CN111104663A - Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system - Google Patents

Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system Download PDF

Info

Publication number
CN111104663A
CN111104663A CN201911019005.8A CN201911019005A CN111104663A CN 111104663 A CN111104663 A CN 111104663A CN 201911019005 A CN201911019005 A CN 201911019005A CN 111104663 A CN111104663 A CN 111104663A
Authority
CN
China
Prior art keywords
fingerprint
access control
current access
control equipment
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911019005.8A
Other languages
Chinese (zh)
Other versions
CN111104663B (en
Inventor
邓震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Debi Innovation Technology Development Co ltd
Original Assignee
Shanghai Debi Innovation Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Debi Innovation Technology Development Co ltd filed Critical Shanghai Debi Innovation Technology Development Co ltd
Priority to CN201911019005.8A priority Critical patent/CN111104663B/en
Publication of CN111104663A publication Critical patent/CN111104663A/en
Application granted granted Critical
Publication of CN111104663B publication Critical patent/CN111104663B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A fingerprint device operation method and device, a storage medium, a cloud server and a fingerprint operation system are provided, and the fingerprint device operation method comprises the following steps: receiving identification information of current access control equipment uploaded by user equipment, wherein the identification information of the current access control equipment is obtained by establishing connection between the user equipment and the current access control equipment; searching authorization information of a current account used by the user equipment, and verifying the authorization information, the current account and identification information of the current access control equipment, wherein the authorization information comprises an association relation between the identification information of the access control equipment to be accessed and the current account used by the user equipment; and if the verification is passed, sending an operation instruction to the current access control equipment so that the current access control equipment responds to the starting instruction to wait for a fingerprint input state or delete the fingerprint. The technical scheme of the invention can realize the convenience of the operation of the fingerprint equipment of the access control equipment.

Description

Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system
Technical Field
The invention relates to the technical field of computers, in particular to a fingerprint device operation method and device, a storage medium, a cloud server and a fingerprint operation system.
Background
The traditional fingerprint access (lock) device mostly adopts a relatively complex key operation for entering a fingerprint, for example, an administrator needs to input a series of keys like ". 1. 12371. 1283" on a touch panel of the device, and then a user needing to enter the fingerprint starts to enter the fingerprint in a fingerprint area of the device.
However, the operation mode of fingerprint input in the prior art has the following problems: the administrator needs to memorize a relatively complex operation instruction, and the operation method needs to be memorized by means of an equipment specification under the condition that the replacement administrator or the administrator forgets; when a user needs to change or input a fingerprint, an administrator needs to be matched on the spot, and inconvenience is brought to the user when the user uses the access control device.
Disclosure of Invention
The technical problem solved by the invention is how to realize the convenience of the operation of the fingerprint equipment of the access control equipment.
In order to solve the foregoing technical problem, an embodiment of the present invention provides a fingerprint device operating method, where the fingerprint device operating method includes: receiving identification information of current access control equipment uploaded by user equipment, wherein the identification information of the current access control equipment is obtained by establishing connection between the user equipment and the current access control equipment; searching authorization information of a current account used by the user equipment, and verifying the authorization information, the current account and identification information of the current access control equipment, wherein the authorization information comprises an association relation between the identification information of the access control equipment to be accessed and the current account used by the user equipment; and if the verification is passed, sending an operation instruction to the current access control equipment so that the current access control equipment responds to the starting instruction to enter a fingerprint waiting equipment operation state or delete the fingerprint.
Optionally, the operating instruction is a start instruction, and the sending of the operating instruction to the current access control device makes the current access control device respond to the operating instruction to enter a waiting fingerprint entry state or delete a fingerprint include: and sending the starting instruction to the current access control equipment so as to enable the current access control equipment to respond to the starting instruction to enter a waiting fingerprint input state, so that the current access control equipment can acquire the fingerprint.
Optionally, before receiving the identification information of the current access control device uploaded by the user equipment, the method further includes: determining that the user equipment accesses by using the current account through an invitation link, wherein the invitation link comprises identification information of the access control equipment to be accessed; and establishing association between the identification information of the access control equipment to be accessed and the current account to form authorization information aiming at the access control equipment to be accessed, and issuing the authorization information to the user equipment.
Optionally, the fingerprint device operation method further includes: receiving a fingerprint index from the current access control device, wherein the fingerprint index is generated by the current access control device aiming at the user fingerprint; and storing the fingerprint index.
Optionally, the fingerprint device operation method further includes: receiving a fingerprint index from the user device, the fingerprint index being generated by the current access control device for the user fingerprint, and the fingerprint index being sent by the current access control device to the user device via the connection; and storing the fingerprint index.
Optionally, the user equipment and the current access control equipment are connected in a short-distance wireless communication mode.
Optionally, the sending the start instruction to the current access control device includes: directly sending the starting instruction to the current access control equipment; or forwarding the starting instruction to the current access control equipment through the user equipment.
Optionally, the operation instruction is a delete fingerprint instruction, and the sending of the operation instruction to the current access control device makes the current access control device respond to the operation instruction to enter a waiting fingerprint input state or delete a fingerprint include: and sending the fingerprint deleting instruction to the current access control equipment so that the access control equipment responds to the fingerprint deleting instruction to delete the fingerprint in the current access control equipment.
Optionally, the receiving the identification information of the current access control device uploaded by the user equipment includes: receiving identification information of the current access control equipment uploaded by the user equipment and a fingerprint deleting request, wherein the fingerprint deleting request comprises a fingerprint index, and the access control equipment responds to the fingerprint deleting instruction to delete the fingerprint indicated by the fingerprint index.
In order to solve the above technical problem, an embodiment of the present invention further discloses a fingerprint device operating apparatus, where the fingerprint device operating apparatus includes: the system comprises an identification information receiving module, a storage module and a processing module, wherein the identification information receiving module is used for receiving identification information of current access control equipment uploaded by user equipment, and the identification information of the current access control equipment is obtained by establishing connection between the user equipment and the current access control equipment; the verification module is used for searching authorization information of a current account used by the user equipment and verifying the authorization information, the current account and identification information of the current access control equipment, wherein the authorization information comprises an association relation between the identification information of the access control equipment to be accessed and the current account used by the user equipment; and the fingerprint equipment operation module is used for sending an operation instruction to the current access control equipment if the verification is passed so that the current access control equipment responds to the starting instruction to enter a waiting fingerprint input state or delete the fingerprint.
The embodiment of the invention also discloses a storage medium, wherein a computer instruction is stored on the storage medium, and the fingerprint equipment operation method is executed when the computer instruction runs.
The embodiment of the invention also discloses a cloud server which comprises a memory and a processor, wherein the memory is stored with computer instructions capable of running on the processor, and the processor executes the fingerprint equipment operation method when running the computer instructions.
The embodiment of the invention also discloses a fingerprint operating system, which comprises: the cloud server; the entrance guard equipment is used for inputting the fingerprint or deleting the fingerprint; user equipment comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, when executing the computer instructions, performing the method steps of the texture device operation.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following beneficial effects:
according to the technical scheme, the authorization information can be preset, when the fingerprint is input, the identification information of the current access control equipment and the current account used by the user equipment are compared with the authorization information, and when the fingerprint passes verification, the access control equipment is triggered to enter a waiting fingerprint equipment operation state or delete the fingerprint through a starting instruction, so that the input or deletion of the user fingerprint is realized. According to the technical scheme, the defects caused by the fact that operation of fingerprint equipment needs manual whole-course participation in the prior art are overcome, the operation flow of the fingerprint equipment is simplified through a series of interactions of the user equipment, the access control equipment and the cloud server, convenience in operation of the fingerprint equipment of the access control equipment is achieved, and meanwhile safety of fingerprint access control management is improved.
Further, determining that the user equipment accesses by using the current account through an invitation link, wherein the invitation link comprises identification information of the access control equipment to be accessed; and establishing association between the identification information of the access control equipment to be accessed and the current account to form authorization information aiming at the access control equipment to be accessed, and issuing the authorization information to the user equipment. According to the technical scheme, before the fingerprint is input, the user equipment can access the cloud server through the invitation link, and the cloud server can establish association by using the identification information of the access control equipment in the invitation link and the current account used by the user equipment to form authorization information, so that the safety of subsequent fingerprint equipment operation is ensured.
Further, a fingerprint deleting request from the current account for the access control equipment is obtained, wherein the fingerprint request comprises a fingerprint index; verifying whether the current account has administrator authority or not, or verifying whether the current account and the access control equipment have an association relation or not; and if the verification is passed, sending a fingerprint deleting instruction to the current access control equipment so that the access control equipment responds to the fingerprint deleting instruction to delete the fingerprint indicated by the fingerprint index. According to the technical scheme, when the input fingerprint is deleted, the identity of the account sending the fingerprint deleting request can be verified, and after the verification is passed, the fingerprint deleting instruction triggers the entrance guard equipment to delete the fingerprint, so that the convenience of fingerprint deletion is realized.
Drawings
FIG. 1 is a flow chart of a method of operating a fingerprint device in accordance with an embodiment of the present invention;
FIG. 2 is a data flow diagram of a method of operating a fingerprint device in accordance with an embodiment of the present invention;
FIG. 3 is a flow chart of another method of operation of a fingerprinting device in accordance with an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an operating apparatus of a fingerprint device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another fingerprint device operating apparatus according to an embodiment of the present invention.
Detailed Description
As mentioned in the background, the operation of prior art fingerprint devices has several problems: the administrator needs to memorize a relatively complex operation instruction, and the operation method needs to be memorized by means of an equipment specification under the condition that the replacement administrator or the administrator forgets; when a user needs to change or input a fingerprint, an administrator needs to be matched on the spot, and inconvenience is brought to the user when the user uses the access control device.
According to the technical scheme, the defects caused by the fact that operation of fingerprint equipment needs manual whole-course participation in the prior art are overcome, the operation flow of the fingerprint equipment is simplified through a series of interactions of the user equipment, the access control equipment and the cloud server, convenience in operation of the fingerprint equipment of the access control equipment is achieved, and meanwhile safety of fingerprint access control management is improved.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below.
Fig. 1 is a flowchart of a method for operating a fingerprint device according to an embodiment of the present invention.
The fingerprint device operation method can be used on the cloud server side, that is, the cloud server can execute the steps of the method shown in fig. 1.
The fingerprint device operating method may include the steps of:
step S101: receiving identification information of current access control equipment uploaded by user equipment, wherein the identification information of the current access control equipment is obtained by establishing connection between the user equipment and the current access control equipment;
step S102: searching authorization information of a current account used by the user equipment, and verifying the authorization information, the current account and identification information of the current access control equipment, wherein the authorization information comprises an association relation between the identification information of the access control equipment to be accessed and the current account used by the user equipment;
step S103: and if the verification is passed, sending an operation instruction to the current access control equipment so that the current access control equipment responds to the operation instruction to enter a waiting fingerprint input state or delete the fingerprint.
It should be noted that the sequence numbers of the steps in this embodiment do not represent a limitation on the execution sequence of the steps.
In this embodiment, each access control device has identification information, which may be, for example, a serial number composed of characters, and the identification information can uniquely point to the access control device.
In specific implementation, the user equipment may establish a connection with the current access control device before the fingerprint device operates, and through the connection, data may be transmitted between the user equipment and the current access control device, for example, the current access control device transmits its identification information to the user equipment through the connection. Specifically, the user equipment may be any implementable intelligent terminal equipment, such as a mobile phone, a computer, a tablet computer, and the like.
In a specific embodiment, the user equipment and the current access control equipment may establish a connection by using a short-range wireless communication manner. The short-range wireless Communication mode may be bluetooth, ZigBee, WIFI, Near Field Communication (NFC), or the like.
In the specific implementation of step S101, the user equipment may access the cloud server, and upload the identification information of the current access control device to the cloud server. The user equipment may specifically access the cloud server by means of a web page or an APPlication (APP).
In a specific implementation of step S102, the authorization information of the current account may be preset, and for example, may be obtained by a user equipment through a previous application. Therefore, after receiving the identification information of the current access control device uploaded by the user equipment, the cloud server can search the authorization information of the current account, if the authorization information exists, the current account obtains the authorization of the fingerprint device operation, the identification information of the access control device to be accessed in the authorization information is compared with the identification information of the current access control device, and whether the identification information of the access control device to be accessed in the authorization information is consistent with the identification information of the current access control device is also compared.
Or, if the authorization information of the current account used by the user equipment does not exist, the current account does not obtain the authorization of the fingerprint equipment operation, and the subsequent fingerprint equipment operation step is not executed. Further, a prompt message may be sent to the user equipment, so that the user equipment knows that the user equipment does not have the right to perform the fingerprint device operation.
Further, if the identification information of the access control equipment to be accessed in the authorization information is consistent with the identification information of the current access control equipment, the verification is passed; otherwise, it indicates that the verification failed.
Further, in the specific implementation of step S103, if the verification is passed, which indicates that the user equipment has the authorization to enter the fingerprint into the current access control device, a start instruction may be sent to the current access control device. The current entrance guard's equipment can respond to start instruction gets into waits for fingerprint equipment operating condition, and afterwards, the user can type in the fingerprint on user equipment, so that current entrance guard's equipment can acquire the fingerprint. For example, a user directly presses a fingerprint sensor on a current access control device to enter a fingerprint.
And if the verification fails, the user equipment does not have the authorization of entering the fingerprint into the current access control equipment, and the starting instruction is not sent to the current access control equipment.
According to the technical scheme, the authorization information can be preset, when the fingerprint is input, the identification information of the current access control equipment and the current account used by the user equipment are compared with the authorization information, and when the identification information passes verification, the access control equipment is triggered to enter a state waiting for the operation of the fingerprint equipment through a starting instruction, so that the input of the user fingerprint is realized. According to the technical scheme, the defects caused by the fact that operation of fingerprint equipment needs manual whole-course participation in the prior art are overcome, the operation flow of the fingerprint equipment is simplified through a series of interactions of the user equipment, the access control equipment and the cloud server, convenience in operation of the fingerprint equipment of the access control equipment is achieved, and meanwhile safety of fingerprint access control management is improved.
In one non-limiting embodiment, step S101 shown in fig. 1 may be preceded by the following steps:
determining that the user equipment accesses by using the current account through an invitation link, wherein the invitation link comprises identification information of the access control equipment to be accessed; and establishing association between the identification information of the access control equipment to be accessed and the current account to form authorization information aiming at the access control equipment to be accessed, and issuing the authorization information to the user equipment.
In this embodiment, the user device may access the cloud server by using the current account via the invitation link, and the invitation link includes the identification information of the access control device to be accessed, so that after receiving the access of the user device, the cloud server may determine that the current account is to obtain the authorization for the access control device to be accessed. In this case, the cloud server may establish an association between the user device and the access control device to be accessed. That is, the cloud server establishes authorization for entering the fingerprint for the access control device to be accessed to the current account.
The authorization information for the access control device to be accessed may include identification information of the access control device to be accessed, a current account, and an association relationship between the identification information of the access control device to be accessed and the current account.
In particular, the invitation link may be sent to the user device by a device having administrator rights. The user equipment can enter an access page of the cloud server after clicking the invitation link, and at the access page, the user equipment can register and log in the cloud server by using the current account so as to use the related services provided by the cloud server. More specifically, the current account may be a third party account, and may be, for example, a social account number in the user device, such as a wechat account number, a QQ account number, or the like.
Further, after the cloud server establishes the authorization information for the access control device to be accessed, the cloud server can store the authorization information in the cloud server so as to be called in time when needed.
In one non-limiting embodiment, the fingerprint device operating method shown in fig. 1 may further include the steps of:
receiving a fingerprint index from the current access control device, wherein the fingerprint index is generated by the current access control device aiming at the user fingerprint; and storing the fingerprint index.
In this embodiment, after receiving a fingerprint input by a user, the current access control device may generate a fingerprint index for the input fingerprint, and the fingerprint index may uniquely point to the fingerprint. The current entrance guard's equipment can be with fingerprint index direct transmission to cloud ware.
And the cloud server stores the received fingerprint index. Further, the cloud server may store the fingerprint index in association with authorization information of the current account.
In one non-limiting embodiment, the fingerprint device operating method shown in fig. 1 may further include the steps of: receiving a fingerprint index from the user device, the fingerprint index being generated by the current access control device for the user fingerprint, and the fingerprint index being sent by the current access control device to the user device via the connection; and storing the fingerprint index.
Different from the foregoing embodiment, the current access control device may forward the fingerprint index to the cloud server through the user equipment. Further, the user equipment may store the fingerprint index.
In a specific application scenario, the current access control device is in an offline state and cannot be in network connection with the cloud server, and in this case, if the fingerprint index is generated by the current access control device, the fingerprint index can be firstly sent to the user equipment through the connection, and then the fingerprint index is forwarded to the cloud server through the user equipment.
In one non-limiting embodiment, step S103 shown in fig. 1 may include the following steps: directly sending the starting instruction to the current access control equipment; or forwarding the starting instruction to the current access control equipment through the user equipment.
In this embodiment, when the current access control device is in network connection with the cloud server, the cloud server may directly send the start instruction to the current access control device.
The current access control equipment is in an off-line state, and can not be in network connection with the cloud server, and under the condition that the user equipment is connected with the current access control equipment (such as Bluetooth connection), the cloud server can transmit the starting instruction to the current access control equipment through the user equipment, so that the starting instruction can be transmitted to the current access control equipment in time.
In a specific application scenario of the present invention, referring to fig. 2, before the fingerprint device operates, the cloud server 103 may execute step S201 to issue the authorization information to the user equipment 101.
When a fingerprint needs to be entered, in step S202, the user device 101 establishes a connection, for example, a bluetooth connection, with the door control device 102. The access control device 102 transmits its own identification information to the user device 101 through bluetooth connection. In step S203, the user device 101 uploads the identification information of the access control device 102 to the cloud server 103.
The cloud server 103 executes step S204, searches for authorization information of a current account used by the user equipment 101, and verifies the authorization information with the current account and identification information of the current access control device 102.
After the verification is passed, in step S205, the cloud server 103 drives the user equipment 101 to send a start instruction to the access control device 102, and the user equipment 101 enters a fingerprint.
In step S206, the access control device 102 generates a fingerprint index for the entered fingerprint.
In step S207, the access control device 102 transmits the fingerprint index to the cloud server 103.
Or in step S208, the access control device 102 forwards the fingerprint to the cloud server 103 through the user device 101.
The embodiment of the present invention further discloses another fingerprint device operation method, referring to fig. 3, the fingerprint device operation method may include the following steps:
step S301: connecting with the current access control equipment, and acquiring identification information of the current access control equipment;
step S302: uploading the identification information of the current access control equipment to a cloud server so that the cloud server searches the authorization information of the current account used by the user equipment and verifies the authorization information, the current account and the identification information of the current access control equipment;
step S303: and if the verification is passed, forwarding an operation instruction from the cloud server to the current access control equipment so that the current access control equipment responds to the operation instruction to enter a waiting fingerprint input state or delete the fingerprint.
In this embodiment, the fingerprint device operation method may be executed by the user equipment, that is, the user equipment executes each step of the method shown in fig. 3.
The current account may be an account used by the user device, the user device may also be a device used by an administrator, or a device used by a general user.
For more specific implementation of the embodiments of the present invention, reference may be made to the foregoing embodiments, which are not described herein again.
In a non-limiting embodiment of the present invention, when the current account needs to delete the fingerprint, a fingerprint deletion request may be sent to the cloud server. Wherein the fingerprint request comprises a fingerprint index, the fingerprint index being capable of uniquely pointing to the fingerprint. I.e. the current account sends a request for the fingerprint to be deleted.
The cloud server can verify whether the current account has administrator authority or not, or the cloud server can verify whether the current account and the access control device have an association relationship or not. That is, the cloud server may verify that the current account has the right to delete the fingerprint indicated by the fingerprint index. Specifically, an account with administrator authority may delete any fingerprint, and an account associated with the access control device may delete a fingerprint in the access control device.
And if the verification is passed, sending a fingerprint deleting instruction to the current access control equipment so that the access control equipment responds to the fingerprint deleting instruction to delete the fingerprint indicated by the fingerprint index. Since a plurality of fingerprints may be stored in the access control device, the access control device may delete only the fingerprint indicated by the fingerprint index.
Specifically, the cloud server can directly send a fingerprint deleting instruction to the access control device, and also can send the fingerprint deleting instruction to the user equipment, and the user equipment forwards the fingerprint deleting instruction to the access control device.
Referring to fig. 4, an embodiment of the present invention further discloses a fingerprint device operating apparatus 40, where the fingerprint device operating apparatus 40 may include:
the identification information receiving module 401 is configured to receive identification information of a current access control device uploaded by a user equipment, where the identification information of the current access control device is obtained by establishing a connection between the user equipment and the current access control device;
a verification module 402, configured to search authorization information of a current account used by the user equipment, and verify the authorization information with the current account and identification information of the current access control device, where the authorization information includes an association relationship between identification information of an access control device to be accessed and the current account used by the user equipment;
the fingerprint device operating module 403 is configured to send an operating instruction to the current access control device if the verification is passed, so that the current access control device enters a waiting fingerprint entry state or deletes a fingerprint in response to the operating instruction.
The embodiment of the invention avoids the defects caused by the fact that the operation of the fingerprint equipment needs manual whole-course participation in the prior art, simplifies the operation flow of the fingerprint equipment through a series of interactions of the user equipment, the access control equipment and the cloud server, realizes the convenience of the operation of the fingerprint equipment of the access control equipment, and simultaneously improves the safety of fingerprint access control management.
Referring to fig. 5, an embodiment of the present invention further discloses another fingerprint device operating apparatus 50, where the fingerprint device operating apparatus 50 may include:
the connection module 501 is configured to connect with a current access control device and obtain identification information of the current access control device;
an uploading module 502, configured to upload the identification information of the current access control device to a cloud server, so that the cloud server searches for authorization information of a current account used by the user equipment, and verifies the authorization information, the current account, and the identification information of the current access control device;
the instruction sending module 503 is configured to forward an operation instruction from the cloud server to the current access control device if the verification is passed, so that the current access control device enters a waiting fingerprint entering state or deletes a fingerprint in response to the operation instruction.
For more details of the working principle and working mode of the fingerprint device operation 40 and the fingerprint device operation 50, reference may be made to the relevant descriptions in fig. 1 to fig. 3, and details are not repeated here.
The embodiment of the invention also discloses a storage medium which is a computer readable storage medium and stores computer instructions, and the computer instructions can execute the steps of the method shown in fig. 1 to 3 when running. The storage medium may include ROM, RAM, magnetic or optical disks, etc. The storage medium may further include a non-volatile memory (non-volatile) or a non-transitory memory (non-transient), and the like.
The embodiment of the invention also discloses a cloud server which can comprise a memory and a processor, wherein the memory stores computer instructions capable of running on the processor. The processor, when executing the computer instructions, may perform the steps of the methods shown in fig. 1-3.
The embodiment of the invention also discloses a fingerprint operating system which comprises a cloud server, at least one access control device and at least one user device.
Wherein, the cloud server can execute each step of the method shown in fig. 1; the entrance guard equipment is used for inputting fingerprints or deleting the fingerprints; the user device comprises a memory and a processor, wherein the memory stores computer instructions executable on the processor, and the processor executes the computer instructions to perform the fingerprint device operation method steps described in fig. 3.
Through data interaction among the cloud server, the at least one access control device and the at least one user equipment, operations such as entering of fingerprints (for example, newly adding fingerprints, updating fingerprints) in the access control device, deleting of the fingerprints and the like can be achieved.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (15)

1. A method of operating a fingerprint device, comprising:
receiving identification information of current access control equipment uploaded by user equipment, wherein the identification information of the current access control equipment is obtained by establishing connection between the user equipment and the current access control equipment;
searching authorization information of a current account used by the user equipment, and verifying the authorization information, the current account and identification information of the current access control equipment, wherein the authorization information comprises an association relation between the identification information of the access control equipment to be accessed and the current account used by the user equipment;
and if the verification is passed, sending an operation instruction to the current access control equipment so that the current access control equipment responds to the operation instruction to enter a waiting fingerprint input state or delete the fingerprint.
2. The fingerprint device operation method according to claim 1, wherein the operation instruction is a start instruction, and the sending of the operation instruction to the current access control device to enable the current access control device to enter a waiting fingerprint entry state or delete a fingerprint in response to the operation instruction comprises:
and sending the starting instruction to the current access control equipment so as to enable the current access control equipment to respond to the starting instruction to enter a waiting fingerprint input state, so that the current access control equipment can acquire the fingerprint.
3. The fingerprint device operating method according to claim 1, wherein before receiving the identification information of the current access control device uploaded by the user device, the method further comprises:
determining that the user equipment accesses by using the current account through an invitation link, wherein the invitation link comprises identification information of the access control equipment to be accessed;
and establishing association between the identification information of the access control equipment to be accessed and the current account to form authorization information aiming at the access control equipment to be accessed, and issuing the authorization information to the user equipment.
4. The fingerprint device operating method according to claim 1, further comprising:
receiving a fingerprint index from the current access control device, wherein the fingerprint index is generated by the current access control device aiming at the user fingerprint;
and storing the fingerprint index.
5. The fingerprint device operating method according to claim 1, further comprising:
receiving a fingerprint index from the user device, the fingerprint index being generated by the current access control device for the user fingerprint, and the fingerprint index being sent by the current access control device to the user device via the connection;
and storing the fingerprint index.
6. The fingerprint device operating method according to claim 1, wherein the user device and the current access control device are connected by short-range wireless communication.
7. The fingerprint device operation method according to claim 1, wherein the sending of the start instruction to the current access control device comprises:
directly sending the starting instruction to the current access control equipment;
or forwarding the starting instruction to the current access control equipment through the user equipment.
8. The fingerprint device operating method according to claim 1, wherein the operating instruction is a delete fingerprint instruction, and the sending of the operating instruction to the current access control device to enable the current access control device to enter a wait fingerprint entry state or delete a fingerprint in response to the operating instruction comprises:
and sending the fingerprint deleting instruction to the current access control equipment so that the access control equipment responds to the fingerprint deleting instruction to delete the fingerprint in the current access control equipment.
9. The fingerprint device operation method according to claim 8, wherein the receiving the identification information of the current access control device uploaded by the user equipment comprises:
receiving identification information of the current access control equipment uploaded by the user equipment and a fingerprint deleting request, wherein the fingerprint deleting request comprises a fingerprint index, and the access control equipment responds to the fingerprint deleting instruction to delete the fingerprint indicated by the fingerprint index.
10. A method of operating a fingerprint device, comprising:
connecting with the current access control equipment, and acquiring identification information of the current access control equipment;
uploading the identification information of the current access control equipment to a cloud server so that the cloud server searches the authorization information of the current account and verifies the authorization information, the current account and the identification information of the current access control equipment;
and if the verification is passed, forwarding an operation instruction from the cloud server to the current access control equipment so that the current access control equipment responds to the operation instruction to enter a waiting fingerprint input state or delete the fingerprint.
11. A fingerprint device operating apparatus, comprising:
the system comprises an identification information receiving module, a storage module and a processing module, wherein the identification information receiving module is used for receiving identification information of current access control equipment uploaded by user equipment, and the identification information of the current access control equipment is obtained by establishing connection between the user equipment and the current access control equipment;
the verification module is used for searching authorization information of a current account used by the user equipment and verifying the authorization information, the current account and identification information of the current access control equipment, wherein the authorization information comprises an association relation between the identification information of the access control equipment to be accessed and the current account used by the user equipment;
and the fingerprint equipment operation module is used for sending an operation instruction to the current access control equipment if the verification is passed so that the current access control equipment responds to the operation instruction to enter a waiting fingerprint input state or delete the fingerprint.
12. A fingerprint device operating apparatus, comprising:
the access control device comprises a connection module, a storage module and a control module, wherein the connection module is used for connecting with the current access control device and acquiring identification information of the current access control device;
the uploading module is used for uploading the identification information of the current access control equipment to a cloud server so that the cloud server searches the authorization information of the current account and verifies the authorization information, the current account and the identification information of the current access control equipment;
and the instruction sending module is used for forwarding the operation instruction from the cloud server to the current access control equipment if the verification is passed so that the current access control equipment responds to the operation instruction to enter a waiting fingerprint input state or delete the fingerprint.
13. A storage medium having stored thereon computer instructions, wherein the computer instructions when executed perform the steps of the method of operating a fingerprint device of any one of claims 1 to 10.
14. A cloud server comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, wherein the processor, when executing the computer instructions, performs the steps of the fingerprint device operation method of any one of claims 1 to 9.
15. A fingerprint operating system, comprising:
the cloud server of claim 14;
the entrance guard equipment is used for inputting the fingerprint or deleting the fingerprint;
user device comprising a memory and a processor, said memory having stored thereon computer instructions executable on said processor, said processor when executing said computer instructions performing the fingerprint device operation method steps of claim 10.
CN201911019005.8A 2019-10-24 2019-10-24 Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system Active CN111104663B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911019005.8A CN111104663B (en) 2019-10-24 2019-10-24 Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911019005.8A CN111104663B (en) 2019-10-24 2019-10-24 Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system

Publications (2)

Publication Number Publication Date
CN111104663A true CN111104663A (en) 2020-05-05
CN111104663B CN111104663B (en) 2024-04-26

Family

ID=70421605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911019005.8A Active CN111104663B (en) 2019-10-24 2019-10-24 Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system

Country Status (1)

Country Link
CN (1) CN111104663B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768527A (en) * 2020-06-30 2020-10-13 惠州拓邦电气技术有限公司 Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN107133530A (en) * 2017-05-23 2017-09-05 崔俊新 A kind of account management method, shared device and computer-readable recording medium
CN109905318A (en) * 2019-03-28 2019-06-18 腾讯科技(深圳)有限公司 Apparatus control method, device and storage medium
US20190197231A1 (en) * 2017-12-21 2019-06-27 Bitstrata Systems Inc. Secure association of an installed application instance with a service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN107133530A (en) * 2017-05-23 2017-09-05 崔俊新 A kind of account management method, shared device and computer-readable recording medium
US20190197231A1 (en) * 2017-12-21 2019-06-27 Bitstrata Systems Inc. Secure association of an installed application instance with a service
CN109905318A (en) * 2019-03-28 2019-06-18 腾讯科技(深圳)有限公司 Apparatus control method, device and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵云鹏;: "基于指纹的门禁系统的研究", no. 32 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768527A (en) * 2020-06-30 2020-10-13 惠州拓邦电气技术有限公司 Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system

Also Published As

Publication number Publication date
CN111104663B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
US20200128003A1 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
US9363251B2 (en) Systems and methods for credential management between electronic devices
CN104902028B (en) A kind of a key login authentication method, apparatus and system
EP3541098B1 (en) Processing method for communication identifier binding and terminal
CN104125485B (en) A kind of user profile shared method, equipment and system
EP3557835B1 (en) Authorization credential migration method, terminal device and service server
US10637805B2 (en) Instant messaging method, server, and storage medium
CN106101091B (en) Method and device for processing data between terminals
CN113453175B (en) 5G message processing method and device, computer equipment and storage medium
CN110602216A (en) Method and device for using single account by multiple terminals, cloud server and storage medium
CN109639421B (en) Method for retrieving private key and server
CN104123350A (en) Social relation management method, device and system
CN111857498B (en) Data interaction method and device and electronic equipment
CN105227579A (en) Access rights method to set up and device
CN111104663B (en) Fingerprint equipment operation method and device, storage medium, cloud server and fingerprint operation system
CN107819729B (en) Data request method and system, access device, storage device and storage medium
WO2024001882A1 (en) Method and apparatus for issuing facial data, and device
CN104967525A (en) News sharing method, apparatus and system
CN106487829B (en) A kind of virtual machine control system, method and user terminal
WO2018019047A1 (en) Set-top box operation method and device
CN104394059A (en) Station establishing method and system based on social application
CN112785312A (en) Information sharing method and device, electronic equipment and readable storage medium
CN105610807A (en) Network identity authentication device and authentication method
WO2015120593A1 (en) Mobile terminal and control method for access control system
CN112069486B (en) Multi-device account login method, account platform and first device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant