CN111080844A - Entrance guard control method with double unlocking recognition modes - Google Patents

Entrance guard control method with double unlocking recognition modes Download PDF

Info

Publication number
CN111080844A
CN111080844A CN201811223571.6A CN201811223571A CN111080844A CN 111080844 A CN111080844 A CN 111080844A CN 201811223571 A CN201811223571 A CN 201811223571A CN 111080844 A CN111080844 A CN 111080844A
Authority
CN
China
Prior art keywords
time
access control
biological
packet
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811223571.6A
Other languages
Chinese (zh)
Inventor
沈奕廷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
I Tek Metal Manufacturing Co Ltd
Original Assignee
I Tek Metal Manufacturing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by I Tek Metal Manufacturing Co Ltd filed Critical I Tek Metal Manufacturing Co Ltd
Priority to CN201811223571.6A priority Critical patent/CN111080844A/en
Publication of CN111080844A publication Critical patent/CN111080844A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a door control method with double unlocking identification patterns, which has a first identification pattern identified by biological characteristics and a second identification pattern identified by non-biological characteristics.

Description

Entrance guard control method with double unlocking recognition modes
Technical Field
The invention relates to a method for controlling an entrance guard, in particular to a method for independently or jointly applying biological identification and non-biological identification to entrance guard control.
Background
The entrance guard control is a mode that is used for providing managers to advance and go out and prevent burglary, and entrance guard control specially adapted has many people or the occasion or the space that unspecific people can pass in and out to along with scientific and technological progress, entrance guard control has also gradually progressed to electronic type entrance guard control from manual type entrance guard control, and electronic type entrance guard control often uses at present utilizes the entrance guard card to carry out the entrance guard control, also has some electronic type entrance guard control modes to use password, electronic key or biological identification to carry out the entrance guard control, and these electronic type entrance guard control can divide into two categories on the large scale roughly, and first kind utilizes biological identification (for example fingerprint, face figure), and the second kind utilizes abiological identification (for example password, adds the seal package).
The electronic access control method usually only uses one of the biometric identification and the non-biometric identification as an identification means for allowing or not allowing the access control, however, such access control method lacks flexibility, and there is no other method for providing access control release in real time when the identification system fails or is wrong.
In addition, if only a single non-biometric type of access control is used, it is not easy to record the personnel who are monitoring the access.
Disclosure of Invention
To solve the problem, the invention provides a door control method with double unlocking modes, which comprises selecting an identification mode, selecting a first identification mode or a second identification mode to be used, if the first identification mode is selected, transmitting biological characteristics, using an intelligent mobile device or an intelligent wearable device to capture the biological characteristics, transmitting the biological characteristics to a door control system for storage, transmitting identification data, transmitting the identification data by the door control system, transmitting the identification data containing a hardware identifier of corresponding door control equipment to the intelligent mobile device or the intelligent wearable device for storage to form an action key, if the biological identification is not started, the action key does not capture the biological characteristics, if the biological identification is started, using the action key to capture the biological characteristics, if the biological characteristic is successfully captured, if the biological characteristic is not captured, the identification data is not encrypted into a packet, if the biological characteristic is successfully captured, the action key encrypts the captured biological characteristic and the identification data into a packet, transmits an encryption and sealing packet, transmits the encryption and sealing packet to the access control equipment, decrypts the encryption and sealing packet to obtain the identification data and the biological characteristic, identifies the decrypted data, keeps the access control equipment locked if any one of the biological characteristic and the hardware identifier is wrong, keeps the access control equipment in an locked state, unlocks if both the biological characteristic and the hardware identifier are correct, unlocks to enable the corresponding access control equipment to be unlocked, or selects a second identification, executes manual identity check to confirm the identity of a person, does not provide an electronic key if the identity is wrong, provides the electronic key if the identity is correct, starts the electronic key identification, and enables the electronic key to be close to the access control equipment, the door control equipment is enabled to read unlocking data in the electronic key, whether the electronic key is correct or not is identified, if the unlocking data is identified to be wrong, locking is carried out, the corresponding door control equipment is enabled to be kept in the locked state, and if the unlocking data is identified to be correct, unlocking is carried out, and the corresponding door control equipment is enabled to be unlocked.
The entrance guard control method with double unlocking modes simultaneously provides two identification modes which can be independently operated, namely a first identification mode utilizing biological characteristic identification and a second identification mode utilizing non-biological characteristic identification, and people who need to pass through the entrance guard can freely select the first identification mode or the second identification mode for identification, so that the entrance guard control method has good convenience in use.
Wherein the transmitted identification data further comprises an authorized start date, time, and an authorized end date, time, and when encrypting into a packet, the authorized start date, time, authorized end date, time, hardware identifier, and biometric characteristic are encrypted into a packet, locking is performed when the hardware identifier and biometric characteristic are recognized correctly and the recognized time is before the authorized start date, time, or after the authorized end date, time, and unlocking is performed when the hardware identifier and biometric characteristic are recognized correctly and the recognized time is between the authorized start date, time, and authorized end date, time.
Wherein the biological characteristic is one of face information, fingerprint, voiceprint, iris and finger vein of the mobile key holder.
The invention provides another access control method with double unlocking recognition patterns, which comprises the following steps: transmitting the biological characteristics, using an intelligent action device or an intelligent wearing device to capture the biological characteristics, transmitting the biological characteristics to an access control system for storage, transmitting identification data of the access control system to the intelligent action device or the intelligent wearing device for storage to form an action key, manually checking the identity of a person, if the identity is wrong, not providing an electronic key, if the identity is correct, providing the electronic key, whether to start the biological identification, if not, not capturing the biological characteristics, if starting the biological identification, capturing the biological characteristics by using the action key, whether to successfully capture the biological characteristics, if the biological characteristics are not captured, not encrypting the identification data into a packet, and if the biological characteristics are captured successfully, encrypting the captured biological characteristics and the identification data into a packet by using the action key, the method comprises the steps of transmitting an encryption package, transmitting the encryption package to the access control equipment by an action key, decrypting the encryption package to obtain identification data and biological characteristics, identifying the decrypted data, keeping locking if any one of the identification biological characteristics and the hardware identifiers is wrong, keeping the access control equipment in an locked state, unlocking if both the identification biological characteristics and the hardware identifiers are correct, starting electronic identification, enabling the electronic key to be close to the access control equipment, enabling the access control equipment to read unlocking data in the electronic key, identifying whether the electronic key is correct, keeping locking if the unlocking data is wrong, keeping the corresponding access control equipment in an locked state, and unlocking if the unlocking data is correct, and enabling the corresponding access control equipment to release the locked state.
Wherein the transmitted identification data further comprises an authorized start date, time, and an authorized end date, time, and when encrypting into a packet, the authorized start date, time, authorized end date, time, hardware identifier, and biometric characteristic are encrypted into a packet, locking is performed when the hardware identifier and biometric characteristic are recognized correctly and the recognized time is before the authorized start date, time, or after the authorized end date, time, and unlocking is performed when the hardware identifier and biometric characteristic are recognized correctly and the recognized time is between the authorized start date, time, and authorized end date, time.
Wherein the biological characteristic is one of face information, fingerprint, voiceprint, iris and finger vein of the mobile key holder.
The invention further provides an entrance guard control method with double unlocking recognition patterns, which comprises the following steps: transmitting the biological characteristics, capturing the biological characteristics by using an intelligent action device or an intelligent wearing device, transmitting the biological characteristics to an access control system for storage, transmitting identification data of a hardware identifier of corresponding access control equipment by the access control system to the intelligent action device or the intelligent wearing device for storage to form an action key, manually checking the identity of a person, if the identity is wrong, not providing an electronic key, if the identity is correct, providing the electronic key, starting electronic key identification, enabling the electronic key to be close to the access control equipment, enabling the access control equipment to read unlocking data in the electronic key, identifying whether the electronic key is correct, if the unlocking data is wrong, executing locking to keep the corresponding access control equipment in a locked state, and if the unlocking data is correct, starting the biological identification, the method comprises the steps of using an action key to capture biological characteristics, judging whether the biological characteristics are successfully captured or not, if the biological characteristics are not successfully captured, not encrypting identification data into a packet, if the biological characteristics are successfully captured, encrypting the captured biological characteristics and the identification data into the packet by the action key, transmitting an encryption packet, transmitting the encryption packet to access control equipment by the action key, decrypting the encryption packet to obtain the identification data and the biological characteristics, identifying the decrypted data, if any one of the biological characteristics and a hardware identifier is wrong, keeping the access control equipment locked, and if both the biological characteristics and the hardware identifier are correct, executing unlocking, and enabling the corresponding access control equipment to be unlocked.
The invention relates to a double-unlocking type entrance guard control method, which provides higher-safety entrance guard control by mutually matching a first identification type and a second identification type, namely, because the corresponding entrance guard equipment can be unlocked only when the first identification type and the second identification type are successfully identified, if an electronic key (such as an entrance guard card) is lost, a person picking up the electronic key can not unlock the corresponding entrance guard equipment, thereby having good safety in use.
In addition, the entrance guard control method with the double-unlocking type needs to input the biological characteristics in the process of unlocking the entrance guard equipment, so that the identity of a person passing through the entrance guard can be confirmed and recorded, and the entrance guard control method is favorable for entrance guard management.
Wherein the transmitted identification data further comprises an authorized start date, time, and an authorized end date, time, and when encrypting into a packet, the authorized start date, time, authorized end date, time, hardware identifier, and biometric characteristic are encrypted into a packet, locking is performed when the hardware identifier and biometric characteristic are recognized correctly and the recognized time is before the authorized start date, time, or after the authorized end date, time, and unlocking is performed when the hardware identifier and biometric characteristic are recognized correctly and the recognized time is between the authorized start date, time, and authorized end date, time.
Wherein the biological characteristic is one of face information, fingerprint, voiceprint, iris and finger vein of the mobile key holder.
The present invention will become more apparent from the detailed description of illustrative embodiments thereof given in conjunction with the accompanying drawings.
Drawings
Fig. 1 is a schematic diagram of a first embodiment of a dual-unlocking type access control method according to the present invention.
Fig. 2 is a schematic diagram of a second embodiment of the access control method with a double-unlocking mode according to the present invention.
Fig. 3 is a schematic diagram of a third embodiment of a dual-unlocking type access control method according to the present invention.
Description of reference numerals: s10-selecting an identification mode; s19-transmitting the biometric feature; s20-transmitting identification data; s22 — whether biometric identification is enabled; s24-no biometric feature is extracted; s26-extracting biological characteristics; s27-initiating biometric identification; s28-whether the biometric feature extraction is successful; s30-not encrypting into packets; s32-encrypting into packets; s34-transmitting the sealed package; s36-decrypting the encrypted sealed package; s38-identifying the decrypted data; s40-keeping locking; s42-unlocking; s70-manual identity check; s72-no electronic key is provided; s74-providing an electronic key; s76-starting electronic key identification; s78-identifying whether the electronic key is correct; s82-keeping locking; s84-unlocking.
Detailed Description
The invention relates to a double unlocking recognition type entrance guard control method, which is a method for controlling whether personnel can enter or exit. Referring to fig. 1, a first embodiment of the access control method according to the present invention is shown, in which a selected one of a plurality of access control devices of an access control system is set to an unlocked state by using biometric features (a first identification type, such as face information, fingerprints, voiceprints, irises, finger veins) or non-biometric features (a second identification type, such as an access card, an electronic key) to control the access control system, and the first embodiment of the access control method includes a selection identification mode S10, in which a person who wants to pass through the access control system freely selects a specific one of the access control devices to be set to an unlocked state by using the first identification type or the second identification type.
If the first identification type is selected, the person uses the smart mobile device or the smart wearable device to retrieve his/her biometric and performs the biometric transmission S19, the retrieved biometric is transmitted to the access control system for storage. After the access control system receives the biometric feature of the person, the identification data transmission is executed S20, and the access control system transmits an identification data including a hardware identifier, an authorized start date and time, and an authorized end date and time exclusive to a corresponding one of the access control devices to an intelligent mobile device or an intelligent wearable device for storage to form an action key. It is worth mentioning that the transmitting the biometric S19 and the transmitting the identification data S20 may be performed remotely via the Internet or a mobile network.
Whether biometric activation is enabled S22, if biometric activation is not enabled, the biometric key does not capture the biometric feature S24, if biometric activation is enabled, the biometric key captures the biometric feature S26, in particular, whether biometric activation is enabled S22 requires the person to be in proximity to one of the access control devices of the access control system (the selected access control device), in other words, whether biometric activation is to be determined because the person intends to unlock a particular one of the access control devices, such that biometric activation is not required if the particular access control device is not unlocked, and further, the biometric activation step is performed by the person using a biometric capture device that the held biometric key (one of a smart mobile device or a smart wearable device) has, the biometric characteristic may be one of facial information, a fingerprint, a voiceprint, an iris, and a finger vein, and the biometric characteristic capturing device may be one of a camera, a fingerprint grabber, a microphone, an iris grabber, and a finger vein grabber.
The biometric extraction is successful or not S28, if the biometric extraction fails, the identification data is not encrypted into a packet S30, if the biometric extraction succeeds, the action key encrypts the extracted biometric and the identification data into a packet S32, in detail, the person uses a biometric capturing device (e.g., a fingerprint extractor) on the action key to input his/her biometric (e.g., fingerprint) under the guidance of an entrance guard application installed in the smart mobile device or the smart wearable device, when the action key fails to successfully extract the biometric, the hardware identifier in the identification data, the authorized start date and time, and the authorized end date and time are not encrypted into an encrypted packet, and if the action key successfully extracts the biometric, the entrance guard application of the action key encrypts the biometric, the identification data, the authorized start date and time into an encrypted packet, The hardware identifier, the authorized start date and time, and the authorized end date and time in the Identification data are encrypted together to form a sealed packet, and further, a transmission of the sealed packet S34 is performed, the action key transmits the sealed packet to the access control device, that is, after the action key completes the sealed packet, the sealed packet is transmitted to the access control device through wireless communication technologies such as Internet (Internet), mobile network (mobile network), Bluetooth (Bluetooth), Near-field communication (Near-field communication/NFC), or Radio Frequency (Radio Frequency Identification/RFID). The encryption into the package S32 means that the data of the biometric feature, the hardware identifier, the start date and time of the authorization and the end date and time of the authorization are converted into unrecognizable scrambles or symbols by an algorithm.
After the access control device receives the encrypted packet, the encrypted packet is decrypted S36, and the encrypted packet is decrypted using the decryption key to obtain the hardware identifier, the start date and time of the authorization, and the end date and time of the authorization and the biometric characteristic of the hardware identifier and the authorization in the identification data. The decryption key is used for calculating the hardware identifier encrypted to be unrecognizable scrambled code, the start date and time of the authorization and the end date and time of the authorization to be restored to be recognizable data. The decryption by using the decryption key is that the messy codes or symbols which cannot be identified by the encrypted package are decrypted by an algorithm to be restored into the originally identifiable hardware identifier, the biological characteristics, the authorization starting date and time and the authorization ending date and time.
And identifying the decrypted data S38, and after acquiring the biometric characteristic, the hardware identifier, the authorized start date and time, and the authorized end date and time, further identifying whether the decrypted data is correct, if the identification time is before the authorized start date and time or after the authorized end date and time, or if any one of the biometric characteristic and the hardware identifier is wrong, performing locking S40 so that the corresponding access device is kept in the locked state, and if the identification time is between the authorized start date and time and the authorized end date and time, and if both the biometric characteristic and the hardware identifier are correct, performing unlocking S42 so that the corresponding access device is unlocked, so that the person can operate the access device to enter the room by operating a door lock to open the door, for example.
In essence, the biometric identification is to compare the biometric feature obtained after decrypting the encrypted packet with the biometric feature stored in the access control system, and the hardware identifier is to compare the hardware identifier obtained after decrypting the encrypted packet with the hardware identifier of the corresponding access control device, the identification of the hardware identifier helps the access control system to determine whether the access control device to be unlocked is the correct access control device, the identification time is between the start date and time of the authorization and the end date and time of the authorization, the identification time is the current date and time of the identification, and the current date and time can be obtained by a timer inside the access control device or by network connection, and the identification time of the decrypted data is between the start date and time of the authorization and the end date and time of the authorization to prevent the person with the authorization from being overdue And setting the corresponding access control equipment to be in a locking release state.
Assuming that the person selects the second identification type, a manual identity check S70 is performed to confirm the identity of the person, and if the identity is wrong, the electronic key S72 is not provided, and if the identity is correct, the electronic key S74 is provided, and the person can set the selected access control device to the unlocked state by holding the acquired electronic key S74 close thereto. When the person is located near the access control device and the electronic key is close to the access control device, the access control device may activate the electronic key recognition S76, so that the access control device reads the unlocking data in the electronic key and recognizes whether the electronic key is correct S78, if the unlocking data is recognized as wrong, perform locking S82, so that the corresponding access control device is maintained in a locked state, and if the unlocking data is recognized as correct, perform unlocking S84, so that the corresponding access control device is unlocked.
It should be noted that the first identification type or the second identification type in the control method according to the first embodiment of the present invention is not a selection order, that is, the person can decide by himself whether the first identification type or the second identification type is to be used.
The access control method with the double-unlocking mode of the first embodiment of the invention simultaneously provides two identification modes which can be independently operated, namely a first identification mode utilizing biological characteristic identification and a second identification mode utilizing non-biological characteristic identification, so that a person passing through the access control can freely select the first identification mode or the second identification mode for identification, and the access control method has good convenience in use.
In addition, the first embodiment of the access control method with double unlocking mode of the present invention provides two identification modes which can be operated independently for the convenience of the manager, for example, the manager can choose to provide only the first identification mode (biometric identification) under normal conditions, and provide the second identification mode (non-biometric identification) under emergency conditions or in case of a biometric error, such a usage situation can be applied to the room access control management of restaurants and hotels, for example, in the normal condition, the passenger can unlock the access control device of a predetermined room by using the biometric identification mode, if the biometric identification fails, the passenger can successfully obtain the electronic key from the counter of the restaurant or hotel through manual identity check, and can also unlock the access control device of the corresponding room further into the room, or when an emergency condition occurs and the passenger needs to enter the room, a restaurant or hotel manager can forcibly enter a room without biometrics using an electronic key, and thus has great convenience for use in a multi-room environment such as a restaurant, a hotel, and an environment where people enter and exit are not specified.
Referring to fig. 2, in a second embodiment of the access control method, after the first identification type is successfully identified, the second identification type is further performed, and after the second identification type is successfully identified, the corresponding access control device will unlock the lock state, specifically, first, after the person uses the biometric capturing device of the smart mobile device or the smart wearable device to capture the biometric through guidance of the access application program, the person transmits the biometric S19, and the action key transmits the captured biometric to the access control system through the Internet or mobile network (mobile network) for storage.
After receiving the biological characteristics transmitted by the intelligent action device or the intelligent wearing device of the person, the access control system returns a hardware identifier containing the exclusive property of the corresponding access control equipment and identification data of the authorization start date and time and the authorization end date and time to the intelligent action device or the intelligent wearing device of the person for storage, so that the intelligent action device or the intelligent wearing device forms an action key.
Upon arrival of the person (e.g., at the counter of the restaurant), a manual identity check S70 is performed to confirm the identity of the person, and if the identity is wrong, the electronic key S72 is not provided, and if the identity is correct, the electronic key S74 (e.g., an access card) is provided.
Performing biometric activation S22, if the person is far from the corresponding access control device, determining not to activate biometric, such that the person does not retrieve the biometric feature S24, if the person is close to the corresponding access control device, using an access control application of the action key to guide the retrieval of the biometric feature S26, further determining whether the biometric feature was successfully retrieved by the action key S28, if the biometric feature was not successfully retrieved, the biometric feature is not encrypted into a packet S30, i.e., in a state lacking the biometric feature, the access control application of the action key will not encrypt the hardware identifier and the authorization start date and time and the authorization end date and time into a packet, but if the biometric was successfully retrieved, the action key uses the access control application to encrypt the biometric, the hardware identifier, the authorization start date and time and the authorization end date and time into a packet S32, the action key transmits the encrypted packet S34 to the corresponding access control device, and the corresponding access control device decrypts the encrypted packet S36 after receiving the encrypted packet, and further obtains the biometric feature, the hardware identifier, the authorization start date and time, and the authorization end date and time in the encrypted packet.
Recognizing the decrypted data S38, the access control device comparing the obtained biometric with the biometric stored in the access control system and comparing the obtained hardware identifier with the hardware identifier of the access control device, further determining whether the time of the recognition is between the authorization start date and time and the authorization end date and time, if the recognition time is before the authorization start date and time or after the authorization end date and time or if any one of the biometric identifier and the hardware identifier is wrong, performing locking S40 so that the access control device is locked, if the recognition time is between the authorization start date and time and the authorization end date and time and both the biometric identifier and the hardware identifier are correct, performing electronic key recognition S76 so that the person needs to approach the obtained electronic key to the access control device, the method comprises the steps that the entrance guard equipment reads unlocking data in the electronic key and further identifies whether the electronic key is correct or not S78, if the unlocking data are identified to be wrong, the electronic key identifies the wrong and performs locking keeping S82, so that the corresponding entrance guard equipment is kept in a locked state, and if the unlocking data are identified to be correct, the electronic key identifies the right and further performs unlocking S84, so that the corresponding entrance guard equipment is unlocked.
Referring to fig. 3, the dual-unlocking type access control method of the present invention provides another control method matching the first and second identification types, and basically, the first identification type is executed after the second identification type is successful, and the access control device corresponding to the first and second identification types is unlocked, specifically, the biometric feature S19 is first transmitted, and the action key transmits the captured biometric feature to the access control system for storage through the Internet or the mobile network.
After receiving the biological characteristics transmitted by the intelligent action device or the intelligent wearing device of the person, the access control system returns a hardware identifier containing the exclusive property of the corresponding access control equipment and identification data of the authorization start date and time and the authorization end date and time to the intelligent action device or the intelligent wearing device of the person for storage, so that the intelligent action device or the intelligent wearing device forms an action key.
Upon arrival of the person (e.g., at the counter of the restaurant), a manual identity check S70 is performed to confirm the identity of the person, and if the identity is wrong, the electronic key S72 is not provided, and if the identity is correct, the electronic key S74 (e.g., an access card) is provided.
When the person approaches the access control device, the electronic key recognition S76 is started, and actually the electronic key is approached to the access control device, so that the access control device reads the unlocking data in the electronic key and recognizes whether the electronic key is correct S78, if the unlocking data is recognized as incorrect, the locking is kept S82, so that the corresponding access control device is kept in the locked state, if the unlocking data is recognized as correct, the biometric recognition is started S27, the access control application program of the action key guides the person to input the biometric features, and the action key identifies whether the biometric feature extraction is successful S28, if the biometric feature extraction fails, the access control application program of the action key is not encrypted into the packet S30, that is, in the absence of the biometric features, the access control application program of the action key does not encrypt the hardware identifier, the authorization start date and time, and the authorization end date and time into the packet, if the biometric extraction is successful, the action key uses the access control application to encrypt the biometric, the hardware identifier, the authorization start date and time, and the authorization end date and time into a packet S32, and further the action key transmits a sealed packet S34 to the corresponding access control device, and the corresponding access control device receives the sealed packet and then decrypts the sealed packet S36, thereby further obtaining the biometric, the hardware identifier, the authorization start date and time, and the authorization end date and time in the sealed packet.
And identifying the decrypted data S38, wherein the access control device compares whether the acquired biological characteristics are the same as the biological characteristics stored in the access control system, compares whether the acquired hardware identifiers are the same as the hardware identifiers of the access control device, further judges whether the time during identification is between the authorization starting date and time and the authorization ending date and time, if the identification time is before the authorization starting date and time or after the authorization ending date and time or any one of the biological characteristics and the hardware identifiers is wrong, executes locking S40 to keep the access control device in a locked state, and if the identification time is between the authorization starting date and time and the authorization ending date and time and both the biological characteristics and the hardware identifiers are correct, executes unlocking S42 to unlock the corresponding access control device.
The second and third embodiments of the present invention provide a door control method with a double-unlocking type by matching the first and second identification types, which provides a higher security door control, that is, because the corresponding door control device will be unlocked only when the first and second identification types are successfully identified, if the electronic key (such as the door control card) is lost, the person who picks up the electronic key will not be able to unlock the corresponding door control device, so the use of the method has a better security.
In addition, the second and third embodiments of the present invention with the double-unlocking type access control method require inputting the biometric feature during unlocking the access device, so that the identity of the person passing through the access can be confirmed and recorded, which is helpful for access control.
While the basic teachings of the present invention have been described, numerous extensions and variations will be apparent to those of ordinary skill in the art. For example, the identification data may not include an authorization start time and date and an authorization end time and date, since the authorization start time and date and the authorization end time and date are only helpful for temporary access control of unspecified persons, but are not necessary for long-term access control of specified persons.
As the present invention disclosed in the specification may be embodied in other specific forms without departing from the spirit or essential characteristics thereof, and some of these specific forms have been indicated, the embodiments disclosed in the specification should be considered as illustrative and not restrictive. The scope of the invention is indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are intended to be embraced therein.

Claims (9)

1. A door control method with double unlocking recognition patterns is characterized by comprising the following steps:
selecting an identification mode, and selecting a first identification type or a second identification type to be used;
if the first identification is selected, the biological characteristics are transmitted, and an intelligent mobile device or an intelligent wearable device is used for capturing the biological characteristics and transmitting the biological characteristics to an access control system for storage;
the door control system transmits identification data containing a hardware identifier of corresponding door control equipment to an intelligent action device or an intelligent wearing device to be stored to form an action key;
whether the biological recognition is started or not, if the biological recognition is not started, the action key does not capture the biological characteristics, and if the biological recognition is started, the action key is used for capturing the biological characteristics;
whether the biological feature capturing is successful or not, if the biological feature capturing is failed, the identification data are not encrypted into a packet, and if the biological feature capturing is successful, the action key encrypts the captured biological feature and the identification data into a packet;
transmitting the sealed package, and transmitting the sealed package to the access control equipment by the action key;
decrypting the encrypted packet, and decrypting the encrypted packet to obtain identification data and biological characteristics;
identifying the decrypted data, and keeping locking if any one of the biological characteristics and the hardware identifier is identified to be wrong, so that the access control equipment is kept in a locking state;
if the biological characteristics and the hardware identifiers are identified to be correct, unlocking is executed, and the corresponding access control equipment is unlocked;
or selecting the second type of recognition, executing manual identity check to confirm the identity of the personnel, if the identity is wrong, not providing the electronic key, and if the identity is correct, providing the electronic key;
starting electronic key identification, and enabling the electronic key to be close to the access control equipment, so that the access control equipment reads unlocking data in the electronic key;
and identifying whether the electronic key is correct, if so, executing locking to keep the corresponding access control equipment in a locked state, and if so, executing unlocking to enable the corresponding access control equipment to be unlocked.
2. The method of claim 1, wherein the transmitted identification data further comprises an authorized start date, time, and an authorized end date, time, and when encrypting into a packet, the authorized start date, time, authorized end date, time, hardware identifier, and biometric characteristic are encrypted into a packet, and when identifying that the hardware identifier and the biometric characteristic are both correct and the identified time is before the authorized start date, time or after the authorized end date, time, locking is performed, and when identifying that the hardware identifier and the biometric characteristic are both correct and the identified time is between the authorized start date, time, and the authorized end date, time, unlocking is performed.
3. The dual unlock recognition type access control method according to claim 1, wherein the biometric feature is one of face information, fingerprint, voiceprint, iris, and finger vein of the mobile key holder.
4. A door control method with double unlocking recognition patterns is characterized by comprising the following steps:
transmitting the biological characteristics, using an intelligent mobile device or an intelligent wearable device to capture the biological characteristics and transmitting the biological characteristics to an access control system for storage;
the door control system transmits identification data containing a hardware identifier of corresponding door control equipment to an intelligent action device or an intelligent wearing device to be stored to form an action key;
the manual identity check is used for confirming the identity of a person, if the identity is wrong, the electronic key is not provided, and if the identity is correct, the electronic key is provided;
whether the biological recognition is started or not, if the biological recognition is not started, the action key does not capture the biological characteristics, and if the biological recognition is started, the action key is used for capturing the biological characteristics;
whether the biological feature capturing is successful or not, if the biological feature capturing is failed, the identification data are not encrypted into a packet, and if the biological feature capturing is successful, the action key encrypts the captured biological feature and the identification data into a packet;
transmitting the sealed package, and transmitting the sealed package to the access control equipment by the action key;
decrypting the encrypted packet, and decrypting the encrypted packet to obtain identification data and biological characteristics;
identifying the decrypted data, and keeping locking if any one of the biological characteristics and the hardware identifier is identified to be wrong, so that the access control equipment is kept in a locking state;
if the recognized biological characteristics and the hardware identifier are both correct, unlocking is executed, electronic recognition is started, the electronic key is close to the access control equipment, and the access control equipment reads unlocking data in the electronic key;
and identifying whether the electronic key is correct, if so, executing locking to keep the corresponding access control equipment in a locked state, and if so, executing unlocking S84 to release the corresponding access control equipment from the locked state.
5. The method as claimed in claim 4, wherein the transmitted identification data further includes an authorized start date, time and an authorized end date, time, and the authorized start date, time, the authorized end date, time, the hardware identifier and the biometric feature are encrypted together into a packet when the encryption into the packet is performed, the locking is performed when the hardware identifier and the biometric feature are recognized to be correct and the recognized time is before the authorized start date, time or after the authorized end date, time, and the unlocking is performed between the authorized start date, time and the authorized end date, time when the hardware identifier and the biometric feature are recognized to be correct and the recognized time.
6. The dual unlock recognition type access control method according to claim 4, wherein the biometric feature is one of face information, fingerprint, voiceprint, iris, and finger vein of the mobile key holder.
7. A door control method with double unlocking recognition patterns is characterized by comprising the following steps:
transmitting the biological characteristics, using an intelligent mobile device or an intelligent wearable device to capture the biological characteristics and transmitting the biological characteristics to an access control system for storage;
the door control system transmits identification data containing a hardware identifier of corresponding door control equipment to an intelligent action device or an intelligent wearing device to be stored to form an action key;
the manual identity check is used for confirming the identity of a person, if the identity is wrong, the electronic key is not provided, and if the identity is correct, the electronic key is provided;
starting electronic key identification, and enabling the electronic key to be close to the access control equipment, so that the access control equipment reads unlocking data in the electronic key;
identifying whether the electronic key is correct, if the unlocking data is identified to be wrong, executing locking to keep the corresponding access control equipment in a locked state, and if the unlocking data is identified to be correct, starting biological identification and using an action key to capture biological characteristics;
whether the biological feature capturing is successful or not, if the biological feature capturing is failed, the identification data are not encrypted into a packet, and if the biological feature capturing is successful, the action key encrypts the captured biological feature and the identification data into a packet;
transmitting the sealed package, and transmitting the sealed package to the access control equipment by the action key;
decrypting the encrypted packet, and decrypting the encrypted packet to obtain identification data and biological characteristics;
identifying the decrypted data, and keeping locking if any one of the biological characteristics and the hardware identifier is identified to be wrong, so that the access control equipment is kept in a locking state;
and if the biological characteristics and the hardware identifier are identified to be correct, unlocking is executed, and the corresponding access control equipment is unlocked.
8. The method as claimed in claim 7, wherein the transmitted identification data further includes an authorized start date, time and an authorized end date, time, and the authorized start date, time, the authorized end date, time, the hardware identifier and the biometric feature are encrypted together into a packet when the encryption into the packet is performed, the locking is performed when the hardware identifier and the biometric feature are recognized to be correct and the recognized time is before the authorized start date, time or after the authorized end date, time, and the unlocking is performed between the authorized start date, time and the authorized end date, time when the hardware identifier and the biometric feature are recognized to be correct and the recognized time.
9. The dual unlock recognition type access control method according to claim 7, wherein the biometric feature is one of face information, fingerprint, voiceprint, iris, and finger vein of the mobile key holder.
CN201811223571.6A 2018-10-19 2018-10-19 Entrance guard control method with double unlocking recognition modes Withdrawn CN111080844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811223571.6A CN111080844A (en) 2018-10-19 2018-10-19 Entrance guard control method with double unlocking recognition modes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811223571.6A CN111080844A (en) 2018-10-19 2018-10-19 Entrance guard control method with double unlocking recognition modes

Publications (1)

Publication Number Publication Date
CN111080844A true CN111080844A (en) 2020-04-28

Family

ID=70309287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811223571.6A Withdrawn CN111080844A (en) 2018-10-19 2018-10-19 Entrance guard control method with double unlocking recognition modes

Country Status (1)

Country Link
CN (1) CN111080844A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112348999A (en) * 2020-09-23 2021-02-09 深圳Tcl新技术有限公司 Electronic lock control method, electronic lock and computer readable storage medium
TWI776755B (en) * 2021-12-16 2022-09-01 一德金屬工業股份有限公司 How to operate the lock
CN116653854A (en) * 2023-07-11 2023-08-29 浙江春风动力股份有限公司 motorcycle

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104157045A (en) * 2014-07-07 2014-11-19 广东建邦计算机软件有限公司 Entrance guard control method and system
TWM513256U (en) * 2015-09-11 2015-12-01 I Tek Metal Mfg Co Ltd Operating control system using mobile device
CN106157407A (en) * 2016-07-05 2016-11-23 孔尧 Intelligent entrance guard control method and device
TWM544552U (en) * 2017-03-17 2017-07-01 I-Tek Metal Manufacturing Co Ltd Lock device control system
CN207568353U (en) * 2017-12-04 2018-07-03 深圳市爱迪尔电子有限公司 There are many smart locks of unlocking mode for a kind of band
CN108364382A (en) * 2018-02-02 2018-08-03 北京车和家信息技术有限公司 Access permission acquisition methods and device
CN108537917A (en) * 2018-02-07 2018-09-14 青岛海尔智能家电科技有限公司 Identification success rate improvement method and intelligent door lock, doorway machine and server

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104157045A (en) * 2014-07-07 2014-11-19 广东建邦计算机软件有限公司 Entrance guard control method and system
TWM513256U (en) * 2015-09-11 2015-12-01 I Tek Metal Mfg Co Ltd Operating control system using mobile device
CN106157407A (en) * 2016-07-05 2016-11-23 孔尧 Intelligent entrance guard control method and device
TWM544552U (en) * 2017-03-17 2017-07-01 I-Tek Metal Manufacturing Co Ltd Lock device control system
CN207568353U (en) * 2017-12-04 2018-07-03 深圳市爱迪尔电子有限公司 There are many smart locks of unlocking mode for a kind of band
CN108364382A (en) * 2018-02-02 2018-08-03 北京车和家信息技术有限公司 Access permission acquisition methods and device
CN108537917A (en) * 2018-02-07 2018-09-14 青岛海尔智能家电科技有限公司 Identification success rate improvement method and intelligent door lock, doorway machine and server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112348999A (en) * 2020-09-23 2021-02-09 深圳Tcl新技术有限公司 Electronic lock control method, electronic lock and computer readable storage medium
TWI776755B (en) * 2021-12-16 2022-09-01 一德金屬工業股份有限公司 How to operate the lock
CN116653854A (en) * 2023-07-11 2023-08-29 浙江春风动力股份有限公司 motorcycle

Similar Documents

Publication Publication Date Title
TWI662177B (en) Access control method with double unlock recognition pattern
US9953151B2 (en) System and method identifying a user to an associated device
EP0924657B2 (en) Remote idendity verification technique using a personal identification device
EP0924656B2 (en) Personal identification FOB
US8437477B2 (en) Key information issuing device, wireless operation device, and program
KR101542517B1 (en) Biometric key
US8131260B2 (en) Mobile communication device, mobile communication device control program, and mobile communication device control method
US9218473B2 (en) Creation and authentication of biometric information
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN111080844A (en) Entrance guard control method with double unlocking recognition modes
US20050226475A1 (en) Method of, and system for, accessing a home or dwelling
KR102243963B1 (en) System for managing attendance using face recognition
TW201545125A (en) Access control apparatus and register system and register method thereof
KR100965428B1 (en) The system and operating method using two different positioned intelligent cameras for automatic verification of authenticated person's entrance
CN110223430A (en) A kind of control method of electronic lock, device and electronic lock
CN108447162A (en) Access Control Method Based on Face Recognition
CN110111464A (en) A kind of individual palpation key controller entrance guard safety system
CN107516371B (en) Verification and identification method and hotel intelligent card system
KR20100010465A (en) Apparatus and method for managing entrance using pin and biometrics
KR101834181B1 (en) Access control system using certification schedule of multi certification device
CN109243014A (en) Access control system and the double mirror unlocking methods of gate inhibition
KR20070042362A (en) Authentication apparatus of doorlock using venous blood sensing and method for operating the same
KR20170026920A (en) System and Method for Controlling Door Lock Based on Z-Wave Using Smart Device
KR101255733B1 (en) Method of generating cyber key and system for the same
US10057258B2 (en) Biometric identification device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200428

WW01 Invention patent application withdrawn after publication