CN110246246A - Access control management method and device - Google Patents
Access control management method and device Download PDFInfo
- Publication number
- CN110246246A CN110246246A CN201910427686.5A CN201910427686A CN110246246A CN 110246246 A CN110246246 A CN 110246246A CN 201910427686 A CN201910427686 A CN 201910427686A CN 110246246 A CN110246246 A CN 110246246A
- Authority
- CN
- China
- Prior art keywords
- unlocking
- information
- door lock
- credential information
- intelligent door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the present invention provides a kind of access control management method and device, belongs to field of security technology.It include: the unlocking credential information for obtaining first movement terminal and sending;If detecting the authorized order for authorizing unlocking authority for unlocking credential information, unlocking credential information is sent to intelligent door lock, and store in the information bank into intelligent door lock, the unlocking credential information that unlocking authority has been awarded is stored in information bank.Method provided in an embodiment of the present invention, the unlocking credential information sent by obtaining first movement terminal.If detecting the authorized order for authorizing unlocking authority for unlocking credential information, unlocking credential information is sent to intelligent door lock, and store in the information bank into intelligent door lock.Since empowerment management can be carried out with dual lock credential information, so that the safety of intelligent door lock can be improved.
Description
Technical field
The present invention relates to field of security technology more particularly to a kind of access control management methods and device.
Background technique
With the high speed development of social economy, people start to pursue the living environment of comfortable safety, and intelligent building is fast therewith
Exhibition is hailed, access control system is increasingly paid attention to as the significant element in intelligent building, and access control system is also known as gate inhibition's entrance
Automated management system is related to many new technology necks such as electronics, machinery, optics, computer technology, the communication technology, biotechnology
Domain has to multiple functions such as portal access and exit control, security and anti-theft, alarms, it mainly facilitates interior employee or resident to enter and leave, Du
Exhausted nonnative personnel arbitrarily enters and leaves, and not only facilitates internal control, but also enhances internal security personnel.In the related art, user is usual
As long as having the i.e. openable door lock of access card, and the possibility that access card is found in the presence of loss by people, to cause security risk.Cause
This, is badly in need of a kind of access control management method at present.
Summary of the invention
To solve the above-mentioned problems, the embodiment of the present invention provides one kind and overcomes the above problem or at least be partially solved
State the access control management method and device of problem.
According to a first aspect of the embodiments of the present invention, a kind of access control management method is provided, comprising:
Obtain the unlocking credential information that first movement terminal is sent;
If detecting the authorized order for authorizing unlocking authority for the unlocking credential information, by the unlocking credential information
In the information bank for being sent to intelligent door lock, and storing into the intelligent door lock, it is stored in described information storehouse and is awarded out
Lock the unlocking credential information of permission.
According to a second aspect of the embodiments of the present invention, a kind of gate inhibition management apparatus is provided, comprising:
First obtains module, for obtaining the unlocking credential information of first movement terminal transmission;
First sending module, for when detect authorize the authorized order of unlocking authority for the unlocking credential information when,
In the information bank that then the unlocking credential information is sent to intelligent door lock, and is stored into the intelligent door lock, the information
The unlocking credential information that unlocking authority has been awarded is stored in library.
According to a third aspect of the embodiments of the present invention, a kind of electronic equipment is provided, comprising:
At least one processor;And
At least one processor being connect with processor communication, in which:
Memory is stored with the program instruction that can be executed by processor, and the instruction of processor caller is able to carry out first party
Access control management method provided by any possible implementation in the various possible implementations in face.
According to the fourth aspect of the invention, a kind of non-transient computer readable storage medium, non-transient computer are provided
Readable storage medium storing program for executing stores computer instruction, and computer instruction makes the various possible implementations of computer execution first aspect
In access control management method provided by any possible implementation.
Access control management method and device provided in an embodiment of the present invention, by obtain first movement terminal send unlocking with
Demonstrate,prove information.If detecting the authorized order for authorizing unlocking authority for the unlocking credential information, by the unlocking credential information
In the information bank for being sent to intelligent door lock, and storing into the intelligent door lock.Due to that can be awarded with dual lock credential information
Power management, so that the safety of intelligent door lock can be improved.
It should be understood that above general description and following detailed description be it is exemplary and explanatory, can not
Limit the embodiment of the present invention.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of flow diagram of access control management method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of gate inhibition management apparatus provided in an embodiment of the present invention;
Fig. 3 is the block diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
For the problems in the relevant technologies, the embodiment of the invention provides a kind of access control management methods.This method can answer
For enabling scene, cell gate inhibition scene and the enabling scene of room tenant in different scenes, such as enterprise, the present invention is real
It applies example and this is not especially limited.In order to make it easy to understand, the embodiment of the present invention by be applied to room tenant enabling scene for,
Method flow is explained.Wherein, the enabling scene of room tenant generally refers to rent a house for a set of, corresponds to
The entry door of intelligent door lock is installed, being rented a house due to the set might have many tenants, thus these tenants enter rent a house when,
It is required to open intelligent door lock.Correspondingly, the executing subject of this method can be mobile terminal, and specifically corresponding is to have management
The mobile terminal of permission.
Referring to Fig. 1, this method comprises: the unlocking credential information that 101, acquisition first movement terminal is sent;If 102, detecting
To the authorized order for authorizing unlocking authority for unlocking credential information, then unlocking credential information is sent to intelligent door lock, and store
The unlocking credential information that unlocking authority has been awarded is stored in information bank into intelligent door lock, in information bank.
In conjunction with scene of renting a house, by taking the second mobile terminal that executing subject uses for second user (landlord) as an example, first is used
Family (tenant) can send unlocking credential information to the second mobile terminal by first movement terminal.Second mobile terminal is receiving
First movement terminal send unlocking credential information after, if detecting the authorized order of second user, can by the unlocking with
Card information is sent to intelligent door lock, and subsequent first user can be used the unlocking credential information and open intelligent door lock.
Method provided in an embodiment of the present invention, the unlocking credential information sent by obtaining first movement terminal.If detection
To the authorized order for authorizing unlocking authority for unlocking credential information, then unlocking credential information is sent to intelligent door lock, and store
In information bank into intelligent door lock.Since empowerment management can be carried out with dual lock credential information, so that intelligent door lock can be improved
Safety.
Content based on the above embodiment, as a kind of alternative embodiment, unlocking credential information is ID card information, character
String or IC card data.
Specifically, with tenant be the first user, unlocking credential information be character string for, when the first user need open into
When the door of family, the Bluetooth function of first movement terminal can be opened, and by first movement terminal close to intelligent door lock.At this point, first
The APP relevant to intelligent door lock installed on mobile terminal can be sent to intelligent door lock for opening intelligent door lock by bluetooth
Character string.It should be noted that first movement terminal is sent out to intelligent door lock in order to guarantee safety during actual implementation
When sending character string, APP can carry out preset times encryption to character string, obtain encrypted characters string.
For first movement terminal after sending encrypted characters string to intelligent door lock, the bluetooth module in intelligent door lock is available
Encrypted characters string.Bluetooth module in intelligent door lock, can be by deciphering module to encrypted characters after getting encrypted characters string
String is decrypted.Door lock control module in intelligent door lock is used to open intelligent door what the first movement terminal got was sent
After the character string of lock, can by obtained character string and the pre-stored character string library (namely information bank) with unlocking authority into
Row compares.If the character string is located in character string library, unlatching intelligent door lock is controlled.Conversely, can then prompt unlocking authentication failed.
Added it should be noted that encrypted characters string can be based on 3 group keys randomly selected and 3 group encryption algorithms
It is obtained after close.Wherein, preset times can be 3 times, can specifically be encrypted in such a way that 3 secondary keys encrypt, this hair
Bright embodiment is not especially limited this.It should be noted that APP, can be from preset 10 when carrying out the encryption of 3 secondary keys
Group key randomly chooses 3 group keys, and 3 group encryption algorithms are randomly choosed in preset 10 group encryption algorithm, and based on random
3 group keys and 3 group encryption algorithms of selection, encrypt character string, obtain encrypted characters string.
It should be noted that as shown in the above, APP, can when encrypting to character string in first movement terminal
It is encrypted with randomly choosing 3 group keys and 3 group encryption algorithms.Correspondingly, intelligent door lock can be preset 10 group keys and
10 group encryption algorithms, and 10 group key and 10 group encryption algorithms are based on, it is decrypted by 3 times, obtains decrypted result namely first
Mobile terminal is used to open the character string of intelligent door lock.It should be noted that every time after the completion of the communication process of encrypting and decrypting, it is close
Key can update simultaneously with Encryption Algorithm, and the present invention is not especially limit this.
Specifically, with tenant be the first user, unlocking credential information be ID card information for, when the first user need beat
It, can be by the identity card of oneself close to intelligent door lock when opening entry door.At this point, identity card read module in intelligent door lock can be with
Reading identity card information.Wherein, ID card information can be the check code of identity card, and the embodiment of the present invention does not limit this specifically
It is fixed.Door lock control module in intelligent door lock, can be to body after getting the ID card information that identity card read module is read
Part card information is verified.If being proved to be successful, unlatching intelligent door lock is controlled.Conversely, can then prompt unlocking authentication failed.Wherein
Specific verification mode can be with are as follows: ID card information is compared with pre-stored ID card information library;If ID card information
It is present in ID card information library, it is determined that ID card information is verified, and opens intelligent door lock.
Specifically, the door lock control module in intelligent door lock is getting the identity card letter that identity card read module reads
After breath, ID card information can be compared with pre-stored ID card information library.If the ID card information is located at identity card
In information bank, then unlatching intelligent door lock is controlled.Conversely, can then prompt unlocking authentication failed.Wherein, the body in ID card information library
Part card information is that by real-name authentication and unlocking authority is awarded.
Specifically, with tenant for the first user, unlocking credential information is IC card data instance, when the first user needs to open
It, can be by IC card close to intelligent door lock when entry door.At this point, the IC card read module in intelligent door lock can read IC card number
According to.Door lock control module in intelligent door lock, can be by IC card number after getting the IC card data that IC card read module is read
It is compared according to the pre-stored IC card database with unlocking authority.If the IC card data are located in IC card database,
Then control unlatching intelligent door lock.Conversely, can then prompt unlocking authentication failed.
Method provided in an embodiment of the present invention, the first user can be opened by different types of unlocking credential information
Lock is not take up both hands and simple and easy since user unlocks, so that user experience is preferable.
Content based on the above embodiment, as a kind of alternative embodiment, if unlocking credential information is ID card information,
ID card information is the real-name authentication by first movement terminal.
By the content of above-described embodiment it is found that the first user can open intelligent door lock by identity card.In order to guarantee to pacify
Quan Xing, the ID card information of the first user need to pass through real-name authentication.For example, just in case tenant is the crime point of public security system record
Son, can also be in time by finding by real-name authentication from the background, and is notified to public security system.
Wherein, the first user can shoot itself facial image, the people that first movement terminal can be shot according to the first user
The identity card head portrait of face image and the first user carry out real-name authentication to the first user.Specifically, the first user can open
The APP relevant to intelligent door lock installed in first movement terminal, the facial image of itself is shot by first movement terminal.The
One mobile terminal can prompt the first user of ground to input the identification card number of itself after the facial image for obtaining the first user shooting,
To which identity-based card number transfers the identity card head portrait of the first user from public security system.If the two matches, first can determine
User's real-name authentication passes through.It is on the contrary, it is determined that the failure of first user's real-name authentication.It should be noted that in addition to by the first user
It inputs except the identification card number of itself, can also identify the identity card of the first user to obtain by way of optical character identification
Identification card number, the present invention is not especially limit this.
Method provided in an embodiment of the present invention, since the ID card information for opening intelligent door lock is to need to pass through reality
Name authenticates and needs to be awarded unlocking authority, so as to improve safety.
Content based on the above embodiment, as a kind of alternative embodiment, obtain unlocking that first movement terminal is sent with
After card information, further includes: if detecting the authorized order for authorizing unlocking authority for unlocking credential information, authorized order is returned
First movement terminal is reached, so that unlocking credential information is sent to intelligent door lock by first movement terminal, and is stored to intelligence
In information bank in door lock.
By taking unlocking credential information is ID card information as an example, in conjunction with the content of step 102 in above-described embodiment, first movement
The ID card information of first user can be sent to the second mobile terminal after first user's real-name authentication passes through by terminal.Second
Mobile terminal can receive the ID card information that first movement terminal is sent, and according to the authorized order of second user input to identity
Card information authorizes unlocking authority.Specifically, with tenant for the first user, landlord is for second user.First user is passing through
After first movement terminal carries out real-name authentication, the ID card information after real-name authentication can be sent to second by first movement terminal
Mobile terminal authorizes unlocking authority by second user by input authorized order for the ID card information of the first user, and by the
First user is passed through real-name authentication by two mobile terminals and the ID card information that unlocking authority is awarded is sent to intelligent door lock, and
It stores in the information bank into intelligent door lock.
And in embodiments of the present invention, second user can will be authorized after inputting authorized order by the second mobile terminal
Instruction is back to first movement terminal.First movement terminal is after receiving authorized order, you can learn that the identity of the first user
Card information is granted unlocking authority, so that unlocking credential information can be sent to intelligent door lock by first movement terminal, and stores
In information bank into intelligent door lock.
It should be noted that for the intelligent door lock newly installed, need to bind a management user, management user can be with
Possess all permissions of intelligent door lock, such as managing user can be landlord, and landlord can authorize different user and pass through its identity card
The unlocking authority unlocked.Specifically, second user can pass through the two dimensional code mark on the second mobile scanning terminal intelligent door lock
Know, with the administration authority for second user binding to intelligent door lock.
It should also be noted that, either landlord or tenant are required to carry out real-name authentication in actual implementation, so as to
The facial image that ID card information and user are shot is sent to the server of public security system, so that real-name authentication is realized, to mention
High security.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: in information bank by
Any unlocking credential information of unlocking authority is authorized, if detecting, dual lock credential information withdraws the withdrawal instruction of unlocking authority,
It is then sent to intelligent door lock and deletes instruction, so that intelligent door lock deletes any unlocking credential information from information bank.
Specifically, with tenant for the first user, landlord is for second user, second user can be mobile whole by second
The withdrawal instruction of unlocking authority is withdrawn in end input.Wherein, withdraw instruction may include specifically be retracted the unlocking of unlocking authority with
Demonstrate,prove information.After detecting withdrawal instruction, the second mobile terminal can send to intelligent door lock and delete instruction, so that intelligent door
Lock deletes the unlocking credential information from information bank.
Content based on the above embodiment, as a kind of alternative embodiment, this method further include: if detecting administration authority
Instruction is authorized, then authorizes instruction according to administration authority, authorizes target user's administration authority;Wherein, administration authority authorizes instruction packet
The user identifier for including target user, the target user that administration authority is awarded can authorize or withdraw opening for other unlocking credential informations
Lock permission.
Specifically, unlocking authority of the administration authority of intelligent door lock in addition to authorizing other unlocking credential informations in actual implementation
Except, this gift can also be distributed, namely make other users also there is the permission for authorizing unlocking authority.Its
In, only there is the user for authorizing unlocking authority can be used as landlord, and other than the permission, also have and authorizes other users
With the permission for authorizing unlocking authority, this user can be used as super keepe.Correspondingly, in embodiments of the present invention, surpass
If the corresponding mobile terminal of grade administrator detects administration authority and authorizes instruction, instruction can be authorized according to administration authority, is awarded
Give target user's administration authority.At this point, the permission that target user is possessed is equivalent to landlord, corresponding mobile terminal can be passed through
Authorize or withdraw the unlocking authority of other unlocking credential informations.
Content based on the above embodiment authorizes instruction according to administration authority, authorizes target as a kind of alternative embodiment
After user management permission, further includes: if detecting, target user performs the management operation of unlocking authority, obtains target use
The execution at family records information.
Specifically, by taking target user is landlord as an example, landlord weighs in the unlocking for the unlocking credential information for authorizing other tenants
After limit, the execution for authorizing permission can be recorded information and be sent to the corresponding movement of super keepe eventually by the corresponding mobile terminal of landlord
End.Wherein, executing record information may include the object of granted permission and authorizes the time etc., and the embodiment of the present invention does not make this
It is specific to limit.
Content based on the above embodiment, the embodiment of the invention provides a kind of gate inhibition management apparatus, entrance guard management dresses
It sets for executing the access control management method provided in above method embodiment.Referring to fig. 2, which includes:
First obtains module 201, for obtaining the unlocking credential information of first movement terminal transmission;
First sending module 202, for when detect authorize the authorized order of unlocking authority for unlocking credential information when, then
Unlocking credential information is sent to intelligent door lock, and is stored in the information bank into intelligent door lock, be stored in information bank by
Authorize the unlocking credential information of unlocking authority.
As a kind of alternative embodiment, unlocking credential information is ID card information, character string or IC card data.
As a kind of alternative embodiment, if unlocking credential information is ID card information, ID card information is by first
The real-name authentication of mobile terminal.
As a kind of alternative embodiment, the device further include:
Return module, for when detect authorize the authorized order of unlocking authority for unlocking credential information when, then will authorization
Instruction is back to first movement terminal, so that unlocking credential information is sent to intelligent door lock by first movement terminal, and stores
In information bank into intelligent door lock.
As a kind of alternative embodiment, the device further include:
Second sending module, for any unlocking credential information for unlocking authority has been awarded in information bank, if inspection
The withdrawal instruction that dual lock credential information withdraws unlocking authority is measured, then is sent to intelligent door lock and deletes instruction, so that intelligence
Door lock deletes any unlocking credential information from information bank.
As a kind of alternative embodiment, the device further include:
Module is authorized, for when detecting that administration authority authorizes instruction, then authorizing instruction according to administration authority, authorizing mesh
Mark user management permission;Wherein, administration authority authorizes the user identifier that instruction includes target user, and the mesh of administration authority is awarded
Mark user can authorize or withdraw the unlocking authority of other unlocking credential informations.
As a kind of alternative embodiment, the device further include:
Second obtains module, for when detecting that target user performs the management operation of unlocking authority, then obtaining mesh
The execution for marking user records information.
Device provided in an embodiment of the present invention, the unlocking credential information sent by obtaining first movement terminal.If detection
To the authorized order for authorizing unlocking authority for unlocking credential information, then unlocking credential information is sent to intelligent door lock, and store
In information bank into intelligent door lock.Since empowerment management can be carried out with dual lock credential information, so that intelligent door lock can be improved
Safety.
Fig. 3 illustrates the entity structure schematic diagram of a kind of electronic equipment, as shown in figure 3, the electronic equipment may include: place
Manage device (processor) 310, communication interface (Communications Interface) 320,330 He of memory (memory)
Communication bus 340, wherein processor 310, communication interface 320, memory 330 complete mutual lead to by communication bus 340
Letter.Processor 310 can call the logical order in memory 330, to execute following method: obtaining first movement terminal and send
Unlocking credential information;If detecting the authorized order for authorizing unlocking authority for unlocking credential information, will unlock credential information
It is sent to intelligent door lock, and is stored in the information bank into intelligent door lock, is stored in information bank and unlocking authority has been awarded
Unlocking credential information.
In addition, the logical order in above-mentioned memory 330 can be realized by way of SFU software functional unit and conduct
Independent product when selling or using, can store in a computer readable storage medium.Based on this understanding, originally
Substantially the part of the part that contributes to existing technology or the technical solution can be in other words for the technical solution of invention
The form of software product embodies, which is stored in a storage medium, including some instructions to
So that a computer equipment (can be personal computer, electronic equipment or the network equipment etc.) executes each reality of the present invention
Apply all or part of the steps of a method.And storage medium above-mentioned include: USB flash disk, mobile hard disk, read-only memory (ROM,
Read-Only Memory), random access memory (RAM, Random AccessMemory), magnetic or disk etc. it is various
It can store the medium of program code.
The embodiment of the present invention also provides a kind of non-transient computer readable storage medium, is stored thereon with computer program,
The computer program is implemented to carry out the various embodiments described above offer method when being executed by processor, for example, obtain first
The unlocking credential information that mobile terminal is sent;It, will if detecting the authorized order for authorizing unlocking authority for unlocking credential information
Unlocking credential information is sent to intelligent door lock, and stores in the information bank into intelligent door lock, is stored in information bank and is awarded
Give the unlocking credential information of unlocking authority.
The apparatus embodiments described above are merely exemplary, wherein unit can be as illustrated by the separation member
Or may not be and be physically separated, component shown as a unit may or may not be physical unit, i.e.,
It can be located in one place, or may be distributed over multiple network units.It can select according to the actual needs therein
Some or all of the modules achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying creative labor
In the case where dynamic, it can understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be embodied in the form of software products in other words, should
Computer software product may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including several fingers
It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation
Method described in certain parts of example or embodiment.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of access control management method characterized by comprising
Obtain the unlocking credential information that first movement terminal is sent;
If detecting the authorized order for authorizing unlocking authority for the unlocking credential information, the unlocking credential information is sent
To intelligent door lock, and it is stored in the information bank stored into the intelligent door lock, in described information storehouse and unlocking power has been awarded
The unlocking credential information of limit.
2. access control management method according to claim 1, which is characterized in that the unlocking credential information is identity card letter
Breath, character string or IC card data.
3. access control management method according to claim 2, which is characterized in that if the unlocking credential information is identity card letter
Breath, then the ID card information is the real-name authentication by the first movement terminal.
4. access control management method according to claim 1, which is characterized in that described to obtain opening for first movement terminal transmission
After lock credential information, further includes:
If detecting the authorized order for authorizing unlocking authority for the unlocking credential information, authorized order is back to described
One mobile terminal so that the unlocking credential information is sent to intelligent door lock by the first movement terminal, and is stored to institute
It states in the information bank in intelligent door lock.
5. access control management method according to claim 1, which is characterized in that further include:
For any unlocking credential information of unlocking authority has been awarded in described information storehouse, if detecting to the unlocking voucher
The withdrawal of information retrieval unlocking authority instructs, then sends to the intelligent door lock and delete instruction, so that the intelligent door lock will
Any unlocking credential information is deleted from described information storehouse.
6. access control management method according to claim 1, which is characterized in that further include:
If detecting, administration authority authorizes instruction, authorizes instruction according to the administration authority, authorizes target user's administration authority;
Wherein, the administration authority authorizes the user identifier that instruction includes the target user, and the target user of administration authority is awarded
It can authorize or withdraw the unlocking authority of other unlocking credential informations.
7. access control management method according to claim 6, which is characterized in that described to authorize finger according to the administration authority
It enables, after authorizing target user's administration authority, further includes:
If detecting, the target user performs the management operation of unlocking authority, and obtain the target user executes record
Information.
8. a kind of gate inhibition management apparatus characterized by comprising
First obtains module, for obtaining the unlocking credential information of first movement terminal transmission;
First sending module, for when detect authorize the authorized order of unlocking authority for the unlocking credential information when, then will
In the information bank that the unlocking credential information is sent to intelligent door lock, and stores into the intelligent door lock, in described information storehouse
It is stored with the unlocking credential information that unlocking authority has been awarded.
9. a kind of electronic equipment characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, in which:
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy
Enough methods executed as described in claim 1 to 7 is any.
10. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited
Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 7 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427686.5A CN110246246A (en) | 2019-05-22 | 2019-05-22 | Access control management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427686.5A CN110246246A (en) | 2019-05-22 | 2019-05-22 | Access control management method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110246246A true CN110246246A (en) | 2019-09-17 |
Family
ID=67884734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910427686.5A Pending CN110246246A (en) | 2019-05-22 | 2019-05-22 | Access control management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110246246A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI715391B (en) * | 2019-12-30 | 2021-01-01 | 台灣新光保全股份有限公司 | Security system |
-
2019
- 2019-05-22 CN CN201910427686.5A patent/CN110246246A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI715391B (en) * | 2019-12-30 | 2021-01-01 | 台灣新光保全股份有限公司 | Security system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110213246B (en) | Wide-area multi-factor identity authentication system | |
CN105205370B (en) | Mobile terminal safety means of defence and mobile terminal, security system and methods for using them | |
CN108091011A (en) | Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness | |
CN109639632A (en) | User information management method, electronic equipment and storage medium based on block chain | |
US20180359635A1 (en) | Securitization of Temporal Digital Communications Via Authentication and Validation for Wireless User and Access Devices | |
CN106652109A (en) | Intelligent lock control method, device and lock management server | |
CN108600213B (en) | Composite identity authentication method and composite identity authentication system applying same | |
CN106887060A (en) | Hotel guest room fingerprint door lock control system and method | |
CN103473844A (en) | Intelligent control method and intelligent control system for public rental housing | |
CN109151820A (en) | One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 " | |
CN106878471A (en) | A kind of bluetooth auto-unlocking checking and the autosynchronous method of high in the clouds client | |
CN110533807A (en) | A kind of decentralization door-locking system based on block chain | |
CN108712389A (en) | A kind of intelligent lock system | |
WO2015117507A1 (en) | Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor | |
CN107180173A (en) | unlocking method and device | |
CN104680670A (en) | Re-encryption/encryption technique solution for key control points during bank card operation on ATM (automatic teller machine) | |
CN106355709A (en) | Access control system and door opening method based on dynamic quick response code | |
CA3160728A1 (en) | Method of realizing intelligent equipment system, method of controlling intelligent equipement, and system | |
CN109285256A (en) | Computer room based on block chain authentication enter permission give method | |
CN112905976A (en) | User data protection method for security computer | |
CN107995227A (en) | The authentication method and device of movable storage device | |
CN110349301A (en) | Gate inhibition's open method and device | |
CN110164013A (en) | A kind of retrospective caller management method | |
CN207123882U (en) | A kind of antitheft cloud service door-locking system of multiple intelligent | |
CN108460872A (en) | The control method and device of smart lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190917 |
|
WD01 | Invention patent application deemed withdrawn after publication |