summary of the invention
In view of this, the embodiment of the invention provides access control method, device and terminal device, to solve the prior art In how to realize intelligent identification technology with access control system the problem of fusion under the premise of controlling hardware cost.
The first aspect of the embodiment of the present invention provides a kind of access control method, comprising:
The identity information of visitor is identified, if the identity information of the visitor generates trigger signal by identification verifying;
Second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored, wherein described the One wireless signal is the radiofrequency signal that user's operation access control system issues;
The second wireless singal is sent to the access control system, the access control system is controlled and executes door opening action.
The second aspect of the embodiment of the present invention provides a kind of access control device, comprising:
Trigger signal generation unit, the identity information of visitor for identification, if the identity information of the visitor passes through identification Verifying, then generate trigger signal;
Second wireless singal generation unit, for raw according to the trigger signal and the information of the first wireless signal prestored At second wireless singal, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues;
Transmission unit controls the access control system and holds for the second wireless singal to be sent to the access control system Row door opening action.
The third aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in In the memory and the computer program that can run on the processor, when the processor executes the computer program It realizes such as the step of the access control method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the step such as the access control method is realized when the computer program is executed by processor Suddenly.
Existing beneficial effect is the embodiment of the present invention compared with prior art: in the embodiment of the present invention, due to working as visitor When by identification verifying, the first wireless signal for simulating original access control system generates second wireless singal, access control System executes door opening action, i.e., under the premise of not destroying original access control system by the simulation of wireless signal by intelligent recognition skill Art is merged with existing access control system, therefore intelligent identification technology and access control system can be realized while controlling hardware cost Fusion, and eliminate replacement or be transformed access control system time cost.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without creative efforts, can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is the implementation process schematic diagram of the first access control method provided in an embodiment of the present invention;
Fig. 2 is the implementation process schematic diagram of second of access control method provided in an embodiment of the present invention;
Fig. 3 is the schematic diagram of access control device provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " instruction is described special Sign, entirety, step, operation, the presence of element and/or component, but be not precluded one or more of the other feature, entirety, step, Operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In addition, term " first ", " second " etc. are only used for distinguishing description, and should not be understood as in the description of the present application Indication or suggestion relative importance.
Embodiment one:
Fig. 1 shows the flow diagram of the first access control method provided by the embodiments of the present application, and details are as follows:
In S101, the identity information of visitor is identified, if the identity information of the visitor generates touching by identification verifying It signals.
When having detected visitor close to access control system, such as pass through infrared sensor or imaging sensor etc., detection To have visitor close to when, the automatic identity information for obtaining visitor, and the identity information of visitor is identified.If the body of visitor Part information then generates trigger signal by identification verifying, which is the finger for the radiofrequency signal that triggering generation access control is opened Enable signal.
Optionally, the identity information of the identification visitor, comprising:
Pass through the knowledge of any one or any two kinds and combination of the above in recognition of face, fingerprint recognition, speech recognition Other mode, identifies the identity information of visitor.
Obtain the identity informations such as human face image information, finger print information or voice messaging of visitor, and by recognition of face, The identity information of the identification methods such as fingerprint recognition or speech recognition identification visitor.Specifically, these identity informations are passed through pre- If algorithm (such as feature extraction algorithm) be compared with the identity information library prestored, or these identity informations are inputted pre- If neural network model identified, if the identity information of the visitor can be found in the identity information library prestored, or Person then proves that the identity information of the visitor passes through verifying by the identification of preset neural network model.Optionally, in the knowledge Before the identity information of other visitor, typing in advance and the identity information for storing authorization visitor.
It can identify visitor's only with any one identification method in recognition of face, fingerprint recognition, speech recognition Identity information, or visitor is identified using any two kinds in these types of identification method and two or more combined identification methods Identity information further increase the safety of access control system to reinforce the reliability of authentication.
Optionally, before the identity information of the identification visitor, further includes:
The selection instruction for receiving user, selects current identification method.
User described here is the personnel for possessing access control system administration authority, and user can select according to actual needs Current identification method.By taking the access control system of enterprise as an example, usually, gate inhibition is only open to interior employee, in order to improve gate inhibition The safety of system, user can choose recognition of face, fingerprint recognition, speech recognition while combined identification method, Lai Tigao The safety of access control system;When enterprise's Open Day (having external staff visiting), since the finger print information of external staff, voice are believed Breath can not obtain typing in advance, and image information is relatively easy to obtain, therefore can shift to an earlier date what the specified authorization of typing entered The image information of external staff, and the identification method of recognition of face is only selected, allow specified external staff that can also pass through identification Verifying enters.
Optionally, the identity information of the identification visitor, if the identity information of the visitor is generated by identification verifying Trigger signal, comprising:
The identity information of visitor is obtained, and the identity information of the visitor is uploaded to intelligent recognition server;
The recognition result information that the intelligent recognition server returns is received, and institute is judged according to the recognition result information Whether the identity information for stating visitor passes through identification verifying;
If the identity information of the visitor generates trigger signal by identification verifying.
The identity informations such as facial image, fingerprint or the voice of visitor are obtained, and the identity information of the visitor is passed through into object Networking (Internet of Things, IOT) communication modes are uploaded to intelligent recognition server.Internet of Things (Internet of Things, IOT) communication modes may include wired (such as Serial Port Line), wireless (such as Zigbee, WiFi) communication modes or The identity information of the visitor is uploaded to intelligent recognition server, for intelligence by the transmission mode of existing IOT cloud platform by person It can identify that server carries out identity information identification verifying.
The recognition result information that intelligent recognition server returns is received, specific field list can be used in recognition result information Show and be proved to be successful or the recognition result of authentication failed, such as indicate to be proved to be successful with 0, use 1 indicates authentication failed, according to reception The recognition result information arrived, judges whether the identity information of visitor passes through identification verifying.If the identity information of current visitor passes through Identification verifying, then generate trigger signal.
In S102, second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored, Wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
Existing access control system is usually constructed with remote control equipment, and (user refers to access control system administrative staff, example to user here Such as the foreground personnel of enterprise) by manually controlling remote control equipment, radiofrequency signal is issued, with the unlatching of access control system.Here First wireless signal refers to the radiofrequency signal that user's operation access control system issues, such as original access control system is distant Signal is controlled, i.e. the first wireless signal is the radiofrequency signal that existing access control system is original, is issued by user's manual handling equipment.This In second wireless singal refer to according to intelligent recognition result automatic trigger generate with first wireless signal have it is identical The wireless signal of feature (such as identical frequency, wave character, encoded information).
Specifically, according to trigger signal, the generation of automatic trigger second wireless singal.The wherein generation of second wireless singal The specific information needed according to the first wireless signal prestored, the information of first wireless signal prestored include first wireless Characteristic information of signal, such as frequency, wave character, encoded information etc..
Optionally, second wireless communication is generated according to the trigger signal and the information of the first wireless signal prestored described Before number, further includes: in the first wireless signal of the acquisition, be decoded to first wireless signal, storage decoding obtains The first wireless signal information, comprising:
The first wireless signal is obtained, first wireless signal is decoded, the first wireless communication that storage decoding obtains Number information.
Can be when access control system to merge intelligent identification technology for the first time, access control system administrative staff pass through the devices such as remote controler The first wireless signal for issuing access control system manually, captures first wireless signal, and to first wireless signal at this time It is decoded, obtains the characteristic informations such as frequency, wave character, the encoded information of the first wireless signal, and by first wireless communication Number information stored.
Optionally, described state obtains the first wireless signal, is decoded to first wireless signal, and storage decoding obtains The first wireless signal information, comprising:
The first wireless signal is captured, first wireless signal is decoded, the first wireless communication that storage decoding obtains Number information, wherein the information of first wireless signal includes the modulation system, centre frequency and base band of the first wireless signal Code information;
Accordingly, described that second wireless communication is generated according to the trigger signal and the information of the first wireless signal prestored Number, comprising:
According to the trigger signal and the modulation system of first wireless signal, centre frequency and base band code information, The base band code is modulated according to the modulation system to the centre frequency, second wireless singal is generated.
The first wireless signal is captured, first wireless signal is decoded, the information of first wireless signal is obtained, It can specifically be realized by following two step:
A: scanning first wireless signal, obtains the modulation system and centre frequency f of first wireless signal0
This step is mainly the processing carried out on frequency domain to the first wireless signal.Initial frequency and the end of scanning are set first Only frequency, since initial frequency, according to preset step value set gradually each frequency point in frequency range to the first wireless signal into Row scanning.When scanning the first wireless signal, received signal strength indicator information (Received Signal can be generated Strength Indication, RSSI), it is identical as the frequency of the first wireless signal in the scan frequency of local frequency, that is, current When, RSSI output amplitude highest, therefore by the way which corresponding RSSI of scanning frequency point by first wireless signal is scanned frequently, judged It is worth highest, then the frequency point is the centre frequency f of the first wireless signal0.Simultaneously by scanning available first wireless signal Spectrogram, may determine that the modulation system of first wireless signal, such as frequency shift keying (Frequency- according to the spectrogram Shift keying, FSK), the modulation systems such as amplitude shift keying ASK (Amplitude-shift keying, ASL).
Since the time is about several milliseconds to usual run-down (from initial frequency to termination frequency), and access control system is original First wireless signal emits duration more than several hundred milliseconds, therefore successively scanning can get the first wireless signal The spectrum signatures information such as modulation system, centre frequency.Optionally, the initial frequency of the scanning of setting is about 200MHZ, terminates frequency Rate may be about 600MHZ.Due to usual access control system the radiofrequency signal i.e. frequency of the first wireless signal be 315MHZ or Person 433MHZ etc., therefore the range for the initial frequency and termination frequency being arranged includes these common radiofrequency signal frequency ranges, energy Enough spectrum signature information that is more acurrate, obtaining first wireless signal more quickly.
B: with the centre frequency f got0For current scan frequency, first wireless signal is scanned again, and obtaining should The base band code information of first wireless signal.
This step is mainly the processing to the first wireless signal in the time domain.With frequency identical with the first radio signal frequency Rate, i.e. the centre frequency f got in step A0For scan frequency, the number for obtaining the first wireless signal in preset time t is compiled Code rule, obtains base band code information.Optionally, which can be according to the centre frequency f got0It determines.In Frequency of heart f0Cycle T=1/f of available first wireless signal0, due to need to only obtain in the first wireless signal a cycle Information can be obtained by the base band code information of the first wireless signal, thus preset time t can be set to slightly larger than T when Between, or t=nT is enabled, wherein n can be the arbitrary value in 2~10.
A, B obtain first wireless communications such as the modulation system, centre frequency, base band code of the first wireless signal through the above steps Number information after, these information are stored.
When detecting trigger signal, according to the modulation system, centre frequency and base band code of the first wireless signal of storage Information etc. modulates the base band code of storage into first wireless signal according to the modulation system of the first wireless signal of storage Frequency of heart obtains the second wireless singal for having the same signal characteristic information with the first wireless signal, that is, the second nothing generated Line signal is equivalent to the duplicate of the first wireless signal.
In S103, the second wireless singal is sent to the access control system, the access control system execution is controlled and opens Door movement.
Visitor is sent to access control system by the second wireless singal that automated intelligent after identification verifying generates, second nothing Line signal is identical as the function of original first wireless signal of access control system.Access control system either receives original user hand The second wireless singal generated after intelligent recognition in the first wireless signal or the embodiment of the present invention that dynamic operation issues, can ring The control of induction signal executes door opening action.
In the embodiment of the present invention, due to simulating the first of original access control system when visitor is by identification verifying Wireless signal generates second wireless singal, and access control system executes door opening action, i.e., before not destroying original access control system Put and merged intelligent identification technology with existing access control system by the simulation of wireless signal, thus can control hardware at This while, realizes merging for intelligent identification technology and access control system, and eliminates replacement or be transformed the time of access control system Cost.
Embodiment two:
Fig. 2 shows the flow diagrams of second of access control method provided by the embodiments of the present application, and details are as follows:
In S201, the identity information of visitor is identified, if the identity information of the visitor generates touching by identification verifying It signals.
S201 is identical as the S101 in a upper embodiment in the present embodiment, referring specifically to the phase of S101 in a upper embodiment Description is closed, is not repeated herein.
Optionally, before the step S201, further includes:
If having detected visitor's visiting, the prompt information of typing identity information is issued;
Record the identity information of visitor's typing.
Currently whether there is visitor's visiting by infrared sensor of the human body or imaging sensor detection, if having detected visitor Visiting, then issue the prompt information of typing identity information.Such as designated position is emitted in a manner of text importing or voice The prompt information of man face image acquiring, fingerprint typing or voice input is carried out, to indicate visitor's typing identity information.Work as visitor When carrying out identity information typing according to prompt, the identity information of visitor's typing is received and recorded.
In S202, second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored, Wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
S202 is identical as the S102 in a upper embodiment in the present embodiment, referring specifically to the phase of S102 in a upper embodiment Description is closed, is not repeated herein.
In S203, the second wireless singal is sent to the access control system, the access control system execution is controlled and opens Door movement.
S203 is identical as the S103 in a upper embodiment in the present embodiment, referring specifically to the phase of S103 in a upper embodiment Description is closed, is not repeated herein.
In S204, the identity information and visiting time information of the visitor are stored.
The identity information for the visitor that will acquire and the visiting time information of the visitor carry out corresponding storage, such as can be with The form of tables of data establishes corresponding relationship, to inquire the visiting record of visitor later.It is alternatively possible to according to the visit got The information such as facial image, fingerprint or the voice of visitor, match the name or number (such as employee number) of the visitor prestored, will Matched name or number is corresponding with visiting time stores, so that the visiting of quick search visitor later records.Optionally, institute Stating visitor is the interior employee for having shifted to an earlier date the enterprise of typing identity information, and matched name or number is corresponding with visiting time After storage, Attendance Sheet is automatically generated, records the attendance situation of interior employee.
In the embodiment of the present invention, due to simulating the first of original access control system when visitor is by identification verifying Wireless signal generates second wireless singal, and access control system executes door opening action, i.e., before not destroying original access control system Put and merged intelligent identification technology with existing access control system by the simulation of wireless signal, thus can control hardware at This while, realizes merging for intelligent identification technology and access control system, and eliminates replacement or be transformed the time of access control system Cost.Meanwhile the identity information by storing visitor every time and visiting time information, can conveniently after carry out visiting history The inquiry of record is also convenient for enterprise and carries out staff attendance record.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Embodiment three:
Fig. 3 shows a kind of structural schematic diagram of access control device provided by the embodiments of the present application, for ease of description, Illustrate only part relevant to the embodiment of the present application:
The access control device includes: trigger signal generation unit 31, second wireless singal generation unit 32, transmission unit 33.Wherein:
Trigger signal generation unit 31, the identity information of visitor for identification, if the identity information of the visitor passes through knowledge It does not verify, then generates trigger signal.
When having detected visitor close to access control system, such as pass through infrared sensor or imaging sensor etc., detection To have visitor close to when, the automatic identity information for obtaining visitor, and the identity information of visitor is identified.If the body of visitor Part information then generates trigger signal by identification verifying, which is the finger for the radiofrequency signal that triggering generation access control is opened Enable signal.
Optionally, the trigger signal generation unit 31 includes:
First identification module, for by recognition of face, fingerprint recognition, in speech recognition any one or any two The identification method of kind and combination of the above, identifies the identity information of visitor.
Optionally, the trigger signal generation unit 31 includes uploading module, judgment module and trigger signal generation module:
Uploading module is uploaded to intelligent recognition for obtaining the identity information of visitor, and by the identity information of the visitor Server.
Judgment module, the recognition result information returned for receiving the intelligent recognition server, and according to the identification Result information judges whether the identity information of the visitor passes through identification verifying.
Trigger signal generation module, if the identity information for the visitor generates trigger signal by identification verifying.
Second wireless singal generation unit 32, for the information according to the trigger signal and the first wireless signal prestored Second wireless singal is generated, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
Existing access control system is usually constructed with remote control equipment, and (user refers to access control system administrative staff, example to user here Such as the foreground personnel of enterprise) by manually controlling remote control equipment, radiofrequency signal is issued, with the unlatching of access control system.Here First wireless signal refers to the radiofrequency signal that user's operation access control system issues, such as original access control system is distant Signal is controlled, i.e. the first wireless signal is the radiofrequency signal that existing access control system is original, is issued by user's manual handling equipment.This In second wireless singal refer to according to intelligent recognition result automatic trigger generate with first wireless signal have it is identical The wireless signal of feature (such as identical frequency, waveform, encoded information).
Transmission unit 33 controls the access control system for the second wireless singal to be sent to the access control system Execute door opening action.
Visitor is sent to access control system by the second wireless singal that automated intelligent after identification verifying generates, second nothing Line signal is identical as the function of original first wireless signal of access control system.Access control system either receives original user hand Second wireless singal after intelligent recognition generates in the first wireless signal or the embodiment of the present invention that dynamic operation issues, can ring The control of induction signal executes door opening action.
Optionally, the access control device further include:
Prompt unit, if issuing the prompt information of typing identity information for having detected visitor's visiting;Record visitor The identity information of typing.
Optionally, the access control device further include:
First wireless signal acquiring unit is decoded first wireless signal for the first wireless signal of acquisition, The information for the first wireless signal that storage decoding obtains.
Optionally, the first wireless signal acquiring unit includes:
Decoder module is captured, for capturing the first wireless signal, first wireless signal is decoded, storage decoding The information of the first obtained wireless signal, wherein the information of first wireless signal includes the modulation methods of the first wireless signal Formula, centre frequency and base band code information.
Accordingly, the second wireless singal generation unit 32 includes:
Modulation module, for modulation system, the centre frequency according to the trigger signal and first wireless signal With base band code information, the base band code is modulated according to the modulation system to the centre frequency, second wireless singal is generated.
Optionally, the access control device further include:
Storage unit, for storing the identity information and visiting time information of the visitor.
In the embodiment of the present invention, due to simulating the first of original access control system when visitor is by identification verifying Wireless signal generates second wireless singal, and access control system executes door opening action, i.e., before not destroying original access control system Put and merged intelligent identification technology with existing access control system by the simulation of wireless signal, thus can control hardware at This while, realizes merging for intelligent identification technology and access control system, and eliminates replacement or be transformed the time of access control system Cost.
Example IV:
Fig. 4 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in figure 4, the terminal of the embodiment is set Standby 4 include: processor 40, memory 41 and are stored in the meter that can be run in the memory 41 and on the processor 40 Calculation machine program 42, such as access control program.The processor 40 realizes above-mentioned each door when executing the computer program 42 Prohibit the step in control method embodiment, such as step S101 to S103 shown in FIG. 1.Alternatively, the processor 40 executes institute The function of each module/unit in above-mentioned each Installation practice, such as module 31 to 33 shown in Fig. 3 are realized when stating computer program 42 Function.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 42 in the terminal device 4 is described.For example, the computer program 42 can be divided It is cut into trigger signal generation unit, second wireless singal generation unit, transmission unit, each unit concrete function is as follows:
Trigger signal generation unit, the identity information of visitor for identification, if the identity information of the visitor passes through identification Verifying, then generate trigger signal.
Second wireless singal generation unit, for raw according to the trigger signal and the information of the first wireless signal prestored At second wireless singal, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues.
Transmission unit controls the access control system and holds for the second wireless singal to be sent to the access control system Row door opening action.
The terminal device 4 can be raspberry pie, desktop PC, notebook, palm PC and cloud server etc. Calculate equipment.The terminal device may include, but be not limited only to, processor 40, memory 41.Those skilled in the art can manage Solution, Fig. 4 is only the example of terminal device 4, does not constitute the restriction to terminal device 4, may include more or more than illustrating Few component perhaps combines certain components or different components, such as the terminal device can also be set including input and output Standby, network access equipment, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk or interior of terminal device 4 It deposits.The memory 41 is also possible to the External memory equipment of the terminal device 4, such as be equipped on the terminal device 4 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 41 can also both include the storage inside list of the terminal device 4 Member also includes External memory equipment.The memory 41 is for storing needed for the computer program and the terminal device Other programs and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of access control method characterized by comprising
The identity information of visitor is identified, if the identity information of the visitor generates trigger signal by identification verifying;
Second wireless singal is generated according to the trigger signal and the information of the first wireless signal prestored, wherein first nothing Line signal is the radiofrequency signal that user's operation access control system issues;
The second wireless singal is sent to the access control system, the access control system is controlled and executes door opening action.
2. access control method as described in claim 1, which is characterized in that the identity information of the identification visitor, comprising:
Pass through the identification side of any one or any two kinds and combination of the above in recognition of face, fingerprint recognition, speech recognition Formula identifies the identity information of visitor.
3. access control method as described in claim 1, which is characterized in that before the identity information of the identification visitor, Further include:
If having detected visitor's visiting, the prompt information of typing identity information is issued;
Record the identity information of visitor's typing.
4. access control method as described in claim 1, which is characterized in that the identity information of the identification visitor, if described The identity information of visitor then generates trigger signal by identification verifying, comprising:
The identity information of visitor is obtained, and the identity information of the visitor is uploaded to intelligent recognition server;
The recognition result information that the intelligent recognition server returns is received, and the visit is judged according to the recognition result information Whether the identity information of visitor passes through identification verifying;
If the identity information of the visitor generates trigger signal by identification verifying.
5. access control method as described in claim 1, which is characterized in that according to the trigger signal and prestored described The information of first wireless signal generates before second wireless singal, further includes:
The first wireless signal is obtained, first wireless signal is decoded, the first wireless signal that storage decoding obtains Information.
6. access control method as claimed in claim 4, which is characterized in that the first wireless signal of the acquisition, to described One wireless signal is decoded, the information for the first wireless signal that storage decoding obtains, comprising:
The first wireless signal is captured, first wireless signal is decoded, the first wireless signal that storage decoding obtains Information, wherein the information of first wireless signal includes modulation system, centre frequency and base band the code letter of the first wireless signal Breath;
Accordingly, described that second wireless singal, packet are generated according to the trigger signal and the information of the first wireless signal prestored It includes:
According to the trigger signal and the modulation system of first wireless signal, centre frequency and base band code information, by institute It states base band code to modulate according to the modulation system to the centre frequency, generates second wireless singal.
7. access control method as described in claim 1, which is characterized in that be sent to the second wireless singal described The access control system controls after the access control system executes door opening action, further includes:
Store the identity information and visiting time information of the visitor.
8. a kind of access control device characterized by comprising
Trigger signal generation unit, the identity information of visitor for identification, if the identity information of the visitor by identification verifying, Then generate trigger signal;
Second wireless singal generation unit, for generating the according to the trigger signal and the information of the first wireless signal prestored Two wireless signals, wherein first wireless signal is the radiofrequency signal that user's operation access control system issues;
Transmission unit controls the access control system execution and opens for the second wireless singal to be sent to the access control system Door movement.
9. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor The computer program of operation, which is characterized in that the processor realizes such as claim 1 to 7 when executing the computer program The step of any one the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In when the computer program is executed by processor the step of any one of such as claim 1 to 7 of realization the method.
CN201910273217.2A 2019-04-04 2019-04-04 Access control method, device and terminal device Pending CN110164001A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910273217.2A CN110164001A (en) 2019-04-04 2019-04-04 Access control method, device and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910273217.2A CN110164001A (en) 2019-04-04 2019-04-04 Access control method, device and terminal device

Publications (1)

Publication Number Publication Date
CN110164001A true CN110164001A (en) 2019-08-23

Family

ID=67639120

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910273217.2A Pending CN110164001A (en) 2019-04-04 2019-04-04 Access control method, device and terminal device

Country Status (1)

Country Link
CN (1) CN110164001A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882739A (en) * 2020-07-21 2020-11-03 中国工商银行股份有限公司 Entrance guard verification method, entrance guard device, server and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040061591A1 (en) * 2002-09-27 2004-04-01 Teich Rudor M. Remote code authorization for access control systems
CN101158867A (en) * 2007-10-26 2008-04-09 海信集团有限公司 Remote control method of household electrical appliance and alarm capable of controlling household electrical appliance
CN101291365A (en) * 2008-05-14 2008-10-22 深圳创维-Rgb电子有限公司 Mobile phone and remote setting method of the mobile phone
CN201241526Y (en) * 2007-12-03 2009-05-20 董志毅 Remote control door lock and specific remote controller thereof
CN102339529A (en) * 2010-07-20 2012-02-01 唐守龙 Radio frequency remote control device with infrared learning function
CN102945619A (en) * 2012-10-17 2013-02-27 深圳市中兴移动通信有限公司 Radio remote signal learning device and learning method
CN203490750U (en) * 2013-08-29 2014-03-19 王科达 Control structure for access control device
CN104050736A (en) * 2013-03-14 2014-09-17 福特全球技术公司 Key fob security copy to a mobile phone
CN207319310U (en) * 2017-03-27 2018-05-04 广州市果豆科技有限责任公司 A kind of intelligent access controller and intelligent access control system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040061591A1 (en) * 2002-09-27 2004-04-01 Teich Rudor M. Remote code authorization for access control systems
CN101158867A (en) * 2007-10-26 2008-04-09 海信集团有限公司 Remote control method of household electrical appliance and alarm capable of controlling household electrical appliance
CN201241526Y (en) * 2007-12-03 2009-05-20 董志毅 Remote control door lock and specific remote controller thereof
CN101291365A (en) * 2008-05-14 2008-10-22 深圳创维-Rgb电子有限公司 Mobile phone and remote setting method of the mobile phone
CN102339529A (en) * 2010-07-20 2012-02-01 唐守龙 Radio frequency remote control device with infrared learning function
CN102945619A (en) * 2012-10-17 2013-02-27 深圳市中兴移动通信有限公司 Radio remote signal learning device and learning method
CN104050736A (en) * 2013-03-14 2014-09-17 福特全球技术公司 Key fob security copy to a mobile phone
CN203490750U (en) * 2013-08-29 2014-03-19 王科达 Control structure for access control device
CN207319310U (en) * 2017-03-27 2018-05-04 广州市果豆科技有限责任公司 A kind of intelligent access controller and intelligent access control system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
任萍萍: "《智能客服机器人》", 31 August 2017 *
王一丁,李琛,王蕴红: "《数字图像处理》", 31 August 2015 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882739A (en) * 2020-07-21 2020-11-03 中国工商银行股份有限公司 Entrance guard verification method, entrance guard device, server and system

Similar Documents

Publication Publication Date Title
US20200105081A1 (en) Access control method, access control apparatus, system, and storage medium
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
US9818244B2 (en) Method and system for permitting remote check-in and coordinating access control
CN206431720U (en) Wireless intelligent access control system
CN106447944A (en) Intelligent handover cabinet system and intelligent handover method based on internet of things
CN109887144A (en) A kind of visitor's recognition methods, device and computer readable storage medium
CN108537929A (en) Remote de-locking system and remote de-locking method
CN206522020U (en) A kind of intelligent door lock and system
CN101872436A (en) Multi-user synchronous fingerprint authentication method
CN104954138B (en) Based on the dynamic password formation method of iris information
CN104851164A (en) Intelligent lock with biological feature recognition function and control method thereof
Kamaraju et al. Wireless fingerprint attendance management system
CN106296903A (en) A kind of gate control system based on fingerprint recognition
CN109389711A (en) Gate inhibition's unlocking method, device, equipment and medium based on living things feature recognition
CN106097519A (en) Control device of electronic lock, control method and application of control device
CN203276380U (en) Distributed door access authentication system based on palm veins
CN109741509A (en) A kind of the face access control system and information authentication method of double authentication
CN107038509A (en) Self-service registration-management system
Govindraj et al. Smart door using biometric NFC band and OTP based methods
CN110164001A (en) Access control method, device and terminal device
CN108986444A (en) A kind of learning method and its transmitting equipment of infrared coding
CN106355684B (en) Control method, the device and system of controlled plant
CN108305408A (en) A kind of safe and reliable intelligent locker system and management method
CN112907791A (en) Intelligent key cabinet system based on RFID accurate identification and face identification technology
CN205809949U (en) Quick Response Code is swiped the card door opener

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823

RJ01 Rejection of invention patent application after publication