CN110599640A - Personnel monitoring system based on millimeter wave radar - Google Patents

Personnel monitoring system based on millimeter wave radar Download PDF

Info

Publication number
CN110599640A
CN110599640A CN201910776708.9A CN201910776708A CN110599640A CN 110599640 A CN110599640 A CN 110599640A CN 201910776708 A CN201910776708 A CN 201910776708A CN 110599640 A CN110599640 A CN 110599640A
Authority
CN
China
Prior art keywords
millimeter wave
wave radar
access control
personnel
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910776708.9A
Other languages
Chinese (zh)
Inventor
戴红山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Enjoy Key Technology Co Ltd
Original Assignee
Hangzhou Enjoy Key Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Enjoy Key Technology Co Ltd filed Critical Hangzhou Enjoy Key Technology Co Ltd
Priority to CN201910776708.9A priority Critical patent/CN110599640A/en
Publication of CN110599640A publication Critical patent/CN110599640A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses personnel monitored control system based on millimeter wave radar includes: the system comprises a mobile terminal, an access control device, a millimeter wave radar device and a server; the mobile terminal acquires a two-dimensional code image and acquires a first digital secret key from the server, the mobile terminal and the door lock device carry out data transmission to compare the first secret key with a second secret key prestored in the door control device, if the comparison is successful, the door control motor drives the door lock mechanism to unlock, and if the comparison is failed, the door control locking state is kept; the millimeter wave radar device and the server form data interaction, the personnel monitoring system compares personnel data acquired through the mobile terminal and the access control device with personnel data acquired through the millimeter wave radar device, and when the data are not matched, the server generates prompt data. The millimeter wave radar-based personnel monitoring system has the beneficial effects that the personnel monitoring system based on the millimeter wave radar can effectively identify the identity and can conveniently register and manage personnel.

Description

Personnel monitoring system based on millimeter wave radar
Technical Field
The application relates to a personnel monitoring system based on a millimeter wave radar.
Background
In the related art, an access control system performs identification and access control using an authorized IC card. However, the access control system using the IC card for identification usually has the following defects:
the existing access control system has the following defects:
firstly, the door opening modes of the district unit door and the pedestrian gate are single, and the owner card can not pass through the district unit door and the pedestrian gate if forgetting to take or losing the district unit door and the pedestrian gate; the card supplementing mode is single, the working time of the owner conflicts with the property, and the owner and the property do not understand each other;
secondly, the card is easy to copy, which is not beneficial to the safety of community owners;
the aging serious failure rate of the lines and equipment of the access control system is high for more than five years, the cost of rearranging a new system is high, and the property business is difficult to advance and retreat, and the current general current situation is that the access control facilities in the community are basically in an idle or paralyzed state;
the visitors are manually registered, the visitor identity checking waiting time is long due to large security workload, the efficiency is low, and the checking difficulty is large afterwards;
fifthly, the repair cost of the building access control system is high, and the owner and the visitor are very inconvenient to enter because the door cannot be opened normally;
sixthly, the difficulty of controlling the safety of the personnel entering the community is high;
and seventhly, the use of the passing equipment is not ideal, the owner has large opinions and deep property contradiction, the difficulty of collecting property fees is increased, and vicious circle is realized.
In addition, in order to save electric energy in hotel rooms, induction cards are adopted to take electricity at present. However, the induction card is not efficient when power is supplied, and the energy-saving effect cannot be realized. Moreover, the phenomenon that people are constantly electrified due to the fact that the card is used for getting electricity is easy to happen, and energy consumption is very waste; the card is damaged to cause that the electricity can not be normally taken; the number of people is monitored in real time by millimeter radar waves, and various abnormal phenomena in industries such as hotels, residents and the like can be avoided: the person who opens the house is not in line with the person who enters the house, and one person registers that many people enter the house.
Disclosure of Invention
A personnel monitoring system based on millimeter wave radar comprises: a mobile terminal capable of accessing at least one wireless communication network; the access control device at least can access the wireless communication network; the millimeter wave radar device is used for scanning the number of the personnel in the preset place; the server at least forms data interaction with the mobile terminal, the access control device and the millimeter wave radar device; wherein, the mobile terminal comprises: the image acquisition equipment is used for acquiring a two-dimensional code image or a human face image; the first communication module is at least used for receiving and transmitting Bluetooth signals; the first processor is used for controlling the image acquisition equipment and the first Bluetooth module to perform data processing; the entrance guard's device includes: the door lock mechanism is used for realizing unlocking or locking of the entrance guard; the door control motor is used for driving the door lock mechanism; the second communication module is at least used for receiving and transmitting Bluetooth signals to form interaction with the first Bluetooth module; the second processor is used for controlling the access control motor and the second Bluetooth module and processing data; after the mobile terminal collects a two-dimension code image, the first processor obtains a first digital secret key from the server, the first communication module and the second communication module carry out data transmission to compare the first secret key with a second secret key prestored in the access control device, if the comparison is successful, the access control motor drives the door lock mechanism to unlock, and if the comparison is failed, the access control locking state is kept; the millimeter wave radar device and the server form data interaction, the personnel monitoring system compares personnel data acquired through the mobile terminal and the access control device with the personnel data acquired through the millimeter wave radar device, and when the data are not matched, the server generates prompt data.
Further, the millimeter wave radar device at least corresponds to the access control device one to one.
Further, the millimeter wave radar device is in a working state after the door lock mechanism is unlocked.
Further, the millimeter wave radar device is in a non-working state after scanning the number of people in the preset place to be zero for a preset time.
Further, the millimeter wave radar device and the door lock device form a Bluetooth connection to transmit data.
Further, the millimeter wave radar device is in a working state within a preset time after the door lock mechanism is unlocked.
Further, after the personnel monitoring system judges that the number of the personnel collected by the millimeter wave radar device is in accordance with the personnel data acquired by the access control device, the millimeter wave radar device is converted into a non-working state.
Further, the millimeter wave radar device starts to scan the number of the personnel after the state of the access control device changes.
Further, the millimeter wave radar device closes the scanning function after the state of the access control device is kept for a certain preset time.
Further, the millimeter wave radar device starts a scanning function after a certain preset time after the millimeter wave radar device is converted into a non-working state.
The invention has the advantages that: the millimeter wave radar-based personnel monitoring system can effectively identify and conveniently register and manage personnel.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
in the drawings:
fig. 1 is a schematic diagram of an architecture of a system provided in an embodiment of the present application;
FIG. 2 is a block diagram illustrating the structure of the system shown in FIG. 1 according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an access control device provided in an embodiment of the present application;
FIG. 4 is a block diagram of another system according to an embodiment of the present disclosure;
FIG. 5 is a block diagram of a third system according to an embodiment of the present disclosure;
FIG. 6 is a flow chart of a management method provided by an embodiment of the present application;
FIG. 7 is a schematic flow chart diagram of another management method provided by the embodiments of the present application;
FIG. 8 is a schematic diagram of the architecture of the millimeter wave radar-based personnel monitoring system of the present application;
fig. 9 is a schematic architecture diagram of a management system for entrance guard and power supply of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
As shown in fig. 1, in a first embodiment of the present application, a millimeter wave radar-based personnel monitoring system includes a mobile terminal, an access control device, and a server.
The mobile terminal can access at least one wireless communication network, such as WIFI, Bluetooth, NFC, NB-IOT and the like; as a specific scheme, the system can also be accessed to a long-distance wireless communication network, such as a CDMA, WCDMA, GSM, TD-SCDMA, TD-LTE, 5G and other mobile networks.
Specifically, as shown in fig. 2, the mobile terminal includes an image capturing device, a first communication module, and a first processor.
As a specific scheme, the mobile terminal may further include: terminal power, terminal touch-sensitive screen, terminal stereo set and some other equipment. The terminal power supply is used for supplying power to other equipment of the mobile terminal; the terminal touch screen is mainly used for feeding back image information to a user and providing an input interface for the user; the terminal sound box is used for feeding back sound information to the user.
The image acquisition equipment can comprise a front camera and a rear camera which are respectively arranged at two opposite sides of the mobile terminal. The front camera or the rear camera can acquire image information.
The first communication module is used for realizing the communication function of the mobile terminal, and the first communication module can at least transmit data through a Bluetooth protocol. Of course, the first communication module can also implement data transmission of other communication protocols.
As a specific solution, the mobile terminal further includes a human body information sensor for identifying a physical feature of the user. These physical characteristics include human face characteristics, fingerprint characteristics, or iris characteristics, or a combination of these characteristics. As a specific scheme, the human body information sensor comprises a camera, a fingerprint sensor and an iris sensor to collect human body characteristics so as to identify different users.
As mentioned above, the mobile terminal may be configured with two cameras, both of which may be an implementation manner of an image acquisition device or a human body information sensor, as a preferred scheme, the rear camera is used as an image acquisition device for acquiring identification information of the access control device, and the front camera is used as a human body information sensor for acquiring a face image and further acquiring face feature data.
As another specific scheme, the iris sensor may be implemented by selecting a high-precision optical camera, and as a preferred scheme, the iris sensor and the camera for recognizing the human face are both front-facing cameras of the mobile terminal. The fingerprint identification sensor can be formed by a special device of the mobile terminal, can also be formed by a pressure-sensitive touch screen configured on the mobile terminal, or adopts an optical fingerprint identification technology.
The access control device comprises three main parts: entrance guard's body, door lock device and controlling means.
The access control body mainly constitutes the entrance control body of separation to the space, specifically can be constructed as room door, floodgate or other forms of entity mechanism. The entrance guard body in this application should be understood as the most generalized entrance guard body.
The door lock mechanism is also understood to be a device or a mechanism which can realize the mechanical or electromechanical combination for limiting the position of the door lock body in the broadest sense. For example, a lock cylinder mechanism in a room door and a lock cylinder motor driving the lock cylinder, and for example, an electromagnet device of a glass door and a driving circuit driving the electromagnet; for another example, a gate of a gate machine and a gate motor driving the gate. As is apparent from the above, the door lock device includes: the mechanical part for realizing physical contact or obstruction is defined as a door lock mechanism, and the other part can be a driving device for converting electric energy into mechanical energy for driving the mechanical part. The control means may be a variety of chips, chip combinations or a combination of chips and peripheral circuits capable of control signal output.
As an embodiment, as shown in fig. 2 and 3, the access control device further includes a door lock mechanism, an access control motor, a second communication module, and a second processor in addition to the access control body.
As mentioned above, the door lock mechanism is used to unlock and lock the door, i.e. to control the state of the door, so that the door lock mechanism has an unlocked state that enables a user to enter a certain space and a locked state that enables the user to not enter the certain space through the position of the door lock body.
The entrance guard motor is used as a driving device of the door lock mechanism, and can drive the lock cylinder in the door lock mechanism to be embedded into or withdraw from the building structure through rotation to form a lock groove, so that the function of locking is realized.
The second processor is used as a control device which can control the entrance guard motor and can form data interaction based on the electric signal with the second communication module. The second processor controls the operation of the access control motor by sending an electrical signal to the access control motor. The second communication module can at least form communication connection with the first communication module, so that the mobile terminal and the access control device form data interaction.
The second communication module can also be at least accessed to a wireless communication network like the first communication module, such as WIFI, Bluetooth, NFC, NB-IOT and the like; as a specific scheme, the system can also be accessed to a long-distance wireless communication network, such as a CDMA, WCDMA, GSM, TD-SCDMA, TD-LTE, 5G and other mobile networks.
As an extension, the door access device further comprises an input device and an output device, wherein the input device is used for being operated by a user to input information, and the output device is used for outputting information to the user. Specifically, the input device and the second processor form a data connection so that the user input information and data can be transmitted to the second processor; the output device is in data connection with the second processor such that the output device is capable of outputting information under control of said second processor.
As shown in fig. 3, the door control device may further be provided with a door control camera, an iris sensor, a fingerprint sensor, a touch screen, and a password disk, in addition to the housing.
The door control camera can realize face recognition and direct unlocking, and can also be used as a peripheral of a mobile terminal or a peripheral camera of other servers through a short-range wireless communication network.
The iris sensor, the fingerprint sensor and the password disk can be used as input devices, so that a user can input information to the second processor of the access control device.
The touch screen can be used as an input device of the access control device and an output device of the access control device, and can display information for a user, for example, pattern information such as two-dimensional codes can be displayed for the user, and the mobile terminal can scan to identify the access control device. Of course, the touch screen may be replaced with a general display screen for presenting information to the user, and a combination disk may be used as an input device.
As an extension, the output device further comprises an audio device, which may be used to prompt the user with information.
As an alternative, the access control system of the present application further includes a gateway device, which can be disposed between the server and the access control device, and the gateway device directly forms data interaction with the second communication module of the access control device, so as to remotely control the access control device through the gateway device. The server directly forms data interaction with the gateway device so as to indirectly form data interaction with the gate control device. The server and the gateway device can communicate through a wireless network or a wired network.
As a specific scheme, the present application provides a bluetooth device, which can be used as a control device and is compatible to an electronic access control device having only a door lock mechanism and an access control motor to expand specific functions.
As a specific scheme, the bluetooth device includes: bluetooth module, treater and circuit board. The Bluetooth module is at least used for receiving and transmitting Bluetooth signals; the processor is used for controlling the access control motor and judging whether the electronic key transmitted by the Bluetooth accords with the electronic key stored in the processor; the circuit board is used for connecting the Bluetooth module with the circuit board to form a battery core.
More specifically, the circuit board is provided with a power access point for accessing the circuit board and is provided with a power access point for accessing 4V to 6V.
The width dimension of the circuit board ranges from 10mm to 15mm, and the length dimension of the circuit board ranges from 15mm to 25 mm. Preferably, the width of the circuit board is 13mm, and the length of the circuit board is 23 mm.
The area of the circuit board is 250mm2To 350mm2. Preferably, the area of the circuit board is 299 mm.
The circuit board is provided with a plurality of half holes, the half holes are used for connecting external circuits, and the value range of the distance between the half holes is 1mm to 1.5 mm. Preferably, the spacing between the half holes is 1.27 mm.
The circuit board is provided with a motor driving pin, and the output voltage of the electrode driving pin is between 4V and 6V.
As a specific scheme, the specific parameters of the bluetooth device are as follows:
the working frequency band is 2.4GHz ISM frequency band; the communication distance is 30m (condition: open area/class II); the working voltage is 4V to 6V; the temperature range is-40 ℃ to 85 ℃.
The interface includes: high level output, low level output, state indication output, external trigger detection, serial ports, motor drive output and a customized function IO interface.
As a specific scheme, the Bluetooth device adopts an onboard antenna; a Bluetooth module of the Bluetooth module adopts a low-power-consumption BLE4.0 Bluetooth single-mode chip and integrates a standard BLE4.0 protocol stack;
in addition, the Bluetooth device is also provided with a standard UART (TTL) interface, a serial port capable of being directly connected with an external MCU or a serial port peripheral module pad adopts a half-hole process, the hole distance is standard 1.27mm, and the Bluetooth device can be directly welded on a mainboard of other types of access control devices.
On the basis of the above scheme, the technical scheme of the software part in the present application is described below.
The mobile terminal is provided with a corresponding application program in advance, the access control device is also provided with a corresponding pre-stored control program in advance, the access control device is activated in advance, and a unique equipment identifier is set for each access control device.
Specifically, the data protocols of the bluetooth device of the present application include a base protocol and an application layer protocol. The basic protocol comprises an equipment activating/Bluetooth binding protocol, a time synchronization protocol, a synchronization authority protocol, a synchronous use record protocol, a request report information protocol, a report information protocol, an obtained information protocol, a factory reset protocol and a mobile terminal door opening protocol; the application layer protocol comprises adding authority, adding authority with physical information, deleting authority, modifying authority, forbidding/enabling authority, setting a door opening mode and inquiring battery electric quantity.
In order to enable the management system to effectively and safely manage the access control device, a unique equipment identifier is set for the access control device. If the entrance guard's device is the integrated manufacturing, then after equipment bluetooth module and treater, carry out equipment activation and the binding of bluetooth, make treater and bluetooth module bind into a whole. Preferably, in order to enable the mobile terminal to be paired with the bluetooth module of the access control device, pairing information of the bluetooth module or device information of the access control device may be attached to the access control device or disposed around the access control device in the form of a readable image such as a two-dimensional code. The information such as the two-dimensional code may include the name and MAC address of the bluetooth module.
As an alternative, the touch screen of the access control device may be activated to display a two-dimensional code corresponding to the access control device.
On the basis of the technical scheme, the application also discloses a management method based on the access control device.
The management method includes an unlocking method. Specifically, the unlocking method comprises the following steps:
the mobile terminal scans the two-dimensional code of the access control device to obtain the equipment information of the access control device.
The mobile terminal transmits the device information to the server.
The server verifies the equipment information, and if the equipment information is correct, the server sends a first digital key corresponding to the equipment information to the mobile terminal.
And the mobile terminal sends the first digital key to the access control device through a Bluetooth protocol.
The entrance guard device judges whether the first digital secret key is matched with a second digital secret key prestored in the entrance guard device.
And the access control device outputs a control signal for driving the access control motor according to the matched result.
As a preferred scheme, the mobile terminal obtains a verification data related to the access serial number of the bluetooth device of the current access control device from the first digital key obtained by the server. The door control device determines whether the first digital key and the second digital key are matched and also determines whether the check data meets the requirements.
Specifically, the check data is equal to the access serial number of the bluetooth device stored in the server, and is subjected to one operation, for example, 1 is added to the original access requirement, or other operations are naturally available, then the combination of the check data after the operation and the first digital key is subjected to AES encryption, and then the combination is sent to the mobile terminal, and meanwhile, the server uses the check data of this time and replaces the original stored access serial number. And if the access control device passes the matching, covering the current verification data with the original access serial number.
The access sequence number and the check data are for security reasons. And if the check data received by the Bluetooth device is larger than the current access serial number, making a response, and using the check data as the next access serial number. And if the sequence number received by the receiver is less than or equal to the currently recorded sequence number, discarding the instruction, returning a sequence number packet, and informing the sender that the sequence number is wrong, wherein the sequence number parameter is the current sequence number parameter. When the current sequence number is 0xFFFFFF, the next sequence number is 0x 000000.
Alternatively, the check data may be a set of random numbers in a set format. The judgment standard is that the check data is different from the current access serial number.
Therefore, the access sequence number is changed when the secret key is acquired every time, the secret key is prevented from being repeatedly used by a person after being intercepted, namely the secret key is automatically invalidated after being opened, and the safety of the secret key is ensured.
As a specific scheme, the management method includes:
applying for registering a property manager account and a password through a property management client (a data background is on a cloud server);
the registration application of the property manager is checked through a system management end, a corresponding account password is established for the registration application, and the authority is distributed and stored;
after the property manager account is established, the user can log in the cloud server to set property related information such as: property unit information, each property owner information, entrance guard control equipment information, entrance guard installation positions and the like, and the cloud server is stored. The property unit information comprises a property name and the number of terminal users; the access control equipment information comprises an access control channel name and a Bluetooth equipment name;
a4, a property owner logs in a WeChat applet by using an intelligent mobile terminal, a camera code scanning access control device fixing two-dimensional code (namely the name of a Bluetooth device and an MAC address) is called by clicking a button 'code scanning door opening', the name of the Bluetooth device is checked and matched with the MAC address, and if the matching is successful, the property owner has the right to apply for a key to a cloud server; wherein, the specific entry is an entry requiring a user name and a password of the wechat applet. The WeChat account login mode is realized, namely the WeChat quick login can be clicked to enter the WeChat state.
After receiving the key request, the cloud server adds 1 to the maximum serial number of the corresponding Bluetooth device recorded in the cloud database, combines a secret key in the database, encrypts the combined content in an AES (advanced encryption standard) mode and then sends the encrypted content to the requesting mobile terminal;
the WeChat applet transmits the received secret key returned by the cloud server to the Bluetooth equipment for decryption according to the protocol, and the decrypted content must satisfy the following conditions: the serial number is larger than the serial number recorded in the Bluetooth equipment, the secret key is matched with the secret key in the Bluetooth module, if the conditions of the serial number and the secret key are met simultaneously, the electronic control door lock is opened by returning success and outputting a signal, otherwise, the electronic control door lock is opened without outputting a signal after returning failure, and the door lock is prompted to be opened failure; the content of obtaining the secret key at the cloud server is composed of two parts, one part is the access serial number of the current access control Bluetooth module plus 1, and the other part is the secret key of the Bluetooth module. The two parts of contents are encrypted and issued in an AES mode, and the current access serial number in the database is replaced at the same time, so that the access serial number is only increased when the secret key is obtained every time, the secret key is prevented from being reused by a person after the secret key is intercepted, namely the secret key is automatically invalidated after the secret key is opened, and the safety of the secret key is ensured.
And covering the current sequence number into the Bluetooth equipment after the return is successful, and preparing for the next comparison. The processing ensures that the secret key must be acquired from the cloud server in real time, and the security and timeliness of the secret key are ensured.
And a property manager of the property management client is responsible for managing the door opening permission of the terminal user, such as issuing a new secret key permission or recovering a secret key and the like, and storing the result in the cloud server. And checking or counting the door opening records and the door opening authority in the jurisdiction range according to the needs.
In a specific scheme, in order to improve unlocking safety, when a user registers by using a mobile terminal, information to be filled in includes that a mobile terminal number is filled or the mobile terminal logs in a micro-signal mode, identity verification is required, an identity card number needs to be input, the mobile terminal shoots a face and uploads the face to a database of a national identity card (such as a national identity card center library and a public security first research institute) for comparison, and other operations can be carried out only when the identity verification is passed.
The remote cloud server in the master door opening process contains owner information including property units, building numbers, owner names and owner addresses; the entrance guard information comprises an entrance guard name, a Bluetooth device name and an MAC address, and effective start-stop time is obtained; the action information of the owner entrance guard opening door is sent to a remote cloud server through a wide area network by an intelligent mobile terminal (APP or an applet) to be stored for query.
As an extension scheme, when the door lock device is installed or a part of the door lock device is installed, an installed user can enter an installation interface through a small program or in a form of accessing a public number and the like, then an address location function is used, address information is obtained through a mobile terminal, such as a location module of a mobile phone, such as a GPS module, and then the address information is bound with the device.
As a specific scheme, simultaneously, in the process of code scanning unlocking, face recognition is required, the face recognition is acquired through an image acquisition device of the mobile terminal and then uploaded to a server for comparison, or the face recognition is uploaded to a server of a database of a national identification card (such as a national identification card center library and a public security first research institute) through the server for comparison. And comparing the secret keys through Bluetooth only when the face recognition is successful and the user is actually used.
Therefore, the real-name access control management can be realized, and the system can be applied to places needing real-name check-in, such as residences, hotels and the like.
As an alternative scheme, the entrance guard device is also provided with a camera, the camera of the entrance guard device can be used for collecting face information, then the face information is transmitted to the mobile terminal through Bluetooth, and then the face information is uploaded to the server through the mobile terminal to be compared. This can improve safety.
As another alternative, after the mobile terminal performs face comparison, the camera of the access control device collects face information again for comparison, so as to ensure that the user is entering.
Similar tests can of course be performed with other body recognition sensors or combinations of sensors.
As an extension, since the above scheme has a function of real-name authentication, the scheme can be applied to check-in management of rental places such as residences, hotels, public rental houses, and the like.
Specifically, the server described above is a broad server, and as a specific aspect, the broad server may include a plurality of servers, such as a first server and a second server.
As a specific scheme, three sub-servers may be included: a key server, an identity server and a management server. Data interaction can be formed among the three servers.
The key server is used for realizing the key transmission and matching of the bluetooth device, and is used for supporting data services related to the basic functions of the access control system in the application.
The identity server can be an external server or a self-built internal server, and at least stores face information for identity recognition. The key server may be externally connected to a server of a national identity card database (e.g., a national identity card repository, a public security first research institute) to serve as the identity server. No matter the electronic key is shared or other electronic keys are obtained, the user can obtain the address information of the door lock through the information of the electronic key so as to navigate.
The management server is used for daily management of places such as hotels and the like, can store the corresponding relation between the user and the access control device into the relation between hotel rooms and the user, and can directly or indirectly form communication with the communication module of the access control device so as to master the information of the user.
When a user opens a door, the face recognition of the user firstly realizes real-name authentication of the user, then, in the unlocking process, the user and the room number are stored in the management server in a correlated mode, in order to ensure safety, the entrance guard device can collect the face information of the user entering the door again, and whether the user is in real name is checked again.
As an extension, as shown in fig. 8, a millimeter wave radar 107 may be provided inside a room, and the accuracy of the millimeter wave radar 107 is adjusted to recognize only whether a human body is present.
Of course, corresponding precision can be set so that the millimeter wave radar can only recognize the approximate outline of the human body, and the processor connected with the millimeter wave radar can judge which image is the human body in a convolution nerve learning mode, so that millimeter wave radar detection can be carried out after a user enters, and whether redundant personnel appear or not is detected.
Specifically, the millimeter wave radar-based personnel monitoring system includes a millimeter wave radar device for scanning the number of personnel in a predetermined location.
The millimeter wave radar device and the server form data interaction, the personnel monitoring system compares personnel data acquired through the mobile terminal and the access control device with personnel data acquired through the millimeter wave radar device, and when the data are not matched, the server generates prompt data.
Specifically, millimeter radar wave can link the LAN through wiFi, upload the server with data through backstage software, form the data pool, then combine bluetooth entrance guard's device, draw personnel's data, especially the difference of personnel's number, the number of people that obtains when radar wave is greater than the real person's of the entrance guard's real name authentication of unblanking number, then can push away and give the owner of a house to investigate by oneself, then how much time is exceeded and then push away to other platforms, form early warning data, like public security platform, with this phenomenon that one person registers many people and lives in, i's division of a house you live in.
As a specific scheme, the millimeter wave radar devices are at least in one-to-one correspondence with the access control devices. Here, mainly the parts for detection and sensing in the millimeter wave radar apparatus. In general, the millimeter wave radar apparatus may be set in a room of a hotel or a residential home or the like. The millimeter wave radar apparatus may also be disposed in a main aisle of a hotel or a residential home.
The millimeter wave radar device may be controlled by a controller, which may be the controller of the millimeter wave radar itself or an external controller.
As a general solution, the millimeter wave radar may be in an operating state at all times.
The millimeter wave radar device can be in a working state after the door lock mechanism is unlocked in consideration of privacy, radiation safety and energy consumption.
As an extension scheme, the millimeter wave radar device is in a non-working state after scanning the number of people in a preset place to be zero for a preset time. Namely, the scanning task is finished, namely, the working state of the millimeter wave radar can be released.
The millimeter wave radar device and the door lock device form a Bluetooth connection to transmit data. As one of the schemes, the millimeter wave radar device may form data interaction with the door lock device, so that the millimeter wave radar device may be controlled and a topology structure for data exchange may be formed at the same time by arranging the door lock device.
The millimeter wave radar device is in a working state within a preset time after the door lock mechanism is unlocked. And after the personnel monitoring system judges that the number of the personnel collected by the millimeter wave radar device accords with the personnel data acquired by the access control device, the millimeter wave radar device is converted into a non-working state.
As another control mechanism, the millimeter wave radar device starts to scan the number of people after the state of the access control device is changed. And after the state of the access control device is kept for a certain preset time, the millimeter wave radar device closes the scanning function. And the millimeter wave radar device starts the scanning function after a certain preset time after the millimeter wave radar device is converted into the non-working state.
The millimeter wave radar supplies power through the power adapter, then is connected with the local area network through WiFi for communication, and data are uploaded to background software. This device is always working and there is currently no triggered start-up procedure. The background can set the time interval for reporting data, or someone reports the data, and no one reports the data. The millimeter wave radar power adapter is connected with the power supply and is controlled by the total power supply of the room.
As a further development, the millimeter wave radar device also comprises a standby power supply, such as a lithium battery pack, and in some special cases, such as emergency situations like fire, the total power supply is powered off, but the millimeter wave radar device still can scan to determine whether the room is occupied or not.
As shown in fig. 9, as one scheme, the management system for entrance guard and power supply of a place further includes a power supply management device 106. The power management device 106 is used to control the total power of the place where the access control device belongs.
The switch can be understood as a power-taking switch in places such as hotels, residences and the like. The prior power-taking switch adopts a card to control power taking. The power management device of the application can comprise a switch capable of electrically controlling switching on and off. Simply speaking, the plug-in card signal circuit of the general plug-in card electricity-taking switch can be changed into the output circuit signal of the Bluetooth module, and the switch can control the main power circuit after receiving the control signal.
The third communication module and the second communication module form communication connection so that the power management device controls the main power supply to be in a power supply state after the door control device is unlocked.
As an extension scheme, after the first communication module and the second communication module form communication connection, the first communication module and the third communication module form communication connection, so that various connections do not need to be established between the second communication module and the third communication module. This is achieved by binding the second communication module and the third communication module uniquely in the server by ID.
Specifically, the second communication module, the second processor (a bluetooth module in the access control device), the third communication module and the third processor are uniquely bound by background server software, and no communication exists between the second communication module and the third processor, so that the problem of large power supply loss is solved, and therefore the third communication module only interactively communicates with the first communication module. That is to say, any cell-phone can all be with the communication of third communication module (bluetooth electricity switch), but first, the cell-phone is when acquireing the key of lock bluetooth switch, and the permission of the bluetooth switch of binding relation is obtained in the lump, then the second cell-phone can be through the mode that the first step cell-phone shared the permission, obtains the authority of lock and electricity switch, also can only scan the two-dimensional code of getting the electricity switch with the cell-phone, obtains the permission of the electricity switch in room.
The third communication module converts the received Bluetooth signal into a control signal for controlling the air switch so as to realize control. That is, when the user is unlocking, if the user can unlock the lock, the mobile terminal can be automatically and directionally paired with the power management device to form Bluetooth connection, so that the user can automatically take power. In fact, after the mobile phone applet completes unlocking, the authority of the third communication module is automatically obtained from the second Bluetooth module, and the third processor is controlled to complete power taking.
Specifically, the third communication module and the second communication module form a bluetooth connection, so that the first communication module and the second communication module form a bluetooth connection automatically after pairing. After the user opens the access control device through the mobile terminal, the mobile terminal can form Bluetooth connection with the power management device and enable the power management device to open the main power supply.
After the first communication module and the third communication module form Bluetooth connection, the power management device controls the main power supply to be in a power supply state. After the first communication module and the third communication module are disconnected from the Bluetooth, the power management device controls the main power supply to be in a power-off state. When the mobile terminal is far away from the field range, the third communication module loses the Bluetooth connection with the first communication Bluetooth module, so that the main power supply is turned off by the power management device.
The third communication module can form Bluetooth connection with two or more first communication modules, and the power management device controls the main power supply to be in a power-off state only after the third communication module is disconnected with all the connected first communication modules. When the check-in user is a plurality of people, all the mobile terminals of the check-in user can be paired to the power management device. Thus, when one of the users goes out, the power supply is not cut off.
One first communication module is connected with the third communication module through the Bluetooth of the other first communication module to form Bluetooth connection, and the other first communication module is connected with the third communication module to form Bluetooth connection.
In order to conveniently realize Bluetooth connection, the check-in users do not need to unlock all the users to be connected to the power management device, and the terminals of the users who do not unlock can be indirectly paired to the power management device through the users who unlock.
As another scheme, a mobile terminal which is not unlocked can scan the two-dimensional code (or the solar code) of the power-taking switch, then perform authority and user authentication similar to unlocking, and also realize the power-taking function, which is substantially equal to that the unlocking instruction is used for taking power.
The first digital key of the mobile terminal is shared by another mobile terminal, wherein the first mobile terminal generates sharing information and sends the sharing information to the second mobile terminal; the second mobile terminal sends a sharing request for obtaining the first digital key to the server according to the sharing information; the server judges the sharing request, and transmits the first digital key to the second mobile terminal when the sharing request meets the condition. After two mobile terminals shared by keys, a first communication module of one mobile terminal and a third communication module form Bluetooth connection, and a first communication module of the other mobile terminal is connected to the same third communication module through data obtained by key sharing. Thus, the user can also connect to the power management device through key sharing.
The management system suitable for place entrance guard and power still includes: the millimeter wave radar device is used for scanning the number of the personnel in the preset place; the millimeter wave radar device and the server form data interaction, the personnel monitoring system compares personnel data acquired through the mobile terminal and the access control device with personnel data acquired through the millimeter wave radar device, and when the data are not matched, the server generates prompt data.
And the management system enables the main power supply to be in a power supply state when the number of the personnel scanned by the millimeter wave radar device is not 0.
Therefore, the Bluetooth connection formed by unlocking the user is only a power supply starting instruction, and then the maintenance of the power supply can be controlled according to the scanning result of the millimeter wave radar device.
The application provides a method for getting electricity through a wireless communication connection mode of a mobile terminal.
Specifically, the electricity taking method comprises the following steps:
the mobile terminal scans the two-dimensional code of the access control device to obtain equipment information of the access control device;
the mobile terminal transmits the equipment information to the server;
the server verifies the equipment information, and if the equipment information is correct, the server sends a first digital key corresponding to the equipment information to the mobile terminal;
the mobile terminal sends the first digital secret key to the access control device through a Bluetooth protocol;
the entrance guard device judges whether the first digital secret key is matched with a second digital secret key prestored in the entrance guard device;
the entrance guard device outputs a control signal for driving the driving device according to the matching result;
if the access control device outputs an unlocking signal, the mobile terminal and the power taking device form Bluetooth connection;
the electricity taking device controls the main power supply to output electric energy. Therefore, as long as the key server and the management server of the hotel and the server of the national identity card center form data interconnection, the card-free access of the user can be realized, the real-name authentication and registration can be completed when the user opens the entrance guard, the time of the user is saved, and meanwhile, the unmanned management is realized, so that the method is particularly suitable for residential homes or other forms of cyber-contracted rooms or unmanned hotels.
In addition, as another aspect of the present application, the above scheme may also be applied to an access control system of a community, and similarly, the management server is used to implement general management of property, and the identity server is used for identity recognition of a user.
The difference is that the community management server does not need to match and register users with the access control devices in a one-to-one correspondence, but only needs to register passing users.
As a specific scheme, the access control of the community needs to distinguish users, which can be divided into owner users and visitor users, the owner users can only complete the passing-through function without monitoring the access time of the owner users, and for the visitor users, except for the time limit of the secret key server, the management server also needs to monitor the visitor users, especially the visitor users such as express delivery, takeaway and the like.
In order to realize convenience of multi-user sharing, particularly the requirement of opening a door for express delivery or takeaway in a community, the application also records a key sharing method.
As shown in fig. 6, in another example, a gate inhibition system includes a mobile terminal, a gate inhibition device, a server, and a guest terminal.
The mobile terminal can share the acquired first digital key to the visitor terminal through the server. It can be understood that, when the visitor visits or is about to visit, the visitor terminal 4 may make a pass application to the mobile terminal or the mobile terminal 1 may actively operate key sharing. For example, the mobile terminal may respond to the communication request through an associated terminal application (e.g., an applet to a wechat switch), or actively perform key sharing. Optionally, in the process of responding to key sharing, the mobile terminal may set the valid time for the authorized object to have the electronic key according to the identity category (for example, visiting friends, express home, interview invitation, business negotiation, house renters, family members/employees, and the like) of the authorized object (i.e., the person who obtains the authority to share the key) carried by the communication request. Further, the mobile terminal can send the set sharing request to the server, the server 3 can generate a to-be-claimed key record and a sharing link (a connection picture or a short message) according to the sharing request, then the sharing link is sent to the visitor terminal through the mobile terminal 1, and further, the visitor terminal can get the sharing key indicated by the to-be-claimed key record through the sharing link. Alternatively, the server may directly send the access link to the guest terminal.
It can be understood that after the guest terminal obtains the sharing key, the unlocking process similar to that of the mobile terminal can be realized through the related terminal application, namely, the fixed two-dimensional code (namely, the name and the MAC address of the bluetooth device) on the door lock device is scanned, the name and the MAC address of the bluetooth device are checked and matched, and if the matching is successful, the guest terminal has the right to apply for the key from the server.
In an optional embodiment, if the server does not receive an access request sent by the guest terminal based on the access link within a preset time period, the sharing link may be set as a failed link, and it is understood that the preset time period may be a preset link effective time, for example, 60 minutes. The server 3 does not receive an access request of the visitor within 60 minutes after the generation of the access link, and the link may be set to be disabled.
In alternative embodiments, the server may respond to multiple access requests for the same electronic key, or multiple access requests for multiple electronic keys.
In an alternative embodiment, the server may generate an access record when the visitor accesses the server, and store the access record for subsequent query of the access record.
As shown in fig. 7, the sharing method may include the following steps:
the access terminal sends an access request to the mobile terminal.
And the mobile terminal responds to the access request, generates a sharing application and sends the application to the server.
And the server receives the analysis application and generates a sharing link and a sharing key of the key record to be claimed.
And the server sends the sharing link to the mobile terminal or directly to the visitor terminal.
And the visitor terminal receives the visitor link from the server or the mobile terminal and obtains the sharing key.
The visitor terminal requests unlocking to the door lock device.
As a more specific scheme, the sharing method in the present application includes:
step cl, the visitor visits or is about to visit, and a pass application is made to the owner or the visitor actively operates key sharing;
and c2, enabling the owner to enter a WeChat applet by holding the smart phone, clicking a sharing key to select WeChat or short message modes, selecting the category of authorized people (visiting friends by relatives, express home, interview invitation, commercial negotiation, house renters, family members/staff), selecting the access door access needing authorization, selecting effective starting and stopping time, selecting WeChat friends of the owner, and clicking to determine sharing). The sharee receives the WeChat applet connection picture or the short message of the sharing key 1.
Step c3, after the cloud server receives the sharing instruction of the WeChat or the short message, generating a record waiting for a claim key in the cloud server;
step c4, the sharee can select the mobile phone number to log in or the wechat to log in quickly by opening the wechat applet connection or the short message, namely logging in the wechat applet; after login is successful, the sharing key is picked up, and binding with the currently operated mobile phone number is carried out in the cloud server, and then the claiming operation is completed;
step c5, after the visitor acquires the door opening permission pass, opening the WeChat applet, scanning a fixed two-dimensional code (namely the name of the Bluetooth device and the MAC address) on the door lock, checking and matching the name of the Bluetooth device and the MAC address, and if the matching is successful, applying for a key to the cloud server;
step c6, after receiving the key request, the cloud server adds 1 to the corresponding bluetooth access serial number recorded in the cloud database, combines the secret key in the database, encrypts the combined content in an AES mode and sends the encrypted content to the requesting mobile phone;
step c7, the wechat applet transmits the received secret key returned by the cloud server to the bluetooth device and decrypts the secret key according to the protocol, and the decrypted content must satisfy: the serial number should be greater than the serial number of record in the bluetooth equipment, and the key matches with secret key in the bluetooth module, and both conditions satisfy simultaneously promptly and return success and output signal and open automatically controlled lock, otherwise return failure and not output signal nor open the lock suggestion failure of opening a door.
As a specific scheme, the visitor smart phone is connected with the cloud server, the shared key is limited by the number of times of opening the door and the effective starting and stopping time, and the visitor cannot operate the key to share the shared key. The owner holds the smart phone to enter a WeChat applet, clicks a sharing key, selects a sharing mode (WeChat or short message mode), selects the category of authorized people (visit relatives and friends, express home, interview invitation, business negotiation, house renters, family members/staff), selects a passage to be authorized, inputs the start and end time of the validity period, selects WeChat friends of the owner, and clicks 'determine sharing'. The sharee receives the WeChat applet connection pictures of 1 sharing key.
Specifically, the specific process of implementing the functions of each module in the apparatus according to the embodiment of the present invention may refer to the related description in the method embodiment, and is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. The utility model provides a personnel monitored control system based on millimeter wave radar which characterized in that:
the millimeter wave radar-based personnel monitoring system comprises:
a mobile terminal capable of accessing at least one wireless communication network;
the access control device at least can access the wireless communication network;
the millimeter wave radar device is used for scanning the number of the personnel in the preset place;
the server at least forms data interaction with the mobile terminal, the access control device and the millimeter wave radar device;
wherein, the mobile terminal comprises:
the image acquisition equipment is used for acquiring a two-dimensional code image or a human face image;
the first communication module is at least used for receiving and transmitting Bluetooth signals;
the first processor is used for controlling the image acquisition equipment and the first Bluetooth module to perform data processing;
the entrance guard's device includes:
the door lock mechanism is used for realizing unlocking or locking of the entrance guard;
the door control motor is used for driving the door lock mechanism;
the second communication module is at least used for receiving and transmitting Bluetooth signals to form interaction with the first Bluetooth module;
the second processor is used for controlling the access control motor and the second Bluetooth module and processing data;
after the mobile terminal collects a two-dimension code image, the first processor obtains a first digital secret key from the server, the first communication module and the second communication module carry out data transmission to compare the first secret key with a second secret key prestored in the access control device, if the comparison is successful, the access control motor drives the door lock mechanism to unlock, and if the comparison is failed, the access control locking state is kept;
the millimeter wave radar device and the server form data interaction, the personnel monitoring system compares personnel data acquired through the mobile terminal and the access control device with the personnel data acquired through the millimeter wave radar device, and when the data are not matched, the server generates prompt data.
2. The millimeter wave radar-based personnel monitoring system of claim 1, wherein:
the millimeter wave radar device is at least in one-to-one correspondence with the access control device.
3. The millimeter wave radar-based personnel monitoring system of claim 1, wherein:
the millimeter wave radar device is in a working state after the door lock mechanism is unlocked.
4. The millimeter wave radar-based personnel monitoring system of claim 1, wherein:
the millimeter wave radar device is in a non-working state after scanning the number of the personnel in the preset place to be zero for a preset time.
5. The millimeter wave radar-based personnel monitoring system of claim 1, wherein:
the millimeter wave radar device and the door lock device form wireless communication connection to transmit data.
6. The millimeter wave radar-based personnel monitoring system of claim 1, wherein:
the millimeter wave radar device is in a working state within a preset time after the door lock mechanism is unlocked.
7. The millimeter wave radar-based personnel monitoring system of claim 6, wherein:
and after the personnel monitoring system judges that the number of the personnel collected by the millimeter wave radar device is in accordance with the personnel data acquired by the access control device, the millimeter wave radar device is converted into a non-working state.
8. The millimeter wave radar-based personnel monitoring system of claim 7, wherein:
and the millimeter wave radar device starts to scan the number of the personnel after the state of the access control device is changed.
9. The millimeter wave radar-based personnel monitoring system of claim 8, wherein:
and the millimeter wave radar device closes the scanning function after the state of the access control device is kept for a certain preset time.
10. The millimeter wave radar-based personnel monitoring system of claim 1, wherein:
and the millimeter wave radar device starts a scanning function after a certain preset time after the millimeter wave radar device is converted into a non-working state.
CN201910776708.9A 2019-08-21 2019-08-21 Personnel monitoring system based on millimeter wave radar Pending CN110599640A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910776708.9A CN110599640A (en) 2019-08-21 2019-08-21 Personnel monitoring system based on millimeter wave radar

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910776708.9A CN110599640A (en) 2019-08-21 2019-08-21 Personnel monitoring system based on millimeter wave radar

Publications (1)

Publication Number Publication Date
CN110599640A true CN110599640A (en) 2019-12-20

Family

ID=68855060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910776708.9A Pending CN110599640A (en) 2019-08-21 2019-08-21 Personnel monitoring system based on millimeter wave radar

Country Status (1)

Country Link
CN (1) CN110599640A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112098985A (en) * 2020-09-09 2020-12-18 杭州中芯微电子有限公司 UWB positioning method based on millimeter wave detection

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5089692A (en) * 1988-07-29 1992-02-18 Trioving A.S. Electronic lock
CN104898487A (en) * 2015-05-27 2015-09-09 张泽 Indoor power supply control method, apparatus and system
CN105184935A (en) * 2015-10-22 2015-12-23 深圳优方网络技术有限公司 Bluetooth intelligent lock system capable of sharing passwords by WeChat
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN106023355A (en) * 2016-05-03 2016-10-12 物联网络科技(深圳)有限公司 Room control system with Bluetooth signal control function and control method thereof
CN106600760A (en) * 2016-11-07 2017-04-26 成都科曦科技有限公司 Guest room personnel detecting system and method for automatically recognizing guest information and number of check-in people
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN208580200U (en) * 2018-07-31 2019-03-05 北京博锐尚格节能技术股份有限公司 Monitoring device and monitoring system
CN109712300A (en) * 2019-01-31 2019-05-03 广州微证互联网有限公司 A kind of unlocking system based on network identification card certification

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5089692A (en) * 1988-07-29 1992-02-18 Trioving A.S. Electronic lock
CN104898487A (en) * 2015-05-27 2015-09-09 张泽 Indoor power supply control method, apparatus and system
CN105184935A (en) * 2015-10-22 2015-12-23 深圳优方网络技术有限公司 Bluetooth intelligent lock system capable of sharing passwords by WeChat
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN106023355A (en) * 2016-05-03 2016-10-12 物联网络科技(深圳)有限公司 Room control system with Bluetooth signal control function and control method thereof
CN106600760A (en) * 2016-11-07 2017-04-26 成都科曦科技有限公司 Guest room personnel detecting system and method for automatically recognizing guest information and number of check-in people
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN208580200U (en) * 2018-07-31 2019-03-05 北京博锐尚格节能技术股份有限公司 Monitoring device and monitoring system
CN109712300A (en) * 2019-01-31 2019-05-03 广州微证互联网有限公司 A kind of unlocking system based on network identification card certification

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112098985A (en) * 2020-09-09 2020-12-18 杭州中芯微电子有限公司 UWB positioning method based on millimeter wave detection
CN112098985B (en) * 2020-09-09 2024-04-12 杭州中芯微电子有限公司 UWB positioning method based on millimeter wave detection

Similar Documents

Publication Publication Date Title
CN104966336B (en) Intelligent lock and authorization management method and device of intelligent lock
CN107967741A (en) Double-channel testimony of a witness in-one intelligent lock control method and system
CN104157045B (en) Access control method and system
CN110570559A (en) Electronic key sharing method in access control system based on mobile terminal
CN205670315U (en) Fingerprint lock and fingerprint lock system
CN108510626B (en) Dynamic password access control management method and management system thereof
CN104134253A (en) Entrance guard system and entrance guard opening method
CN106803298A (en) Intelligent intercom system and method based on recognition of face
CN204204069U (en) Gate inhibition's intelligent controller and gate inhibition's intelligent control system
CN103635940A (en) Systems and methods for controlling a locking mechanism using a portable electronic device
CN102915582A (en) Face recognition-based residence visitor system
CN108305367A (en) A kind of application method of intelligent peephole and intelligent peephole and high in the clouds management system
CN110570557A (en) access control system based on wireless communication network
CN105957202A (en) Intelligent building management system for overall passage safety
US11134228B1 (en) Point-to-point visual communications in a security monitoring system
CN110570560A (en) access control system based on identity recognition
CN102521904A (en) Intermediary control system based on Internet application
CN106251438A (en) A kind of E.E.G lock system and method
CN106097490B (en) A kind of intelligent lock, the door-locking system and method for unlocking being made of lockset
CN110415419A (en) Electron key share system in access control system based on mobile terminal
CN106780190B (en) Apartment management system
TWI638316B (en) Rfid-to-bluetooth selective adapter
CN207938069U (en) A kind of intelligent door lock
CN214752023U (en) Fingerprint acquisition device and fingerprint management system
CN110599640A (en) Personnel monitoring system based on millimeter wave radar

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 311113 room 1425, building 1, Shangyi center, Dufu village, Liangzhu street, Yuhang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Enjoy Key Technology Co.,Ltd.

Address before: 310000 room 301-2, building 1, Xigang development center, Sandun Town, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: Hangzhou Enjoy Key Technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191220