CN110533802A - Access control equipment control method, device, equipment, system and storage medium - Google Patents
Access control equipment control method, device, equipment, system and storage medium Download PDFInfo
- Publication number
- CN110533802A CN110533802A CN201910645728.2A CN201910645728A CN110533802A CN 110533802 A CN110533802 A CN 110533802A CN 201910645728 A CN201910645728 A CN 201910645728A CN 110533802 A CN110533802 A CN 110533802A
- Authority
- CN
- China
- Prior art keywords
- access control
- control equipment
- information
- typing
- biological information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application discloses a kind of access control equipment control method, device, equipment, system and storage mediums, belong to field of computer technology.The described method includes: receiving the typing that access control equipment is sent by target radio network indicates information;After receiving typing instruction information, the biological information of legitimate user is acquired;Collected biological information is stored into access control equipment, biological information is used to carry out authentication to the current user of request for access control equipment.Technical solution provided by the embodiments of the present application can solve the poor problem of access control equipment typing biological information flexibility.
Description
Technical field
This application involves electronic equipment control fields, more particularly to access control equipment control method, device, equipment, system
And storage medium.
Background technique
Currently, access control equipment is increasingly common in people's daily life, and access control equipment can be logical to request
Capable user carries out authentication, and lets pass after being verified to user.In practical application, many access control equipments can be with
Authentication is carried out to user using finger print information.In order to carry out authentication to user using finger print information, access control equipment is needed
Typing is wanted to allow the finger print information of current user (that is to say legitimate user).
In the related technology, in the finger print information of typing legitimate user, the administrative staff of access control equipment need to be located at gate inhibition
Around equipment, access control equipment can acquire the finger print information of administrative staff located around it, and utilize collected fingerprint
After information passes through the authentication of administrative staff, access control equipment is inputted according to administrative staff instruction acquisition legitimate user's
Finger print information, then, access control equipment can store the finger print information of collected legitimate user into access control equipment, thus complete
The typing of pairs of legitimate user's finger print information.
However, since the relevant technologies require administrative staff to the week of access control equipment in the finger print information of typing legitimate user
It encloses and is operated, therefore, the flexibility of typing finger print information is poor.
Summary of the invention
Based on this, it is necessary to for the problem that access control equipment typing finger print information flexibility is poor, provide a kind of gate inhibition and set
Standby control method, device, equipment, system and storage medium.
In a first aspect, a kind of access control equipment control method is provided, for the access control equipment in access control system, the door
Prohibiting control system includes access control equipment and the access control equipment, and the access control equipment and the access control equipment pass through Target Wireless
Network is communicated, this method comprises:
Information is indicated by the typing that the target radio network receives access control equipment transmission;
After receiving typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, which is used to supply the gate inhibition
Equipment carries out authentication to the current user of request.
In one of the embodiments, after the biological information of acquisition legitimate user, this method further include:
Message identification is distributed for the biological information, the message identification is for identifying the biological information;
Typing is sent to the access control equipment by the target radio network and successfully indicates information, which successfully indicates
Information carries the message identification.
Typing should be sent to the access control equipment by the target radio network in one of the embodiments, successfully to refer to
After showing information, this method further include:
After the current user of request is carried out authentication and is verified using the biological information, verifying is obtained
By at the time of and the message identification;
It is sent by the target radio network to the access control equipment and enters and leaves record information, which records information and carry
At the time of the message identification is verified with this.
Typing should be sent to the access control equipment by the target radio network in one of the embodiments, successfully to refer to
After showing information, this method further include:
Information is indicated by the deletion that the target radio network receives access control equipment transmission, which indicates information
Carry the message identification;
It is deleted from the access control equipment according to the biological information that the deletion indicates that information is identified the message identifier
It removes.
The target radio network is long range LORA network in one of the embodiments,.
The biological information is finger print information in one of the embodiments,.
Second aspect provides a kind of access control equipment control method, for the access control equipment in access control system,
The access control system includes the access control equipment and access control equipment, and the access control equipment and the access control equipment pass through target
Wireless network is communicated, this method comprises:
Receive the typing instruction of user's triggering;
After receiving typing instruction, typing is sent to the access control equipment by the target radio network and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request
Current user carries out authentication.
In one of the embodiments, should by the target radio network to the access control equipment send typing indicate information it
Afterwards, this method further include:
Information is successfully indicated by the typing that the target radio network receives access control equipment transmission, which successfully indicates
Information carries message identification;
Wherein, which is the access control equipment for biological information distribution, which is used to identify
The biological information.
The typing that access control equipment transmission should be received by the target radio network in one of the embodiments, successfully refers to
After showing information, this method further include:
Information is recorded by the discrepancy that the target radio network receives access control equipment transmission, it is this which, which records information,
What access control equipment was sent after carrying out authentication to the current user of request using the biological information and being verified, it should
At the time of discrepancy record information carries the message identification and is verified.
The typing that access control equipment transmission should be received by the target radio network in one of the embodiments, successfully refers to
After showing information, this method further include:
It is sent by the target radio network to the access control equipment and deletes instruction information, deletion instruction information carries the letter
Breath mark, deletion instruction information are used to indicate the access control equipment and delete the biological information that the message identifier is identified.
The typing instruction of reception user triggering in one of the embodiments, comprising:
The control interface of displaying target application program, the control interface include typing option, which is peace
Loaded on the application journey in the access control equipment, with control access control equipment progress biological information typing
Sequence;
After detecting trigger action of the user to the typing option, typing instruction is received.
The target radio network is long range LORA network in one of the embodiments,.
The biological information is finger print information in one of the embodiments,.
The third aspect provides a kind of access control equipment, which belongs to access control system, the access control system
It further include access control equipment, the access control equipment and the access control equipment are communicated by target radio network, the gate inhibition
Equipment includes:
First information receiving module, the typing for receiving access control equipment transmission by the target radio network refer to
Show information;
Acquisition module, for acquiring the biological information of legitimate user after receiving typing instruction information;
Memory module, for storing the collected biological information into the access control equipment, biological characteristic letter
Breath is for carrying out authentication to the current user of request for the access control equipment.
Fourth aspect provides a kind of access control equipment, which belongs to access control system, the gate inhibition
Control system further includes access control equipment, and the access control equipment and the access control equipment are communicated by target radio network, should
Access control equipment includes:
Command reception module, for receiving the typing instruction of user's triggering;
First sending module, for after receiving typing instruction, by the target radio network to the access control equipment
It sends typing and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request
Current user carries out authentication.
5th aspect, provides a kind of access control equipment, including memory and processor, memory is stored with computer journey
The step of sequence, processor realizes above-mentioned access control equipment control method when executing computer program.
6th aspect, provides a kind of access control equipment, including memory and processor, memory are stored with computer
The step of program, processor realizes above-mentioned access control equipment control method when executing computer program.
7th aspect, provides a kind of access control system, which includes as being somebody's turn to do in terms of the above-mentioned 5th
The access control equipment being somebody's turn to do in terms of access control equipment and the such as the above-mentioned 6th.
Eighth aspect provides a kind of computer readable storage medium, is stored thereon with computer program, computer program
The step of above-mentioned access control equipment control method is realized when being executed by processor.
9th aspect, provide a kind of computer program product, instruction be stored in the computer program product, when its
When running on computer, enable a computer to execute access control equipment control method provided by the embodiments of the present application.
Tenth aspect, provides a kind of chip, which includes programmable logic circuit and/or program instruction, when the core
Piece is able to carry out access control equipment control method provided by the embodiments of the present application when running.
Technical solution bring beneficial effect provided by the embodiments of the present application includes at least:
Information, access control equipment are indicated by sending typing to access control equipment from access control equipment utilization target radio network
After receiving typing instruction information, the biological information of legitimate user is acquired, and collected biological information is deposited
Storage into access control equipment, be stored in biological information in access control equipment be used for for access control equipment to the current user of request into
Row authentication, in this way, the administrative staff of access control equipment can be long-range by target radio network using access control equipment
The biological information of access control equipment typing legitimate user, so that in the biological information of typing legitimate user, pipe
Reason personnel do not need to around access control equipment to operate, therefore the flexibility of typing biological information can be improved.
Detailed description of the invention
Fig. 1 is the schematic diagram of implementation environment involved by access control equipment control method provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 3 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 4 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 5 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 6 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 7 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 8 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Fig. 9 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Figure 10 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Figure 11 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Figure 12 is a kind of block diagram of computer equipment provided by the embodiments of the present application;
Figure 13 is a kind of block diagram of computer equipment provided by the embodiments of the present application;
Figure 14 is a kind of block diagram that access control equipment control system is given provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party
Formula is described in further detail.
Access control equipment is a kind of relatively conventional safety device, can usually be installed on door or channel of building etc.
Place can carry out authentication to the current user of request, and let pass after being verified to user.Access control equipment can
It plays and illegal user is prevented to enter building, guarantee the effect of building safety.
Wherein, Fingerprint Lock is a kind of relatively conventional access control equipment, and Fingerprint Lock can use finger print information and pass through to request
User carry out authentication.Specifically, the finger print information that can store at least one legitimate user in Fingerprint Lock, when some
When user requests current, Fingerprint Lock can acquire the finger print information of the user, and will be in collected finger print information and Fingerprint Lock
The finger print information of storage is compared, when the fingerprint of some legitimate user stored in collected finger print information and Fingerprint Lock is believed
When manner of breathing matches, Fingerprint Lock can be determined that the current user of the request is legitimate user, thus to the current user of the request into
Row is let pass, conversely, when the finger print information of any legitimate user stored in collected finger print information and Fingerprint Lock mismatches
When, Fingerprint Lock can be determined that the current user of the request is illegal user, at this point, the use that Fingerprint Lock can not be current to the request
It lets pass at family.
By described above it is found that being tested to enable Fingerprint Lock to carry out identity to the current user of request using finger print information
Card, Fingerprint Lock need the finger print information of typing legitimate user, and so-called " finger print information of typing legitimate user " refers to that acquisition is closed
The finger print information of method user, and the finger print information of the collected legitimate user is stored into Fingerprint Lock, for fingerprint Lock Lee
It is verified with identity of the finger print information of storage to the current user of request.
In the related technology, special personnel (hereinafter referred to as administrative staff) can be arranged to be managed Fingerprint Lock, the pipe
The permission that there is reason personnel control Fingerprint Lock to carry out the typing of legitimate user's finger print information.In the finger print information of typing legitimate user
When, which can move to the peripheral region of Fingerprint Lock, and then, which can enable Fingerprint Lock acquire its fingerprint
Information, Fingerprint Lock can use the identity of finger print information verification management personnel after collecting the finger print information of administrative staff,
After the authentication to administrative staff passes through, which can receive the instruction of administrative staff's input, and according to administrator
The finger print information of the instruction typing legitimate user of member's input.
However, since the relevant technologies require administrative staff to the week of access control equipment in the finger print information of typing legitimate user
It encloses region to be operated, therefore, the flexibility of typing finger print information is poor.
The embodiment of the present application provides a kind of access control equipment control method, can solve access control equipment typing finger print information spirit
The poor problem of activity.
In access control equipment control method provided by the embodiments of the present application, access control equipment can use Target Wireless net
Network sends typing to access control equipment and indicates information, and access control equipment can acquire legitimate user after receiving typing instruction information
Biological information, and collected biological information is stored into access control equipment, wherein be stored in access control equipment
Biological information be used to carry out authentication for the access control equipment user current to request, in this way, the management of access control equipment
Personnel can pass through the biology of the long-range access control equipment typing legitimate user of target radio network using access control equipment
Characteristic information so that in the biological information of typing legitimate user, administrative staff do not need around access control equipment into
Row operation, therefore the flexibility of typing biological information can be improved.
In the following, will be carried out to implementation environment involved by access control equipment control method provided by the embodiments of the present application brief
Explanation.
Fig. 1 is a kind of signal of implementation environment involved by access control equipment control method provided by the embodiments of the present application
Figure, as shown in Figure 1, the implementation environment may include access control equipment 101 and access control equipment 102,101 He of access control equipment
It can be communicated by target radio network W between access control equipment 102.
Wherein, access control equipment 101 can be smart phone, tablet computer, wearable device, MP3 player
(Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3),
MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level
4) player, E-book reader or mobile unit etc..
Access control equipment 102 can use biological information and carry out authentication to the current user of request.Wherein, biological
Characteristic information is a kind of for characterizing the information of the intrinsic physiological characteristic of human body or behavioural characteristic, for example, the biological characteristic is believed
Breath can be finger print information, iris information, face feature information and gait information etc..Optionally, in the biological information
When for finger print information, which can be for Fingerprint Lock.
Target radio network W can be mobile data network, wide area network or Internet of Things etc..In one embodiment of the application
In, target radio network W can be LORA (Long Range, over long distances) network.
On the one hand, LORA communication signal transmissions distance longer (generally can be several kms or so) therefore passes through LORA network
It can make to carry out longer-distance communication between access control equipment 101 and access control equipment 102, thereby may be ensured that typing biology
The flexibility of characteristic information.On the other hand, communicate by LORA network that required power consumption is smaller, this can reduce gate inhibition
The power consumption of equipment 102 increases the standby time of access control equipment 102, especially for the battery powered access control equipment 102 of utilization
Speech carries out communicating the frequency that can be reduced the access control equipment 102 and replace battery with access control equipment 101 by LORA network,
To reduce the management cost of access control equipment 102.
It, can in access control equipment 102 in one embodiment of the application in the case where target radio network is LORA network
To be equipped with LORA communication component, access control equipment 102 can receive and dispatch LORA communication letter by the LORA communication component of itself installation
Number, meanwhile, LORA communication component can also be installed, access control equipment 101 can also be by certainly in access control equipment 101
The LORA communication component of body installation receives and dispatches LORA signal of communication.
During access control equipment 101 is communicated with access control equipment 102, access control equipment 101 can lead to
The LORA communication component for crossing itself installation sends LORA signal of communication to access control equipment 102, and access control equipment 102 can pass through itself
The LORA communication component of installation receives the LORA signal of communication that access control equipment 101 is sent, and similarly, access control equipment 102 can
LORA signal of communication, access control equipment 101 are sent to access control equipment 101 with the LORA communication component installed by itself
The LORA signal of communication that access control equipment 102 is sent can be received by the LORA communication component of itself installation.
In the case where target radio network is LORA network, in another embodiment of the application, in access control equipment 102
LORA communication component can be installed, access control equipment 102 can receive and dispatch LORA communication by the LORA communication component of itself installation
Signal, meanwhile, mobile data communication component can be installed, access control equipment 101 can pass through in access control equipment 101
The mobile data communication component receives and dispatches mobile data communication signal, for example, the mobile data communication signal can be 5G (the
4th Generation mobile communication, the 5th third-generation mobile communication technology) signal of communication, 4G (the 4th
Generation mobile communication, fourth generation mobile communication technology) signal of communication, 3G (the 3th
Generation mobile communication, 3rd generation mobile communication technology) signal of communication etc..
During access control equipment 101 is communicated with access control equipment 102, access control equipment 101 can lead to
The mobile data communication component for crossing itself installation sends mobile data communication signal to base station, wherein shifting is equipped in the base station
Dynamic data communication component and LORA communication component, the base station can receive gate inhibition by the mobile data communication component of itself installation
The mobile data communication signal that equipment 101 is sent is controlled, and the mobile data communication signal is converted into LORA signal of communication, and
Afterwards, the LORA signal of communication that conversion obtains can be sent to access control equipment by the LORA communication component of itself installation by base station
In 102, access control equipment 102 can receive the LORA signal of communication that base station is sent by the LORA communication component of itself installation.
Access control equipment 102 can send LORA signal of communication, base station to base station by the LORA communication component of itself installation
The LORA signal of communication that access control equipment 101 is sent can be received by the LORA communication component of itself installation, and the LORA is led to
Letter signal is converted to mobile data communication signal, and then, base station is controlled by the mobile data communication component itself installed to gate inhibition
Control equipment 101 sends the mobile data communication signal, the mobile data communication component that access control equipment 101 is installed by itself
Receive the mobile data communication signal that base station is sent.
Referring to FIG. 2, it illustrates a kind of flow chart of access control equipment control method provided by the embodiments of the present application, the door
Prohibiting apparatus control method can be applied in the access control equipment 102 in Fig. 1.As shown in Fig. 2, the access control equipment control method can be with
The following steps are included:
Step 201, access control equipment receive the typing that access control equipment is sent by target radio network and indicate information.
It is LORA network in target radio network, and, LORA communication is mounted in access control equipment and access control equipment
In the case where component, access control equipment can send LORA communication to access control equipment by the LORA communication component of itself installation
Signal, wherein the LORA signal of communication carries typing instruction information.Access control equipment can be logical by the LORA of itself installation
Believe that component receives the LORA signal of communication that access control equipment is sent, and obtains the typing instruction carried in the LORA signal of communication
Information.
It is LORA network in target radio network, and, access control equipment is equipped with mobile data communication component, Men Jinshe
It is standby LORA communication component is installed in the case where, access control equipment can by the mobile data communication component of itself installation to
Base station sends mobile data communication signal, which can carry the instruction information of typing above.Base station
After the mobile data communication signal for receiving the transmission of access control equipment, the mobile data communication signal can be converted to
LORA signal of communication, wherein the LORA signal of communication converted can carry typing instruction information.Then, base station can
The LORA signal of communication that the conversion obtains is sent to access control equipment, access control equipment with the LORA communication component installed by itself
The LORA signal of communication that base station is sent can be received by the LORA communication component of itself installation, and obtain the LORA signal of communication
The typing of middle carrying indicates information.
Step 202, receive typing instruction information after, access control equipment acquire legitimate user biological information.
In the embodiment of the present application, collecting biological feature information component can be installed, in step 202 in access control equipment
In, after the typing instruction information for receiving the transmission of access control equipment, access control equipment can star the biology installed in itself
Characteristic information acquisition component, and pass through the biological information of collecting biological feature information component acquisition legitimate user.
In the case where the biological information of legitimate user is finger print information, above-mentioned collecting biological feature information component can
Think finger print information acquisition component, optionally, which can refer to for optical ftngetpnnt acquisidon component, heat-sensitive type
Line acquisition component or biological RF fingerprint acquisition component etc..
Step 203, access control equipment store the biological information of collected legitimate user into access control equipment.
In one embodiment of the application, access control equipment may include a target storage space, the target storage space
It can be used to store the collected biological information of access control equipment, the biological information stored in the target storage space is used
In the user progress authentication current to request for access control equipment.The biological characteristic of legitimate user is collected in step 202
After information, access control equipment can be stored the biological information of the collected legitimate user into the target storage space,
So that access control equipment carries out authentication to the current user of request using the biological information of the legitimate user.
In access control equipment control method provided by the embodiments of the present application, by by access control equipment utilization Target Wireless
Network sends typing to access control equipment and indicates information, and access control equipment acquires legitimate user's after receiving typing instruction information
Biological information, and collected biological information is stored into access control equipment, the biology being stored in access control equipment
Characteristic information is used to carry out authentication to the current user of request for access control equipment, in this way, the administrative staff of access control equipment are just
It can use access control equipment to believe by the biological characteristic of the long-range access control equipment typing legitimate user of target radio network
Breath, so that administrative staff do not need to around access control equipment to operate in the biological information of typing legitimate user,
Therefore the flexibility of typing biological information can be improved.
Referring to FIG. 3, it illustrates the flow chart of another access control equipment control method provided by the embodiments of the present application, it should
Access control equipment control method can be applied in the access control equipment 102 in Fig. 1.As shown in figure 3, in embodiment described above
On the basis of, after above-mentioned steps 202, access control equipment control method further include:
Step 301, the biological information that access control equipment is collected legitimate user distribute message identification.
In the embodiment of the present application, access control equipment can be special for the biology of its collected legitimate user in step 202
Reference breath distribution message identification, wherein the message identification is used to identify the biological information of collected legitimate user, optional
, which can be used for the biological information of the collected legitimate user of unique identification.
Optionally, after distributing message identification for the biological information of legitimate user, access control equipment can be by the letter
Breath mark is corresponding with the biological information of the legitimate user to be stored in the target storage space of access control equipment.
Step 302, access control equipment send typing to access control equipment by target radio network and successfully indicate information.
Wherein, which successfully indicates that information carries the letter that the biological information that access control equipment is the legitimate user distributes
Breath mark.The typing successfully indicate information be used to indicate access control equipment successful acquisition and store legitimate user biology it is special
Reference breath.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be collected legitimate user
Biological information distribute message identification, and successfully indicate that the message identification is sent to access control and set by information by typing
It is standby, since access control equipment obtains message identification, in the next steps, access control equipment and access control equipment it
Between can use the message identification and indicate the biological information, without directly transmitting the biological information, due to mark
The data volume for knowing information is generally less than the data volume of biological information, and therefore, avoiding directly transmitting biological information can be with
Reduce the occupancy to network bandwidth, also can reduce the data interaction time delay between access control equipment and access control equipment.
Referring to FIG. 4, it illustrates the flow chart of another access control equipment control method provided by the embodiments of the present application, it should
Access control equipment control method can be applied in the access control equipment 102 in Fig. 1.As shown in figure 4, in embodiment described above
On the basis of, after above-mentioned steps 302, access control equipment control method further include:
Step 401, after carrying out authentication using the biological information user current to request and being verified, door
Taboo equipment obtains at the time of being verified and message identification.
As described above, correspondence is stored with the collected legitimate user's of access control equipment in the target storage space of access control equipment
Biological information and access control equipment are the message identification of biological information distribution.Access control equipment can use target storage
The biological information stored in space carries out authentication to the current user of request.
Optionally, when some user requests current, access control equipment can acquire the biological information of the user, and will
The biological information stored in collected biological information and target storage space is compared, when collected biology
When the biological information stored in characteristic information and target storage space matches, what access control equipment can be current to the request
Subscriber authentication passes through, and that is to say, access control equipment can be determined that the current user of the request is legitimate user, logical to request
After capable subscriber authentication passes through, the available biological information point to be stored in target storage space of access control equipment
The message identification matched and at the time of be verified.
Step 402, access control equipment, which are sent by target radio network to access control equipment, enters and leaves record information.
Wherein, discrepancy record information carries the message identification and be verified that access control equipment is got in step 401
At the time of.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be sent to access control equipment
The discrepancy of legitimate user records information, so that the holder (administrative staff that is to say access control equipment) of access control equipment can
At the time of timely learning enters and leaves personnel and the personnel discrepancy of access control equipment, to play the effect reinforced to gate inhibition's equipment management
Fruit.
Referring to FIG. 5, it illustrates the flow chart of another access control equipment control method provided by the embodiments of the present application, it should
Access control equipment control method can be applied in the access control equipment 102 in Fig. 1.As shown in figure 5, in embodiment described above
On the basis of, after above-mentioned steps 302, access control equipment control method further include:
Step 501, access control equipment receive the deletion that access control equipment is sent by target radio network and indicate information.
Wherein, deletion instruction information carries message identification, and deletion instruction information is used to indicate access control equipment deletion should
The biological information that message identification is identified.
Step 502, access control equipment indicate the information biological information that is identified message identifier from door according to the deletion
Prohibit and is deleted in equipment.
Optionally, after receiving deletion instruction information, access control equipment can indicate that information carries according to the deletion
Message identification inquire target storage space, to obtain the biology of corresponding with message identification storage in target storage space
Characteristic information, then, the biological information of the storage corresponding with the message identification that access control equipment can will acquire is from target
It is deleted in memory space.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be according to access control equipment
It indicates to delete the biological information of itself storage, so that the biological information stored in deleting access control equipment
When, administrative staff do not need to around access control equipment to operate, therefore the flexible of typing biological information can be improved
Property.
Referring to FIG. 6, it illustrates a kind of flow chart of access control equipment control method provided by the embodiments of the present application, the door
Prohibiting apparatus control method can be applied in the access control equipment 101 in Fig. 1.As shown in fig. 6, the access control equipment control method
It may comprise steps of:
Step 601, access control equipment receive the typing instruction of user's triggering.
Optionally, destination application can be installed in access control equipment, which can have control
Access control equipment processed carries out the function of biological information typing.Needing long-range access control equipment typing biological information
When, the holder (administrative staff that is to say access control equipment) of access control equipment can control access control equipment and start the mesh
Mark application program, destination application starting after, access control equipment can with the control interface of displaying target application program,
The control interface includes typing option.After detecting the trigger action to the typing option, access control equipment is ready to receive
Typing instruction described above.
Step 602, receive typing instruction after, access control equipment by target radio network to access control equipment send
Typing indicates information.
After receiving typing instruction described above, access control equipment can be executed to be referred to access control equipment transmission typing
Show the technical process of information, wherein similarly, the embodiment of the present application is herein for technical process described in the technical process and step 201
It repeats no more.
In access control equipment control method provided by the embodiments of the present application, by by access control equipment utilization Target Wireless
Network sends typing to access control equipment and indicates information, and access control equipment acquires legitimate user's after receiving typing instruction information
Biological information, and collected biological information is stored into access control equipment, the biology being stored in access control equipment
Characteristic information is used to carry out authentication to the current user of request for access control equipment, in this way, the administrative staff of access control equipment are just
It can use access control equipment to believe by the biological characteristic of the long-range access control equipment typing legitimate user of target radio network
Breath, so that administrative staff do not need to around access control equipment to operate in the biological information of typing legitimate user,
Therefore the flexibility of typing biological information can be improved.
The embodiment of the present application also provides the flow chart of another access control equipment control method, the access control equipment control methods
It can be applied in the access control equipment 101 in Fig. 1.On the basis of embodiment described above, above-mentioned steps 602 it
Afterwards, access control equipment control method further include:
Step 701, access control equipment receive the typing that access control equipment is sent by target radio network and successfully indicate to believe
Breath.
Wherein, which successfully indicates that information carries message identification, which is that access control equipment is adopted for access control equipment
The biological information distribution of the legitimate user collected, the message identification is for identifying the biological information.
Optionally, after receiving typing and successfully indicating information, access control equipment can show typing successful information,
The typing successful information is used to prompting holder's access control equipment of access control equipment successful acquisition and to store legal use
The biological information at family.For example, after receiving typing and successfully indicating information, access control equipment can show typing at
Function pop-up can show the printed words of " biological information typing success " in typing success pop-up, wherein should " biology is special
The printed words of sign data input success " are typing successful information described above.
Optionally, after receiving typing and successfully indicating information, access control equipment can also show editing options, when
After detecting that the editing options are triggered, access control equipment can receive the user identifier of its holder input, user mark
Know legitimate user corresponding to the biological information for the typing of unique identification access control equipment.Receiving holder's input
After user identifier, access control equipment can be stored the user identifier is corresponding with message identification.In this way, in subsequent step
In rapid, after access control equipment has sent the message identification to access control equipment, access control equipment is available with the letter
Breath identifies corresponding user identifier, and the user identifier is showed to the holder of access control equipment, in this way, access control is set
Standby holder can intuitively understand who legitimate user user corresponding to the message identification of access control equipment transmission is
.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be collected legitimate user
Biological information distribute message identification, and successfully indicate that the message identification is sent to access control and set by information by typing
It is standby, since access control equipment obtains message identification, in the next steps, access control equipment and access control equipment it
Between can use the message identification and indicate the biological information, without directly transmitting the biological information, due to mark
The data volume for knowing information is generally less than the data volume of biological information, and therefore, avoiding directly transmitting biological information can be with
Reduce the occupancy to network bandwidth, also can reduce the data interaction time delay between access control equipment and access control equipment.
The flow chart for another access control equipment control method that the embodiment of the present application also provides, the access control equipment control method
It can be applied in the access control equipment 101 in Fig. 1.On the basis of embodiment described above, above-mentioned steps 701 it
Afterwards, access control equipment control method further include:
Step 801, access control equipment receive the discrepancy that access control equipment is sent by target radio network and record information.
Wherein, discrepancy record information is that access control equipment is current to request in the biological information using itself storage
User carries out authentication and sends after being verified, which records information and carry access control equipment is the biological information
The message identification of distribution and at the time of be verified.
Optionally, after receiving discrepancy record information, the available discrepancy of access control equipment records information
User identifier corresponding to the message identification of carrying, then, what access control equipment can pass through the user identification and verification
Moment shows the holder of access control equipment, so that the holder of access control equipment is intuitively understood and enters and leaves gate inhibition
At the time of the personnel of equipment and the personnel enter and leave.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be sent to access control equipment
The discrepancy of legitimate user records information, so that the holder (administrative staff that is to say access control equipment) of access control equipment can
At the time of timely learning enters and leaves personnel and the personnel discrepancy of access control equipment, to play the effect reinforced to gate inhibition's equipment management
Fruit.
The embodiment of the present application also provides the flow chart of another access control equipment control method, the access control equipment control methods
It can be applied in the access control equipment 101 in Fig. 1.On the basis of embodiment described above, above-mentioned steps 701 it
Afterwards, access control equipment control method further include:
Step 901, access control equipment, which are sent by target radio network to access control equipment, deletes instruction information.
Wherein, deletion instruction information carries message identification, and deletion instruction information is used to indicate access control equipment deletion should
The biological information that message identifier is identified.
Optionally, the destination application installed in access control equipment can provide deletion option, when detecting to this
After the trigger action for deleting option, access control equipment can show user identifier list, which includes at least
One user identifier, each user identifier are corresponding with a message identification.When detecting in the user identifier list
Certain user identifier trigger action after, the available corresponding message identification of certain user identifier of access control equipment, then,
Deletion instruction information can be generated in access control equipment, and deletion instruction information can carry the corresponding information of certain user identifier
Mark.Then, the deletion of generation can be indicated that information is sent to gate inhibition by target radio network and sets by access control equipment
It is standby.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be according to access control equipment
It indicates to delete the biological information of itself storage, so that the biological information stored in deleting access control equipment
When, administrative staff do not need to around access control equipment to operate, therefore the flexible of typing biological information can be improved
Property.
Referring to FIG. 7, it illustrates a kind of flow chart of access control equipment control method provided by the embodiments of the present application, the door
Prohibiting apparatus control method can be applied in implementation environment shown in FIG. 1.As shown in fig. 7, the access control equipment control method can be with
The following steps are included:
Step 1001, access control equipment receive the typing instruction of user's triggering.
The embodiment of the present application is only installed on public affairs with access control equipment and rents a house in door, and the artificial public affairs of holding of access control equipment are rented a house
Landlord, the legitimate user of access control equipment be public affairs rent a house lessee scene for, to access control equipment provided by the embodiments of the present application
Control method is briefly described.
When the lessee that rents a house of public affairs moves in public affairs and rents a house, the lessee can negotiate with landlord typing biological information when
It carves.After the completion of negotiation, landlord can inscribe the access control equipment for starting and itself holding (for example, the access control at this
Equipment can be smart phone) in destination application, and click the typing choosing in the control interface of the destination application
.The access control equipment can receive typing instruction described above after detecting that the typing option is triggered.
Step 1002, receive typing instruction after, access control equipment by target radio network to access control equipment send out
Typing is sent to indicate information.
Wherein, similarly, the embodiment of the present application is herein for the technical process of the technical process of step 1002 and above step 602
It repeats no more.
Step 1003, receive typing instruction information after, access control equipment acquire legitimate user biological information.
After receiving the typing instruction information of access control equipment transmission, access control equipment can star the middle peace of itself
The collecting biological feature information component of dress, and pass through the biological information of collecting biological feature information component acquisition lessee.
Step 1004, access control equipment are that collected biological information distributes message identification.
After collecting the biological information of lessee, access control equipment can distribute for the biological information of the lessee
Message identification, wherein the message identification is used for the biological information of the unique identification lessee.
Step 1005, access control equipment by collected biological information and are the information mark of biological information distribution
Know correspondence to store into access control equipment.
For example, the characteristic information of the biology of the collected lessee Xiao Wang of access control equipment is biological information A, access control equipment
Message identification for biological information A distribution is a, then access control equipment can be by biological information A and a couples of message identification
It should be stored in access control equipment.
Step 1006, access control equipment send typing to access control equipment by target radio network and successfully indicate information.
Wherein, which successfully indicates that information carries the information that access control equipment is distributed by collected biological information
Mark.Such as the example above, after collecting the biological information A of lessee Xiao Wang, access control equipment can pass through Target Wireless
Network sends typing to access control equipment and successfully indicates information, which successfully indicates that information can carry message identification a.
Step 1007, access control equipment receive the typing that access control equipment is sent by target radio network and successfully indicate to believe
Breath.
Access control equipment can show typing success pop-up, the typing after receiving typing and successfully indicating information
The printed words of " biological information typing success " can be shown in success pop-up.
Meanwhile access control equipment can also show editing options, and after the editing options are triggered, access control equipment
Can receive landlord input user identifier, for example, the user identifier can be " Xiao Wang ", the user identifier " Xiao Wang " for pair
Lessee Xiao Wang is identified.After receiving user identifier, access control equipment can be by the user identifier and the information mark
Know correspondence to be stored in access control equipment, such as the example above, access control equipment can be by user identifier " Xiao Wang " and information
Mark a correspondence is stored in access control equipment.
Step 1008, after carrying out authentication using the biological information user current to request and being verified,
Access control equipment obtains at the time of being verified and message identification.
For example, access control equipment can acquire the biological information of lessee Xiao Wang when lessee Xiao Wang requests current, due to
The biological information A of lessee Xiao Wang has been stored in access control equipment, therefore, the life of the collected lessee Xiao Wang of access control equipment
Object characteristic information is matched with biological information A certainly, that is to say, it is special that access control equipment can use the biology stored in itself
Reference breath A passes through the authentication of the lessee Xiao Wang.After the authentication to lessee Xiao Wang passes through, access control equipment can be with
T and message identification a at the time of acquisition passes through the authentication of lessee Xiao Wang.
Step 1009, access control equipment, which are sent by target radio network to access control equipment, enters and leaves record information.
Wherein, at the time of discrepancy record information carries message identification and is verified.Such as the example above, access control equipment to
The discrepancy record information that access control equipment is sent carries moment t and message identification a.
Step 1010, access control equipment receive the discrepancy that access control equipment is sent by target radio network and record information.
Such as the example above, after receiving the discrepancy record information of access control equipment transmission, access control equipment can be obtained
User identifier corresponding to message identification a " Xiao Wang " is taken, then, access control equipment by the user identifier " Xiao Wang " and can be tested
T shows landlord at the time of card passes through, and so that landlord is intuitively understood and enters and leaves the public personnel (lessee Xiao Wang) to rent a house and be somebody's turn to do
At the time of personnel enter and leave.
Step 1011, access control equipment, which are sent by target radio network to access control equipment, deletes instruction information.
Such as the example above, after lessee Xiao Wang throws a lease, lessee Xiao Wang will not be allowed to enter public affairs and rent a house, at this point, landlord
The deletion option that can be provided in the destination application of triggering access control equipment installation, when detecting to the deletion option
After trigger action, access control equipment can show user identifier list, which includes at least one user mark
Know, which includes user identifier " Xiao Wang ".After detecting the trigger action to user identifier " Xiao Wang ",
The access control equipment corresponding message identification a of the available user identifier " Xiao Wang ", then, access control equipment can be generated
Instruction information is deleted, deletion instruction information can carry message identification a.Then, access control equipment being somebody's turn to do generation
It deletes instruction information and access control equipment is sent to by target radio network.
Step 1012, received by target radio network access control equipment transmission deletion instruction information after,
Access control equipment is deleted from access control equipment according to the biological information that the deletion indicates that information is identified message identifier.
Such as the example above, after the deletion for receiving the transmission of access control equipment indicates information, access control equipment can be from
The deletion instruction information in extract message identification a, then, access control equipment can by itself storage with a pairs of the message identification
The biological information A answered is deleted.
Referring to FIG. 8, it illustrates a kind of block diagram of access control equipment 1100 provided by the embodiments of the present application, the access control equipment
1100 can be the access control equipment 102 in Fig. 1.As shown in figure 8, the access control equipment 1100 may include: that the first information receives mould
Block 1101, acquisition module 1102 and memory module 1103.
Wherein, first information receiving module 1101, for receiving the access control equipment by the target radio network
The typing of transmission indicates information.
The acquisition module 1102, for acquiring the biological characteristic letter of legitimate user after receiving typing instruction information
Breath.
The memory module 1103, for storing the collected biological information into the access control equipment, the biology
Characteristic information is used to carry out authentication to the current user of request for the access control equipment.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
With reference to Fig. 9, the embodiment of the present application also provides a kind of access control equipment 1200, the access control equipment 1200 is in addition to including door
Prohibit outside each module that equipment 1100 includes, optionally, can also include distribution module 1104, the first sending module 1105, obtain
Module 1106, the second sending module 1107, the second information receiving module 1108 and removing module 1109.
Wherein, the distribution module 1104, for distributing message identification for the biological information, the message identification is for marking
Know the biological information.
First sending module 1105, for sending typing success to the access control equipment by the target radio network
Indicate information, which successfully indicates that information carries the message identification.
The acquisition module 1106, for carrying out authentication simultaneously to the current user of request using the biological information
After being verified, acquisition is at the time of be verified and the message identification.
Second sending module 1107 enters and leaves record for sending by the target radio network to the access control equipment
Information, discrepancy record information carry the message identification and this at the time of be verified.
Second information receiving module 1108, for receiving access control equipment transmission by the target radio network
Instruction information is deleted, deletion instruction information carries the message identification.
The removing module 1109, for indicating that the biological characteristic that information is identified the message identifier is believed according to the deletion
Breath is deleted from the access control equipment.
Above method embodiment, realization principle and technology effect may be implemented in access control equipment provided by the embodiments of the present application
Seemingly, details are not described herein for fruit.
Specific about access control equipment limits the restriction that may refer to above for access control equipment control method, herein not
It repeats again.Modules in above-mentioned access control equipment can be realized fully or partially through software, hardware and combinations thereof.It is above-mentioned each
Module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be stored in meter in a software form
It calculates in the memory in machine equipment, executes the corresponding operation of the above modules in order to which processor calls.
Referring to FIG. 10, it illustrates a kind of block diagram of access control equipment 1300 provided by the embodiments of the present application, the door
Prohibiting control equipment 1300 can be the access control equipment 101 in Fig. 1.As shown in Figure 10, which can be with
It include: command reception module 1301 and the first sending module 1302.
The command reception module 1301, for receiving the typing instruction of user's triggering.
First sending module 1302, for after receiving typing instruction, by the target radio network to the door
Prohibit equipment and sends typing instruction information.
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request
Current user carries out authentication.
In one embodiment of the application, which is specifically used for: displaying target application program
Control interface, the control interface include typing option, which is mounted in the access control equipment, has
Control the application program that the access control equipment carries out the function of biological information typing;When detecting user to the typing option
After trigger action, typing instruction is received.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
With reference to Figure 11, the embodiment of the present application also provides a kind of access control equipment 1400, the access control equipment 1400
It further include instruction information receiving module 1303, record optionally including access control equipment 1300 other than each module for including
Information receiving module 1304 and the second sending module 1305.
Wherein, the instruction information receiving module 1303 is sent for receiving the access control equipment by the target radio network
Typing successfully indicate information, the typing successfully indicate information carry message identification;Wherein, which is the access control equipment
For biological information distribution, the message identification is for identifying the biological information.
The record information receiving module 1304, for receiving the discrepancy of access control equipment transmission by the target radio network
Information is recorded, discrepancy record information is that the access control equipment is carrying out body to the current user of request using the biological information
It part verifies and sends after being verified, at the time of discrepancy record information carries the message identification and is verified.
Second sending module 1305 deletes instruction letter for sending by the target radio network to the access control equipment
Breath, deletion instruction information carry the message identification, and deletion instruction information is used to indicate the access control equipment and deletes the message mark
Know the biological information identified.
Access control equipment provided by the embodiments of the present application, may be implemented above method embodiment, realization principle and skill
Art effect is similar, and details are not described herein.
Specific about access control equipment limits the restriction that may refer to above for access control equipment control method, In
This is repeated no more.Modules in above-mentioned access control equipment can come real fully or partially through software, hardware and combinations thereof
It is existing.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software shape
Formula is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment of the application, a kind of computer equipment is provided, which can be gate inhibition and set
Standby, internal structure chart is shown in Fig.12.The computer equipment includes the processor connected by system bus, storage
Device, communication component and collecting biological feature information component.Wherein, the processor of the computer equipment is calculated and is controlled for providing
Ability.The memory of the computer equipment includes non-volatile memory medium, built-in storage.Non-volatile memory medium storage
There are operating system and computer program.The built-in storage is operating system and computer program in non-volatile memory medium
Operation provides environment.The communication component of the computer equipment is used for and other computer equipments (for example, access control equipment)
By target radio network connection communication, in one embodiment of the application, which can be LORA communication component.
To realize a kind of access control equipment control method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 12, only part relevant to application scheme
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment of the application, a kind of computer equipment is provided, which can be gate inhibition's control
Control equipment, internal structure chart can be as shown in figure 13.The computer equipment includes the processor connected by system bus, deposits
Reservoir and communication component.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment
Memory includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer
Program.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The meter
The communication component for calculating machine equipment is used to connect with other computer equipments (for example, access control equipment) by target radio network logical
Letter, in one embodiment of the application, which can be LORA communication component or mobile data communication component.The meter
To realize a kind of access control equipment control method when calculation machine program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 13, only part relevant to application scheme
The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set
Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment of the application, a kind of computer equipment, including memory and processor, memory are provided
In be stored with computer program, the processor execute computer program when perform the steps of
Information is indicated by the typing that the target radio network receives access control equipment transmission;
After receiving typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, which is used to supply the gate inhibition
Equipment carries out authentication to the current user of request.
In one embodiment of the application, processor is also performed the steps of when executing computer program as the biology
Characteristic information distributes message identification, and the message identification is for identifying the biological information;By the target radio network to this
Access control equipment sends typing and successfully indicates information, which successfully indicates that information carries the message identification.
In one embodiment of the application, processor is also performed the steps of to work as to utilize when executing computer program and is somebody's turn to do
After the biological information user current to request carries out authentication and be verified, at the time of acquisition is verified and the letter
Breath mark;It is sent by the target radio network to the access control equipment and enters and leaves record information, which records information and carry
At the time of the message identification is verified with this.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh
Mark wireless network receives the deletion instruction information of access control equipment transmission, and deletion instruction information carries the message identification;
It is deleted from the access control equipment according to the biological information that the deletion indicates that information is identified the message identifier.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer equipment provided by the embodiments of the present application, implementing principle and technical effect and above method embodiment class
Seemingly, details are not described herein.
In one embodiment of the application, a kind of computer equipment, including memory and processor, memory are provided
In be stored with computer program, the processor execute computer program when perform the steps of
Receive the typing instruction of user's triggering;
After receiving typing instruction, typing is sent to the access control equipment by the target radio network and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request
Current user carries out authentication.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh
The typing that mark wireless network receives access control equipment transmission successfully indicates information, which successfully indicates that information carries information mark
Know;Wherein, which is the access control equipment for biological information distribution, which is used to identify the biology
Characteristic information.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh
Mark wireless network receives the discrepancy record information of access control equipment transmission, and discrepancy record information is the access control equipment using should
To what is sent after requesting current user to carry out authentication and be verified, which records information and carries biological information
The message identification and at the time of be verified.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh
It marks wireless network and sends deletion instruction information to the access control equipment, deletion instruction information carries the message identification, which refers to
Show that information is used to indicate the access control equipment and deletes the biological information that the message identifier is identified.
In one embodiment of the application, processor also performs the steps of displaying target when executing computer program
The control interface of application program, the control interface include typing option, which is mounted to the access control and sets
In standby, have the function of controlling the application program that the access control equipment carries out biological information typing;When detecting user couple
After the trigger action of the typing option, typing instruction is received.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer equipment provided by the embodiments of the present application, implementing principle and technical effect and above method embodiment class
Seemingly, details are not described herein.
In one embodiment of the application, a kind of computer readable storage medium is provided, computer is stored thereon with
Program performs the steps of when computer program is executed by processor
Information is indicated by the typing that the target radio network receives access control equipment transmission;
After receiving typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, which is used to supply the gate inhibition
Equipment carries out authentication to the current user of request.
It is also performed the steps of in one embodiment of the application, when computer program is executed by processor as the life
Object characteristic information distributes message identification, and the message identification is for identifying the biological information;By the target radio network to
The access control equipment sends typing and successfully indicates information, which successfully indicates that information carries the message identification.
In one embodiment of the application, also perform the steps of when computer program is executed by processor when utilization
It, and should at the time of acquisition is verified after the biological information carries out authentication and be verified to the current user of request
Message identification;It is sent by the target radio network to the access control equipment and enters and leaves record information, discrepancy record information is taken
At the time of being verified with the message identification with this.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this
Target radio network receives the deletion instruction information of access control equipment transmission, and deletion instruction information carries the information mark
Know;It is deleted from the access control equipment according to the biological information that the deletion indicates that information is identified the message identifier.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer readable storage medium provided in this embodiment, implementing principle and technical effect and above method embodiment
Similar, details are not described herein.
In one embodiment of the application, a kind of computer readable storage medium is provided, computer is stored thereon with
Program performs the steps of when computer program is executed by processor
Receive the typing instruction of user's triggering;
After receiving typing instruction, typing is sent to the access control equipment by the target radio network and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request
Current user carries out authentication.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this
The typing that target radio network receives access control equipment transmission successfully indicates information, which successfully indicates that information carries information mark
Know;Wherein, which is the access control equipment for biological information distribution, which is used to identify the biology
Characteristic information.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this
Target radio network receives the discrepancy record information of access control equipment transmission, and it is that the access control equipment is utilizing which, which records information,
The biological information to what is sent after requesting current user to carry out authentication and be verified, take by discrepancy record information
At the time of with the message identification and being verified.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this
Target radio network is sent to the access control equipment deletes instruction information, and deletion instruction information carries the message identification, the deletion
Instruction information is used to indicate the access control equipment and deletes the biological information that the message identifier is identified.
In one embodiment of the application, display mesh is also performed the steps of when computer program is executed by processor
The control interface of application program is marked, which includes typing option, which is mounted to the access control
In equipment, have the function of controlling the application program that the access control equipment carries out biological information typing;When detecting user
After the trigger action of the typing option, typing instruction is received.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer readable storage medium provided in this embodiment, implementing principle and technical effect and above method embodiment
Similar, details are not described herein.
Figure 14 is please referred to, the embodiment of the present application also provides a kind of access control equipment control systems 1700.As shown in figure 14, door
Prohibiting apparatus control system 1700 includes access control equipment 1701 and access control equipment 1702.
Wherein, access control equipment 1701 is for executing the technology mistake as performed by access control equipment in above-described embodiment
Journey.
Access control equipment 1702 is for executing the technical process as performed by access control equipment in above-described embodiment.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
The limitation to claim therefore cannot be interpreted as.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (20)
1. a kind of access control equipment control method, which is characterized in that for the access control equipment in access control system, gate inhibition's control
System processed includes access control equipment and the access control equipment, the access control equipment and the access control equipment by target without
Gauze network is communicated, which comprises
The typing that the access control equipment is sent, which is received, by the target radio network indicates information;
After receiving the typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, the biological information is for described in confession
Access control equipment carries out authentication to the current user of request.
2. the method according to claim 1, wherein it is described acquisition legitimate user biological information after,
The method also includes:
Message identification is distributed for the biological information, the message identification is for identifying the biological information;
Typing is sent to the access control equipment by the target radio network and successfully indicates information, and the typing successfully refers to
Show that information carries the message identification.
3. according to the method described in claim 2, it is characterized in that, described controlled by the target radio network to the gate inhibition
After control equipment transmission typing successfully indicates information, the method also includes:
After the current user of request is carried out authentication and is verified using the biological information, it is logical to obtain verifying
At the time of mistake and the message identification;
It is sent by the target radio network to the access control equipment and enters and leaves record information, the discrepancy record information is taken
With the message identification and it is described be verified at the time of.
4. according to the method described in claim 2, it is characterized in that, described controlled by the target radio network to the gate inhibition
After control equipment transmission typing successfully indicates information, the method also includes:
The deletion that the access control equipment is sent, which is received, by the target radio network indicates information, the deletion instruction letter
Breath carries the message identification;
According to the instruction information biological information that is identified the message identifier of deleting from the access control equipment
Middle deletion.
5. method according to any one of claims 1 to 4, which is characterized in that the target radio network is long range LORA
Network.
6. method according to any one of claims 1 to 4, which is characterized in that the biological information is finger print information.
7. a kind of access control equipment control method, which is characterized in that for the access control equipment in access control system, the door
Prohibiting control system includes the access control equipment and access control equipment, and the access control equipment and the access control equipment pass through mesh
Mark wireless network is communicated, which comprises
Receive the typing instruction of user's triggering;
After receiving the typing instruction, typing instruction letter is sent to the access control equipment by the target radio network
Breath;
Wherein, the typing instruction information is used to indicate the biological information of the access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, and the biological information is used to set for the gate inhibition
The standby user current to request carries out authentication.
8. the method according to the description of claim 7 is characterized in that described set by the target radio network to the gate inhibition
After preparation send typing to indicate information, the method also includes:
The typing that the access control equipment is sent is received by the target radio network and successfully indicates information, and the typing successfully refers to
Show that information carries message identification;
Wherein, the message identification is the access control equipment for biological information distribution, and the message identification is used for
Identify the biological information.
9. according to the method described in claim 8, it is characterized in that, described receive the gate inhibition by the target radio network
After the typing that equipment is sent successfully indicates information, the method also includes:
The discrepancy that the access control equipment is sent is received by the target radio network and records information, and the discrepancy record information is
The access control equipment is sent out after carrying out authentication to the current user of request using the biological information and being verified
It send, at the time of the discrepancy record information carries the message identification and is verified.
10. according to the method described in claim 8, it is characterized in that, described receive the door by the target radio network
After the typing that taboo equipment is sent successfully indicates information, the method also includes:
It is sent by the target radio network to the access control equipment and deletes instruction information, the deletion instruction information carries institute
Message identification is stated, the deletion instruction information is used to indicate the access control equipment and deletes the life that the message identifier is identified
Object characteristic information.
11. method according to claim 7, which is characterized in that the typing instruction for receiving user's triggering, comprising:
The control interface of displaying target application program, the control interface include typing option, and the destination application is peace
Loaded on the application in the access control equipment, with the control access control equipment progress biological information typing
Program;
After detecting trigger action of the user to the typing option, the typing instruction is received.
12. according to any method of claim 7 to 11, which is characterized in that the target radio network is over long distances
LORA network.
13. according to any method of claim 7 to 11, which is characterized in that the biological information is finger print information.
14. a kind of access control equipment, which is characterized in that the access control equipment belongs to access control system, the access control system
It further include access control equipment, the access control equipment and the access control equipment are communicated by target radio network, institute
Stating access control equipment includes:
First information receiving module refers to for receiving the typing that the access control equipment is sent by the target radio network
Show information;
Acquisition module, for acquiring the biological information of legitimate user after receiving the typing instruction information;
Memory module, for storing the collected biological information into the access control equipment, the biological characteristic
Information is used to carry out authentication to the current user of request for the access control equipment.
15. a kind of access control equipment, which is characterized in that the access control equipment belongs in access control system, the door
Prohibiting control system further includes access control equipment, and the access control equipment and the access control equipment are led to by target radio network
Letter, the access control equipment control equipment include:
Command reception module, for receiving the typing instruction of user's triggering;
First sending module, for being set by the target radio network to the gate inhibition after receiving the typing instruction
Preparation send typing to indicate information;
Wherein, the typing instruction information is used to indicate the biological information of the access control equipment acquisition legitimate user, and will
The collected biological information is stored into the access control equipment, and the biological information is used to set for the gate inhibition
The standby user current to request carries out authentication.
16. a kind of access control equipment, which is characterized in that including memory and processor, the memory is stored with computer program,
It is characterized in that, the processor realizes the step of any one of claims 1 to 6 the method when executing the computer program
Suddenly.
17. a kind of access control equipment, which is characterized in that including memory and processor, the memory is stored with computer
Program, which is characterized in that the processor realizes side described in any one of claim 7 to 13 when executing the computer program
The step of method.
18. a kind of access control system, which is characterized in that the access control system includes as claimed in claim 16 calculates
Machine equipment and computer equipment as claimed in claim 17.
19. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, which is characterized in that described
The step of method described in any one of claims 1 to 6 is realized when computer program is executed by processor.
20. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, which is characterized in that described
The step of method described in any one of claim 7 to 13 is realized when computer program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910645728.2A CN110533802A (en) | 2019-07-17 | 2019-07-17 | Access control equipment control method, device, equipment, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910645728.2A CN110533802A (en) | 2019-07-17 | 2019-07-17 | Access control equipment control method, device, equipment, system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110533802A true CN110533802A (en) | 2019-12-03 |
Family
ID=68661893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910645728.2A Pending CN110533802A (en) | 2019-07-17 | 2019-07-17 | Access control equipment control method, device, equipment, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110533802A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI715391B (en) * | 2019-12-30 | 2021-01-01 | 台灣新光保全股份有限公司 | Security system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003193723A (en) * | 2001-12-27 | 2003-07-09 | Citizen Watch Co Ltd | Personal authentication system and id administration method |
CN105447928A (en) * | 2014-08-29 | 2016-03-30 | 青岛海尔智能家电科技有限公司 | Entrance guard control method and control system thereof |
CN106575454A (en) * | 2014-06-11 | 2017-04-19 | 威尔蒂姆Ip公司 | System and method for facilitating user access to vehicles based on biometric information |
CN106570955B (en) * | 2016-10-12 | 2019-02-01 | 广东建邦计算机软件股份有限公司 | Information collecting method and device based on access control equipment |
CN109790727A (en) * | 2016-06-10 | 2019-05-21 | 塔普洛克公司 | Hanging locking device, system and its operating method including hanging locking device |
CN109830017A (en) * | 2019-02-01 | 2019-05-31 | 深圳市汇顶科技股份有限公司 | Data managing method, device, equipment, system and the storage medium of smart lock |
-
2019
- 2019-07-17 CN CN201910645728.2A patent/CN110533802A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003193723A (en) * | 2001-12-27 | 2003-07-09 | Citizen Watch Co Ltd | Personal authentication system and id administration method |
CN106575454A (en) * | 2014-06-11 | 2017-04-19 | 威尔蒂姆Ip公司 | System and method for facilitating user access to vehicles based on biometric information |
CN105447928A (en) * | 2014-08-29 | 2016-03-30 | 青岛海尔智能家电科技有限公司 | Entrance guard control method and control system thereof |
CN109790727A (en) * | 2016-06-10 | 2019-05-21 | 塔普洛克公司 | Hanging locking device, system and its operating method including hanging locking device |
CN106570955B (en) * | 2016-10-12 | 2019-02-01 | 广东建邦计算机软件股份有限公司 | Information collecting method and device based on access control equipment |
CN109830017A (en) * | 2019-02-01 | 2019-05-31 | 深圳市汇顶科技股份有限公司 | Data managing method, device, equipment, system and the storage medium of smart lock |
Non-Patent Citations (2)
Title |
---|
陈伟利: "基于指纹识别技术的网络式门禁管理系统设计", 《安防科技》 * |
马飒飒: "《物联网基础技术及应用》", 31 January 2018 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI715391B (en) * | 2019-12-30 | 2021-01-01 | 台灣新光保全股份有限公司 | Security system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101719955B (en) | Intelligent terminal system with fingerprint identification and information processing method | |
US20150106958A1 (en) | Methods, systems, and devices for monitoring privacy beacons related to entities depicted in images | |
CN103117853B (en) | A kind of safe storage device account input and authentication method | |
CN101945486A (en) | Transfer of data with the wireless power communication equipment | |
CN107832615A (en) | Place perceives safety | |
CN106710017A (en) | Identity authentication method used for logistics sign-off and device and system thereof | |
CN106534206A (en) | Identity authentication method, apparatus and system based on cloud platform | |
CN105631959A (en) | Attendance checking method and system | |
CN106204853A (en) | Server, access control equipment administrative center, mobile terminal, the method and system of access control | |
CN108038950A (en) | For the Door-access control method and device in ward, storage medium, terminal | |
US10185841B2 (en) | Devices, methods, and systems for managing representations of entities through use of privacy beacons | |
CN107948970A (en) | System of real name method of network entry, system and the mobile terminal of subordinate terminal | |
CN106790136A (en) | A kind of identity identifying method based on cloud platform, device and system | |
CN108900536A (en) | Authentication method, device, computer equipment and storage medium | |
CN106339632A (en) | Method for allocating M2M device administration authority, user device and system | |
CN109830010A (en) | Wireless entrance guard equipment unlocking information distribution method, device and computer equipment | |
CN110533802A (en) | Access control equipment control method, device, equipment, system and storage medium | |
CN107657199A (en) | Mobile device, verification device and verification method thereof | |
CN106921617B (en) | Public equipment reservation control method and device | |
CN106375996A (en) | Virtual subscriber identity module (SIM) card protection method, application processor and terminal | |
CN108510599A (en) | Parking management method, device and computer readable storage medium | |
JP2008242793A (en) | Authentication system | |
CN109727141A (en) | Based on the information processing method, device and equipment for moving vehicle card | |
CN109146012A (en) | Management method, device and the system of card | |
CN110363886A (en) | Function realizing method, device and its relevant device of smart lock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191203 |