CN110533802A - Access control equipment control method, device, equipment, system and storage medium - Google Patents

Access control equipment control method, device, equipment, system and storage medium Download PDF

Info

Publication number
CN110533802A
CN110533802A CN201910645728.2A CN201910645728A CN110533802A CN 110533802 A CN110533802 A CN 110533802A CN 201910645728 A CN201910645728 A CN 201910645728A CN 110533802 A CN110533802 A CN 110533802A
Authority
CN
China
Prior art keywords
access control
control equipment
information
typing
biological information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910645728.2A
Other languages
Chinese (zh)
Inventor
田自考
陈洪欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN201910645728.2A priority Critical patent/CN110533802A/en
Publication of CN110533802A publication Critical patent/CN110533802A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of access control equipment control method, device, equipment, system and storage mediums, belong to field of computer technology.The described method includes: receiving the typing that access control equipment is sent by target radio network indicates information;After receiving typing instruction information, the biological information of legitimate user is acquired;Collected biological information is stored into access control equipment, biological information is used to carry out authentication to the current user of request for access control equipment.Technical solution provided by the embodiments of the present application can solve the poor problem of access control equipment typing biological information flexibility.

Description

Access control equipment control method, device, equipment, system and storage medium
Technical field
This application involves electronic equipment control fields, more particularly to access control equipment control method, device, equipment, system And storage medium.
Background technique
Currently, access control equipment is increasingly common in people's daily life, and access control equipment can be logical to request Capable user carries out authentication, and lets pass after being verified to user.In practical application, many access control equipments can be with Authentication is carried out to user using finger print information.In order to carry out authentication to user using finger print information, access control equipment is needed Typing is wanted to allow the finger print information of current user (that is to say legitimate user).
In the related technology, in the finger print information of typing legitimate user, the administrative staff of access control equipment need to be located at gate inhibition Around equipment, access control equipment can acquire the finger print information of administrative staff located around it, and utilize collected fingerprint After information passes through the authentication of administrative staff, access control equipment is inputted according to administrative staff instruction acquisition legitimate user's Finger print information, then, access control equipment can store the finger print information of collected legitimate user into access control equipment, thus complete The typing of pairs of legitimate user's finger print information.
However, since the relevant technologies require administrative staff to the week of access control equipment in the finger print information of typing legitimate user It encloses and is operated, therefore, the flexibility of typing finger print information is poor.
Summary of the invention
Based on this, it is necessary to for the problem that access control equipment typing finger print information flexibility is poor, provide a kind of gate inhibition and set Standby control method, device, equipment, system and storage medium.
In a first aspect, a kind of access control equipment control method is provided, for the access control equipment in access control system, the door Prohibiting control system includes access control equipment and the access control equipment, and the access control equipment and the access control equipment pass through Target Wireless Network is communicated, this method comprises:
Information is indicated by the typing that the target radio network receives access control equipment transmission;
After receiving typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, which is used to supply the gate inhibition Equipment carries out authentication to the current user of request.
In one of the embodiments, after the biological information of acquisition legitimate user, this method further include:
Message identification is distributed for the biological information, the message identification is for identifying the biological information;
Typing is sent to the access control equipment by the target radio network and successfully indicates information, which successfully indicates Information carries the message identification.
Typing should be sent to the access control equipment by the target radio network in one of the embodiments, successfully to refer to After showing information, this method further include:
After the current user of request is carried out authentication and is verified using the biological information, verifying is obtained By at the time of and the message identification;
It is sent by the target radio network to the access control equipment and enters and leaves record information, which records information and carry At the time of the message identification is verified with this.
Typing should be sent to the access control equipment by the target radio network in one of the embodiments, successfully to refer to After showing information, this method further include:
Information is indicated by the deletion that the target radio network receives access control equipment transmission, which indicates information Carry the message identification;
It is deleted from the access control equipment according to the biological information that the deletion indicates that information is identified the message identifier It removes.
The target radio network is long range LORA network in one of the embodiments,.
The biological information is finger print information in one of the embodiments,.
Second aspect provides a kind of access control equipment control method, for the access control equipment in access control system, The access control system includes the access control equipment and access control equipment, and the access control equipment and the access control equipment pass through target Wireless network is communicated, this method comprises:
Receive the typing instruction of user's triggering;
After receiving typing instruction, typing is sent to the access control equipment by the target radio network and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request Current user carries out authentication.
In one of the embodiments, should by the target radio network to the access control equipment send typing indicate information it Afterwards, this method further include:
Information is successfully indicated by the typing that the target radio network receives access control equipment transmission, which successfully indicates Information carries message identification;
Wherein, which is the access control equipment for biological information distribution, which is used to identify The biological information.
The typing that access control equipment transmission should be received by the target radio network in one of the embodiments, successfully refers to After showing information, this method further include:
Information is recorded by the discrepancy that the target radio network receives access control equipment transmission, it is this which, which records information, What access control equipment was sent after carrying out authentication to the current user of request using the biological information and being verified, it should At the time of discrepancy record information carries the message identification and is verified.
The typing that access control equipment transmission should be received by the target radio network in one of the embodiments, successfully refers to After showing information, this method further include:
It is sent by the target radio network to the access control equipment and deletes instruction information, deletion instruction information carries the letter Breath mark, deletion instruction information are used to indicate the access control equipment and delete the biological information that the message identifier is identified.
The typing instruction of reception user triggering in one of the embodiments, comprising:
The control interface of displaying target application program, the control interface include typing option, which is peace Loaded on the application journey in the access control equipment, with control access control equipment progress biological information typing Sequence;
After detecting trigger action of the user to the typing option, typing instruction is received.
The target radio network is long range LORA network in one of the embodiments,.
The biological information is finger print information in one of the embodiments,.
The third aspect provides a kind of access control equipment, which belongs to access control system, the access control system It further include access control equipment, the access control equipment and the access control equipment are communicated by target radio network, the gate inhibition Equipment includes:
First information receiving module, the typing for receiving access control equipment transmission by the target radio network refer to Show information;
Acquisition module, for acquiring the biological information of legitimate user after receiving typing instruction information;
Memory module, for storing the collected biological information into the access control equipment, biological characteristic letter Breath is for carrying out authentication to the current user of request for the access control equipment.
Fourth aspect provides a kind of access control equipment, which belongs to access control system, the gate inhibition Control system further includes access control equipment, and the access control equipment and the access control equipment are communicated by target radio network, should Access control equipment includes:
Command reception module, for receiving the typing instruction of user's triggering;
First sending module, for after receiving typing instruction, by the target radio network to the access control equipment It sends typing and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request Current user carries out authentication.
5th aspect, provides a kind of access control equipment, including memory and processor, memory is stored with computer journey The step of sequence, processor realizes above-mentioned access control equipment control method when executing computer program.
6th aspect, provides a kind of access control equipment, including memory and processor, memory are stored with computer The step of program, processor realizes above-mentioned access control equipment control method when executing computer program.
7th aspect, provides a kind of access control system, which includes as being somebody's turn to do in terms of the above-mentioned 5th The access control equipment being somebody's turn to do in terms of access control equipment and the such as the above-mentioned 6th.
Eighth aspect provides a kind of computer readable storage medium, is stored thereon with computer program, computer program The step of above-mentioned access control equipment control method is realized when being executed by processor.
9th aspect, provide a kind of computer program product, instruction be stored in the computer program product, when its When running on computer, enable a computer to execute access control equipment control method provided by the embodiments of the present application.
Tenth aspect, provides a kind of chip, which includes programmable logic circuit and/or program instruction, when the core Piece is able to carry out access control equipment control method provided by the embodiments of the present application when running.
Technical solution bring beneficial effect provided by the embodiments of the present application includes at least:
Information, access control equipment are indicated by sending typing to access control equipment from access control equipment utilization target radio network After receiving typing instruction information, the biological information of legitimate user is acquired, and collected biological information is deposited Storage into access control equipment, be stored in biological information in access control equipment be used for for access control equipment to the current user of request into Row authentication, in this way, the administrative staff of access control equipment can be long-range by target radio network using access control equipment The biological information of access control equipment typing legitimate user, so that in the biological information of typing legitimate user, pipe Reason personnel do not need to around access control equipment to operate, therefore the flexibility of typing biological information can be improved.
Detailed description of the invention
Fig. 1 is the schematic diagram of implementation environment involved by access control equipment control method provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 3 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 4 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 5 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 6 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 7 is a kind of flow chart of access control equipment control method provided by the embodiments of the present application;
Fig. 8 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Fig. 9 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Figure 10 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Figure 11 is a kind of block diagram of access control equipment control device provided by the embodiments of the present application;
Figure 12 is a kind of block diagram of computer equipment provided by the embodiments of the present application;
Figure 13 is a kind of block diagram of computer equipment provided by the embodiments of the present application;
Figure 14 is a kind of block diagram that access control equipment control system is given provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the application embodiment party Formula is described in further detail.
Access control equipment is a kind of relatively conventional safety device, can usually be installed on door or channel of building etc. Place can carry out authentication to the current user of request, and let pass after being verified to user.Access control equipment can It plays and illegal user is prevented to enter building, guarantee the effect of building safety.
Wherein, Fingerprint Lock is a kind of relatively conventional access control equipment, and Fingerprint Lock can use finger print information and pass through to request User carry out authentication.Specifically, the finger print information that can store at least one legitimate user in Fingerprint Lock, when some When user requests current, Fingerprint Lock can acquire the finger print information of the user, and will be in collected finger print information and Fingerprint Lock The finger print information of storage is compared, when the fingerprint of some legitimate user stored in collected finger print information and Fingerprint Lock is believed When manner of breathing matches, Fingerprint Lock can be determined that the current user of the request is legitimate user, thus to the current user of the request into Row is let pass, conversely, when the finger print information of any legitimate user stored in collected finger print information and Fingerprint Lock mismatches When, Fingerprint Lock can be determined that the current user of the request is illegal user, at this point, the use that Fingerprint Lock can not be current to the request It lets pass at family.
By described above it is found that being tested to enable Fingerprint Lock to carry out identity to the current user of request using finger print information Card, Fingerprint Lock need the finger print information of typing legitimate user, and so-called " finger print information of typing legitimate user " refers to that acquisition is closed The finger print information of method user, and the finger print information of the collected legitimate user is stored into Fingerprint Lock, for fingerprint Lock Lee It is verified with identity of the finger print information of storage to the current user of request.
In the related technology, special personnel (hereinafter referred to as administrative staff) can be arranged to be managed Fingerprint Lock, the pipe The permission that there is reason personnel control Fingerprint Lock to carry out the typing of legitimate user's finger print information.In the finger print information of typing legitimate user When, which can move to the peripheral region of Fingerprint Lock, and then, which can enable Fingerprint Lock acquire its fingerprint Information, Fingerprint Lock can use the identity of finger print information verification management personnel after collecting the finger print information of administrative staff, After the authentication to administrative staff passes through, which can receive the instruction of administrative staff's input, and according to administrator The finger print information of the instruction typing legitimate user of member's input.
However, since the relevant technologies require administrative staff to the week of access control equipment in the finger print information of typing legitimate user It encloses region to be operated, therefore, the flexibility of typing finger print information is poor.
The embodiment of the present application provides a kind of access control equipment control method, can solve access control equipment typing finger print information spirit The poor problem of activity.
In access control equipment control method provided by the embodiments of the present application, access control equipment can use Target Wireless net Network sends typing to access control equipment and indicates information, and access control equipment can acquire legitimate user after receiving typing instruction information Biological information, and collected biological information is stored into access control equipment, wherein be stored in access control equipment Biological information be used to carry out authentication for the access control equipment user current to request, in this way, the management of access control equipment Personnel can pass through the biology of the long-range access control equipment typing legitimate user of target radio network using access control equipment Characteristic information so that in the biological information of typing legitimate user, administrative staff do not need around access control equipment into Row operation, therefore the flexibility of typing biological information can be improved.
In the following, will be carried out to implementation environment involved by access control equipment control method provided by the embodiments of the present application brief Explanation.
Fig. 1 is a kind of signal of implementation environment involved by access control equipment control method provided by the embodiments of the present application Figure, as shown in Figure 1, the implementation environment may include access control equipment 101 and access control equipment 102,101 He of access control equipment It can be communicated by target radio network W between access control equipment 102.
Wherein, access control equipment 101 can be smart phone, tablet computer, wearable device, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) player, E-book reader or mobile unit etc..
Access control equipment 102 can use biological information and carry out authentication to the current user of request.Wherein, biological Characteristic information is a kind of for characterizing the information of the intrinsic physiological characteristic of human body or behavioural characteristic, for example, the biological characteristic is believed Breath can be finger print information, iris information, face feature information and gait information etc..Optionally, in the biological information When for finger print information, which can be for Fingerprint Lock.
Target radio network W can be mobile data network, wide area network or Internet of Things etc..In one embodiment of the application In, target radio network W can be LORA (Long Range, over long distances) network.
On the one hand, LORA communication signal transmissions distance longer (generally can be several kms or so) therefore passes through LORA network It can make to carry out longer-distance communication between access control equipment 101 and access control equipment 102, thereby may be ensured that typing biology The flexibility of characteristic information.On the other hand, communicate by LORA network that required power consumption is smaller, this can reduce gate inhibition The power consumption of equipment 102 increases the standby time of access control equipment 102, especially for the battery powered access control equipment 102 of utilization Speech carries out communicating the frequency that can be reduced the access control equipment 102 and replace battery with access control equipment 101 by LORA network, To reduce the management cost of access control equipment 102.
It, can in access control equipment 102 in one embodiment of the application in the case where target radio network is LORA network To be equipped with LORA communication component, access control equipment 102 can receive and dispatch LORA communication letter by the LORA communication component of itself installation Number, meanwhile, LORA communication component can also be installed, access control equipment 101 can also be by certainly in access control equipment 101 The LORA communication component of body installation receives and dispatches LORA signal of communication.
During access control equipment 101 is communicated with access control equipment 102, access control equipment 101 can lead to The LORA communication component for crossing itself installation sends LORA signal of communication to access control equipment 102, and access control equipment 102 can pass through itself The LORA communication component of installation receives the LORA signal of communication that access control equipment 101 is sent, and similarly, access control equipment 102 can LORA signal of communication, access control equipment 101 are sent to access control equipment 101 with the LORA communication component installed by itself The LORA signal of communication that access control equipment 102 is sent can be received by the LORA communication component of itself installation.
In the case where target radio network is LORA network, in another embodiment of the application, in access control equipment 102 LORA communication component can be installed, access control equipment 102 can receive and dispatch LORA communication by the LORA communication component of itself installation Signal, meanwhile, mobile data communication component can be installed, access control equipment 101 can pass through in access control equipment 101 The mobile data communication component receives and dispatches mobile data communication signal, for example, the mobile data communication signal can be 5G (the 4th Generation mobile communication, the 5th third-generation mobile communication technology) signal of communication, 4G (the 4th Generation mobile communication, fourth generation mobile communication technology) signal of communication, 3G (the 3th Generation mobile communication, 3rd generation mobile communication technology) signal of communication etc..
During access control equipment 101 is communicated with access control equipment 102, access control equipment 101 can lead to The mobile data communication component for crossing itself installation sends mobile data communication signal to base station, wherein shifting is equipped in the base station Dynamic data communication component and LORA communication component, the base station can receive gate inhibition by the mobile data communication component of itself installation The mobile data communication signal that equipment 101 is sent is controlled, and the mobile data communication signal is converted into LORA signal of communication, and Afterwards, the LORA signal of communication that conversion obtains can be sent to access control equipment by the LORA communication component of itself installation by base station In 102, access control equipment 102 can receive the LORA signal of communication that base station is sent by the LORA communication component of itself installation.
Access control equipment 102 can send LORA signal of communication, base station to base station by the LORA communication component of itself installation The LORA signal of communication that access control equipment 101 is sent can be received by the LORA communication component of itself installation, and the LORA is led to Letter signal is converted to mobile data communication signal, and then, base station is controlled by the mobile data communication component itself installed to gate inhibition Control equipment 101 sends the mobile data communication signal, the mobile data communication component that access control equipment 101 is installed by itself Receive the mobile data communication signal that base station is sent.
Referring to FIG. 2, it illustrates a kind of flow chart of access control equipment control method provided by the embodiments of the present application, the door Prohibiting apparatus control method can be applied in the access control equipment 102 in Fig. 1.As shown in Fig. 2, the access control equipment control method can be with The following steps are included:
Step 201, access control equipment receive the typing that access control equipment is sent by target radio network and indicate information.
It is LORA network in target radio network, and, LORA communication is mounted in access control equipment and access control equipment In the case where component, access control equipment can send LORA communication to access control equipment by the LORA communication component of itself installation Signal, wherein the LORA signal of communication carries typing instruction information.Access control equipment can be logical by the LORA of itself installation Believe that component receives the LORA signal of communication that access control equipment is sent, and obtains the typing instruction carried in the LORA signal of communication Information.
It is LORA network in target radio network, and, access control equipment is equipped with mobile data communication component, Men Jinshe It is standby LORA communication component is installed in the case where, access control equipment can by the mobile data communication component of itself installation to Base station sends mobile data communication signal, which can carry the instruction information of typing above.Base station After the mobile data communication signal for receiving the transmission of access control equipment, the mobile data communication signal can be converted to LORA signal of communication, wherein the LORA signal of communication converted can carry typing instruction information.Then, base station can The LORA signal of communication that the conversion obtains is sent to access control equipment, access control equipment with the LORA communication component installed by itself The LORA signal of communication that base station is sent can be received by the LORA communication component of itself installation, and obtain the LORA signal of communication The typing of middle carrying indicates information.
Step 202, receive typing instruction information after, access control equipment acquire legitimate user biological information.
In the embodiment of the present application, collecting biological feature information component can be installed, in step 202 in access control equipment In, after the typing instruction information for receiving the transmission of access control equipment, access control equipment can star the biology installed in itself Characteristic information acquisition component, and pass through the biological information of collecting biological feature information component acquisition legitimate user.
In the case where the biological information of legitimate user is finger print information, above-mentioned collecting biological feature information component can Think finger print information acquisition component, optionally, which can refer to for optical ftngetpnnt acquisidon component, heat-sensitive type Line acquisition component or biological RF fingerprint acquisition component etc..
Step 203, access control equipment store the biological information of collected legitimate user into access control equipment.
In one embodiment of the application, access control equipment may include a target storage space, the target storage space It can be used to store the collected biological information of access control equipment, the biological information stored in the target storage space is used In the user progress authentication current to request for access control equipment.The biological characteristic of legitimate user is collected in step 202 After information, access control equipment can be stored the biological information of the collected legitimate user into the target storage space, So that access control equipment carries out authentication to the current user of request using the biological information of the legitimate user.
In access control equipment control method provided by the embodiments of the present application, by by access control equipment utilization Target Wireless Network sends typing to access control equipment and indicates information, and access control equipment acquires legitimate user's after receiving typing instruction information Biological information, and collected biological information is stored into access control equipment, the biology being stored in access control equipment Characteristic information is used to carry out authentication to the current user of request for access control equipment, in this way, the administrative staff of access control equipment are just It can use access control equipment to believe by the biological characteristic of the long-range access control equipment typing legitimate user of target radio network Breath, so that administrative staff do not need to around access control equipment to operate in the biological information of typing legitimate user, Therefore the flexibility of typing biological information can be improved.
Referring to FIG. 3, it illustrates the flow chart of another access control equipment control method provided by the embodiments of the present application, it should Access control equipment control method can be applied in the access control equipment 102 in Fig. 1.As shown in figure 3, in embodiment described above On the basis of, after above-mentioned steps 202, access control equipment control method further include:
Step 301, the biological information that access control equipment is collected legitimate user distribute message identification.
In the embodiment of the present application, access control equipment can be special for the biology of its collected legitimate user in step 202 Reference breath distribution message identification, wherein the message identification is used to identify the biological information of collected legitimate user, optional , which can be used for the biological information of the collected legitimate user of unique identification.
Optionally, after distributing message identification for the biological information of legitimate user, access control equipment can be by the letter Breath mark is corresponding with the biological information of the legitimate user to be stored in the target storage space of access control equipment.
Step 302, access control equipment send typing to access control equipment by target radio network and successfully indicate information.
Wherein, which successfully indicates that information carries the letter that the biological information that access control equipment is the legitimate user distributes Breath mark.The typing successfully indicate information be used to indicate access control equipment successful acquisition and store legitimate user biology it is special Reference breath.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be collected legitimate user Biological information distribute message identification, and successfully indicate that the message identification is sent to access control and set by information by typing It is standby, since access control equipment obtains message identification, in the next steps, access control equipment and access control equipment it Between can use the message identification and indicate the biological information, without directly transmitting the biological information, due to mark The data volume for knowing information is generally less than the data volume of biological information, and therefore, avoiding directly transmitting biological information can be with Reduce the occupancy to network bandwidth, also can reduce the data interaction time delay between access control equipment and access control equipment.
Referring to FIG. 4, it illustrates the flow chart of another access control equipment control method provided by the embodiments of the present application, it should Access control equipment control method can be applied in the access control equipment 102 in Fig. 1.As shown in figure 4, in embodiment described above On the basis of, after above-mentioned steps 302, access control equipment control method further include:
Step 401, after carrying out authentication using the biological information user current to request and being verified, door Taboo equipment obtains at the time of being verified and message identification.
As described above, correspondence is stored with the collected legitimate user's of access control equipment in the target storage space of access control equipment Biological information and access control equipment are the message identification of biological information distribution.Access control equipment can use target storage The biological information stored in space carries out authentication to the current user of request.
Optionally, when some user requests current, access control equipment can acquire the biological information of the user, and will The biological information stored in collected biological information and target storage space is compared, when collected biology When the biological information stored in characteristic information and target storage space matches, what access control equipment can be current to the request Subscriber authentication passes through, and that is to say, access control equipment can be determined that the current user of the request is legitimate user, logical to request After capable subscriber authentication passes through, the available biological information point to be stored in target storage space of access control equipment The message identification matched and at the time of be verified.
Step 402, access control equipment, which are sent by target radio network to access control equipment, enters and leaves record information.
Wherein, discrepancy record information carries the message identification and be verified that access control equipment is got in step 401 At the time of.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be sent to access control equipment The discrepancy of legitimate user records information, so that the holder (administrative staff that is to say access control equipment) of access control equipment can At the time of timely learning enters and leaves personnel and the personnel discrepancy of access control equipment, to play the effect reinforced to gate inhibition's equipment management Fruit.
Referring to FIG. 5, it illustrates the flow chart of another access control equipment control method provided by the embodiments of the present application, it should Access control equipment control method can be applied in the access control equipment 102 in Fig. 1.As shown in figure 5, in embodiment described above On the basis of, after above-mentioned steps 302, access control equipment control method further include:
Step 501, access control equipment receive the deletion that access control equipment is sent by target radio network and indicate information.
Wherein, deletion instruction information carries message identification, and deletion instruction information is used to indicate access control equipment deletion should The biological information that message identification is identified.
Step 502, access control equipment indicate the information biological information that is identified message identifier from door according to the deletion Prohibit and is deleted in equipment.
Optionally, after receiving deletion instruction information, access control equipment can indicate that information carries according to the deletion Message identification inquire target storage space, to obtain the biology of corresponding with message identification storage in target storage space Characteristic information, then, the biological information of the storage corresponding with the message identification that access control equipment can will acquire is from target It is deleted in memory space.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be according to access control equipment It indicates to delete the biological information of itself storage, so that the biological information stored in deleting access control equipment When, administrative staff do not need to around access control equipment to operate, therefore the flexible of typing biological information can be improved Property.
Referring to FIG. 6, it illustrates a kind of flow chart of access control equipment control method provided by the embodiments of the present application, the door Prohibiting apparatus control method can be applied in the access control equipment 101 in Fig. 1.As shown in fig. 6, the access control equipment control method It may comprise steps of:
Step 601, access control equipment receive the typing instruction of user's triggering.
Optionally, destination application can be installed in access control equipment, which can have control Access control equipment processed carries out the function of biological information typing.Needing long-range access control equipment typing biological information When, the holder (administrative staff that is to say access control equipment) of access control equipment can control access control equipment and start the mesh Mark application program, destination application starting after, access control equipment can with the control interface of displaying target application program, The control interface includes typing option.After detecting the trigger action to the typing option, access control equipment is ready to receive Typing instruction described above.
Step 602, receive typing instruction after, access control equipment by target radio network to access control equipment send Typing indicates information.
After receiving typing instruction described above, access control equipment can be executed to be referred to access control equipment transmission typing Show the technical process of information, wherein similarly, the embodiment of the present application is herein for technical process described in the technical process and step 201 It repeats no more.
In access control equipment control method provided by the embodiments of the present application, by by access control equipment utilization Target Wireless Network sends typing to access control equipment and indicates information, and access control equipment acquires legitimate user's after receiving typing instruction information Biological information, and collected biological information is stored into access control equipment, the biology being stored in access control equipment Characteristic information is used to carry out authentication to the current user of request for access control equipment, in this way, the administrative staff of access control equipment are just It can use access control equipment to believe by the biological characteristic of the long-range access control equipment typing legitimate user of target radio network Breath, so that administrative staff do not need to around access control equipment to operate in the biological information of typing legitimate user, Therefore the flexibility of typing biological information can be improved.
The embodiment of the present application also provides the flow chart of another access control equipment control method, the access control equipment control methods It can be applied in the access control equipment 101 in Fig. 1.On the basis of embodiment described above, above-mentioned steps 602 it Afterwards, access control equipment control method further include:
Step 701, access control equipment receive the typing that access control equipment is sent by target radio network and successfully indicate to believe Breath.
Wherein, which successfully indicates that information carries message identification, which is that access control equipment is adopted for access control equipment The biological information distribution of the legitimate user collected, the message identification is for identifying the biological information.
Optionally, after receiving typing and successfully indicating information, access control equipment can show typing successful information, The typing successful information is used to prompting holder's access control equipment of access control equipment successful acquisition and to store legal use The biological information at family.For example, after receiving typing and successfully indicating information, access control equipment can show typing at Function pop-up can show the printed words of " biological information typing success " in typing success pop-up, wherein should " biology is special The printed words of sign data input success " are typing successful information described above.
Optionally, after receiving typing and successfully indicating information, access control equipment can also show editing options, when After detecting that the editing options are triggered, access control equipment can receive the user identifier of its holder input, user mark Know legitimate user corresponding to the biological information for the typing of unique identification access control equipment.Receiving holder's input After user identifier, access control equipment can be stored the user identifier is corresponding with message identification.In this way, in subsequent step In rapid, after access control equipment has sent the message identification to access control equipment, access control equipment is available with the letter Breath identifies corresponding user identifier, and the user identifier is showed to the holder of access control equipment, in this way, access control is set Standby holder can intuitively understand who legitimate user user corresponding to the message identification of access control equipment transmission is .
In access control equipment control method provided by the embodiments of the present application, access control equipment can be collected legitimate user Biological information distribute message identification, and successfully indicate that the message identification is sent to access control and set by information by typing It is standby, since access control equipment obtains message identification, in the next steps, access control equipment and access control equipment it Between can use the message identification and indicate the biological information, without directly transmitting the biological information, due to mark The data volume for knowing information is generally less than the data volume of biological information, and therefore, avoiding directly transmitting biological information can be with Reduce the occupancy to network bandwidth, also can reduce the data interaction time delay between access control equipment and access control equipment.
The flow chart for another access control equipment control method that the embodiment of the present application also provides, the access control equipment control method It can be applied in the access control equipment 101 in Fig. 1.On the basis of embodiment described above, above-mentioned steps 701 it Afterwards, access control equipment control method further include:
Step 801, access control equipment receive the discrepancy that access control equipment is sent by target radio network and record information.
Wherein, discrepancy record information is that access control equipment is current to request in the biological information using itself storage User carries out authentication and sends after being verified, which records information and carry access control equipment is the biological information The message identification of distribution and at the time of be verified.
Optionally, after receiving discrepancy record information, the available discrepancy of access control equipment records information User identifier corresponding to the message identification of carrying, then, what access control equipment can pass through the user identification and verification Moment shows the holder of access control equipment, so that the holder of access control equipment is intuitively understood and enters and leaves gate inhibition At the time of the personnel of equipment and the personnel enter and leave.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be sent to access control equipment The discrepancy of legitimate user records information, so that the holder (administrative staff that is to say access control equipment) of access control equipment can At the time of timely learning enters and leaves personnel and the personnel discrepancy of access control equipment, to play the effect reinforced to gate inhibition's equipment management Fruit.
The embodiment of the present application also provides the flow chart of another access control equipment control method, the access control equipment control methods It can be applied in the access control equipment 101 in Fig. 1.On the basis of embodiment described above, above-mentioned steps 701 it Afterwards, access control equipment control method further include:
Step 901, access control equipment, which are sent by target radio network to access control equipment, deletes instruction information.
Wherein, deletion instruction information carries message identification, and deletion instruction information is used to indicate access control equipment deletion should The biological information that message identifier is identified.
Optionally, the destination application installed in access control equipment can provide deletion option, when detecting to this After the trigger action for deleting option, access control equipment can show user identifier list, which includes at least One user identifier, each user identifier are corresponding with a message identification.When detecting in the user identifier list Certain user identifier trigger action after, the available corresponding message identification of certain user identifier of access control equipment, then, Deletion instruction information can be generated in access control equipment, and deletion instruction information can carry the corresponding information of certain user identifier Mark.Then, the deletion of generation can be indicated that information is sent to gate inhibition by target radio network and sets by access control equipment It is standby.
In access control equipment control method provided by the embodiments of the present application, access control equipment can be according to access control equipment It indicates to delete the biological information of itself storage, so that the biological information stored in deleting access control equipment When, administrative staff do not need to around access control equipment to operate, therefore the flexible of typing biological information can be improved Property.
Referring to FIG. 7, it illustrates a kind of flow chart of access control equipment control method provided by the embodiments of the present application, the door Prohibiting apparatus control method can be applied in implementation environment shown in FIG. 1.As shown in fig. 7, the access control equipment control method can be with The following steps are included:
Step 1001, access control equipment receive the typing instruction of user's triggering.
The embodiment of the present application is only installed on public affairs with access control equipment and rents a house in door, and the artificial public affairs of holding of access control equipment are rented a house Landlord, the legitimate user of access control equipment be public affairs rent a house lessee scene for, to access control equipment provided by the embodiments of the present application Control method is briefly described.
When the lessee that rents a house of public affairs moves in public affairs and rents a house, the lessee can negotiate with landlord typing biological information when It carves.After the completion of negotiation, landlord can inscribe the access control equipment for starting and itself holding (for example, the access control at this Equipment can be smart phone) in destination application, and click the typing choosing in the control interface of the destination application .The access control equipment can receive typing instruction described above after detecting that the typing option is triggered.
Step 1002, receive typing instruction after, access control equipment by target radio network to access control equipment send out Typing is sent to indicate information.
Wherein, similarly, the embodiment of the present application is herein for the technical process of the technical process of step 1002 and above step 602 It repeats no more.
Step 1003, receive typing instruction information after, access control equipment acquire legitimate user biological information.
After receiving the typing instruction information of access control equipment transmission, access control equipment can star the middle peace of itself The collecting biological feature information component of dress, and pass through the biological information of collecting biological feature information component acquisition lessee.
Step 1004, access control equipment are that collected biological information distributes message identification.
After collecting the biological information of lessee, access control equipment can distribute for the biological information of the lessee Message identification, wherein the message identification is used for the biological information of the unique identification lessee.
Step 1005, access control equipment by collected biological information and are the information mark of biological information distribution Know correspondence to store into access control equipment.
For example, the characteristic information of the biology of the collected lessee Xiao Wang of access control equipment is biological information A, access control equipment Message identification for biological information A distribution is a, then access control equipment can be by biological information A and a couples of message identification It should be stored in access control equipment.
Step 1006, access control equipment send typing to access control equipment by target radio network and successfully indicate information.
Wherein, which successfully indicates that information carries the information that access control equipment is distributed by collected biological information Mark.Such as the example above, after collecting the biological information A of lessee Xiao Wang, access control equipment can pass through Target Wireless Network sends typing to access control equipment and successfully indicates information, which successfully indicates that information can carry message identification a.
Step 1007, access control equipment receive the typing that access control equipment is sent by target radio network and successfully indicate to believe Breath.
Access control equipment can show typing success pop-up, the typing after receiving typing and successfully indicating information The printed words of " biological information typing success " can be shown in success pop-up.
Meanwhile access control equipment can also show editing options, and after the editing options are triggered, access control equipment Can receive landlord input user identifier, for example, the user identifier can be " Xiao Wang ", the user identifier " Xiao Wang " for pair Lessee Xiao Wang is identified.After receiving user identifier, access control equipment can be by the user identifier and the information mark Know correspondence to be stored in access control equipment, such as the example above, access control equipment can be by user identifier " Xiao Wang " and information Mark a correspondence is stored in access control equipment.
Step 1008, after carrying out authentication using the biological information user current to request and being verified, Access control equipment obtains at the time of being verified and message identification.
For example, access control equipment can acquire the biological information of lessee Xiao Wang when lessee Xiao Wang requests current, due to The biological information A of lessee Xiao Wang has been stored in access control equipment, therefore, the life of the collected lessee Xiao Wang of access control equipment Object characteristic information is matched with biological information A certainly, that is to say, it is special that access control equipment can use the biology stored in itself Reference breath A passes through the authentication of the lessee Xiao Wang.After the authentication to lessee Xiao Wang passes through, access control equipment can be with T and message identification a at the time of acquisition passes through the authentication of lessee Xiao Wang.
Step 1009, access control equipment, which are sent by target radio network to access control equipment, enters and leaves record information.
Wherein, at the time of discrepancy record information carries message identification and is verified.Such as the example above, access control equipment to The discrepancy record information that access control equipment is sent carries moment t and message identification a.
Step 1010, access control equipment receive the discrepancy that access control equipment is sent by target radio network and record information.
Such as the example above, after receiving the discrepancy record information of access control equipment transmission, access control equipment can be obtained User identifier corresponding to message identification a " Xiao Wang " is taken, then, access control equipment by the user identifier " Xiao Wang " and can be tested T shows landlord at the time of card passes through, and so that landlord is intuitively understood and enters and leaves the public personnel (lessee Xiao Wang) to rent a house and be somebody's turn to do At the time of personnel enter and leave.
Step 1011, access control equipment, which are sent by target radio network to access control equipment, deletes instruction information.
Such as the example above, after lessee Xiao Wang throws a lease, lessee Xiao Wang will not be allowed to enter public affairs and rent a house, at this point, landlord The deletion option that can be provided in the destination application of triggering access control equipment installation, when detecting to the deletion option After trigger action, access control equipment can show user identifier list, which includes at least one user mark Know, which includes user identifier " Xiao Wang ".After detecting the trigger action to user identifier " Xiao Wang ", The access control equipment corresponding message identification a of the available user identifier " Xiao Wang ", then, access control equipment can be generated Instruction information is deleted, deletion instruction information can carry message identification a.Then, access control equipment being somebody's turn to do generation It deletes instruction information and access control equipment is sent to by target radio network.
Step 1012, received by target radio network access control equipment transmission deletion instruction information after, Access control equipment is deleted from access control equipment according to the biological information that the deletion indicates that information is identified message identifier.
Such as the example above, after the deletion for receiving the transmission of access control equipment indicates information, access control equipment can be from The deletion instruction information in extract message identification a, then, access control equipment can by itself storage with a pairs of the message identification The biological information A answered is deleted.
Referring to FIG. 8, it illustrates a kind of block diagram of access control equipment 1100 provided by the embodiments of the present application, the access control equipment 1100 can be the access control equipment 102 in Fig. 1.As shown in figure 8, the access control equipment 1100 may include: that the first information receives mould Block 1101, acquisition module 1102 and memory module 1103.
Wherein, first information receiving module 1101, for receiving the access control equipment by the target radio network The typing of transmission indicates information.
The acquisition module 1102, for acquiring the biological characteristic letter of legitimate user after receiving typing instruction information Breath.
The memory module 1103, for storing the collected biological information into the access control equipment, the biology Characteristic information is used to carry out authentication to the current user of request for the access control equipment.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
With reference to Fig. 9, the embodiment of the present application also provides a kind of access control equipment 1200, the access control equipment 1200 is in addition to including door Prohibit outside each module that equipment 1100 includes, optionally, can also include distribution module 1104, the first sending module 1105, obtain Module 1106, the second sending module 1107, the second information receiving module 1108 and removing module 1109.
Wherein, the distribution module 1104, for distributing message identification for the biological information, the message identification is for marking Know the biological information.
First sending module 1105, for sending typing success to the access control equipment by the target radio network Indicate information, which successfully indicates that information carries the message identification.
The acquisition module 1106, for carrying out authentication simultaneously to the current user of request using the biological information After being verified, acquisition is at the time of be verified and the message identification.
Second sending module 1107 enters and leaves record for sending by the target radio network to the access control equipment Information, discrepancy record information carry the message identification and this at the time of be verified.
Second information receiving module 1108, for receiving access control equipment transmission by the target radio network Instruction information is deleted, deletion instruction information carries the message identification.
The removing module 1109, for indicating that the biological characteristic that information is identified the message identifier is believed according to the deletion Breath is deleted from the access control equipment.
Above method embodiment, realization principle and technology effect may be implemented in access control equipment provided by the embodiments of the present application Seemingly, details are not described herein for fruit.
Specific about access control equipment limits the restriction that may refer to above for access control equipment control method, herein not It repeats again.Modules in above-mentioned access control equipment can be realized fully or partially through software, hardware and combinations thereof.It is above-mentioned each Module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be stored in meter in a software form It calculates in the memory in machine equipment, executes the corresponding operation of the above modules in order to which processor calls.
Referring to FIG. 10, it illustrates a kind of block diagram of access control equipment 1300 provided by the embodiments of the present application, the door Prohibiting control equipment 1300 can be the access control equipment 101 in Fig. 1.As shown in Figure 10, which can be with It include: command reception module 1301 and the first sending module 1302.
The command reception module 1301, for receiving the typing instruction of user's triggering.
First sending module 1302, for after receiving typing instruction, by the target radio network to the door Prohibit equipment and sends typing instruction information.
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request Current user carries out authentication.
In one embodiment of the application, which is specifically used for: displaying target application program Control interface, the control interface include typing option, which is mounted in the access control equipment, has Control the application program that the access control equipment carries out the function of biological information typing;When detecting user to the typing option After trigger action, typing instruction is received.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
With reference to Figure 11, the embodiment of the present application also provides a kind of access control equipment 1400, the access control equipment 1400 It further include instruction information receiving module 1303, record optionally including access control equipment 1300 other than each module for including Information receiving module 1304 and the second sending module 1305.
Wherein, the instruction information receiving module 1303 is sent for receiving the access control equipment by the target radio network Typing successfully indicate information, the typing successfully indicate information carry message identification;Wherein, which is the access control equipment For biological information distribution, the message identification is for identifying the biological information.
The record information receiving module 1304, for receiving the discrepancy of access control equipment transmission by the target radio network Information is recorded, discrepancy record information is that the access control equipment is carrying out body to the current user of request using the biological information It part verifies and sends after being verified, at the time of discrepancy record information carries the message identification and is verified.
Second sending module 1305 deletes instruction letter for sending by the target radio network to the access control equipment Breath, deletion instruction information carry the message identification, and deletion instruction information is used to indicate the access control equipment and deletes the message mark Know the biological information identified.
Access control equipment provided by the embodiments of the present application, may be implemented above method embodiment, realization principle and skill Art effect is similar, and details are not described herein.
Specific about access control equipment limits the restriction that may refer to above for access control equipment control method, In This is repeated no more.Modules in above-mentioned access control equipment can come real fully or partially through software, hardware and combinations thereof It is existing.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software shape Formula is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment of the application, a kind of computer equipment is provided, which can be gate inhibition and set Standby, internal structure chart is shown in Fig.12.The computer equipment includes the processor connected by system bus, storage Device, communication component and collecting biological feature information component.Wherein, the processor of the computer equipment is calculated and is controlled for providing Ability.The memory of the computer equipment includes non-volatile memory medium, built-in storage.Non-volatile memory medium storage There are operating system and computer program.The built-in storage is operating system and computer program in non-volatile memory medium Operation provides environment.The communication component of the computer equipment is used for and other computer equipments (for example, access control equipment) By target radio network connection communication, in one embodiment of the application, which can be LORA communication component. To realize a kind of access control equipment control method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 12, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment of the application, a kind of computer equipment is provided, which can be gate inhibition's control Control equipment, internal structure chart can be as shown in figure 13.The computer equipment includes the processor connected by system bus, deposits Reservoir and communication component.Wherein, the processor of the computer equipment is for providing calculating and control ability.The computer equipment Memory includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system and computer Program.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The meter The communication component for calculating machine equipment is used to connect with other computer equipments (for example, access control equipment) by target radio network logical Letter, in one embodiment of the application, which can be LORA communication component or mobile data communication component.The meter To realize a kind of access control equipment control method when calculation machine program is executed by processor.
It will be understood by those skilled in the art that structure shown in Figure 13, only part relevant to application scheme The block diagram of structure, does not constitute the restriction for the computer equipment being applied thereon to application scheme, and specific computer is set Standby may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment of the application, a kind of computer equipment, including memory and processor, memory are provided In be stored with computer program, the processor execute computer program when perform the steps of
Information is indicated by the typing that the target radio network receives access control equipment transmission;
After receiving typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, which is used to supply the gate inhibition Equipment carries out authentication to the current user of request.
In one embodiment of the application, processor is also performed the steps of when executing computer program as the biology Characteristic information distributes message identification, and the message identification is for identifying the biological information;By the target radio network to this Access control equipment sends typing and successfully indicates information, which successfully indicates that information carries the message identification.
In one embodiment of the application, processor is also performed the steps of to work as to utilize when executing computer program and is somebody's turn to do After the biological information user current to request carries out authentication and be verified, at the time of acquisition is verified and the letter Breath mark;It is sent by the target radio network to the access control equipment and enters and leaves record information, which records information and carry At the time of the message identification is verified with this.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh Mark wireless network receives the deletion instruction information of access control equipment transmission, and deletion instruction information carries the message identification; It is deleted from the access control equipment according to the biological information that the deletion indicates that information is identified the message identifier.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer equipment provided by the embodiments of the present application, implementing principle and technical effect and above method embodiment class Seemingly, details are not described herein.
In one embodiment of the application, a kind of computer equipment, including memory and processor, memory are provided In be stored with computer program, the processor execute computer program when perform the steps of
Receive the typing instruction of user's triggering;
After receiving typing instruction, typing is sent to the access control equipment by the target radio network and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request Current user carries out authentication.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh The typing that mark wireless network receives access control equipment transmission successfully indicates information, which successfully indicates that information carries information mark Know;Wherein, which is the access control equipment for biological information distribution, which is used to identify the biology Characteristic information.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh Mark wireless network receives the discrepancy record information of access control equipment transmission, and discrepancy record information is the access control equipment using should To what is sent after requesting current user to carry out authentication and be verified, which records information and carries biological information The message identification and at the time of be verified.
In one embodiment of the application, processor is also performed the steps of when executing computer program through the mesh It marks wireless network and sends deletion instruction information to the access control equipment, deletion instruction information carries the message identification, which refers to Show that information is used to indicate the access control equipment and deletes the biological information that the message identifier is identified.
In one embodiment of the application, processor also performs the steps of displaying target when executing computer program The control interface of application program, the control interface include typing option, which is mounted to the access control and sets In standby, have the function of controlling the application program that the access control equipment carries out biological information typing;When detecting user couple After the trigger action of the typing option, typing instruction is received.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer equipment provided by the embodiments of the present application, implementing principle and technical effect and above method embodiment class Seemingly, details are not described herein.
In one embodiment of the application, a kind of computer readable storage medium is provided, computer is stored thereon with Program performs the steps of when computer program is executed by processor
Information is indicated by the typing that the target radio network receives access control equipment transmission;
After receiving typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, which is used to supply the gate inhibition Equipment carries out authentication to the current user of request.
It is also performed the steps of in one embodiment of the application, when computer program is executed by processor as the life Object characteristic information distributes message identification, and the message identification is for identifying the biological information;By the target radio network to The access control equipment sends typing and successfully indicates information, which successfully indicates that information carries the message identification.
In one embodiment of the application, also perform the steps of when computer program is executed by processor when utilization It, and should at the time of acquisition is verified after the biological information carries out authentication and be verified to the current user of request Message identification;It is sent by the target radio network to the access control equipment and enters and leaves record information, discrepancy record information is taken At the time of being verified with the message identification with this.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this Target radio network receives the deletion instruction information of access control equipment transmission, and deletion instruction information carries the information mark Know;It is deleted from the access control equipment according to the biological information that the deletion indicates that information is identified the message identifier.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer readable storage medium provided in this embodiment, implementing principle and technical effect and above method embodiment Similar, details are not described herein.
In one embodiment of the application, a kind of computer readable storage medium is provided, computer is stored thereon with Program performs the steps of when computer program is executed by processor
Receive the typing instruction of user's triggering;
After receiving typing instruction, typing is sent to the access control equipment by the target radio network and indicates information;
Wherein, typing instruction information is used to indicate the biological information of access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, which is used for for the access control equipment to request Current user carries out authentication.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this The typing that target radio network receives access control equipment transmission successfully indicates information, which successfully indicates that information carries information mark Know;Wherein, which is the access control equipment for biological information distribution, which is used to identify the biology Characteristic information.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this Target radio network receives the discrepancy record information of access control equipment transmission, and it is that the access control equipment is utilizing which, which records information, The biological information to what is sent after requesting current user to carry out authentication and be verified, take by discrepancy record information At the time of with the message identification and being verified.
In one embodiment of the application, also perform the steps of when computer program is executed by processor through this Target radio network is sent to the access control equipment deletes instruction information, and deletion instruction information carries the message identification, the deletion Instruction information is used to indicate the access control equipment and deletes the biological information that the message identifier is identified.
In one embodiment of the application, display mesh is also performed the steps of when computer program is executed by processor The control interface of application program is marked, which includes typing option, which is mounted to the access control In equipment, have the function of controlling the application program that the access control equipment carries out biological information typing;When detecting user After the trigger action of the typing option, typing instruction is received.
In one embodiment of the application, which is long range LORA network.
In one embodiment of the application, which is finger print information.
Computer readable storage medium provided in this embodiment, implementing principle and technical effect and above method embodiment Similar, details are not described herein.
Figure 14 is please referred to, the embodiment of the present application also provides a kind of access control equipment control systems 1700.As shown in figure 14, door Prohibiting apparatus control system 1700 includes access control equipment 1701 and access control equipment 1702.
Wherein, access control equipment 1701 is for executing the technology mistake as performed by access control equipment in above-described embodiment Journey.
Access control equipment 1702 is for executing the technical process as performed by access control equipment in above-described embodiment.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously The limitation to claim therefore cannot be interpreted as.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (20)

1. a kind of access control equipment control method, which is characterized in that for the access control equipment in access control system, gate inhibition's control System processed includes access control equipment and the access control equipment, the access control equipment and the access control equipment by target without Gauze network is communicated, which comprises
The typing that the access control equipment is sent, which is received, by the target radio network indicates information;
After receiving the typing instruction information, the biological information of legitimate user is acquired;
The collected biological information is stored into the access control equipment, the biological information is for described in confession Access control equipment carries out authentication to the current user of request.
2. the method according to claim 1, wherein it is described acquisition legitimate user biological information after, The method also includes:
Message identification is distributed for the biological information, the message identification is for identifying the biological information;
Typing is sent to the access control equipment by the target radio network and successfully indicates information, and the typing successfully refers to Show that information carries the message identification.
3. according to the method described in claim 2, it is characterized in that, described controlled by the target radio network to the gate inhibition After control equipment transmission typing successfully indicates information, the method also includes:
After the current user of request is carried out authentication and is verified using the biological information, it is logical to obtain verifying At the time of mistake and the message identification;
It is sent by the target radio network to the access control equipment and enters and leaves record information, the discrepancy record information is taken With the message identification and it is described be verified at the time of.
4. according to the method described in claim 2, it is characterized in that, described controlled by the target radio network to the gate inhibition After control equipment transmission typing successfully indicates information, the method also includes:
The deletion that the access control equipment is sent, which is received, by the target radio network indicates information, the deletion instruction letter Breath carries the message identification;
According to the instruction information biological information that is identified the message identifier of deleting from the access control equipment Middle deletion.
5. method according to any one of claims 1 to 4, which is characterized in that the target radio network is long range LORA Network.
6. method according to any one of claims 1 to 4, which is characterized in that the biological information is finger print information.
7. a kind of access control equipment control method, which is characterized in that for the access control equipment in access control system, the door Prohibiting control system includes the access control equipment and access control equipment, and the access control equipment and the access control equipment pass through mesh Mark wireless network is communicated, which comprises
Receive the typing instruction of user's triggering;
After receiving the typing instruction, typing instruction letter is sent to the access control equipment by the target radio network Breath;
Wherein, the typing instruction information is used to indicate the biological information of the access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, and the biological information is used to set for the gate inhibition The standby user current to request carries out authentication.
8. the method according to the description of claim 7 is characterized in that described set by the target radio network to the gate inhibition After preparation send typing to indicate information, the method also includes:
The typing that the access control equipment is sent is received by the target radio network and successfully indicates information, and the typing successfully refers to Show that information carries message identification;
Wherein, the message identification is the access control equipment for biological information distribution, and the message identification is used for Identify the biological information.
9. according to the method described in claim 8, it is characterized in that, described receive the gate inhibition by the target radio network After the typing that equipment is sent successfully indicates information, the method also includes:
The discrepancy that the access control equipment is sent is received by the target radio network and records information, and the discrepancy record information is The access control equipment is sent out after carrying out authentication to the current user of request using the biological information and being verified It send, at the time of the discrepancy record information carries the message identification and is verified.
10. according to the method described in claim 8, it is characterized in that, described receive the door by the target radio network After the typing that taboo equipment is sent successfully indicates information, the method also includes:
It is sent by the target radio network to the access control equipment and deletes instruction information, the deletion instruction information carries institute Message identification is stated, the deletion instruction information is used to indicate the access control equipment and deletes the life that the message identifier is identified Object characteristic information.
11. method according to claim 7, which is characterized in that the typing instruction for receiving user's triggering, comprising:
The control interface of displaying target application program, the control interface include typing option, and the destination application is peace Loaded on the application in the access control equipment, with the control access control equipment progress biological information typing Program;
After detecting trigger action of the user to the typing option, the typing instruction is received.
12. according to any method of claim 7 to 11, which is characterized in that the target radio network is over long distances LORA network.
13. according to any method of claim 7 to 11, which is characterized in that the biological information is finger print information.
14. a kind of access control equipment, which is characterized in that the access control equipment belongs to access control system, the access control system It further include access control equipment, the access control equipment and the access control equipment are communicated by target radio network, institute Stating access control equipment includes:
First information receiving module refers to for receiving the typing that the access control equipment is sent by the target radio network Show information;
Acquisition module, for acquiring the biological information of legitimate user after receiving the typing instruction information;
Memory module, for storing the collected biological information into the access control equipment, the biological characteristic Information is used to carry out authentication to the current user of request for the access control equipment.
15. a kind of access control equipment, which is characterized in that the access control equipment belongs in access control system, the door Prohibiting control system further includes access control equipment, and the access control equipment and the access control equipment are led to by target radio network Letter, the access control equipment control equipment include:
Command reception module, for receiving the typing instruction of user's triggering;
First sending module, for being set by the target radio network to the gate inhibition after receiving the typing instruction Preparation send typing to indicate information;
Wherein, the typing instruction information is used to indicate the biological information of the access control equipment acquisition legitimate user, and will The collected biological information is stored into the access control equipment, and the biological information is used to set for the gate inhibition The standby user current to request carries out authentication.
16. a kind of access control equipment, which is characterized in that including memory and processor, the memory is stored with computer program, It is characterized in that, the processor realizes the step of any one of claims 1 to 6 the method when executing the computer program Suddenly.
17. a kind of access control equipment, which is characterized in that including memory and processor, the memory is stored with computer Program, which is characterized in that the processor realizes side described in any one of claim 7 to 13 when executing the computer program The step of method.
18. a kind of access control system, which is characterized in that the access control system includes as claimed in claim 16 calculates Machine equipment and computer equipment as claimed in claim 17.
19. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, which is characterized in that described The step of method described in any one of claims 1 to 6 is realized when computer program is executed by processor.
20. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, which is characterized in that described The step of method described in any one of claim 7 to 13 is realized when computer program is executed by processor.
CN201910645728.2A 2019-07-17 2019-07-17 Access control equipment control method, device, equipment, system and storage medium Pending CN110533802A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910645728.2A CN110533802A (en) 2019-07-17 2019-07-17 Access control equipment control method, device, equipment, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910645728.2A CN110533802A (en) 2019-07-17 2019-07-17 Access control equipment control method, device, equipment, system and storage medium

Publications (1)

Publication Number Publication Date
CN110533802A true CN110533802A (en) 2019-12-03

Family

ID=68661893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910645728.2A Pending CN110533802A (en) 2019-07-17 2019-07-17 Access control equipment control method, device, equipment, system and storage medium

Country Status (1)

Country Link
CN (1) CN110533802A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI715391B (en) * 2019-12-30 2021-01-01 台灣新光保全股份有限公司 Security system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003193723A (en) * 2001-12-27 2003-07-09 Citizen Watch Co Ltd Personal authentication system and id administration method
CN105447928A (en) * 2014-08-29 2016-03-30 青岛海尔智能家电科技有限公司 Entrance guard control method and control system thereof
CN106575454A (en) * 2014-06-11 2017-04-19 威尔蒂姆Ip公司 System and method for facilitating user access to vehicles based on biometric information
CN106570955B (en) * 2016-10-12 2019-02-01 广东建邦计算机软件股份有限公司 Information collecting method and device based on access control equipment
CN109790727A (en) * 2016-06-10 2019-05-21 塔普洛克公司 Hanging locking device, system and its operating method including hanging locking device
CN109830017A (en) * 2019-02-01 2019-05-31 深圳市汇顶科技股份有限公司 Data managing method, device, equipment, system and the storage medium of smart lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003193723A (en) * 2001-12-27 2003-07-09 Citizen Watch Co Ltd Personal authentication system and id administration method
CN106575454A (en) * 2014-06-11 2017-04-19 威尔蒂姆Ip公司 System and method for facilitating user access to vehicles based on biometric information
CN105447928A (en) * 2014-08-29 2016-03-30 青岛海尔智能家电科技有限公司 Entrance guard control method and control system thereof
CN109790727A (en) * 2016-06-10 2019-05-21 塔普洛克公司 Hanging locking device, system and its operating method including hanging locking device
CN106570955B (en) * 2016-10-12 2019-02-01 广东建邦计算机软件股份有限公司 Information collecting method and device based on access control equipment
CN109830017A (en) * 2019-02-01 2019-05-31 深圳市汇顶科技股份有限公司 Data managing method, device, equipment, system and the storage medium of smart lock

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
陈伟利: "基于指纹识别技术的网络式门禁管理系统设计", 《安防科技》 *
马飒飒: "《物联网基础技术及应用》", 31 January 2018 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI715391B (en) * 2019-12-30 2021-01-01 台灣新光保全股份有限公司 Security system

Similar Documents

Publication Publication Date Title
CN101719955B (en) Intelligent terminal system with fingerprint identification and information processing method
US20150106958A1 (en) Methods, systems, and devices for monitoring privacy beacons related to entities depicted in images
CN103117853B (en) A kind of safe storage device account input and authentication method
CN101945486A (en) Transfer of data with the wireless power communication equipment
CN107832615A (en) Place perceives safety
CN106710017A (en) Identity authentication method used for logistics sign-off and device and system thereof
CN106534206A (en) Identity authentication method, apparatus and system based on cloud platform
CN105631959A (en) Attendance checking method and system
CN106204853A (en) Server, access control equipment administrative center, mobile terminal, the method and system of access control
CN108038950A (en) For the Door-access control method and device in ward, storage medium, terminal
US10185841B2 (en) Devices, methods, and systems for managing representations of entities through use of privacy beacons
CN107948970A (en) System of real name method of network entry, system and the mobile terminal of subordinate terminal
CN106790136A (en) A kind of identity identifying method based on cloud platform, device and system
CN108900536A (en) Authentication method, device, computer equipment and storage medium
CN106339632A (en) Method for allocating M2M device administration authority, user device and system
CN109830010A (en) Wireless entrance guard equipment unlocking information distribution method, device and computer equipment
CN110533802A (en) Access control equipment control method, device, equipment, system and storage medium
CN107657199A (en) Mobile device, verification device and verification method thereof
CN106921617B (en) Public equipment reservation control method and device
CN106375996A (en) Virtual subscriber identity module (SIM) card protection method, application processor and terminal
CN108510599A (en) Parking management method, device and computer readable storage medium
JP2008242793A (en) Authentication system
CN109727141A (en) Based on the information processing method, device and equipment for moving vehicle card
CN109146012A (en) Management method, device and the system of card
CN110363886A (en) Function realizing method, device and its relevant device of smart lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191203